Loading
08:30 AM
    Meeting Room 206/208
    Agentic AI represents a shift from models that merely generate text to systems capable of autonomous, goal-directed action. This session examines how early AI coding agents, such as Claude Code, can b …
    Ballroom C
     In this presentation I will go through my forensic workflow. I will discuss how I intake and image items in a timely and efficient manner. I will discuss the storage of case data, how I process cases …
    Ballroom C
    Business Email Compromise (BEC) has evolved from simple credential theft into a persistent, cloud-native threat that bypasses traditional investigative assumptions. Modern attackers abuse trusted serv …
    Ballroom A
    Encryption is now a default feature across iOS, protecting both system and application data. While many forensic tools automatically decode portions of this data, examiners are increasingly encounteri …
    Meeting Room 202/204
    Ballroom A
    Session details in progress.
09:30 AM
    Meeting Room 206/208
    Public-web and social media content are core inputs to OSINT-driven investigations, yet screenshots and consumer capture tools often fail under legal and forensic scrutiny. This session explores why t …
    Meeting Room 104/105
     Professionals in cybercrime, digital forensics, and law enforcement face repeated exposure to graphic material, high-stakes decisions, and overwhelming caseloads, conditions that fuel vicarious traum …
    Meeting Room 202/204
     As cyber threats grow increasingly sophisticated, traditional reactive approaches to incident response are no longer sufficient. This presentation explores how proactive threat hunting can be seamles …
    Meeting Room 106/107
    Dark web activity shows threat actors using compromised law enforcement email credentials to train AI models that generate realistic subpoena forgeries at scale. This session explains attack methods a …
    Ballroom C
    We are in an era where search engines are being augmented or replaced by prompts using ChatGPT, Gemini, Claude, Llama or equivalent. These technologies can be used in digital investigations to find re …
    Ballroom B
    Modern internal investigations, incident response engagements, and e-discovery matters increasingly require the collection of data from geographically dispersed and technically diverse sources. Releva …
10:30 AM
    Meeting Room 206/208
    You've had a ""true positive” security event on a Windows or Linux endpoint (or more than one)! Now what!? Combining investigative methodology with creative utilization of some free tools and custom s …
    Meeting Room 106/107
    This case highlights mobile forensics in CSAM investigations, from tipline reports to courtroom prosecution. Investigators extract and analyze data from devices while preserving evidence integrity. Ex …
    Ballroom C
    Advances in Artificial Intelligence are reshaping the way digital investigators uncover, analyze, and interpret evidence - revealing insights that were once impossible. With this innovation, come impo …
    Meeting Room 202/204
    Navigating SQLite Write-Ahead Logs is essential for digital forensic investigators, particularly when examining unsupported or partially supported applications. This session guides you through the man …
    Ballroom A
    Modern Android devices increasingly generate background data designed to anticipate user behavior and optimize app usage. One such artifact “pkgpredictions.db” is present on Samsung devices and other …
    Ballroom A
    Session details in progress.
11:30 AM
    Meeting Room 202/204
     AI is everywhere. For marketing teams, it means sticking a "Powered by AI" logo on something and adding a 20% markup. Whether in government, industry, or academia the benefits when tied to forensics …
    Meeting Room 106/107
    This session will demonstrate how RAM analysis enables the decryption of unsupported encrypted Android app databases—revealing evidence that was once considered inaccessible. Attendees will learn how …
    Meeting Room 206/208
     Digital evidence is everywhere, but the gap between technically sound and legally defensible is where cases are won or lost. This rapid-fire session delivers 25 practical lessons across eDiscovery, f …
    Ballroom B
    Grants are highly beneficial to law enforcement agencies because they provide critical funding beyond local tax revenue, allowing departments to enhance operations, improve public safety outcomes, and …
    Ballroom C
     As anonymization tools and cryptocurrency adoption expand, criminals increasingly exploit anonymous networks and digital assets to conceal identities, launder funds, and coordinate illicit activity. …
    Today’s vehicles are rolling data sources. They can record data like location history, connected phones, and system activity that helps place people, devices, and actions at key moments in an investig …
02:00 PM
    Meeting Room 206/208
    This session will explore how Digital Forensics and Incident Response teams can significantly strengthen their investigative capabilities by adopting OSINT methodologies pioneered outside the cybersec …
    Meeting Room 106/107
     Online gaming platforms, including mainstream titles and child exploitation themed games, are increasingly leveraged to groom children, produce CSAM, and facilitate sexual abuse. This session examine …
    Ballroom C
     Uses for ESD k9 in ICAC cases and a case study of Brayden Bull and the implications of that case in tribal jurisdictions.
    Meeting Room 202/204
     AI tools give law enforcement an advantage in their investigations. But how do you properly use AI tools without unknowingly violating laws or policies by uploading case information into public AI to …
    Ballroom A
    Joint Presentation with MSAB & Project VIC
    Ballroom B
    This talk examines how we’ve approached building a more connected workflow. Using Detective’s Command Line Interface, data ingestion from our extractor or third-party extraction tools can be automated …
03:00 PM
    Meeting Room 206/208
    Digital forensic investigations often assume evidence will surface through artifact recovery. This session examines a serial homicide case where repeated extractions produced nothing—and that absence …
    Meeting Room 106/107
     A brief look at some of the tools and tricks of using Adobe Premiere to effectively present videos and other details in your case. Taking hours of video or multiple sources of information and present …
    Ballroom C
    This session examines blockchain forensic techniques used to investigate crypto money laundering, including practical tactics for tracing illicit digital asset transactions. Attendees will learn how t …
    Digital evidence now drives the outcome of most civil disputes, yet many discovery battles are lost not because of technology, but because of drafting. This session equips litigators with a discipline …