Loading
08:00 AM
    Ballroom D&E
    Every generation faces a defining technological moment. Ours is unfolding right now. Artificial intelligence is redrawing the boundaries of creation. Digital identities are forming earlier and evolvin …
09:30 AM
     Traffickers increasingly exploit technology to groom, recruit, and control victims. This session highlights how multidisciplinary teams—analysts, prosecutors, and social workers—collaborate throughou …
    Meeting Room 106/107
     Despite heavy investments in cyber and physical security, low-altitude airspace remains a critical blind spot as drone threats grow. This session explores how airspace intelligence and drone forensic …
    Meeting Room 206/208
    Trade secrets make up the majority of value of U.S. companies' portfolios. Not surprisingly, such secrets are high value theft targets for domestic and foreign competitors. In one survey, half of the …
    Meeting Room 202/204
    Prolific threat actors have thrived on double-extortion; proving the ransomware economy remains strong. To hold organizations hostage, identity is now the target of adversary tactics, techniques, and …
    Ballroom C
    Seeing is not always believing. We know that intuitively when you witness a magician on the street, but it's harder to remember when a video is sent to us as proof of an incident. We take at face valu …
    Digital media backlogs are growing rapidly, forcing investigators to triage massive volumes of images and video, often containing disturbing content, under intense time pressure. Magnet Griffeye helps …
    Ballroom B
    Session details in progress
10:30 AM
    Meeting Room 202/204
    Achieving mission requires preparedness, insight, and agility in decision-making—no small feat given today’s complexities: heightened workforce skills, overwhelming information streams, and stringent …
    Ballroom C
     Deepfakes are everywhere in today’s headlines, fueling fear and driving a surge of “AI vs. AI” detection tools. But here’s the truth: recent research shows these solutions often fall short of their p …
    Meeting Room 106/107
     Cyber investigations increasingly require integrating OSINT with legal and cyber investigative processes. This session presents a structured, practitioner-focused approach to aligning OSINT, platform …
    Meeting Room 206/208
    Generative AI goes beyond document review, transforming early case assessment, investigations, and preparation for depositions, hearings, arbitrations, and trials. This panel brings together legal tec …
    Ballroom A
    A Panel discussion about the use of AI in Mobile Forensics (more to come)
    Ballroom A
    Session details in progress.
11:30 AM
    Meeting Room 206/208
    Proposed exhibits can be enhanced or created by Artificial Intelligence and generative AI. To be admitted into evidence, such exhibits must be authenticated by the party offering the exhibits and meet …
    Ballroom C
     AI applications are now widely used by both everyday users and criminals. This session explores how offenders misuse AI to automate tasks, enhance deception, and hide digital traces. We cover key for …
    Meeting Room 202/204
     In the mid-18th century, Benjamin Franklin recognized that communities needed a coordinated, volunteer-based system to fight fires and protect public safety. This presentation draws a direct parallel …
    Meeting Room 106/107
    DFIR investigations often span multiple tools, teams, and timelines, making it difficult to maintain clarity, consistency, and trust. This session examines the practical principles and best practices …
    Ballroom B
    Artificial intelligence is evolving rapidly, and investigative platforms must evolve with it. Traditional image recognition models have served us well, but they are limited in flexibility, scalability …
    Ballroom A
    Moderated panel with digital forensics experts on the above topic
02:00 PM
    Meeting Room 202/204
    Investigators rely on global information streams including multilingual news sources, government alert channels, social media, and specialized technical blogs. This session presents an open-source Pyt …
    Ballroom C
    Geolocation data is often pivotal in criminal investigations, but building a reliable location timeline from mobile devices is challenging. This session for forensic examiners, investigators, and pros …
    Meeting Room 106/107
    This session will cover the use of fintech applications in Human Trafficking Investigations, primarily the use of CashApp. It will describe its use as a source of intelligence driven investigation and …
    Ballroom B
    HANDS ON LAB: Part of the Tool Tactics class series, this hands-on lab delivers practical instruction in extracting actionable evidence from image and video files. Participants will work directly with …
    With the advent of encryption, NetFlow has become the standard for what we have available to analyze network traffic. In this hands-on lab, participants will learn what NetFlow is composed of and, usi …
    Meeting Room 206/208
    In this session, experts will discuss how modern AI empowers legal teams to make sense of large datasets and move efficiently from documents to actionable insights. Attendees will learn how AI can sur …
    Legacy DFIR stacks are slowing teams down with unreliable off network collections, brittle or bloated agents, and too many disconnected point products and scripts. This creates operational drag which …
03:00 PM
    Meeting Room 206/208
    In this session, legal and forensic experts will break down practical strategies for culling and filtering electronically stored information (ESI) during and after collection in an e-discovery project …
    Ballroom C
     This two hour panel prepares digital forensic examiners for AI related challenges in court. It will feature two seasoned digital forensic examiners and two attorneys fluent in the current AI world, t …
    Meeting Room 202/204
    Tracking a subject no longer relies solely on physical devices attached to vehicles. Investigators today can access a vast range of precise digital location data—from smartphones and apps to rideshare …
    Ballroom A
    Graphene OS are causing severe headache for Law Enforcement globally. In this session, we talk about how sensitive we need to be in the industry of mobile forensics when sharing knowledge our capabili …
04:00 PM
    Meeting Room 206/208
    Learn how North Korean IT workers infiltrate enterprises using stolen identities, contractor loopholes, & remote-work obfuscation. This session teaches practical OSINT, remote digital forensics, UBEA …
    Meeting Room 106/107
     This case study shows how rapid patrol response and mobile device forensics turned a local complaint into a federal child-exploitation conviction. It covers key decisions, digital grooming analysis, …
    Meeting Room 202/204
    As AI technologies become increasingly accessible, cybercriminals are rapidly integrating their capabilities into their attack methodologies. This session examines the emerging threat landscape where …
    Mobile devices now represent most of the digital evidence in criminal investigations, yet increasing device volume, storage size, and security have created significant acquisition and workflow challen …
    Ballroom A
    Session details in progress.