The 2025 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).
To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.
For a list of all sessions by day, please click on the day/date link.
Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.
Join us for a powerful and eye-opening presentation by Erin West, a leading expert in combating transnational organized crime and the founder of Operation Shamrock. In this engaging one-hour talk, Eri ...
The prominence of mobile data makes it a critical source of evidence in almost every criminal investigation, but the window of opportunity to capture iOS extractions can be extremely small. Between ev ...
The rise of synthetic data and AI-generated content, including deepfakes, has introduced unprecedented challenges and opportunities in the realms of digital forensics and legal discovery. As these tec ...
Artificial Intelligence is revolutionizing every industry, and digital forensics is no exception. But with great power comes great responsibility—and even greater scrutiny. This session will explore h ...
In modern investigations, successfully integrating digital forensics, OSINT, wiretaps, and beyond is essential for uncovering hidden connections and tracking criminal behavior. This session will explo ...
A ransomware attack is an economic attack against a victim organization by a criminal enterprise. Cyber insurance is most closely associated with this type of attack, but there is another way to under ...
Attendees will be introduced to remote acquisition of computer and mobile devices through the Oxygen Remote Explorer platform. We will discuss the streamlining concepts of remote collection and analys ...
This demo session features the new OpenText Forensic TX2 Imager, showcasing its high-speed forensic imaging capabilities, which enable investigators to collect and analyze vast amounts of digital evid ...
This hands-on lab will discuss how to use encryption with AES and RSA algorithms ubiquitous, and how do these algorithms actually work and why is this important? As digital forensic examiners and anal ...
Android version 15 introduced the Private Space feature that allows users to hide sensitive items natively. This session will discuss the nature of this new feature and how it can affect mobile device ...
Audio, acoustic and video evidence are common and critical in civil and criminal litigation. Often such evidence is from a computer or mobile device. This session will discuss why proponents and oppon ...
In the face of a rapidly expanding attack surface driven by cloud services, IoT devices, and remote work, organizations should include effective Attack Surface Management (ASM) strategies. This sessio ...
Join us for an interactive lab designed to familiarize you with MSAB’s powerful mobile device extraction tool, XRY. In this session, you will: Navigate the Menu Options: Gain a comprehensive understan ...
Collaboration between examiners and investigators is essential for achieving case success in today’s criminal investigations. As technology and criminal behavior evolve in unprecedented ways, a signif ...
Insider Threats represent the most expensive type of breach and organization can experience. Investigating events associated with Insider Threats requires a partnership between Incident Response and D ...
U.S. Customs and Border Protection’s Center for Air and Marine Drone Exploitation (CAMDEx) will highlight the latest techniques involving Unmanned System (UxS) forensics. As this genre of digital fore ...
Come for the pup - stay for the show! Electronic Storage Detection (ESD) K9s work hand-in-hand with ICAC units to find the evidence child predators often try to hide. Watch Linux in action and hear fr ...
This case study highlights the pivotal role of metadata when no other evidence appears to exist. Through a meticulous analysis of both deleted and hidden metadata, investigators uncovered key evidence ...
When AI started to be the technology du jour, many companies decided to integrate it into their own products. The same cybersec teams that worried about potential cybercriminal uses of AI, also tested ...
Hyperlinked files, sometimes referred to as “modern attachments,” are turning up in legal and technical environments and they are causing headaches for e-discovery, information governance, and forensi ...
xBit Case Management for Digital Forensics. This workshop will demonstrate the xBit Case Management solution for digital forensic labs. Attendees will experience how the user-customizable xBit assists ...
Organizations say they want more 'shift-left' to reduce vulnerabilities but don't understand how to execute effective solutions that reduce the risk causing senior leadership to become less supportive ...
AI is Not Enough to Beat AI: Pragmatic Deepfake Detection This session will explore a holistic approach to discriminating deepfakes from authentic images and videos, including: • Limitations of automa ...
Join us for this session where we discover the fundamentals of blockchain technology and its integration into mobile application development. Explore how blockchain extends beyond cryptocurrency, powe ...
Windows Event Tracing for Windows (ETW) offers a powerful, native telemetry framework that provides deep insights into system and application behavior. Despite its potential, ETW remains underutilized ...
Join Magnet Forensics’ Jeff Rutherford as he examines the reliability of Apple’s horizontalAccuracy confidence factor when analyzing iPhone geolocation data in forensic investigations. By comparing GP ...
In an era teeming with digital evidence, the ability to identify and visualize hidden connections is critical to modern investigations. This session delves into the fundamentals and advanced technique ...
The LEAPP suite is a collection of open-source forensic tools designed to empower investigators with efficient methods for parsing and analyzing data across multiple platforms, including iOS, Android ...
In this session, we’ll demonstrate how the flexibility of XRY Pro allows for creative methods to access more data and uncover important evidence. Through live demos, we’ll show how XRY Pro’s versatile ...
Forensic examination of USB device activity is crucial for many different types of investigations. Findings of connections are useful for proof of data exfiltration and/or identifying further evidence ...
A session for Law Enforcement and Private Sector Investigations Professionals to gain a base level knowledge on industry terminology, best practices and a look into how to investigate cryptocurrency u ...
As organizations continue to invest in advanced security technologies, we often overlook the essential human element at the heart of the problem. This session challenges the status quo, advocating for ...
The session will cover key topics such as case context, evidence identification, prioritization techniques, and case examples. By understanding the nature of the case, investigators can identify key d ...
Join us for I beg to DFIR Live with Cellebrite’s Product Management and Customer Engagement teams, where your voice takes center stage. This interactive forum is designed for industry professionals to ...
This session will focus on combatting advanced synthetic identities through a multi-layered, technology-driven approach including: Implementing machine learning, applying multi-source verifications an ...
This session will walk through the forensics of a case related to the alleged theft of high value company data. This case is a real whodunit - a riddle, wrapped in a mystery inside an enigma, and stuf ...
Investigative teams face an increasingly complex digital landscape - requiring flexible, comprehensive solutions to efficiently detect, investigate, and respond to security incidents. Join Magnet Fore ...
The computer evidence cracks the case. But is the computer evidence cracked? During the analysis, malware was identified and dismissed. It was dismissed because it couldn't have been malware...right? ...
The ability to share critical information in real-time is essential for solving cases, ensuring officer safety, and improving operational efficiency. Laken Riley case in Athens, GA highlights how time ...
Artificial Intelligence is reshaping digital forensics, promising faster investigations, deeper insights, and unprecedented automation. But as AI-driven tools become more prevalent in forensic workflo ...
This session will share and discuss two rather exotic capabilities that are being developed under a DARPA contract including: • Cross-architecture code similarity where the system can identify similar ...
Transform your Mac into a forensic workhorse with this practical, step-by-step guide. In this session, you’ll learn how to configure your Mac from day one to handle forensic investigations, no matter ...
This session will share practical insights and creative techniques used in real law enforcement cases to tackle anti-forensic methods, uncover hidden evidence, and piece together a complete picture o ...
Artificial Intelligence and, more specifically, Generative AI (""GenAI"") has taken the world be storm. It has led to government investigations, state and local regulation, and civil actions arising o ...
This presentation explores how OSINT techniques and evidentiary data were used in parallel in an armed robbery investigation to gather critical intelligence. Using Penlink’s digital intelligence platf ...
Sysdiagnose Logs – What are they? This hands-on workshop will answer that question and more! Sysdianose Logs have a plethora of details examiners may be missing. This session will explore how to gener ...
This session will take a closer look at the telematics systems and wireless modules found in vehicles. The session will explore the types of memory chips they use, the file systems they rely on, and t ...
Save the date…or don’t! The ability to change the date and time of previously captured media on iOS devices can greatly complicate investigations and examinations. In this presentation, Magnet Forensi ...
With the rise of the internet, criminals have found new ways to engage in illegal activities like human trafficking and child exploitation. The dark web and cryptocurrency have allowed criminals to c ...
This session will spend very little time discussing definitions of terms, basic concepts, etc., and instead will focus on the very real need to create context around so much data coming into organizat ...
The proper handling of cell phones and other mobile devices as forensic evidence, from the point of seizure to the point of analysis, can be a challenging task. Different agencies may follow varying p ...
Telegram is the fifth largest instant messaging service in the US. The organization has identified the US as the target number one for expansion in 2025. This lecture provides basic information and pr ...
While multiple user-accounts are not a new thing with Android, they are gaining momentum in how much they are used. In addition to just secondary profiles and guest accounts, more and more services li ...
Join us for an exciting session as we dive into Cellebrite's latest advancements in digital investigations. We'll explore the cutting-edge developments in forensics, highlight the key updates from our ...
This panel of eDiscovery experts will explore the AI and eDiscovery tools and processes that are used to analyze forensic data and reporting. Attendees will learn about eDiscovery methodologies in col ...
Secure Element phones come in many flavors, eSE, SPU and SE. This session will share how these were previously used in high-end models, they are now also found in mid-range volume phones, making the f ...
When cybersecurity professionals think about cybercrime, the usual threat actors who engage in data theft, extortion, and other financially motivated attacks for personal gain usually come to mind. Th ...
While computers still represent a large vector for risk within organizations, the response to computer systems is well understood in technology, policy, and procedure. However, Mobile Devices represen ...
Every connection tells a story. Android devices constantly interact with WiFi networks and Bluetooth devices, leaving behind a trail of digital breadcrumbs that can be invaluable in forensic investiga ...
As digital evidence plays an increasingly important role in criminal investigations, law enforcement agencies face two major challenges: How to enable seamless investigator collaboration, and how to m ...
Artificial Intelligence (AI) is increasingly embedded in every aspect of our lives, and its role in digital investigations is no exception. This session explores strategies for the safe and responsibl ...
In 2024 an alarming new threat began to emerge, cheap commercially available drones used to threaten critical infrastructure. During this session, forensic examiners will walk through a drone forensi ...
Mobile device security has evolved beyond the simple screen lock to more complex schemes to protect user data from attackers and legitimate investigators. In this session, we will explore the mechanis ...
Dive into describing self-collection and the major hurdles you need to overcome to avoid risks. Applying recent case law opinions and Federal Rules of Civil Procedure, this session will cover the foll ...
DATAPILOT Rapid Acquisition – Because Every Second Counts DATAPILOT is always evolving, delivering cutting-edge acquisition features designed to help law enforcement get the data they need—fast. Our l ...
Discover how IntelliView, Paladin AI’s cutting-edge investigative platform, leverages big data analytics, machine learning, and real-time insights to enhance digital forensics, cybersecurity monitorin ...
A brief look at some of the tools and tricks of using Adobe Premiere to effectively present videos and other details in your case. Taking hours of video or multiple sources of information and present ...
Deep fake digital photographs are becoming increasingly sophisticated, posing significant risks to personal, corporate, and national security. This session explores advanced techniques for detecting d ...
The National Center for Missing and Exploited Children (NCMEC) and Cellebrite have been longstanding partners in a shared mission to protect our most vulnerable. Jared Barnhart, Head of Cellebrite Cus ...
In today’s digital world, the ease of manipulating and sharing media files with emerging technologies has made it increasingly challenging to detect alterations and prove authenticity. Understanding t ...
This session will explore the power of OSINT to conduct your cryptocurrency investigations. It will hop off the Blockchain to try some attribution techniques on breadcrumbs left behind on social media ...
This session provides a concise yet comprehensive overview of the methodologies employed by nation-state threat actors to infiltrate, persist, and operate within targeted environments undetected. Leve ...
This session will explore the current and emerging technologies shaping network security, from AI-powered threat detection to the convergence of wired, Wi-Fi, and cloud-native security. The presenter ...
Navigating SQLite Databases is essential for digital forensic investigators, especially when dealing with unsupported applications. This session will guide you through the manual analysis of SQLite da ...
More now than ever, users aren't just buying "a device"; they are buying into a whole ecosystem of connected devices that shares a multitude of data both with and without their knowledge. This talk wi ...
As organized crime groups increasingly rely on hardened secured communications (HSCs) and mobile device management (MDM) solutions to evade law enforcement, investigators must adapt their forensic str ...
As Artificial Intelligence (AI) evolves, so does the desire to use its great power in forensic tools and examinations. This session will introduce the audience to probabilistic outputs from AI algorit ...
Not all mobile forensic extraction methods deliver the same results, and in e-discovery and private-sector investigations, choosing the right approach is crucial. This presentation takes a hands-on lo ...
This session explores the challenges and risks of relying on black box technologies in OSINT investigations, using a shooting investigation as a case study. Attendees will gain insights into the pitfa ...
A case study related to the conviction of Joseph Andes. Joseph Andes had identified on grand jury for a CSAM case and used knowledge of LE forensic capabilities to hide his own crimes. This session wi ...
As artificial intelligence continues to transform the legal landscape, the intersection of AI, forensic readiness, and eDiscovery has emerged as a critical area of focus for legal professionals and fo ...
The 6 pillars of digital evidence form a comprehensive framework for investigators to collect, analyze, and leverage data in the digital age. Join Forensic Consultants Steve Gemperle and Chad Gish to ...
Complex digital evidence assessment is often left to the Digital Forensics personnel to decipher what is or is not relevant. Why not get the data in the hands of the decision makers and case agents? T ...
As information technology progresses and expands, its Cyber-attack surface expands dramatically. Everywhere you look there's more "Smart"..(or in some cases, Not SO Smart technology!) being connected ...
Law enforcement agencies face an overwhelming influx of digital evidence, with more than 90% of all criminal cases involving digital elements. This volume of data creates challenges for public safety ...
This session will help attendees understand the threat landscape and gain insights into how cybercriminals are leveraging Generative AI, including deepfakes, to execute sophisticated financial fraud s ...
This session will discuss collecting large amounts of digital evidence and how to combine all the traces from the digital evidence with other traces that we have at our disposal. It will include a wal ...
Artificial Intelligence has come to devices in the form of operating system level enhancements to instantly turn our thoughts into actions. This session will explore the impact this observer could hav ...
Operation Artemis takes a victim centred approach to tackling the online availability of series of child sexual abuse material within Peer-to-Peer file sharing networks, by identifying offenders posse ...
With iOS and Android both having tap-to-pay payment functionality built in, it’s opened a great opportunity for tracking where and how they’re using this feature. Not only can we often see what is bei ...
Explore the challenges of cloud-based forensics in Microsoft OneDrive environments. This session equips attendees with strategies to analyze OneDrive artifacts, interpret unique digital footprints, an ...
Chances are your organization is responsible for complying with multiple regulations and frameworks. How do you accomplish this without wasting time, money, and personnel resources? More importantly, ...
report for use in legal discovery, investigative strategies, due diligence practices, and risk management. Getting the right piece of information at the right time aids decision-making during early ca ...
This session will guide law enforcement practitioners and leaders through strategies to build a compelling case for resource allocation. Attendees will learn how to demonstrate the value of mobile for ...
Join us for a session on how to help law enforcement untangle large datasets by streamlining the examination process. From selective extraction to searching at import for actionable data, then reporti ...
A long sought after requirement for digital forensic tool users is interoperable solutions that allow for the safe data transfer and analysis across multiple platforms. In practice with competing comm ...
Despite being overshadowed by social media giants, Discord is an underrated gem in the OSINT realm. With over 150 million monthly users, it hosts diverse communities ranging from gaming and tech to ed ...
In this session, we will explore how Cellebrite Smart Search can help you quickly and efficiently surface publicly available information at every stage of your investigation. Discover the power of ins ...
Insider threats are a growing challenge as more individuals gain access to sensitive information amid global instability and economic competition. While traditional defenses like access controls and c ...
AI is the new "big thing,"while quantum computing advances out of the public view. However, quantum computing will have an impact on information security, especially with respect to cryptography. This ...
Artificial Intelligence (AI) has become one of the fastest-adopted technologies ever, out-pacing cell phones, personal computers and the internet. By design or accident, AI brings many possibilities a ...
Continuous threat exposure management is one of the hottest trending topics and for good reason. It takes the concepts of vulnerability management, which is vital, and adds to the other key security c ...
Generative Artificial Intelligence (GenAI) is revolutionizing our lives. When controlled and used ethically it can automate tasks, increase productivity, solve complex problems, improve our health, an ...
In the realm of investigation, the utilization of tower dumps and area searches has become increasingly pivotal. This session delves into the methodologies and applications of these techniques. This s ...
Join us for a hands-on workshop designed to help investigators accelerate digital evidence analysis with Cellebrite Pathfinder. Led by experts with more than 30 years of field experience, this session ...
Join us for an insightful presentation co-hosted by Magnet Forensics and T3K.AI, where we will explore advanced tools and techniques for multimedia investigations. This session will dive into the powe ...
Due to the increasing number of data sources, digital forensics tools have needed to evolve over time. However, not all tools are created equal. Tools support different devices, data types (file syste ...
Effective preparation is the bedrock of a successful incident response strategy, as underscored by both the NIST and SANS frameworks. In this session, we will delve into the critical steps necessary t ...
This session will share how AI-infused computer vision can rapidly increase your image and video OSINT data analysis processing time, accuracy, and comprehensiveness. It will share how to use computer ...
The hybrid nature of modern conflicts show the importance of defending and attacking critical infrastructure. This session will discuss the present situation in attacks against critical installations ...
Mobile RAM analysis is one of the most complex and underexplored areas of digital forensics, but it holds the potential to uncover critical evidence that standard extractions often miss. From volatile ...
Traditional workflows of collecting & examining full disk images is no longer a viable Cyber Incident Response option with the larger drives, cloud and network storage & the timeframe customers and C ...
In Part 1 you learned about the capabilities and advantages of our network-based digital evidence collaboration tool, Oxygen Analytic Center. Now let’s roll up our sleeves and start working within the ...