Myrtle Beach, SC

June 5-8, 2022

Marriott Resort at Grande Dunes

Hero Default

hero__default

2021 Conference Program

The 2021 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
Sunday, June 06, 2021
    • Investigations
    Tides 1/2
    Learn how free tools can be used to leverage Wi-Fi signals in criminal investigations. This session will cover finding Wi-Fi enabled client devices, such as laptops, for criminal cases and missing per ...
    • Forensics
    Atlantic 3
    iOS forensics is a hot topic over the last few years. Apple is constantly strengthening its security measures. Things like remote wiping, not allowing the passing of data through lightning cable, requ ...
    • Information Security
    Oleander A
    Most people have heard of using complex passwords but really do not understand what that entails and what constitutes a complex password. This includes developers who write code that often time includ ...
    • Cellebrite Lab
    Atlantic 1
    In today’s world of emerging technology, digital intelligence investigators and examiners, are faced with new challenges daily. As such, they must be prepared to respond at a moment's notice with the ...
    • Investigations
    Oleander B
    With the days of one mobile device per case long gone, triage on mobile derives is now essential to save time and quickly locate relevant data. Know which one of those two, ten, or 30 devices to load ...
    • Magnet Forensics Lab
    Atlantic 2
    LAW ENFORCEMENT ONLY: Pictures, videos, and chats can all be key pieces of evidence in building cases for possession, distribution, and/or production of child sexual abuse material (CSAM), solicitatio ...
    • Audit/Risk Management
    Atlantic 3
    There are many advantages to cloud computing, but there are also many risks. This session will peel back the layers of complexity to distill the key cloud computing risks, discuss how to identify thes ...
    • Forensics
    Oleander A
    Many applications today store data in SQLite databases from Android to iOS to even IoT. This session will explore how data is stored in SQLite and how to recover data from these databases. The present ...
    • Investigations
    Oleander B
    While video is more readily available to aid in investigations today (e.g. CCTV, Body-worn, social media, and cellphones), there are several questions that may be asked of a video that may not able to ...
    • Cellebrite Lab
    Atlantic 1
    Law enforcement is coming under increased pressure to combat human/sex trafficking crimes. In many cases, human traffickers exercise complete control over their victims bringing pain and misery to inn ...
    • Investigations
    Tides 1/2
    Do you want to know how call detail records are generating cell site location information? Are you interested in an in-depth presentation about cell site and sector representation? Have you ever wonde ...
    • Information Security
    Oleander B
    This session will discuss and share how the public and Hollywood view cybersecurity and the reality of how it is really performed. The presenters will walk through incident response case studies aroun ...
    • Forensics
    Atlantic 3
    There are many available tools for Digital Forensics Investigation, all of which are very capable. But what can the small business owner or law enforcement forensics lab with a limited budget do using ...
    • Investigations
    Oleander A
    This session goes through the evolution, goals and motivation of the Dark Web. The presenter will share what and whom you can find on the platforms as well as the major conflicts individuals face whil ...
    • Forensics
    Tides 1/2
    One of the most profound technological and cultural migrations our world faces is that of the migration to the cloud. Not only must devices and information systems interact with each other, but the cl ...
    • Magnet Forensics Lab
    Atlantic 2
    In this lab we will explore Magnet AXIOM’s support for macOS and APFS. We will consider acquisitions, processing, and interactive examinations to leverage AXIOM's various explorers for faster examinat ...
    • Cellebrite Lab
    Atlantic 1
    As the security features on mobile devices continue to advance, examiners must grow their skillsets to ensure lawful data collections are not compromised and that privacy is always maintained. Advance ...
    • Information Security
    Atlantic 3
    The need to secure Active Directory is no longer an option, but a mandate. Attacks on Active Directory are at an all-time high. Companies that are not taking heed are paying, both monetarily and with ...
    • Forensics
    Tides 1/2
    This session will give the forensic practitioner a detailed overview of forensic imaging. Attendees will be the shown need for write protection devices. Some current forensic imaging software and hard ...
    • Investigations
    Oleander B
    The identification of Advance Persistent Threats such as those launched against Solarwinds (APT29 also known as Cozy Bear) that employ anti-forensics methods to impede detection are continuing to adva ...
    • Cellebrite Lab
    Atlantic 1
    Apple has begun transitioning away from Intel Chip computers to proprietary Apple Silicon chips. Numerous functions on Apple computers have changed including security, boot process, and disk structure ...
    • Investigations
    Oleander A
    Have you ever struggled to get a damaged iPhone to enter DFU mode? Here we will show you how to get any iPhone logic board to easily enter DFU by using the FORCE_DFU pin. This trick even works on iPho ...
    • Information Security
    Oleander A
    Network Behavior Anomaly Detection (NBAD) and User and Entity Behavior Analytics (UEBA) are heralded as machine learning fueled messiahs for finding advanced attacks. The data collection and processin ...
    • Forensics
    Atlantic 3
    This session will examine several simple but effective methods of conducting remote forensic collections of computers using easy free, and low-cost software/applications. The session will explore and ...
    • Magnet Forensics Lab
    Atlantic 2
    In this talk we will explore Magnet AXIOM’s features useful to the Linux examiner. We will consider acquisitions, processing, and interactive examinations to leverage AXIOM's various explorers for fas ...
    • Cellebrite Lab
    Atlantic 1
    This session will focus on the various Apple technologies that can affect triaging and imaging on Apple computers. The instruction expert will walk through some of the best practices for triaging and ...
    • Forensics
    Oleander B
    The filesystem of a DVR must balance between speed, efficiency, and organization while recording video. Sometimes there is a substantial amount of overhead involved. How much hard drive space is being ...
    • Information Security
    Tides 1/2
    Come on a journey of how the largest school district in South Carolina created an Information Security Department that just earned ISO 27001 certification.
Monday, June 07, 2021
    • Keynote
    Oleander A/B
    2020 was another record year for cyber criminals. Almost every week there was another data breach in the news. What did all of these organizations have in common? They all spent a lot of money on info ...
    • Forensics
    Tides 1/2
    Legal qualifications of any testifying expert witness have evolved since the landmark Frye case, as well as the more sweeping Daubert case, and continue to evolve as technology advances, as both of th ...
    • Forensics
    Oleander A
    checkm8, the unpatchable exploit, has completely changed the approach to Apple iOS data extraction. This exploit allows investigators to safely extract complete file system and keychain from a wide ra ...
    • Audit/Risk Management
    Atlantic 3
    Jeremy Miller, a retired Green Beret and current CEO of Lionfish Cyber Security, will discuss how mission set tactics used by Special Forces can be applied directly to the cyber war being waged today ...
    • Information Security
    Oleander B
    Technology has impacted our behavior and the ability for criminals to manipulate people. Today's cyber culture is reliant on the use of technology. For example, increased use of technology has left co ...
    • Sponsor Demo
    Heron
    DATAPILOT and Cyan will showcase their new Mobile Triage software to detect Child Exploitation, Terrorism and other contraband images at speeds unseen in current use. This new technology can be used t ...
    • Sponsor Demo
    Osprey
    Mobile devices provide a wealth of digital evidence. They can indicate where devices have been, what they’ve done, who they’ve communicated with, when and why. Keeping up with technology is currently ...
    • Magnet Forensics Lab
    Atlantic 2
    This session will explore the major cloud structures in many modern corporations including O365, AWS, Slack, and more. Throughout this lab, students will learn about AXIOM Cyber’s different functional ...
    • Cellebrite Lab
    Atlantic 1
    Cyberattacks on the United States continue to dominate headlines. It seems that everywhere we turn, malicious actors are trying to steal data, disrupt businesses, and extort money from companies and g ...
    • Information Security
    Oleander B
    Cybercrime continues to flourish despite recent world circumstances. Ransomware, phishing, and other cyberattacks remain a real threat to businesses, governments, and consumers, wreaking havoc and cau ...
    • Investigations
    Tides 1/2
    In the early 2000’s, the world of investigations entered the digital age as desktop computers became the new corporate file cabinet. By the middle of the decade the FRCP pushed digital evidence into t ...
    • Forensics
    Oleander A
    Chromebooks present a forensic challenge as they become more prevalent. One challenge is understanding the difference obtained from different acquisition methods and the cloud. In 2019, a group of 30 ...
    • Information Security
    Atlantic 3
    This session will discuss: Cloud Security Considerations; Shared Responsibility and Contract Language; Cloud Security Requirements; Education and development of effective processes and Governance; and ...
    • Sponsor Demo
    Osprey
    Data acquisition is the most crucial part in each digital forensics and incident response case. If you cannot acquire data, there is nothing to analyze. In our modern world, there can be multiple chal ...
    • Sponsor Demo
    Heron
    We live and breathe to exploit a device to get the data we want. What happens when the data we wanted wasn’t there to begin with? In this demo, we’ll learn to gather data from the next best source … t ...
    • Cellebrite Lab
    Atlantic 1
    This session will discuss Apple device diagnostic logs with emphasis on the function and purpose of “sysdiagnose” logs. Participants will learn the ins and outs of creating, collecting, and analyzing ...
    • Magnet Forensics Lab
    Atlantic 2
    This session will explore the major cloud structures in many modern corporations including O365, AWS, Slack, and more. Throughout this lab, students will learn about AXIOM Cyber’s different functional ...
    • Information Security
    Oleander B
    Cyber-Espionage breaches pose a unique challenge. Through advanced techniques and a specific focus, Cyber-Espionage threat actors seek to swiftly gain access to heavily defended environments, laterall ...
    • Investigations
    Tides 1/2
    This session will provide in-depth coverage and identify the often-overlooked investigative benefits of a few of the most underutilized but increasingly important deep web sources for Law Enforcement ...
    • Forensics
    Oleander A
    In DFIR, investigators and examiners must work together. Strategies must be in place to ensure examiners provide investigators what they need as quickly and efficiently as possible.  The days of “Give ...
    • Forensics
    Atlantic 3
    It no secret that Slack’s popularity has exploded in recent years- once dubbed “the email killer”, organizations have implemented Slack as an efficient collaboration environment either alongside email ...
    • Sponsor Demo
    Heron
    Imagine a sadly too common situation where a major criminal or terrorist incident rocks a heavily populated area. Witnesses at the scene, using their mobile devices, often capture – sometimes without ...
    • Sponsor Demo
    Osprey
    Join us for a technology demo to introduce our automated analysis platform for digital data – LEAP. This demo will provide an overview of LEAP and how it will streamline your CSAM investigations to gi ...
    • Magnet Forensics Lab
    Atlantic 2
    In this lab we will show you how to extend your capabilities with Magnet AXIOM by utilizing and creating custom artifacts. In this hands-on lab we will learn how to create and install custom artifacts ...
    • Cellebrite Lab
    Atlantic 1
    ** LAW ENFORCEMENT ONLY** The challenge to obtain data from mobile devices quickly to advance your investigations is becoming more complex. The coverage of standard forensics tools you are familiar wi ...
    • Information Security
    Tides 1/2
    Passwords are one of the simplest ways industries protect their digital infrastructures, but what they don't know is that they are doing it wrong. In this session, attendees will learn how to strength ...
    • Forensics
    Oleander A
    The use of Drones is rapidly growing and expanding into criminal enterprises and terrorist organizations and news feeds are continually reporting on crimes being successfully prosecuted where UAV fore ...
    • Investigations
    Oleander B
    The internet provides investigators with the ability to ascertain information on subjects efficiently. Focusing on the individual(s) is not always the answer. Identifying actionable intelligence is an ...
    • Sponsor Demo
    Osprey
    Backlogs in digital investigations are a growing problem that challenge examiners and investigators on a daily basis. With the growing amount of data collected - from devices of all types - the requir ...
    • Investigations
    Atlantic 3
    The SolarWinds and Hafnium attacks drove home the critical importance of being able to quickly recognize and respond to the indicators of advanced persistent threats. Cyber security and forensics team ...
    • Magnet Forensics Lab
    Atlantic 2
    A common response when talking to Law Enforcement officers and staff often shows that there is a distinct lack of understanding as to the amount of evidence that can be found on the Cloud. It usually ...
    • Cellebrite Lab
    Atlantic 1
    Anti-forensics measures have been discussed and demonstrated by researchers for decades. Recent lectures and publications have made bold claims about how the industry operates. Is there pause for conc ...
    • Sponsor Demo
    Heron
    **LAW ENFORCEMENT ONLY** Mobile devices provide a wealth of digital evidence. They can indicate where devices have been, what they’ve done, who they’ve communicated with, when and why. Keeping up with ...
    • Investigations
    Atlantic 3
    You may have taken part in investigations that used data from Electronic Data Recorders (the "black box" installed in many vehicles) or an infotainment forensic kit... but modern vehicle technologies ...
    • Information Security
    Oleander B
    Forensic tools often operate in non-ideal conditions (e.g., damaged devices or corrupted files) or in adversarial conditions (e.g., user purposely deleted files). These tools reconstruct data independ ...
    • Forensics
    Tides 1/2
    Remote work requirements. Reduced budgets. Fewer investigators. Today’s environment has created new challenges for investigators. Today’s cloud offerings can help you keep up with your workload and de ...
    • Forensics
    Oleander A
    **LAW ENFORCEMENT ONLY** As technology evolves, so must law enforcement's approach to digital forensics. No longer can an investigator rely solely on what is now considered traditional electronic devi ...
    • Cellebrite Lab
    Atlantic 1
    Cybercrimes have skyrocketed in the enterprise world and email is one of the key pathways in. In this session attendees will learn why business email compromises (BEC) are one of the top cybercrime tr ...
Tuesday, June 08, 2021
    • Information Security
    Oleander B
    Cybersecurity Advisors from the Cybersecurity and Infrastructure Security Agency (CISA) will provide a presentation outlining a brief overview of the Cyber Supply Chain and discuss current and emergin ...
    • Investigations
    Oleander A
    **NO PRESS ALLOWED** With an average of 18 million trips a day and growing, Uber is one of the most widely used transportation companies in the world. While critical incidents and criminal activity in ...
    • Audit/Risk Management
    Atlantic 3
    In today’s new normal, working from a coffee shop, at one’s kitchen table or even out of the country, business are finding new and creative ways to thieve. Enabling employees to work out of the office ...
    • Forensics
    Oleander B
    A panel discussion about the most significant aspects that contribute to successful projects. The panel will include experiences that directly support success, presentation of critical workflows and a ...
    • Information Security
    Tides 1/2
    Recent high-profile breaches are a clear signal that our approach to cybersecurity has failed. We are no longer facing just 'hackers' in their basements. U.S. businesses are up against rogue nation-st ...
    • Investigations
    Oleander A
    With an estimated 1.4 trillion photos being taken in 2020, and approximately 90% of those being taken with mobile devices, investigators now more than ever need an in-depth understanding of how images ...
    • Sponsor Demo
    Heron
    The demo highlights the new NVMe WriteBlocker and the DittoX86. The NVMe WriteBlocker is the fastest on the market. The Ditto x86 is a bootable device that provides investigators with a method for ima ...
    • Sponsor Demo
    Osprey
    How do you approach a crime scene in a house with various digital media devices? A typical US household may have three PCs, one MacBook, one iOS iPad, one Samsung tablet, a dozen different phones (bot ...
    • Magnet Forensics Lab
    Atlantic 2
    The global pandemic accelerated workplace shifts towards new ways of working, many involving online work and new technologies. Law Enforcement Agencies and Digital Forensic teams were already re-imagi ...
    • Cellebrite Lab
    Atlantic 1
    **LAW ENFORCEMENT ONLY** The challenge to obtain data from mobile devices quickly to advance your investigations is becoming more complex. The coverage of standard forensics tools you are familiar wit ...
    • Forensics
    Oleander A
    The Dark Web has become a household term synonymous with criminal activity targeting both public and private sectors. Even the most careful user utilizing the Dark Web will slip up and eventually reve ...
    • Investigations
    Tides 1/2
    Officer safety is paramount, and we consider safety before we visit a suspect’s residence to execute a search warrant or conduct an interview. But do we consider how we could be injured by electronic ...
    • Information Security
    Oleander B
    Because of the time and effort required to compromise well-defended networks, attackers want to stay on their targets as long as possible. Persistence is the term used to describe the techniques and s ...
    • Sponsor Demo
    Osprey
    FTK Central combines the powerful processing engine of FTK with innovative new forensic & legal review workflows, together into one collaborative, web-based tool. FTK Central allows your team to look ...
    • Sponsor Demo
    Heron
    Top 3 answers on the board, here is the question: What do people ask first about technology and device extraction? #1 Can you bypass screen locks? YES! #2 Can you access encrypted devices? YES! #3 Is ...
    • Audit/Risk Management
    Atlantic 3
    This session is an introduction to cybersecurity frameworks and will cover a handful of the more popular frameworks, comparing and contrasting each, showing the pros and cons of implementation and cer ...
    • Magnet Forensics Lab
    Atlantic 2
    **LAW ENFORCEMENT ONLY** The complexity of digital investigations and the volume of data is increasing, as budget constraints and talent shortages force you to get more done with what you have. It’s b ...
    • Cellebrite Lab
    Atlantic 1
    Linux is the operating system that makes the world go round! With 79 percent of enterprises running a Linux back end, 75 percent are using Linux as their primary cloud platform. In this lecture and la ...
    • Information Security
    Atlantic 3
    Cybersecurity professionals are all too familiar with the cliché that the weakest link in an organization are the people who work for and with the company. According to the Verizon Data Breach and Inc ...
    • Forensics
    Oleander B
    In this session we'll focus on the media aspects of fake news and disinformation campaigns with deep analysis of altered images, audio, and video to uncover methods used to twist narratives and mislea ...
    • Information Security
    Tides 1/2
    More than 20% of organizations use mobile credentials for physical access. By 2023, the commercial sector will dominate the market for mobile credentials with 90% share of the TAM, especially hospital ...
    • Forensics
    Oleander A
    **LAW ENFORCEMENT ONLY** Traditional collection methods are limited, creating a backlog and potentially jeopardizing access to time-sensitive data. This session will share modern approaches to digital ...
    • Sponsor Demo
    Heron
    Recent breaches and attacks related to vulnerabilities like SolarWinds and Microsoft Exchange have left government agencies and corporations scrambling to respond. This is especially true within the U ...
    • Sponsor Demo
    Osprey
    This session will give you a look at our blisteringly fast rapid data acquisition, live triage, lab-based automated analysis and analytics. We will live-time pull data from suspect computers, locked A ...
    • Magnet Forensics Lab
    Atlantic 2
    Enabling efficient digital evidence collaboration can be challenging, regardless of an agency’s size, location, or budget. Shipping sensitive evidence on USB drives or requiring investigators to trave ...
    • Cellebrite Lab
    Atlantic 1
    Geofence warrants, which allow law enforcement to lawfully search a database to find all active mobile devices within a particular geo-fence area, are new. To date their use has only surfaced in two o ...
    • Information Security
    Atlantic 3
    The pandemic has lead to an explosion of virtual meetings. At the same time, so-called "ephemeral" or disappearing messaging apps are allowing communications that may not be recorded. This session wil ...
    • Investigations
    Oleander B
    Case studies of homicide investigations will be discussed that use Call Detail Records and Geolocation Analysis to solve homicide investigations. Tools using Google locations, Google Geofence, social ...
    • Forensics
    Tides 1/2
    This session will discuss the latest shake-up to the Mac Forensics world. With the release of Apple’s new proprietary processors, Mac Forensics is faced with its latest in a long line of security enha ...
    • Cellebrite Lab
    Atlantic 1
    During this interactive panel discussion, attendees will hear how state, local and federal law enforcement agencies leverage the Task Force Officer (TFO) model to respond, investigate and prosecute su ...
    • Magnet Forensics Lab
    Atlantic 2
    With a larger than ever remote workforce, the need to collect data from endpoints not connected to the corporate network has never been greater. It’s critical that you have the ability to collect and ...
    • Information Security
    Oleander A
    According to Statista.com in 2020, the global social penetration rate reached 49 percent, with East Asia and North America both having the highest penetration rate at 71 percent, followed by Northern ...
    • Information Security
    Atlantic 3
    Deep packet inspection evaluates the data part and the header of a packet that is transmitted through an inspection point, weeding out any non-compliance to protocol, spam, viruses, intrusions, and an ...
    • Forensics
    Oleander A
    In this session of I Beg to DFIR, our experts will answer the most common acquisition questions: • What does each extraction obtain for both Android and iOS?  • If time is of the essence, which method ...
    • Magnet Forensics Lab
    Atlantic 2
    Do you have a response plan for dealing with data stored in the cloud? Do you have the necessary accounts, access, logging, and knowledge on what to do if you need to collect evidence stored in AWS, A ...
    • Investigations
    Tides 1/2
    Corporate assets are ubiquitous. When there is an intrusion, data breach, or cyber attack, a legally defensible investigation must be executed at scale regardless of the assets’ geolocation. A widesca ...
Wednesday, June 09, 2021
    • Investigations
    Oleander B
    This session will provide attendees with an understanding of investigative techniques associated with reports of Internet crimes, focusing on child exploitation and the CyberTipline reports investigat ...
    • Audit/Risk Management
    Atlantic 3
    Web applications have become more complex, frequently rushed to market by poorly trained software developers, increasing the business risks and the challenges to applying and verifying reliable safegu ...
    • Information Security
    Tides 1/2
    Quantum computing promises significant breakthroughs that benefit all humankind in science, medicine, financial services, and more. But what does quantum computing mean for data security? During this ...
    • Forensics
    Oleander A
    Previous studies of dark web forensics have focused on network forensics rather than host-based forensics. This session discusses a framework for identifying host-based artifacts during digital forens ...
    • Magnet Forensics Lab
    Atlantic 2
    With Apple’s Safari application typically taking the #2 browser spot worldwide across both computer and mobile platforms, examiners need to understand the how’s and the whys of Safari’s operation on b ...
    • Cellebrite Lab
    Atlantic 1
    Drones are becoming more ubiquitous in our modern society and present a new challenge to investigators and forensic examiners. Come learn how to use Cellebrite’s UFED to extract the necessary data and ...
    • Information Security
    Tides 1/2
    Root Cause Analysis (RCA) is an essential element of Incident Response. Determining the answers to "What Happened?" "Why It Happened?" and "How to Reduce the Likelihood of Recurrence" is critical, but ...
    • Investigations
    Oleander B
    Malicious actors have incorporated the use of emulated mobile devices to commit fraud against individuals and financial institutions. This session will introduce how mobile devices are emulated, metho ...
    • Information Security
    Oleander A
    This session provides a deep dive into the Dark Web and its associated technologies. Attendees will gain an understanding of the infrastructure and content of multiple dark nets and learn how to lever ...
    • Magnet Forensics Lab
    Atlantic 2
    "Our online world and the use of electronic devices have led to most of our interactions in the online world. Technology contributes to people’s perception of things being real when they are not. This ...
    • Cellebrite Lab
    Atlantic 1
    The challenge to obtain data from mobile devices quickly to advance your investigations is becoming more complex. The coverage of standard forensics tools you are familiar with is limited. And they pr ...
    • Forensics
    Oleander B
    The need to obtain video evidence from cloud-based security video systems like Ring Doorbells, Arlo, and Nest cameras as well as social media sites such as Facebook, YouTube, Instagram, etc. has incre ...
    • Information Security
    Tides 1/2
    This session will provide an overview of the evolution of online (OSINT) investigative units and what elements comprise successful programs, and commentary on where we are headed. How to avoid buying ...
    • Magnet Forensics Lab
    Atlantic 2
    In this talk we will explore Magnet AXIOM’s features useful to the Linux examiner. We will consider acquisitions, processing, and interactive examinations to leverage AXIOM's various explorers for fas ...
    • Cellebrite Lab
    Atlantic 1
    Over the course of time, history has demonstrated that terrorist attacks occur on a cyclical basis and that we should always remain vigilant. Often referred to as 7/7, were a series of four coordinate ...

2021 Sponsors


QUOTE

  • This year’s event was fantastic. Every year it gets better.
    Joe D’Allacco, Head of EDiscovery and CyberAssurance, AXA XL
  • This was our seventh year in a row at Techno Security & Digital Forensics Conference because we know we are going to meet our very important customers here and we are going to meet some fantastic prospects that will turn into great customers for us.
    John Graham, Director of Sales and Business Development, Atola Technology
  • The diversity of topics (forensics, security, legal, threats, best practices) provides security and investigative practitioners a variety of sessions and learning opportunities over the course of the conference.
    Brian Bannister, CISO, SC Department of Health and Environmental Control
  • Techno Security & Digital Forensics Conference is important to the team at Blackbag as it enables a critical component of our mission to be fulfilled in the rapid and ever changing DFIR community. Individuals should attend the event to keep current with the latest acquisition, analysis and reporting techniques so we can all partner together to reveal the truth in data to create a safer world.
    Ben Charnota, Chief Customer Officer, Blackbag Technologies
  • The conference exceeded my expectations. It was great to meet the vendors of the software I use in my job and to see what is coming in the near future with forensic products.
    Detective Kevin Heinig, Digital Forensics Examiner, Indian River County Sheriff's Office
  • We have been here every year since it started. There is a great mix of international and national clients here from both law enforcement and corporate. We wouldn’t miss it for the world.
    Jason Roslewicz, CEO, Sumuri
  • It’s a place where diverse experts in the field are gathered and fully accessible to all who attend.
    Robert Toronzi, Detective Sergeant, City of Bethlehem Police Department

SECURE YOUR BOOTH TODAY!

SECURE YOUR BOOTH TODAY!

Connect with professionals looking for the latest tools, training, networking, and solutions to industry challenges.

LEARN MORE