Myrtle Beach, SC

June 6-9, 2021

Marriott Resort at Grande Dunes

Hero Default

hero__default

2021 Conference Program

The 2021 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
Sunday, June 06, 2021
    • Investigations
    Tides 1/2
    Learn how free tools can be used to leverage Wi-Fi signals in criminal investigations. This session will cover finding Wi-Fi enabled client devices, such as laptops, for criminal cases and missing per ...
    • Forensics
    Atlantic 3
    iOS forensics is a hot topic over the last few years. Apple is constantly strengthening its security measures. Things like remote wiping, not allowing the passing of data through lightning cable, requ ...
    • Information Security
    Oleander A
    Most people have heard of using complex passwords but really do not understand what that entails and what constitutes a complex password. This includes developers who write code that often time includ ...
    • Cellebrite Lab
    Atlantic 1
    • Investigations
    Oleander B
    As agencies look ahead, many are transforming the way they conduct investigations to maximize Digital Intelligence (DI) as a way to protect their communities against the growing threat from criminals ...
    • Magnet Forensics Lab
    Atlantic 2
    LAW ENFORCEMENT ONLY: Pictures, videos, and chats can all be key pieces of evidence in building cases for possession, distribution, and/or production of child sexual abuse material (CSAM), solicitatio ...
    • Forensics
    Tides 1/2
    Forensic work develops on many levels: precision and care to collect and define each speck of evidence. Responsibility and professionalism needed to ensure the reflection of truth. Hours and resources ...
    • Audit/Risk Management
    Atlantic 3
    There are many advantages to cloud computing, but there are also many risks. This session will peel back the layers of complexity to distill the key cloud computing risks, discuss how to identify thes ...
    • Forensics
    Oleander A
    Many applications today store data in SQLite databases from Android to iOS to even IoT. This session will explore how data is stored in SQLite and how to recover data from these databases. The present ...
    • Investigations
    Oleander B
    While video is more readily available to aid in investigations today (e.g. CCTV, Body-worn, social media, and cellphones), there are several questions that may be asked of a video that may not able to ...
    • Cellebrite Lab
    Atlantic 1
    • Forensics
    Atlantic 3
    There are many available tools for Digital Forensics Investigation, all of which are very capable. But what can the small business owner or law enforcement forensics lab with a limited budget do using ...
    • Investigations
    Oleander A
    This session goes through the evolution, goals and motivation of the Dark Web. The presenter will share what and whom you can find on the platforms as well as the major conflicts individuals face whil ...
    • Forensics
    Tides 1/2
    One of the most profound technological and cultural migrations our world faces is that of the migration to the cloud. Not only must devices and information systems interact with each other, but the cl ...
    • Forensics
    Oleander B
    Many enterprises spend millions of dollars on security, had SOCs, firewalls, IDFs and anti-virus systems but still become compromised. Had they taken a more proactive approach they may have been able ...
    • Magnet Forensics Lab
    Atlantic 2
    In this lab we will explore Magnet AXIOM’s support for macOS and APFS. We will consider acquisitions, processing, and interactive examinations to leverage AXIOM's various explorers for faster examinat ...
    • Cellebrite Lab
    Atlantic 1
    • Forensics
    Oleander A
    Worn-out NAND memory chips became a common issue with the Tesla electric vehicles (2012-2018). The infotainment system that runs on Nvidia's Tegra 3 system-on-chips made almost 160,000 cars susceptibl ...
    • Information Security
    Atlantic 3
    The need to secure Active Directory is no longer an option, but a mandate. Attacks on Active Directory are at an all-time high. Companies that are not taking heed are paying, both monetarily and with ...
    • Forensics
    Tides 1/2
    This session will give the forensic practitioner a detailed overview of forensic imaging. Attendees will be the shown need for write protection devices. Some current forensic imaging software and hard ...
    • Investigations
    Oleander B
    The identification of Advance Persistent Threats such as those launched against Solarwinds (APT29 also known as Cozy Bear) that employ anti-forensics methods to impede detection are continuing to adva ...
    • Cellebrite Lab
    Atlantic 1
    • Investigations
    Oleander B
    Law enforcement information systems are rapidly developing, but investigators are still facing challenges in solving crimes and reveal victims' and perpetrators' identities. Some of the reasons are th ...
    • Forensics
    Tides 1/2
    After attending this session, attendees will understand the legal landscape focusing on recent decisions rendered by the courts, including Carpenter v. United States, S. Ct. (2018); United States v. L ...
    • Information Security
    Oleander A
    Network Behavior Anomaly Detection (NBAD) and User and Entity Behavior Analytics (UEBA) are heralded as machine learning fueled messiahs for finding advanced attacks. The data collection and processin ...
    • Forensics
    Atlantic 3
    This session will examine several simple but effective methods of conducting remote forensic collections of computers using easy free, and low-cost software/applications. The session will explore and ...
    • Magnet Forensics Lab
    Atlantic 2
    In this talk we will explore Magnet AXIOM’s features useful to the Linux examiner. We will consider acquisitions, processing, and interactive examinations to leverage AXIOM's various explorers for fas ...
    • Cellebrite Lab
    Atlantic 1
Monday, June 07, 2021
    • Keynote
    Oleander A/B
    2020 was another record year for the Cyber Criminals. Almost every week there was another data breach in the news. What did all of these organizations have in common? They all spent a lot of money on ...
    • Forensics
    Tides 1/2
    Legal qualifications of any testifying expert witness have evolved since the landmark Frye case, as well as the more sweeping Daubert case, and continue to evolve as technology advances, as both of th ...
    • Forensics
    Oleander A
    checkm8, the unpatchable exploit, has completely changed the approach to Apple iOS data extraction. This exploit allows investigators to safely extract complete file system and keychain from a wide ra ...
    • Audit/Risk Management
    Atlantic 3
    Jeremy Miller, a retired Green Beret and current CEO of Lionfish Cyber Security, will discuss how mission set tactics used by Special Forces can be applied directly to the cyber war being waged today ...
    • Information Security
    Oleander B
    Technology has impacted our behavior and the ability for criminals to manipulate people. Today's cyber culture is reliant on the use of technology. For example, increased use of technology has left co ...
    • Sponsor Demo
    Heron
    Details to come.
    • Sponsor Demo
    Osprey
    The demo highlights the new NVMe WriteBlocker and the DittoX86. The NVMe WriteBlocker is the fastest on the market. The Ditto x86 is a bootable device that provides investigators with a method for ima ...
    • Magnet Forensics Lab
    Atlantic 2
    This session will explore the major cloud structures in many modern corporations including O365, AWS, Slack, and more. Throughout this lab, students will learn about AXIOM Cyber’s different functional ...
    • Cellebrite Lab
    Atlantic 1
    • Magnet Forensics Lab
    Atlantic 2
    The global pandemic accelerated workplace shifts towards new ways of working, many involving online work and new technologies. Law Enforcement Agencies and Digital Forensic teams were already re-imagi ...
    • Cellebrite Lab
    Atlantic 1
    • Information Security
    Oleander B
    Cybercrime continues to flourish despite recent world circumstances. Ransomware, phishing, and other cyberattacks remain a real threat to businesses, governments, and consumers, wreaking havoc and cau ...
    • Investigations
    Tides 1/2
    In the early 2000’s, the world of investigations entered the digital age as desktop computers became the new corporate file cabinet. By the middle of the decade the FRCP pushed digital evidence into t ...
    • Forensics
    Oleander A
    Chromebooks present a forensic challenge as they become more prevalent. One challenge is understanding the difference obtained from different acquisition methods and the cloud. In 2019, a group of 30 ...
    • Information Security
    Atlantic 3
    This session will discuss: Cloud Security Considerations; Shared Responsibility and Contract Language; Cloud Security Requirements; Education and development of effective processes and Governance; and ...
    • Sponsor Demo
    Osprey
    Details to come.
    • Sponsor Demo
    Heron
    Details to come.
    • Information Security
    Oleander B
    Cyber-Espionage breaches pose a unique challenge. Through advanced techniques and a specific focus, Cyber-Espionage threat actors seek to swiftly gain access to heavily defended environments, laterall ...
    • Investigations
    Tides 1/2
    This session will provide in-depth coverage and identify the often-overlooked investigative benefits of a few of the most underutilized but increasingly important deep web sources for Law Enforcement ...
    • Forensics
    Oleander A
    • Forensics
    Atlantic 3
    It no secret that Slack’s popularity has exploded in recent years- once dubbed “the email killer”, organizations have implemented Slack as an efficient collaboration environment either alongside email ...
    • Sponsor Demo
    Heron
    Details to come.
    • Sponsor Demo
    Osprey
    Join us for a technology demo to introduce our automated analysis platform for digital data – LEAP. This demo will provide an overview of LEAP and how it will streamline your CSAM investigations to gi ...
    • Magnet Forensics Lab
    Atlantic 2
    In this lab we will show you how to extend your capabilities with Magnet AXIOM by utilizing and creating custom artifacts. In this hands-on lab we will learn how to create and install custom artifacts ...
    • Cellebrite Lab
    Atlantic 1
    • Information Security
    Tides 1/2
    Passwords are one of the simplest ways industries protect their digital infrastructures, but what they don't know is that they are doing it wrong. In this session, attendees will learn how to strength ...
    • Forensics
    Oleander A
    The use of Drones is rapidly growing and expanding into criminal enterprises and terrorist organizations and news feeds are continually reporting on crimes being successfully prosecuted where UAV fore ...
    • Investigations
    Oleander B
    The internet provides investigators with the ability to ascertain information on subjects efficiently. Focusing on the individual(s) is not always the answer. Identifying actionable intelligence is an ...
    • Sponsor Demo
    Heron
    Join OpenText to discuss forensic best practices and learn how Tableau Forensic can help improve the efficiency of the investigative process
    • Sponsor Demo
    Osprey
    Details to come.
    • Audit/Risk Management
    Atlantic 3
    Session details to come.
    • Magnet Forensics Lab
    Atlantic 2
    A common response when talking to Law Enforcement officers and staff often shows that there is a distinct lack of understanding as to the amount of evidence that can be found on the Cloud. It usually ...
    • Cellebrite Lab
    Atlantic 1
    • Cellebrite Lab
    Atlantic 1
    • Investigations
    Atlantic 1
    Connected vehicles bring new features... but also enable criminals to commit crimes in new ways. It is already happening but LE often don't recognize or know how to solve these crimes. In this session ...
    • Information Security
    Oleander B
    Forensic tools often operate in non-ideal conditions (e.g., damaged devices or corrupted files) or in adversarial conditions (e.g., user purposely deleted files). These tools reconstruct data independ ...
    • Forensics
    Tides 1/2
    Remote work requirements. Reduced budgets. Fewer investigators. Today’s environment has created new challenges for investigators. Today’s cloud offerings can help you keep up with your workload and de ...
    • Forensics
    Oleander A
    LAW ENFORCEMENT ONLY As technology evolves, so must law enforcement's approach to digital forensics. No longer can an investigator rely solely on what is now considered traditional electronic device e ...
    • Cellebrite Lab
    Atlantic 1
Tuesday, June 08, 2021
    • Information Security
    Oleander B
    Cybersecurity Advisors from the Cybersecurity and Infrastructure Security Agency (CISA) will provide a presentation outlining a brief overview of the Cyber Supply Chain and discuss current and emergin ...
    • Investigations
    Oleander A
    **NO PRESS ALLOWED** With an average of 18 million trips a day and growing, Uber is one of the most widely used transportation companies in the world. While critical incidents and criminal activity in ...
    • Audit/Risk Management
    Atlantic 3
    In today’s new normal, working from a coffee shop, at one’s kitchen table or even out of the country, business are finding new and creative ways to thieve. Enabling employees to work out of the office ...
    • Forensics
    Tides 1/2
    A panel discussion about the most significant aspects that contribute to successful projects. The panel will include experiences that directly support success, presentation of critical workflows and a ...
    • Information Security
    Oleander B
    Recent high-profile breaches are a clear signal that our approach to cybersecurity has failed. We are no longer facing just 'hackers' in their basements. U.S. businesses are up against rogue nation-st ...
    • Investigations
    Oleander B
    With an estimated 1.4 trillion photos being taken in 2020, and approximately 90% of those being taken with mobile devices, investigators now more than ever need an in-depth understanding of how images ...
    • Sponsor Demo
    Osprey
    Details to come.
    • Sponsor Demo
    Heron
    Mobile devices provide a wealth of digital evidence. They can indicate where devices have been, what they’ve done, who they’ve communicated with, when and why. Keeping up with technology is currently ...
    • Cellebrite Lab
    Atlantic 1
    • Forensics
    Oleander A
    The Dark Web has become a household term synonymous with criminal activity targeting both public and private sectors. Even the most careful user utilizing the Dark Web will slip up and eventually reve ...
    • Investigations
    Tides 1/2
    Officer safety is paramount, and we consider safety before we visit a suspect’s residence to execute a search warrant or conduct an interview. But do we consider how we could be injured by electronic ...
    • Information Security
    Oleander B
    Because of the time and effort required to compromise well-defended networks, attackers want to stay on their targets as long as possible. Persistence is the term used to describe the techniques and s ...
    • Sponsor Demo
    Osprey
    FTK Central combines the powerful processing engine of FTK with innovative new forensic & legal review workflows, together into one collaborative, web-based tool. FTK Central allows your team to look ...
    • Sponsor Demo
    Heron
    Details to come.
    • Audit/Risk Management
    Atlantic 3
    Details to come.
    • Magnet Forensics Lab
    Atlantic 2
    Law Enforcement Only The complexity of digital investigations and the volume of data is increasing, as budget constraints and talent shortages force you to get more done with what you have. It’s becom ...
    • Cellebrite Lab
    Atlantic 1
    • Information Security
    Atlantic 3
    Cybersecurity professionals are all too familiar with the cliché that the weakest link in an organization are the people who work for and with the company. According to the Verizon Data Breach and Inc ...
    • Forensics
    Oleander B
    In this session we'll focus on the media aspects of fake news and disinformation campaigns with deep analysis of altered images, audio, and video to uncover methods used to twist narratives and mislea ...
    • Information Security
    Tides 1/2
    More than 20% of organizations use mobile credentials for physical access. By 2023, the commercial sector will dominate the market for mobile credentials with 90% share of the TAM, especially hospital ...
    • Forensics
    Oleander A
    LAW ENFORCEMENT ONLY Traditional collection methods are limited, creating a backlog and potentially jeopardizing access to time-sensitive data. This session will share modern approaches to digital for ...
    • Sponsor Demo
    Heron
    Recent breaches and attacks related to vulnerabilities like SolarWinds and Microsoft Exchange have left government agencies and corporations scrambling to respond. This is especially true within the U ...
    • Sponsor Demo
    Osprey
    Details to come
    • Magnet Forensics Lab
    Atlantic 2
    Shipping sensitive evidence on USB drives or requiring investigators to travel to the lab can waste critical investigation time and may introduce security risks. Plus, training investigators to use mu ...
    • Cellebrite Lab
    Atlantic 1
    • Information Security
    Atlantic 3
    The pandemic has lead to an explosion of virtual meetings. At the same time, so-called "ephemeral" or disappearing messaging apps are allowing communications that may not be recorded. This session wil ...
    • Investigations
    Oleander B
    Case studies of homicide investigations will be discussed that use Call Detail Records and Geolocation Analysis to solve homicide investigations. Tools using Google locations, Google Geofence, social ...
    • Forensics
    Oleander A
    Mordor Intelligence states the Mobile Anti-Malware Market was valued at USD 4.50 billion in 2019 and is expected to reach USD 12.40 billion by 2025; a CAGR of 18.4%. The adoption of BYOD is driving th ...
    • Forensics
    Tides 1/2
    This session will discuss the latest shake-up to the Mac Forensics world. With the release of Apple’s new proprietary processors, Mac Forensics is faced with its latest in a long line of security enha ...
    • Cellebrite Lab
    Atlantic 1
    • Magnet Forensics Lab
    Atlantic 2
    With a larger than ever remote workforce, the need to collect data from endpoints not connected to the corporate network has never been greater. It’s critical that you have the ability to collect and ...
    • Investigations
    Tides 1/2
    The darknet is often thought of as impenetrable but this session will take you through how law enforcement can use computer hacking techniques common among criminals to identify and track suspects eng ...
    • Information Security
    Atlantic 3
    Deep packet inspection evaluates the data part and the header of a packet that is transmitted through an inspection point, weeding out any non-compliance to protocol, spam, viruses, intrusions, and an ...
    • Forensics
    Oleander A
    • Magnet Forensics Lab
    Atlantic 2
    Do you have a response plan for dealing with data stored in the cloud? Do you have the necessary accounts, access, logging, and knowledge on what to do if you need to collect evidence stored in AWS, A ...
    • Cellebrite Lab
    Atlantic 1
Wednesday, June 09, 2021
    • Investigations
    Oleander B
    This session will provide attendees with an understanding of investigative techniques associated with reports of Internet crimes, focusing on child exploitation and the CyberTipline reports investigat ...
    • Audit/Risk Management
    Atlantic 3
    Web applications have become more complex, frequently rushed to market by poorly trained software developers, increasing the business risks and the challenges to applying and verifying reliable safegu ...
    • Information Security
    Tides 1/2
    Quantum computing promises significant breakthroughs that benefit all humankind in science, medicine, financial services, and more. But what does quantum computing mean for data security? During this ...
    • Forensics
    Oleander A
    Previous studies of dark web forensics have focused on network forensics rather than host-based forensics. This session discusses a framework for identifying host-based artifacts during digital forens ...
    • Magnet Forensics Lab
    Atlantic 2
    With Apple’s Safari application typically taking the #2 browser spot worldwide across both computer and mobile platforms, examiners need to understand the how’s and the whys of Safari’s operation on b ...
    • Cellebrite Lab
    Atlantic 1
    • Information Security
    Tides 1/2
    Root Cause Analysis (RCA) is an essential element of Incident Response. Determining the answers to "What Happened?" "Why It Happened?" and "How to Reduce the Likelihood of Recurrence" is critical, but ...
    • Investigations
    Oleander B
    Malicious actors have incorporated the use of emulated mobile devices to commit fraud against individuals and financial institutions. This session will introduce how mobile devices are emulated, metho ...
    • Information Security
    Oleander A
    This session provides a deep dive into the Dark Web and its associated technologies. Attendees will gain an understanding of the infrastructure and content of multiple dark nets and learn how to lever ...
    • Magnet Forensics Lab
    Atlantic 2
    "Our online world and the use of electronic devices have led to most of our interactions in the online world. Technology contributes to people’s perception of things being real when they are not. This ...
    • Cellebrite Lab
    Atlantic 1
    • Forensics
    Oleander B
    The need to obtain video evidence from cloud-based security video systems like Ring Doorbells, Arlo, and Nest cameras as well as social media sites such as Facebook, YouTube, Instagram, etc. has incre ...
    • Information Security
    Tides 1/2
    Details to come.
    • Magnet Forensics Lab
    Atlantic 2
    In this talk we will explore Magnet AXIOM’s features useful to the Linux examiner. We will consider acquisitions, processing, and interactive examinations to leverage AXIOM's various explorers for fas ...
    • Cellebrite Lab
    Atlantic 1

2021 Sponsors


QUOTE

  • This year’s event was fantastic. Every year it gets better.
    Joe D’Allacco, Head of EDiscovery and CyberAssurance, AXA XL
  • This was our seventh year in a row at Techno Security & Digital Forensics Conference because we know we are going to meet our very important customers here and we are going to meet some fantastic prospects that will turn into great customers for us.
    John Graham, Director of Sales and Business Development, Atola Technology
  • The diversity of topics (forensics, security, legal, threats, best practices) provides security and investigative practitioners a variety of sessions and learning opportunities over the course of the conference.
    Brian Bannister, CISO, SC Department of Health and Environmental Control
  • Techno Security & Digital Forensics Conference is important to the team at Blackbag as it enables a critical component of our mission to be fulfilled in the rapid and ever changing DFIR community. Individuals should attend the event to keep current with the latest acquisition, analysis and reporting techniques so we can all partner together to reveal the truth in data to create a safer world.
    Ben Charnota, Chief Customer Officer, Blackbag Technologies
  • The conference exceeded my expectations. It was great to meet the vendors of the software I use in my job and to see what is coming in the near future with forensic products.
    Detective Kevin Heinig, Digital Forensics Examiner, Indian River County Sheriff's Office
  • We have been here every year since it started. There is a great mix of international and national clients here from both law enforcement and corporate. We wouldn’t miss it for the world.
    Jason Roslewicz, CEO, Sumuri
  • It’s a place where diverse experts in the field are gathered and fully accessible to all who attend.
    Robert Toronzi, Detective Sergeant, City of Bethlehem Police Department

SECURE YOUR BOOTH TODAY!

SECURE YOUR BOOTH TODAY!

Connect with professionals looking for the latest tools, training, networking, and solutions to industry challenges.

LEARN MORE