Myrtle Beach, SC

June 6-9, 2021

Marriott Resort at Grande Dunes

Hero Default

hero__default

2020 Conference Program

Postponement Notice: Due to increases in positive COVID-19 cases, extended border closures, and the health and safety of all event participants, the 2020 Techno Security Myrtle Beach event has been postponed until June 6-9, 2021. READ MORE

The 2020 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorney’s/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
Monday, September 14, 2020
    • Forensics
    Oleander A
    Inspired by the rising adoption of IoT technologies amongst the general population, this session offers a methodology for the effective forensic examination of two IoT devices that have independent an ...
    • Investigations
    Atlantic 3
    In the last few years, mass casualty shootings have posed increasing threats and are rapidly becoming a global epidemic. With each attack inspiring other terrorists, or domestic extremists, these even ...
    • Information Security
    Tides 1/2
    This session will discuss: Cloud Security Considerations; Shared Responsibility and Contract Language; Cloud Security Requirements; Education and development of effective processes and Governance; and ...
    • Magnet Forensics Lab
    Atlantic 2
    With Apple’s switch to the APFS file system and new storage paths in macOS Catalina, making sense of Apple’s structures has changed once again. This lab will explore the latest macOS version and the a ...
    • Magnet Forensics Lab
    Atlantic 2
    Come to this lab to learn about Magnet AXIOM’s support for artifacts from multiple evidence sources, including cloud, smartphone backups, computer hard drives, and memory. We will explore advanced rec ...
    • Forensics
    Tides 1/2
    DVRs are typically suitable for measuring time periods of minutes or even a few seconds, but are they accurate enough to measure to sub-second accuracy? There are two potential sources for error; the ...
    • Audit/Risk Management
    Atlantic 3
    Robotic Process Automation (RPA) promises to revolutionize business processes, cutting cycle times from days down to minutes, practically eliminating manual errors, improving audit trails; the dawning ...
    • Forensics
    Oleander A
    When completing a digital forensics investigation in a corporate setting, you're often working against the clock to deliver results to your executive stakeholders. Although hard work is important, the ...
    • Investigations
    Oleander B
    Attendees will learn how free tools can be used to leverage Wi-Fi signals in criminal investigations. Both ends of Wi-Fi communications, the client device and the access point, can be valuable in inve ...
    • Magnet Forensics Lab
    Atlantic 2
    Session description in progress
    • Forensics
    Atlantic 3
    Forensic analysis of datasets is continuing to grow more complex and include audio and video files with greater frequency. Typical investigations in both the public and private sector involve audio an ...
    • Forensics
    Oleander A
    Most are aware that Checkm8 and checkra1n provide unique access to iOS devices that those outside of Law Enforcement previously weren't able to leverage. What do these exploits offer that set them apa ...
    • Forensics
    Tides 1/2
    Session description in development
    • Information Security
    Oleander A
    Session in Development
    • Magnet Forensics Lab
    Atlantic 2
    Evidence stored in servers belonging to service providers like Facebook, Microsoft, and Google can be crucial in a law enforcement investigation—and also among the hardest to acquire. Even when submit ...
    • Forensics
    Oleander A
    Artificial intelligence (AI)-backed technologies are helping law enforcement overcome challenges of resource and manpower shortages, while optimizing investigation productivity and performance. This s ...
    • Investigations
    Oleander B
    In this session the presenters will take an informative and sometimes lighthearted look at what it means to testify in court, what to expect, how to prepare, what to do and more importantly not do. At ...
    • Information Security
    Atlantic 3
    Session in Development
    • Magnet Forensics Lab
    Atlantic 2
    Come to this lab to learn about Magnet AXIOM’s support for artifacts from multiple evidence sources, including cloud, smartphone backups, computer hard drives, and memory. We will explore advanced rec ...
    • Information Security
    Tides 1/2
    Ransomware, business interruption, compromised vendors, nation-state attacks – cyber claims run the gamut of risks. Are cyber policies meeting the expectations of insureds when it comes to claims? How ...
    • Forensics
    Oleander A
    With the pace of change in mobile apps, including highly encrypted apps, law enforcement agencies and vendors are playing catch up when it comes to reverse engineering the structure of apps and recove ...
    • Forensics
    Oleander B
    iOS forensics has been a hot topic over the last few years. Apple is constantly strengthening its security measures on their devices such as iPhones, iPADs, Apple TV, Apple Watch etc. This was is desi ...
Tuesday, September 15, 2020
    • Keynote
    Oleander A/B
    2019 was another record year for the Cyber Criminals. Almost every week there was another data breach in the news. What did all of these organizations have in common? They all spent a lot of money on ...
    • Information Security
    Oleander B
    The Internet of Things has been evolving for years - and 2020 presents many of the most exciting developments in Internet-connected devices ever. Consumers seeking convenience, healthcare providers se ...
    • Investigations
    Tides 1/2
    It’s no secret that Slack’s popularity has exploded in recent years- once dubbed “the email killer”, organizations have implemented Slack as an efficient collaboration environment either alongside ema ...
    • Forensics
    Oleander A
    Internet artifacts can be a tremendous treasure trove of investigative data, but that is not all. Windows users utilize desktop messaging apps like Telegram, Whatsapp, Line, and others to communicate. ...
    • Audit/Risk Management
    Atlantic 3
    Session in Development
    • Sponsor Demo
    Heron
    Session Description in development
    • Information Security
    Oleander B
    Session in Development
    • Audit/Risk Management
    Atlantic 3
    This session is an introduction to cybersecurity frameworks and will cover a handful of the more popular frameworks, comparing and contrasting each, showing the pros and cons of implementation and cer ...
    • Forensics
    Oleander A
    A new challenge of forensics is upon us as Chromebooks become more and more popular. One of the challenges is understanding the difference obtained from different types of acquisitions as well as the ...
    • Investigations
    Tides 1/2
    Once investigators have completed the sometimes-troublesome tasks of video evidence recovery and footage playback, how do organizations identify suspects? How many people actually view footage of the ...
    • Investigations
    Oleander B
    The Dark Web has become a household term synonymous with criminal activity targeting both public and private sectors. Even the most careful user utilizing the Dark Web will slip up and eventually reve ...
    • Magnet Forensics Lab
    Atlantic 2
    As the landscape of IT systems continues its migration out of the server room and into cloud hosted environments, it is critical that your digital forensics toolkit can adapt to these new environments ...
    • Sponsor Demo
    Osprey
    Session Description in development
    • Sponsor Demo
    Heron
    Session Description in development
    • Information Security
    Tides 1/2
    This is an action-packed lessons learned presentation for public and private sector IT, InfoSec, and executives. Learn from other organization’s mistakes and improve your organizations’ incident respo ...
    • Forensics
    Oleander A
    This session will discuss and demonstrate the process of forensics in the cloud. We will look at both AWS and Azure and will address secure communications, encryption, authentication, dynamic provisio ...
    • Forensics
    Oleander B
    Digital investigations are complex undertakings collecting and analyzing information from a diverse range of sources and in this complexity, defensible findings are often-times hard to create. As a co ...
    • Forensics
    Atlantic 3
    This session will address the date anomalies of decompressed files as well as look at zipfile fragment and why some do not repair with automated tools. Attendees will leave the session with the abilit ...
    • Cellebrite Lab
    Atlantic 1
    NOTE: This presentation is for Law Enforcement only. Proof of identification will be required to attend. Session description in progress.
    • Magnet Forensics Lab
    When time is of the essence and you need to get evidence into the hands of your investigators fast, technology can help you scale up the existing resources and process you have in place. xxx, xxx from ...
    • Information Security
    Oleander B
    This session will look at how systems can be designed or re-architected to take advantage of cloud-based technologies not just to prevent incidents but prepare for and respond to, incidents. The prese ...
    • Investigations
    Tides 1/2
    As criminal use of the Internet becomes more and more sophisticated, law enforcement's ability to locate and act on publicly available information is more crucial than ever. Investigators must be able ...
    • Audit/Risk Management
    Atlantic 3
    This session will cover; Why patching is the best method to secure an endpoint; Why the tool used to discover what endpoints are unpatched doesn't matter if you understand how the data is discovered; ...
    • Magnet Forensics Lab
    Atlantic 2
    Using multiple analysis techniques can be beneficial in any type of investigation. Learn how to correlate different artifacts with each other and see the connections that occur between data across mul ...
    • Forensics
    Oleander B
    This session will showcase some of the common "signature faults" that occur in iPhones and modern encrypted android devices. We will show you what diagnosis and repair of these faults looks like by tr ...
    • Information Security
    Atlantic 3
    From the solo entrepreneurs to Fortune 100 companies, trade secrets may be a most valuable asset to any company, large or small. It is difficult to overestimate their importance in the global economy: ...
    • Forensics
    Oleander A
    In this session, Amped Software shares the results of an internal study covering casework received over the years by their support team. Key questions analyzed include: - What are the most common requ ...
    • Magnet Forensics Lab
    Atlantic 2
    We regularly have brought free tools to the community. Over the years, these tools include the MAGNET App Simulator, MAGNET RAM Capture, and Magnet ACQUIRE. Over the past few weeks we added to that to ...
Wednesday, September 16, 2020
    • Information Security
    Oleander A/B
    The cost of cyber-crime is expected to reach $6 billion by 2021 and is well on-track to meet and even exceed that amount. From the crime of ransomware and its evolution, to new methods of phishing, th ...
    • Audit/Risk Management
    Atlantic 3
    This session will define a technical audit program covering key web application building blocks and significant risks, and systematically sort through the available cyber security safeguards in today’ ...
    • Information Security
    Tides 1/2
    In a cyber smash and grab, the attacker gains access to an organization to facilitate a quick financial gain. The victim organization often suffers damage beyond simple financial loss. Damage occurs t ...
    • Forensics
    Oleander A
    Would you consider buying a new car that had no keys, completely invisible locks and a written commitment from the dealership stating the car has the best security in the industry, can only respond to ...
    • Cellebrite Lab
    Atlantic 1
    NOTE: This presentation is for Law Enforcement only. Proof of identification will be required to attend. Session description in progress.
    • Magnet Forensics Lab
    Atlantic 2
    As the landscape of IT systems continues its migration out of the server room and into cloud hosted environments, it is critical that your digital forensics toolkit can adapt to these new environments ...
    • Sponsor Demo
    Session Description in development
    • Information Security
    Oleander B
    Organizations have to be keenly aware of their own employees due to the advanced computer knowledge that most employees have today. If an employee becomes disgruntled, bored, challenged, etc., might g ...
    • Investigations
    Tides 1/2
    With the increasing importance of privacy and security in today's business world coupled with the advancement and acceptance of cryptocurrencies such as Bitcoin and Ethereum, today's digital forensic ...
    • Sponsor Demo
    Osprey
    Session Description in development
    • Magnet Forensics Lab
    Atlantic 2
    Session description in progress.
    • Investigations
    Oleander B
    Officer safety is paramount, and we consider safety before we visit a suspect’s residence to execute a search warrant or conduct an interview. But do we consider how we could be injured by electronic ...
    • Information Security
    Atlantic 3
    Enterprise ransomware has undoubtedly garnered the most news coverage of information security threats in the past few years. Unlike complex or esoteric threats, enterprise ransomware is readily unders ...
    • Forensics
    Tides 1/2
    Bring together Microsoft’s PowerShell and Python to address digital investigations and create state-of-the-art solutions for incident response teams, and forensic investigators. Attendees will learn h ...
    • Forensics
    Oleander A
    Session description in development.
    • Magnet Forensics Lab
    Atlantic 2
    In many cases, memory analysis can provide access to data you can’t get through “dead-box” forensics alone and may be the only way to obtain evidence critical to solving your investigation. Malware in ...
    • Forensics
    Tides 1/2
    Forensic tools often operate in non-ideal conditions (e.g., damaged devices or corrupted files) or in adversarial conditions (e.g., user purposely deleted files). These tools reconstruct data independ ...
    • Forensics
    Atlantic 3
    This session will discuss recent advancements in macOS forensics as well as emerging challenges. This will include new tools and techniques as well as a discussion of changes in macOS Catalina that ar ...
    • Investigations
    Oleander A
    With an average of 18 million trips a day and growing, Uber is one of the most widely used transportation companies in the world. While critical incidents and criminal activity involving Uber are a fr ...
    • Information Security
    Oleander B
    Session in development.
    • Cellebrite Lab
    Atlantic 1
    Session in Development
    • Forensics
    Tides 1/2
    This session will share a discussion on best practices for triaging Mac computers. As the security on Macs continues to increase the need to triage live in the field becomes more of a necessity. We wi ...
    • Information Security
    Oleander B
    During this session, attendees are provided a framework to assist domestic abuse victims with detaching their abuser/stalker from their real and digital life. The framework provided to the audience is ...
    • Audit/Risk Management
    Atlantic 3
    This session will cover how your team can use the NIST Security and Privacy Control Catalog in NIST SP 800-53 to identify and select IT security controls, identify common controls, and tailor a securi ...
    • Magnet Forensics Lab
    Atlantic 2
    More than half of data breaches reported by organizations are insider incidents — either through the inadvertent or the malicious misuse of data. As enterprises expand the use of cloud-based services ...
    • Magnet Forensics Lab
    Atlantic 2
    This presentation will focus on the development and deployment of an extremely quick triage tool, Magnet OUTRIDER. This tool was designed to help examiners prioritize which evidence to analyze first i ...
Thursday, September 17, 2020
    • Audit/Risk Management
    Atlantic 3
    The disciplines of Information Security and IT Audit are quite different and require different skill sets. However, they have many common goals and objectives. For example, both are tasked with ensuri ...
    • Information Security
    Tides 1
    Current trends and threats in cyber security and the evolving DISA no cost services to combat them.
    • Forensics
    Oleander A
    NOTE: This presentation is for Law Enforcement only. Proof of identification will be required to attend. As technology evolves, so must law enforcement's approach to digital forensics. No longer can a ...
    • Magnet Forensics Lab
    Atlantic 2
    Many of the new mobile applications that daily hit the App Store and Google Play contain features that can contain crucial evidence. Often, though, commercial forensic tools cannot keep pace with thes ...
    • Cellebrite Lab
    Atlantic 1
    NOTE: This presentation is for Law Enforcement only. Proof of identification will be required to attend. Session description in progress.
    • Audit/Risk Management
    Atlantic 3
    During a merger or acquisition, you get all the assets of the acquired organization, but you also take on all their liabilities. That's why due diligence has been so important for M&A. Cybersecurity p ...
    • Forensics
    Oleander A
    Law enforcement is faced with a multitude of challenges in acquiring digital evidence from crimes committed on the dark net: TOR's built-in encryption, the use of crypto currency, and the obfuscation ...
    • Investigations
    Oleander B
    Current threat vectors show targeted attacks on social media accounts owned by enterprises and their employees. Most organizations lack a defense-in-depth strategy to address the evolving social media ...
    • Information Security
    Tides 1/2
    You're either about to stand up resources in Microsoft Azure or you're already there but unsure of your security configuration in Microsoft's cloud. What should you have configured? What additional re ...
    • Magnet Forensics Lab
    • Forensics
    Tides 1
    Forensic examiners and investigators may only look at visible document metadata. Still, there may potentially be much more information available “buried” internally within a file if we conduct a bit o ...
    • Forensics
    Oleander B
    This session will begin with an overview of the state-of-the-art of the technology which creates deepfakes, and (more importantly) of the technology which can be deployed to detect deepfakes. Thereaft ...
    • Investigations
    Oleander A
    Modern vehicles pack increasing amounts of connected sensors and features… which can be exploited by criminals to commit all sorts of old crimes in new ways. It is already happening, and law enforceme ...
    • Audit/Risk Management
    Atlantic 3
    Implementing Regulation & Frameworks with No Context Leaves Perception of Security. the Key to Security Is a Well Thought Implementation of the Framework by a Common-sense Approach You’ve implemented ...
    • Magnet Forensics Lab

2020 Sponsors


QUOTE

  • This year’s event was fantastic. Every year it gets better.
    Joe D’Allacco, Head of EDiscovery and CyberAssurance, AXA XL
  • This was our seventh year in a row at Techno Security & Digital Forensics Conference because we know we are going to meet our very important customers here and we are going to meet some fantastic prospects that will turn into great customers for us.
    John Graham, Director of Sales and Business Development, Atola Technology
  • The diversity of topics (forensics, security, legal, threats, best practices) provides security and investigative practitioners a variety of sessions and learning opportunities over the course of the conference.
    Brian Bannister, CISO, SC Department of Health and Environmental Control
  • Techno Security & Digital Forensics Conference is important to the team at Blackbag as it enables a critical component of our mission to be fulfilled in the rapid and ever changing DFIR community. Individuals should attend the event to keep current with the latest acquisition, analysis and reporting techniques so we can all partner together to reveal the truth in data to create a safer world.
    Ben Charnota, Chief Customer Officer, Blackbag Technologies
  • The conference exceeded my expectations. It was great to meet the vendors of the software I use in my job and to see what is coming in the near future with forensic products.
    Detective Kevin Heinig, Digital Forensics Examiner, Indian River County Sheriff's Office
  • We have been here every year since it started. There is a great mix of international and national clients here from both law enforcement and corporate. We wouldn’t miss it for the world.
    Jason Roslewicz, CEO, Sumuri
  • It’s a place where diverse experts in the field are gathered and fully accessible to all who attend.
    Robert Toronzi, Detective Sergeant, City of Bethlehem Police Department

SECURE YOUR BOOTH TODAY!

SECURE YOUR BOOTH TODAY!

Connect with professionals looking for the latest tools, training, networking, and solutions to industry challenges.

LEARN MORE