Skip to main content

Techno Security & Digital Forensics Conference

Tuesday, June 3, 2025

conference image

Tuesday, June 3, 2025

Loading
    • Keynote
    Salon D/E
    Join us for a powerful and eye-opening presentation by Erin West, a leading expert in combating transnational organized crime and the founder of Operation Shamrock. In this engaging one-hour talk, Eri ...
    • Magnet Forensics Lab
    Salon A
    The prominence of mobile data makes it a critical source of evidence in almost every criminal investigation, but the window of opportunity to capture iOS extractions can be extremely small. Between ev ...
    • eDiscovery
    Salon F
    The rise of synthetic data and AI-generated content, including deepfakes, has introduced unprecedented challenges and opportunities in the realms of digital forensics and legal discovery. As these tec ...
    • Forensics
    Salon C
    Artificial Intelligence is revolutionizing every industry, and digital forensics is no exception. But with great power comes great responsibility—and even greater scrutiny. This session will explore h ...
    • Investigations
    Salon E
    In modern investigations, successfully integrating digital forensics, OSINT, wiretaps, and beyond is essential for uncovering hidden connections and tracking criminal behavior. This session will explo ...
    • Cybersecurity
    Salon D
    A ransomware attack is an economic attack against a victim organization by a criminal enterprise. Cyber insurance is most closely associated with this type of attack, but there is another way to under ...
    • Investigations
    Meeting Room 106
    This hands-on lab will discuss how to use encryption with AES and RSA algorithms ubiquitous, and how do these algorithms actually work and why is this important? As digital forensic examiners and anal ...
    • Oxygen Forensics Lab
    Salon B
    Attendees will be introduced to remote acquisition of computer and mobile devices through the Oxygen Remote Explorer platform. We will discuss the streamlining concepts of remote collection and analys ...
    • Sponsor Demo
    Meeting Room 107
    This demo session features the new OpenText Forensic TX2 Imager, showcasing its high-speed forensic imaging capabilities, which enable investigators to collect and analyze vast amounts of digital evid ...
    • Investigations
    Salon E
    Android version 15 introduced the Private Space feature that allows users to hide sensitive items natively. This session will discuss the nature of this new feature and how it can affect mobile device ...
    • Forensics
    Salon C
    Audio, acoustic and video evidence are common and critical in civil and criminal litigation. Often such evidence is from a computer or mobile device. This session will discuss why proponents and oppon ...
    • Cybersecurity
    Salon F
    In the face of a rapidly expanding attack surface driven by cloud services, IoT devices, and remote work, organizations should include effective Attack Surface Management (ASM) strategies. This sessio ...
    • MSAB Lab
    Salon A
    Join us for an interactive lab designed to familiarize you with MSAB’s powerful mobile device extraction tool, XRY. In this session, you will: Navigate the Menu Options: Gain a comprehensive understan ...
    • Cellebrite Lab
    Salon B
    Collaboration between examiners and investigators is essential for achieving case success in today’s criminal investigations. As technology and criminal behavior evolve in unprecedented ways, a signif ...
    • Investigations
    Salon D
    U.S. Customs and Border Protection’s Center for Air and Marine Drone Exploitation (CAMDEx) will highlight the latest techniques involving Unmanned System (UxS) forensics. As this genre of digital fore ...
    • Sponsor Demo
    Meeting Room 107
    Insider Threats represent the most expensive type of breach and organization can experience. Investigating events associated with Insider Threats requires a partnership between Incident Response and D ...
    • MSAB Lab
    Salon A
    Handling XRY files and how to use XAMN Viewer to view and find data.
    • Cellebrite Lab
    Salon B
    Come for the pup - stay for the show! Electronic Storage Detection (ESD) K9s work hand-in-hand with ICAC units to find the evidence child predators often try to hide. Watch Linux in action and hear fr ...
    • Forensics
    Salon C
    This case study highlights the pivotal role of metadata when no other evidence appears to exist. Through a meticulous analysis of both deleted and hidden metadata, investigators uncovered key evidence ...
    • Cybersecurity
    Salon D
    When AI started to be the technology du jour, many companies decided to integrate it into their own products. The same cybersec teams that worried about potential cybercriminal uses of AI, also tested ...
    • eDiscovery
    Salon F
    Hyperlinked files, sometimes referred to as “modern attachments,” are turning up in legal and technical environments and they are causing headaches for e-discovery, information governance, and forensi ...
    • Sponsor Demo
    Meeting Room 107
    xBit Case Management for Digital Forensics. This workshop will demonstrate the xBit Case Management solution for digital forensic labs. Attendees will experience how the user-customizable xBit assists ...
    • Cybersecurity
    Salon E
    Organizations say they want more 'shift-left' to reduce vulnerabilities but don't understand how to execute effective solutions that reduce the risk causing senior leadership to become less supportive ...
    • Forensics
    Salon F
    AI is Not Enough to Beat AI: Pragmatic Deepfake Detection This session will explore a holistic approach to discriminating deepfakes from authentic images and videos, including: • Limitations of automa ...
    • Forensics
    Salon C
    Join us for this session where we discover the fundamentals of blockchain technology and its integration into mobile application development. Explore how blockchain extends beyond cryptocurrency, powe ...
    • Investigations
    Salon E
    Windows Event Tracing for Windows (ETW) offers a powerful, native telemetry framework that provides deep insights into system and application behavior. Despite its potential, ETW remains underutilized ...
    • Magnet Forensics Lab
    Salon A
    Join Magnet Forensics’ Jeff Rutherford as he examines the reliability of Apple’s horizontalAccuracy confidence factor when analyzing iPhone geolocation data in forensic investigations. By comparing GP ...
    • Forensics
    Meeting Room 107
     The LEAPP suite is a collection of open-source forensic tools designed to empower investigators with efficient methods for parsing and analyzing data across multiple platforms, including iOS, Android ...
    • Oxygen Forensics Lab
    Salon B
    In an era teeming with digital evidence, the ability to identify and visualize hidden connections is critical to modern investigations. This session delves into the fundamentals and advanced technique ...
    • MSAB Lab
    Salon B
    In this session, we’ll demonstrate how the flexibility of XRY Pro allows for creative methods to access more data and uncover important evidence. Through live demos, we’ll show how XRY Pro’s versatile ...
    • Forensics
    Salon C
    Forensic examination of USB device activity is crucial for many different types of investigations. Findings of connections are useful for proof of data exfiltration and/or identifying further evidence ...
    • Investigations
    Salon F
    A session for Law Enforcement and Private Sector Investigations Professionals to gain a base level knowledge on industry terminology, best practices and a look into how to investigate cryptocurrency u ...
    • Cybersecurity
    Salon D
    As organizations continue to invest in advanced security technologies, we often overlook the essential human element at the heart of the problem. This session challenges the status quo, advocating for ...
    • Investigations
    Salon E
    The session will cover key topics such as case context, evidence identification, prioritization techniques, and case examples. By understanding the nature of the case, investigators can identify key d ...
    • Cellebrite Lab
    Salon B
    Join us for I beg to DFIR Live with Cellebrite’s Product Management and Customer Engagement teams, where your voice takes center stage. This interactive forum is designed for industry professionals to ...
    • Cybersecurity
    Salon E
    This session will focus on combatting advanced synthetic identities through a multi-layered, technology-driven approach including: Implementing machine learning, applying multi-source verifications an ...
    • Forensics
    Salon C
    This session will walk through the forensics of a case related to the alleged theft of high value company data. This case is a real whodunit - a riddle, wrapped in a mystery inside an enigma, and stuf ...
    • Magnet Forensics Lab
    Salon A
    Investigative teams face an increasingly complex digital landscape - requiring flexible, comprehensive solutions to efficiently detect, investigate, and respond to security incidents. Join Magnet Fore ...
    • Forensics
    Salon D
    The computer evidence cracks the case. But is the computer evidence cracked? During the analysis, malware was identified and dismissed. It was dismissed because it couldn't have been malware...right? ...
    • Investigations
    Salon F
    The ability to share critical information in real-time is essential for solving cases, ensuring officer safety, and improving operational efficiency. Laken Riley case in Athens, GA highlights how time ...