Skip to main content

Techno Security & Digital Forensics Conference

2025 Conference Program

conference image

2025 Conference Program

The 2025 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
Tuesday, June 03, 2025
    • Keynote
    Salon D/E
    Join us for a powerful and eye-opening presentation by Erin West, a leading expert in combating transnational organized crime and the founder of Operation Shamrock. In this engaging one-hour talk, Eri ...
    • Magnet Forensics Lab
    Salon A
    The prominence of mobile data makes it a critical source of evidence in almost every criminal investigation, but the window of opportunity to capture iOS extractions can be extremely small. Between ev ...
    • eDiscovery
    Salon F
    The rise of synthetic data and AI-generated content, including deepfakes, has introduced unprecedented challenges and opportunities in the realms of digital forensics and legal discovery. As these tec ...
    • Forensics
    Salon C
    Artificial Intelligence is revolutionizing every industry, and digital forensics is no exception. But with great power comes great responsibility—and even greater scrutiny. This session will explore h ...
    • Investigations
    Salon E
    In modern investigations, successfully integrating digital forensics, OSINT, wiretaps, and beyond is essential for uncovering hidden connections and tracking criminal behavior. This session will explo ...
    • Cybersecurity
    Salon D
    A ransomware attack is an economic attack against a victim organization by a criminal enterprise. Cyber insurance is most closely associated with this type of attack, but there is another way to under ...
    • Oxygen Forensics Lab
    Salon B
    Attendees will be introduced to remote acquisition of computer and mobile devices through the Oxygen Remote Explorer platform. We will discuss the streamlining concepts of remote collection and analys ...
    • Investigations
    Salon E
    Android version 15 introduced the Private Space feature that allows users to hide sensitive items natively. This session will discuss the nature of this new feature and how it can affect mobile device ...
    • Forensics
    Salon C
    Audio, acoustic and video evidence are common and critical in civil and criminal litigation. Often such evidence is from a computer or mobile device. This session will discuss why proponents and oppon ...
    • Cybersecurity
    Salon F
    In the face of a rapidly expanding attack surface driven by cloud services, IoT devices, and remote work, organizations should include effective Attack Surface Management (ASM) strategies. This sessio ...
    • MSAB Lab
    Salon A
    Join us for an interactive lab designed to familiarize you with MSAB’s powerful mobile device extraction tool, XRY. In this session, you will: Navigate the Menu Options: Gain a comprehensive understan ...
    • Cellebrite Lab
    Salon B
    • Investigations
    Salon D
    U.S. Customs and Border Protection’s Center for Air and Marine Drone Exploitation (CAMDEx) will highlight the latest techniques involving Unmanned System (UxS) forensics. As this genre of digital fore ...
    • MSAB Lab
    Salon A
    Handling XRY files and how to use XAMN Viewer to view and find data.
    • Cellebrite Lab
    Salon B
    • Forensics
    Salon C
    This case study highlights the pivotal role of metadata when no other evidence appears to exist. Through a meticulous analysis of both deleted and hidden metadata, investigators uncovered key evidence ...
    • Cybersecurity
    Salon D
    When AI started to be the technology du jour, many companies decided to integrate it into their own products. The same cybersec teams that worried about potential cybercriminal uses of AI, also tested ...
    • eDiscovery
    Salon F
    Hyperlinked files, sometimes referred to as “modern attachments,” are turning up in legal and technical environments and they are causing headaches for e-discovery, information governance, and forensi ...
    • Cybersecurity
    Salon E
    Organizations say they want more 'shift-left' to reduce vulnerabilities but don't understand how to execute effective solutions that reduce the risk causing senior leadership to become less supportive ...
    • Forensics
    Salon F
    AI is Not Enough to Beat AI: Pragmatic Deepfake Detection This session will explore a holistic approach to discriminating deepfakes from authentic images and videos, including: • Limitations of automa ...
    • Forensics
    Salon C
    Join us for this session where we discover the fundamentals of blockchain technology and its integration into mobile application development. Explore how blockchain extends beyond cryptocurrency, powe ...
    • Investigations
    Salon E
    Windows Event Tracing for Windows (ETW) offers a powerful, native telemetry framework that provides deep insights into system and application behavior. Despite its potential, ETW remains underutilized ...
    • Magnet Forensics Lab
    Salon A
    Join Magnet Forensics’ Jeff Rutherford as he examines the reliability of Apple’s horizontalAccuracy confidence factor when analyzing iPhone geolocation data in forensic investigations. By comparing GP ...
    • Oxygen Forensics Lab
    Salon B
    In an era teeming with digital evidence, the ability to identify and visualize hidden connections is critical to modern investigations. This session delves into the fundamentals and advanced technique ...
    • Forensics
    Meeting Room 107
     The LEAPP suite is a collection of open-source forensic tools designed to empower investigators with efficient methods for parsing and analyzing data across multiple platforms, including iOS, Android ...
    • MSAB Lab
    Salon B
    In this session, we’ll demonstrate how the flexibility of XRY Pro allows for creative methods to access more data and uncover important evidence. Through live demos, we’ll show how XRY Pro’s versatile ...
    • Forensics
    Salon C
    Forensic examination of USB device activity is crucial for many different types of investigations. Findings of connections are useful for proof of data exfiltration and/or identifying further evidence ...
    • Investigations
    Salon F
    A session for Law Enforcement and Private Sector Investigations Professionals to gain a base level knowledge on industry terminology, best practices and a look into how to investigate cryptocurrency u ...
    • Cybersecurity
    Salon D
    As organizations continue to invest in advanced security technologies, we often overlook the essential human element at the heart of the problem. This session challenges the status quo, advocating for ...
    • Investigations
    Salon E
    The session will cover key topics such as case context, evidence identification, prioritization techniques, and case examples. By understanding the nature of the case, investigators can identify key d ...
    • Cellebrite Lab
    Salon B
    • Cybersecurity
    Salon E
    This session will focus on combatting advanced synthetic identities through a multi-layered, technology-driven approach including: Implementing machine learning, applying multi-source verifications an ...
    • Forensics
    Salon C
    This session will walk through the forensics of a case related to the alleged theft of high value company data. This case is a real whodunit - a riddle, wrapped in a mystery inside an enigma, and stuf ...
    • Magnet Forensics Lab
    Salon A
    Investigative teams face an increasingly complex digital landscape - requiring flexible, comprehensive solutions to efficiently detect, investigate, and respond to security incidents. Join Magnet Fore ...
    • Forensics
    Salon D
    The computer evidence cracks the case. But is the computer evidence cracked? During the analysis, malware was identified and dismissed. It was dismissed because it couldn't have been malware...right? ...
    • Investigations
    Salon F
    The ability to share critical information in real-time is essential for solving cases, ensuring officer safety, and improving operational efficiency. Laken Riley case in Athens, GA highlights how time ...
Wednesday, June 04, 2025
    • MSAB Lab
    Salon A
    Artificial Intelligence is reshaping digital forensics, promising faster investigations, deeper insights, and unprecedented automation. But as AI-driven tools become more prevalent in forensic workflo ...
    • Cybersecurity
    Salon E
    This session will share and discuss two rather exotic capabilities that are being developed under a DARPA contract including: • Cross-architecture code similarity where the system can identify similar ...
    • Forensics
    Salon C
    Transform your Mac into a forensic workhorse with this practical, step-by-step guide. In this session, you’ll learn how to configure your Mac from day one to handle forensic investigations, no matter ...
    • Forensics
    Salon D
     This session will share practical insights and creative techniques used in real law enforcement cases to tackle anti-forensic methods, uncover hidden evidence, and piece together a complete picture o ...
    • eDiscovery
    Salon F
    Artificial Intelligence and, more specifically, Generative AI (""GenAI"") has taken the world be storm. It has led to government investigations, state and local regulation, and civil actions arising o ...
    • Oxygen Forensics Lab
    Salon B
    • Forensics
    Meeting Room 107
    Sysdiagnose Logs – What are they? This hands-on workshop will answer that question and more! Sysdianose Logs have a plethora of details examiners may be missing. This session will explore how to gener ...
    • Forensics
    Salon D
    This session will take a closer look at the telematics systems and wireless modules found in vehicles. The session will explore the types of memory chips they use, the file systems they rely on, and t ...
    • Magnet Forensics Lab
    Salon A
    Save the date…or don’t! The ability to change the date and time of previously captured media on iOS devices can greatly complicate investigations and examinations. In this presentation, Magnet Forensi ...
    • Investigations
    Salon E
     With the rise of the internet, criminals have found new ways to engage in illegal activities like human trafficking and child exploitation. The dark web and cryptocurrency have allowed criminals to c ...
    • Cybersecurity
    Salon F
    This session will spend very little time discussing definitions of terms, basic concepts, etc., and instead will focus on the very real need to create context around so much data coming into organizat ...
    • Investigations
    Salon C
    Telegram is the fifth largest instant messaging service in the US. The organization has identified the US as the target number one for expansion in 2025. This lecture provides basic information and pr ...
    • Magnet Forensics Lab
    Salon A
    While multiple user-accounts are not a new thing with Android, they are gaining momentum in how much they are used. In addition to just secondary profiles and guest accounts, more and more services li ...
    • Cellebrite Lab
    Salon B
    • eDiscovery
    Salon F
    This panel of eDiscovery experts will explore the AI and eDiscovery tools and processes that are used to analyze forensic data and reporting. Attendees will learn about eDiscovery methodologies in col ...
    • Forensics
    Salon D
    Secure Element phones come in many flavors, eSE, SPU and SE. This session will share how these were previously used in high-end models, they are now also found in mid-range volume phones, making the f ...
    • Cybersecurity
    Salon E
    When cybersecurity professionals think about cybercrime, the usual threat actors who engage in data theft, extortion, and other financially motivated attacks for personal gain usually come to mind. Th ...
    • Forensics
    Salon C
    Every connection tells a story. Android devices constantly interact with WiFi networks and Bluetooth devices, leaving behind a trail of digital breadcrumbs that can be invaluable in forensic investiga ...
    • MSAB Lab
    Salon A
    As digital evidence plays an increasingly important role in criminal investigations, law enforcement agencies face two major challenges: How to enable seamless investigator collaboration, and how to m ...
    • Investigations
    Salon D
    Artificial Intelligence (AI) is increasingly embedded in every aspect of our lives, and its role in digital investigations is no exception. This session explores strategies for the safe and responsibl ...
    • Forensics
    Salon E
     In 2024 an alarming new threat began to emerge, cheap commercially available drones used to threaten critical infrastructure. During this session, forensic examiners will walk through a drone forensi ...
    • Oxygen Forensics Lab
    Salon B
    Mobile device security has evolved beyond the simple screen lock to more complex schemes to protect user data from attackers and legitimate investigators. In this session, we will explore the mechanis ...
    • Forensics
    Salon F
     A brief look at some of the tools and tricks of using Adobe Premiere to effectively present videos and other details in your case. Taking hours of video or multiple sources of information and present ...
    • Forensics
    Salon C
    Deep fake digital photographs are becoming increasingly sophisticated, posing significant risks to personal, corporate, and national security. This session explores advanced techniques for detecting d ...
    • Cellebrite Lab
    Salon B
    • Magnet Forensics Lab
    Salon A
    In today’s digital world, the ease of manipulating and sharing media files with emerging technologies has made it increasingly challenging to detect alterations and prove authenticity. Understanding t ...
    • Investigations
    Salon D
    This session will explore the power of OSINT to conduct your cryptocurrency investigations. It will hop off the Blockchain to try some attribution techniques on breadcrumbs left behind on social media ...
    • Cybersecurity
    Salon E
    This session provides a concise yet comprehensive overview of the methodologies employed by nation-state threat actors to infiltrate, persist, and operate within targeted environments undetected. Leve ...
    • Cybersecurity
    Salon D
    This session will explore the current and emerging technologies shaping network security, from AI-powered threat detection to the convergence of wired, Wi-Fi, and cloud-native security. The presenter ...
    • Forensics
    Salon C
    Navigating SQLite Databases is essential for digital forensic investigators, especially when dealing with unsupported applications. This session will guide you through the manual analysis of SQLite da ...
    • Cellebrite Lab
    Salon A
    Session description in progress
    • MSAB Lab
    Salon A
    As organized crime groups increasingly rely on hardened secured communications (HSCs) and mobile device management (MDM) solutions to evade law enforcement, investigators must adapt their forensic str ...
    • Forensics
    Salon E
    As Artificial Intelligence (AI) evolves, so does the desire to use its great power in forensic tools and examinations. This session will introduce the audience to probabilistic outputs from AI algorit ...
Thursday, June 05, 2025
    • Investigations
    Salon D
    This session explores the challenges and risks of relying on black box technologies in OSINT investigations, using a shooting investigation as a case study. Attendees will gain insights into the pitfa ...
    • Forensics
    Salon C
    A case study related to the conviction of Joseph Andes. Joseph Andes had identified on grand jury for a CSAM case and used knowledge of LE forensic capabilities to hide his own crimes. This session wi ...
    • eDiscovery
    Salon F
    As artificial intelligence continues to transform the legal landscape, the intersection of AI, forensic readiness, and eDiscovery has emerged as a critical area of focus for legal professionals and fo ...
    • Magnet Forensics Lab
    Salon A
    The 6 pillars of digital evidence form a comprehensive framework for investigators to collect, analyze, and leverage data in the digital age. Join Forensic Consultants Steve Gemperle and Chad Gish to ...
    • Oxygen Forensics Lab
    Salon B
    Complex digital evidence assessment is often left to the Digital Forensics personnel to decipher what is or is not relevant. Why not get the data in the hands of the decision makers and case agents? T ...
    • Cybersecurity
    Salon E
    As information technology progresses and expands, its Cyber-attack surface expands dramatically. Everywhere you look there's more "Smart"..(or in some cases, Not SO Smart technology!) being connected ...
    • Investigations
    Meeting Room 107
    This hands-on lab will discuss how to use encryption with AES and RSA algorithms ubiquitous, and how do these algorithms actually work and why is this important? As digital forensic examiners and anal ...
    • Cellebrite Lab
    Salon B
    • Cybersecurity
    Salon D
    This session will help attendees understand the threat landscape and gain insights into how cybercriminals are leveraging Generative AI, including deepfakes, to execute sophisticated financial fraud s ...
    • Forensics
    Salon F
    This session will discuss collecting large amounts of digital evidence and how to combine all the traces from the digital evidence with other traces that we have at our disposal. It will include a wal ...
    • Forensics
    Salon C
    Artificial Intelligence has come to devices in the form of operating system level enhancements to instantly turn our thoughts into actions. This session will explore the impact this observer could hav ...
    • MSAB Lab
    Salon A
    Operation Artemis takes a victim centred approach to tackling the online availability of series of child sexual abuse material within Peer-to-Peer file sharing networks, by identifying offenders posse ...
    • Magnet Forensics Lab
    Salon A
    With iOS and Android both having tap-to-pay payment functionality built in, it’s opened a great opportunity for tracking where and how they’re using this feature. Not only can we often see what is bei ...
    • Forensics
    Salon C
    Explore the challenges of cloud-based forensics in Microsoft OneDrive environments. This session equips attendees with strategies to analyze OneDrive artifacts, interpret unique digital footprints, an ...
    • Cybersecurity
    Salon E
     Chances are your organization is responsible for complying with multiple regulations and frameworks. How do you accomplish this without wasting time, money, and personnel resources? More importantly, ...
    • eDiscovery
    Salon F
    report for use in legal discovery, investigative strategies, due diligence practices, and risk management. Getting the right piece of information at the right time aids decision-making during early ca ...
    • Forensics
    Salon D
    This session will guide law enforcement practitioners and leaders through strategies to build a compelling case for resource allocation. Attendees will learn how to demonstrate the value of mobile for ...
    • Oxygen Forensics Lab
    Salon B
    Join us for a session on how to help law enforcement untangle large datasets by streamlining the examination process. From selective extraction to searching at import for actionable data, then reporti ...
    • MSAB Lab
    Salon A
    A long sought after requirement for digital forensic tool users is interoperable solutions that allow for the safe data transfer and analysis across multiple platforms. In practice with competing comm ...
    • Investigations
    Salon C
    Despite being overshadowed by social media giants, Discord is an underrated gem in the OSINT realm. With over 150 million monthly users, it hosts diverse communities ranging from gaming and tech to ed ...
    • Cellebrite Lab
    Salon B
    • Investigations
    Salon F
    Insider threats are a growing challenge as more individuals gain access to sensitive information amid global instability and economic competition. While traditional defenses like access controls and c ...
    • Cybersecurity
    Salon E
    AI is the new "big thing,"while quantum computing advances out of the public view. However, quantum computing will have an impact on information security, especially with respect to cryptography. This ...
    • Cybersecurity
    Salon D
    Artificial Intelligence (AI) has become one of the fastest-adopted technologies ever, out-pacing cell phones, personal computers and the internet. By design or accident, AI brings many possibilities a ...
    • Cybersecurity
    Salon F
    Continuous threat exposure management is one of the hottest trending topics and for good reason. It takes the concepts of vulnerability management, which is vital, and adds to the other key security c ...
    • Cybersecurity
    Salon E
    Generative Artificial Intelligence (GenAI) is revolutionizing our lives. When controlled and used ethically it can automate tasks, increase productivity, solve complex problems, improve our health, an ...
    • Investigations
    Salon C
    In the realm of investigation, the utilization of tower dumps and area searches has become increasingly pivotal. This session delves into the methodologies and applications of these techniques. This s ...
    • Cellebrite Lab
    Salon B
    • Magnet Forensics Lab
    Salon A
    Join us for an insightful presentation co-hosted by Magnet Forensics and T3K.AI, where we will explore advanced tools and techniques for multimedia investigations. This session will dive into the powe ...
    • Cybersecurity
    Salon E
    Effective preparation is the bedrock of a successful incident response strategy, as underscored by both the NIST and SANS frameworks. In this session, we will delve into the critical steps necessary t ...
    • Forensics
    Salon D
    This session will share how AI-infused computer vision can rapidly increase your image and video OSINT data analysis processing time, accuracy, and comprehensiveness. It will share how to use computer ...
    • Cybersecurity
    Salon F
    The hybrid nature of modern conflicts show the importance of defending and attacking critical infrastructure. This session will discuss the present situation in attacks against critical installations ...
    • MSAB Lab
    Salon A
    Mobile RAM analysis is one of the most complex and underexplored areas of digital forensics, but it holds the potential to uncover critical evidence that standard extractions often miss. From volatile ...
    • Investigations
    Salon C
     Traditional workflows of collecting & examining full disk images is no longer a viable Cyber Incident Response option with the larger drives, cloud and network storage & the timeframe customers and C ...
    • Oxygen Forensics Lab
    Salon B
    In Part 1 you learned about the capabilities and advantages of our network-based digital evidence collaboration tool, Oxygen Analytic Center. Now let’s roll up our sleeves and start working within the ...