Skip to main content

Techno Security & Digital Forensics Conference

Thursday, June 6, 2024

conference image

Thursday, June 6, 2024

The 2024 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
    • Cybersecurity
    Salon F
    This session provides a roadmap for cybersecurity professionals to become "Hacker Minded."Today, cyber career discussions are boxed into certifications and education. The presenter will share the "5 E ...
    • Forensics
    Salon A
    GenAI is here, but are we ready to embrace what has become increasingly accessible to both defensive teams and malicious actors? This session will cover how to find success in implementing GenAI in DF ...
    • Forensics
    Salon E
    Important device information can be identified through the monitoring of raw data sent via USB protocol. iOS devices present sensitive information in the back end even when this information is not see ...
    • eDiscovery
    Salon D
    The number of data sources continues to grow. Leading organizations now have Chief Data Officers to lead the governance and set the direction in dealing with the data sets. Reports are dynamically gen ...
    • Investigations
    Salon C
    Google is everyone's go-to search engine, but most people aren't utilizing it to the full capability. By mastering the art of Google Boolean operators and advanced search features, you will learn how ...
    • Oxygen Forensics Lab
    Salon B
    This hands-on lab session will walk you through operating the analytic features of Oxygen Forensic® Detective. You will explore the following: Facial Categorization, Face Searching, OCR, Image Categor ...
    • Investigations
    Meeting Room 107
    *Pre-registration required (included with your paid registration) I’m a digital forensics examiner (DFE), and I know that I need some scripting skills, but I don’t want to be a full-time programmer. P ...
    • Cybersecurity
    Salon F
    Many modern businesses rely on a cloud environment (if not multiple) to store and host valuable employees, customers, and proprietary data. But cloud security is constantly evolving, emphasizing the n ...
    • Investigations
    Salon A
    This session will explore the revolutionary potential of Generative Pre-trained Transformers (GPTs) in Open-Source Intelligence (OSINT). Attendees will learn to harness Chat GPT for insightful OSINT i ...
    • Investigations
    Salon D
    You've been hired to build a team from the ground up, now what? In this session, you will be presented with the scenarios and questions inherent in developing an Enterprise forensics and eDiscovery te ...
    • Cellebrite Lab
    Salon E
    The dramatic increases in the volume, velocity, and veracity of digital evidence, particularly with mobile devices, can paralyze even the most efficient and effective forensic labs, with examiners mak ...
    • Forensics
    Salon B
    This session outlines a process for identifying USB storage device activities on Windows 11. Leveraging Sysinternals Procmon, we monitor registry changes related to USB insertions, removals, and persi ...
    • Investigations
    Salon F
    Almost all serious crimes nowadays contain a digital footprint, and the effective session of this digital evidence to juries is essential for successful prosecutions. In this session attendees will le ...
    • Forensics
    Salon D
    This session provides a practical walkthrough of extracting employee data from Microsoft 365 using an admin account. Attendees will understand how to identify and export data, investigate user logs, a ...
    • Magnet Forensics Lab
    Salon A
    With ever-growing volumes of digital data flooding digital forensics labs—from chat records to geolocational data, photos, videos, and everything in between—time to evidence is crucial. Automation and ...
    • Cybersecurity
    Salon E
    The state of Generative AI today is reminiscent of the inception of the world wide web's interface to the internet. The chatbots today are in the same way bringing the masses to AI, ready or not. The ...
    • Cybersecurity
    Salon C
    Use of remote user access to enterprise networks has exploded dramatically since the start of the recent COVID pandemic...but due to its often-careless management and use, it has become a dangerous ba ...
    • Investigations
    Salon D
    The session demonstrates real use cases in Brazilian investigations solved using operating system artifacts, metadata, and data collection from open sources. This educational session will delve into p ...
    • Forensics
    Salon F
    This session will cover the importance of testing response plans and procedures through performing tabletop exercises focusing specifically on insider threats. The presenter will discuss *the proper p ...
    • Cybersecurity
    Salon E
    Discover three of the key obfuscation techniques attackers use to break down defenses and exploit systems through undetectable means, including impersonation, trusted site, and human ingenuity techniq ...
    • Magnet Forensics Lab
    Salon A
    • Cellebrite Lab
    Salon B
    Join us as we delve into the intricacies of understanding early data assessment, collection, and analysis of employee devices and commonly used workplace applications, including phones, tablets, lapto ...
    • eDiscovery
    Salon D
    In today’s digital landscape, data is curial to business and legal processes. Managing eDiscovery security risks is vital. This session will enhance your grasp of international standards, introducing ...
    • Cybersecurity
    Salon E
    This session examines the current state of the computer security requirements that have been imposed on defense contractors to protect Controlled Unclassified Information. In the process it examines w ...
    • Forensics
    Salon A
    As digital evidence becomes more prevalent throughout the world this trend also includes the prison system. This case study will follow the Tennessee Department of Correction’s first major digital evi ...
    • Oxygen Forensics Lab
    Salon F
    This session will be informing the purpose, threat, and detection of AI images and videos, addressing the rising concerns surrounding AI-generated visual content and its potential for spreading misinf ...
    • Magnet Forensics Lab
    Salon C
    Surveillance video is utilized in most investigations, but getting the most from the evidence you collect can be difficult. Depending on how it was collected, and what is required, you might be used t ...
    • Cellebrite Lab
    Salon B
    Session description in progress
    • Forensics
    Salon F
    This session focuses on the investigation and forensic analysis of a drone which was recovered from prison contraband smuggling incident. Discussion will cover the capabilities of drones, unique foren ...
    • Forensics
    Salon E
    Digital forensic evidence can convict the guilty or exonerate the innocent. Justice requires transparency in pretrial discovery & scrupulous ethics by all investigators. During this session, attendees ...
    • Forensics
    Salon D
    OSINT is a great mechanism for the collection of data, but what do you do with all of it once it’s collected? For the last 5 years we’ve been exploring Azure and AWS for computer vision to rapidly pro ...
    • Cybersecurity
    Salon C
    The cloud has created opportunities for adoption of emergent technologies, e.g., Artificial Intelligence (AI), that many would have considered out of reach a few years ago. Additionally, data is spann ...
    • Cybersecurity
    Salon B
    This session describes some of the challenges of malware development for Red Team initial access operations, and how continuous integration/continuous development (CICD) pipelines can be employed to a ...