We're sorry, but we couldn't find any results that match your search criteria. Please try again with different keywords or filters.
Loading
Loading
08:30 AM
-
Meeting Room 206/208Agentic AI represents a shift from models that merely generate text to systems capable of autonomous, goal-directed action. This session examines how early AI coding agents, such as Claude Code, can b …
-
Ballroom CIn this presentation I will go through my forensic workflow. I will discuss how I intake and image items in a timely and efficient manner. I will discuss the storage of case data, how I process cases …
-
Ballroom CBusiness Email Compromise (BEC) has evolved from simple credential theft into a persistent, cloud-native threat that bypasses traditional investigative assumptions. Modern attackers abuse trusted serv …
-
Ballroom AEncryption is now a default feature across iOS, protecting both system and application data. While many forensic tools automatically decode portions of this data, examiners are increasingly encounteri …
-
Meeting Room 202/204
-
Ballroom ASession details in progress.
09:30 AM
-
Meeting Room 206/208Public-web and social media content are core inputs to OSINT-driven investigations, yet screenshots and consumer capture tools often fail under legal and forensic scrutiny. This session explores why t …Speakers
-
Meeting Room 104/105Professionals in cybercrime, digital forensics, and law enforcement face repeated exposure to graphic material, high-stakes decisions, and overwhelming caseloads, conditions that fuel vicarious traum …
-
Meeting Room 202/204As cyber threats grow increasingly sophisticated, traditional reactive approaches to incident response are no longer sufficient. This presentation explores how proactive threat hunting can be seamles …
-
Meeting Room 106/107Dark web activity shows threat actors using compromised law enforcement email credentials to train AI models that generate realistic subpoena forgeries at scale. This session explains attack methods a …
-
Ballroom CWe are in an era where search engines are being augmented or replaced by prompts using ChatGPT, Gemini, Claude, Llama or equivalent. These technologies can be used in digital investigations to find re …
-
Ballroom BModern internal investigations, incident response engagements, and e-discovery matters increasingly require the collection of data from geographically dispersed and technically diverse sources. Releva …
10:30 AM
-
Meeting Room 206/208You've had a ""true positive” security event on a Windows or Linux endpoint (or more than one)! Now what!? Combining investigative methodology with creative utilization of some free tools and custom s …
-
Meeting Room 106/107This case highlights mobile forensics in CSAM investigations, from tipline reports to courtroom prosecution. Investigators extract and analyze data from devices while preserving evidence integrity. Ex …
-
Ballroom CAdvances in Artificial Intelligence are reshaping the way digital investigators uncover, analyze, and interpret evidence - revealing insights that were once impossible. With this innovation, come impo …
-
Meeting Room 202/204Navigating SQLite Write-Ahead Logs is essential for digital forensic investigators, particularly when examining unsupported or partially supported applications. This session guides you through the man …
-
Ballroom AModern Android devices increasingly generate background data designed to anticipate user behavior and optimize app usage. One such artifact “pkgpredictions.db” is present on Samsung devices and other …
-
Ballroom ASession details in progress.
11:30 AM
-
Meeting Room 202/204AI is everywhere. For marketing teams, it means sticking a "Powered by AI" logo on something and adding a 20% markup. Whether in government, industry, or academia the benefits when tied to forensics …
-
Meeting Room 106/107This session will demonstrate how RAM analysis enables the decryption of unsupported encrypted Android app databases—revealing evidence that was once considered inaccessible. Attendees will learn how …
-
Meeting Room 206/208Digital evidence is everywhere, but the gap between technically sound and legally defensible is where cases are won or lost. This rapid-fire session delivers 25 practical lessons across eDiscovery, f …
-
Ballroom BGrants are highly beneficial to law enforcement agencies because they provide critical funding beyond local tax revenue, allowing departments to enhance operations, improve public safety outcomes, and …Speakers
-
Ballroom CAs anonymization tools and cryptocurrency adoption expand, criminals increasingly exploit anonymous networks and digital assets to conceal identities, launder funds, and coordinate illicit activity. …
-
Today’s vehicles are rolling data sources. They can record data like location history, connected phones, and system activity that helps place people, devices, and actions at key moments in an investig …
02:00 PM
-
Meeting Room 206/208This session will explore how Digital Forensics and Incident Response teams can significantly strengthen their investigative capabilities by adopting OSINT methodologies pioneered outside the cybersec …
-
Meeting Room 106/107Online gaming platforms, including mainstream titles and child exploitation themed games, are increasingly leveraged to groom children, produce CSAM, and facilitate sexual abuse. This session examine …
-
Ballroom CUses for ESD k9 in ICAC cases and a case study of Brayden Bull and the implications of that case in tribal jurisdictions.
-
Meeting Room 202/204AI tools give law enforcement an advantage in their investigations. But how do you properly use AI tools without unknowingly violating laws or policies by uploading case information into public AI to …
-
Ballroom AJoint Presentation with MSAB & Project VIC
-
Ballroom BThis talk examines how we’ve approached building a more connected workflow. Using Detective’s Command Line Interface, data ingestion from our extractor or third-party extraction tools can be automated …
03:00 PM
-
Meeting Room 206/208Digital forensic investigations often assume evidence will surface through artifact recovery. This session examines a serial homicide case where repeated extractions produced nothing—and that absence …
-
Meeting Room 106/107A brief look at some of the tools and tricks of using Adobe Premiere to effectively present videos and other details in your case. Taking hours of video or multiple sources of information and present …
-
Ballroom CThis session examines blockchain forensic techniques used to investigate crypto money laundering, including practical tactics for tracing illicit digital asset transactions. Attendees will learn how t …
-
Digital evidence now drives the outcome of most civil disputes, yet many discovery battles are lost not because of technology, but because of drafting. This session equips litigators with a discipline …