We're sorry, but we couldn't find any results that match your search criteria. Please try again with different keywords or filters.
Loading
Loading
08:00 AM
-
Ballroom D&EEvery generation faces a defining technological moment. Ours is unfolding right now. Artificial intelligence is redrawing the boundaries of creation. Digital identities are forming earlier and evolvin …
09:30 AM
-
Traffickers increasingly exploit technology to groom, recruit, and control victims. This session highlights how multidisciplinary teams—analysts, prosecutors, and social workers—collaborate throughou …
-
Meeting Room 106/107Despite heavy investments in cyber and physical security, low-altitude airspace remains a critical blind spot as drone threats grow. This session explores how airspace intelligence and drone forensic …
-
Meeting Room 206/208Trade secrets make up the majority of value of U.S. companies' portfolios. Not surprisingly, such secrets are high value theft targets for domestic and foreign competitors. In one survey, half of the …
-
Meeting Room 202/204Prolific threat actors have thrived on double-extortion; proving the ransomware economy remains strong. To hold organizations hostage, identity is now the target of adversary tactics, techniques, and …
-
Ballroom CSeeing is not always believing. We know that intuitively when you witness a magician on the street, but it's harder to remember when a video is sent to us as proof of an incident. We take at face valu …
-
Digital media backlogs are growing rapidly, forcing investigators to triage massive volumes of images and video, often containing disturbing content, under intense time pressure. Magnet Griffeye helps …
-
Ballroom BSession details in progress
10:30 AM
-
Meeting Room 202/204Achieving mission requires preparedness, insight, and agility in decision-making—no small feat given today’s complexities: heightened workforce skills, overwhelming information streams, and stringent …
-
Ballroom CDeepfakes are everywhere in today’s headlines, fueling fear and driving a surge of “AI vs. AI” detection tools. But here’s the truth: recent research shows these solutions often fall short of their p …
-
Meeting Room 106/107Cyber investigations increasingly require integrating OSINT with legal and cyber investigative processes. This session presents a structured, practitioner-focused approach to aligning OSINT, platform …
-
Meeting Room 206/208Generative AI goes beyond document review, transforming early case assessment, investigations, and preparation for depositions, hearings, arbitrations, and trials. This panel brings together legal tec …
-
Ballroom AA Panel discussion about the use of AI in Mobile Forensics (more to come)
-
Ballroom ASession details in progress.
11:30 AM
-
Meeting Room 206/208Proposed exhibits can be enhanced or created by Artificial Intelligence and generative AI. To be admitted into evidence, such exhibits must be authenticated by the party offering the exhibits and meet …
-
Ballroom CAI applications are now widely used by both everyday users and criminals. This session explores how offenders misuse AI to automate tasks, enhance deception, and hide digital traces. We cover key for …
-
Meeting Room 202/204In the mid-18th century, Benjamin Franklin recognized that communities needed a coordinated, volunteer-based system to fight fires and protect public safety. This presentation draws a direct parallel …
-
Meeting Room 106/107DFIR investigations often span multiple tools, teams, and timelines, making it difficult to maintain clarity, consistency, and trust. This session examines the practical principles and best practices …
-
Ballroom BArtificial intelligence is evolving rapidly, and investigative platforms must evolve with it. Traditional image recognition models have served us well, but they are limited in flexibility, scalability …
-
Ballroom AModerated panel with digital forensics experts on the above topic
02:00 PM
-
Meeting Room 202/204Investigators rely on global information streams including multilingual news sources, government alert channels, social media, and specialized technical blogs. This session presents an open-source Pyt …
-
Ballroom CGeolocation data is often pivotal in criminal investigations, but building a reliable location timeline from mobile devices is challenging. This session for forensic examiners, investigators, and pros …
-
Meeting Room 106/107This session will cover the use of fintech applications in Human Trafficking Investigations, primarily the use of CashApp. It will describe its use as a source of intelligence driven investigation and …
-
Ballroom BHANDS ON LAB: Part of the Tool Tactics class series, this hands-on lab delivers practical instruction in extracting actionable evidence from image and video files. Participants will work directly with …
-
With the advent of encryption, NetFlow has become the standard for what we have available to analyze network traffic. In this hands-on lab, participants will learn what NetFlow is composed of and, usi …
-
Meeting Room 206/208In this session, experts will discuss how modern AI empowers legal teams to make sense of large datasets and move efficiently from documents to actionable insights. Attendees will learn how AI can sur …
-
Legacy DFIR stacks are slowing teams down with unreliable off network collections, brittle or bloated agents, and too many disconnected point products and scripts. This creates operational drag which …
03:00 PM
-
Meeting Room 206/208In this session, legal and forensic experts will break down practical strategies for culling and filtering electronically stored information (ESI) during and after collection in an e-discovery project …
-
Ballroom CThis two hour panel prepares digital forensic examiners for AI related challenges in court. It will feature two seasoned digital forensic examiners and two attorneys fluent in the current AI world, t …
-
Meeting Room 202/204Tracking a subject no longer relies solely on physical devices attached to vehicles. Investigators today can access a vast range of precise digital location data—from smartphones and apps to rideshare …
-
Ballroom AGraphene OS are causing severe headache for Law Enforcement globally. In this session, we talk about how sensitive we need to be in the industry of mobile forensics when sharing knowledge our capabili …
04:00 PM
-
Meeting Room 206/208Learn how North Korean IT workers infiltrate enterprises using stolen identities, contractor loopholes, & remote-work obfuscation. This session teaches practical OSINT, remote digital forensics, UBEA …
-
Meeting Room 106/107This case study shows how rapid patrol response and mobile device forensics turned a local complaint into a federal child-exploitation conviction. It covers key decisions, digital grooming analysis, …
-
Meeting Room 202/204As AI technologies become increasingly accessible, cybercriminals are rapidly integrating their capabilities into their attack methodologies. This session examines the emerging threat landscape where …
-
Mobile devices now represent most of the digital evidence in criminal investigations, yet increasing device volume, storage size, and security have created significant acquisition and workflow challen …
-
Ballroom ASession details in progress.