Wilmington, NC

June 5-8, 2023

Wilmington Convention Center

Hero Default

hero__default

2022 Conference Program

The 2022 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
Monday, May 09, 2022
    • Information Security
    Oleander A
    Microsoft office applications offer various security measures such as locking a document. This presentation discusses what Office documents are, as a collection of XML files, discusses some of the bui ...
    • Forensics
    Oleander B
    AI is having a profound impact on modern lives, including significant changes to child sexual abuse (CSA) investigations. We will discuss insights gained by Semantics 21 from its cutting-edge AI advan ...
    • Cellebrite Lab
    Atlantic 1
    Join us for this unique session to learn about the latest happenings in the domain of forensic access, enabled by vulnerability research and device exploitation. This session will be held by past and ...
    • Magnet Lab
    Atlantic 2
    RAM is the gatekeeper to the Operating System, and Memory Analysis is quickly becoming an integral part of every malware and incident response investigation. Windows memory can contain an abundance of ...
    • Forensics
    Atlantic 3
    With the steady increase in Drone use by criminal entities, law enforcement must be prepared to add this expansive dataset to their case package. Learn how to successfully integrate this evidence into ...
    • Investigations
    Tides 1/2
    Learn how to extract information from Twitter and Instagram for your investigation. This session will show you how to use free tools to pull images, videos, and collect data from specific locations.
    • Investigations
    Oleander B
    Every day holds the potential for new AI applications, paving the way for future possibilities to assist in investigations. AI-based technology has become essential for crime prevention, prediction, s ...
    • Forensics
    Tides 1/2
    With the amount of data being stored on today's vehicles, the challenge is how to properly harness it for your investigations. Knowing how and when it is generated, is critical when using it as key ev ...
    • Information Security
    Atlantic 3
    Lying deep in every network is Active Directory. It is like a Frankenstein, connected to nearly every application, service, and device. The beast is always changing, which makes it more hideous every ...
    • Forensics
    Oleander A
    Deep Fakes have heightened interest in video authentication. But can a Digital Video Recorder (DVR) be fooled into playing back fake footage? During this session, the presenter will share the attempts ...
    • Cellebrite Lab
    Atlantic 1
    In this session especially for the Lab, attendees will discover the latest UFED collection options for trending devices and encryption methods from Cellebrite. Plus, empower yourself and your digital ...
    • Magnet Lab
    Atlantic 2
    Not all Android extractions are created equal. Mobile device security, user settings and encryption can all play a role in the types of acquisitions available and the evidentiary artifacts. Join Matt ...
    • Forensics
    Tides 1/2
    As an experienced digital forensic examiner who has testified in local, state, and federal court trials, it is vital to perfect the skill of testifying. When giving testimony, the examiner must become ...
    • Audit/Risk Management
    Atlantic 3
    A challenge for Security professionals is getting Management “on board” with security initiatives. Business managers and executives are hired for business expertise, not security expertise. However, w ...
    • Forensics
    Oleander A
    Digital forensic investigators generally struggle with the extraction of evidence from mobile devices when it comes to encrypted, third-party applications such as Signal, Wickr, and Telegram. These ap ...
    • Information Security
    Oleander B
    The ransomware ecosystem in the Dark Web has provided resources to a distributed threat posed by insiders. Recent threat intelligence indicates that the anonymity of the Dark Web and wide spread avail ...
    • Magnet Lab
    Atlantic 2
    This workshop will walk the participants through a Ransomware Investigations and give them a high level understanding of how to work this type of investigation."
    • Cellebrite Lab
    Atlantic 1
    A typical investigation comes with many challenges. Managing the investigation, and the evidence that comes with, shouldn’t be one of them. Streamline and simplify your investigative management, break ...
    • Investigations
    Oleander A
    As the type of evidence law enforcement has to manage becomes increasingly digital, it presents challenges in how to store, ingest, manage, analyze, report and collaborate on that evidence in an effic ...
    • Information Security
    Tides 1/2
    For over a decade the Department of Defense (DoD) has been trying to increase the cyber security capability of its contractors. That effort, now in its fifth iteration, has included mandated improveme ...
    • Forensics
    Oleander B
    Applying Machine Learning to Challenging Digital Forensics Problems Machine Learning offers great promise when applied to digital forensics. The question is how we can apply ML to digital forensics to ...
    • Cellebrite Lab
    Atlantic 1
    Learn how the Surete du Quebec has adapted and modified their investigative workflow, and significantly brought down their case back log. New technologies and techniques, plus thinking outside of the ...
    • Magnet Lab
    Atlantic 2
    With the recent integration capabilities between Magnet and Berla, investigators can now import a proprietary iVe file format into Axiom and analyze it alongside other device data. In this session we ...
    • Forensics
    Atlantic 3
    In this session, attendees will learn how to validate the proper operation of their write blockers. The presentation will show Windows, Mac and Linux methods for testing write blocking tools. This ses ...
    • Investigations
    Tides 1/2
    This session will highlight the common issues investigators face in the creation of the final report. Every expert committed in the forensics analysis process starts from being assigned to a case and ...
    • Forensics
    Oleander B
    As recent cases have shown, video evidence is becoming more and more prevalent. As such, understanding what is happening, the timing of events, and even the speed of a vehicle have increasingly relied ...
    • Forensics
    Oleander A
    Pick the scenario … you have to prove or disprove something and your proof is locked away in a phone. The phone is encrypted and locked when you power it on. What to do? Try an exploit? Brute force th ...
    • Cellebrite Lab
    Atlantic 1
    This session will focus on discussion of the ever-increasing use of geofence warrants by law enforcement. Law enforcement is seeing increased challenges when it comes to obtaining and using data for i ...
    • Magnet Lab
    Atlantic 2
    In today's world where the amount of digital data is exponentially growing and will undoubtedly always be witness to a crime, time to evidence is crucial for digital forensics professionals. From chat ...
    • Investigations
    Atlantic 3
    For encrypted data on iOS and other mobile devices, the path to data recovery often requires getting the device to turn on and boot natively. This can be a hardship for many devices that have accident ...
Tuesday, May 10, 2022
    • Keynote
    Oleander A/B
    With hackers, hostile foreign powers and cyber criminals finding new vulnerabilities to exploit on an almost daily basis, constant vigilance is needed to protect the nation’s critical infrastructure f ...
    • Forensics
    Tides 1/2
    Malware analysis can be learned on your own by reading “The Art of Malware Analysis.” While there are some excellent tools available, these tools can be very expensive. Last summer we got some great n ...
    • Information Security
    Atlantic 3
    As organizations move infrastructure to the cloud, the need for automating processes has become a requirement. No longer can operations administrators spend countless hours clicking through web interf ...
    • Forensics
    Oleander B
    Location data is crucial in most investigations. However, while it's important to understand where someone was, it is potentially more important to understand what they were doing at the location in t ...
    • Investigations
    Oleander A
    This will be an overview of the use of onsite mobile forensics during in-field operations targeting human trafficking. We will discuss the role of mobile forensics in conducting offender-focused inves ...
    • Magnet Lab
    Atlantic 2
    Hands-On Lab: This 50-minute hands-on lab will include a walk-through of the acquisition of cloud-hosted data and focus on the hands-on analysis of data from both Amazon Web Services and Microsoft. Yo ...
    • Cellebrite Lab
    Atlantic 1
    A typical investigation comes with many challenges. Managing the investigation, and the evidence that comes with, shouldn’t be one of them. Streamline and simplify your investigative management, break ...
    • Sponsor Demo
    Heron
    GrayKey collections contain more than just the file system of an iOS device and this additional data is often overlooked. A notable example of this is the GrayKey passcode history file. Learn from Gra ...
    • Sponsor Demo
    Osprey
    Investigators are under increasing pressure to respond to challenges that the wide range of digital evidence sources and the diverse range of digital devices presents. In addition to laptops, computer ...
    • Information Security
    Oleander B
    Consumer reporting agency Equifax was breached in 2017 to the tune of 140+ million consumer records, more than half the adults in the USA at the time. Four years later, from comprehensive analysis of ...
    • Forensics
    Oleander A
    With more complex and sophisticated vehicles, the data originating within a motor vehicle can be overwhelming and confusing. The number of vehicle manufacturers, the capabilities of each system and th ...
    • Investigations
    Atlantic 3
    This session will discuss the mass amounts of data available from social media platforms, such as Google, Facebook, Instagram, Apple iCloud and Snapchat that you can gain to aid in today’s criminal ca ...
    • Forensics
    Tides 1/2
    In one of the most interesting current insider threat cases, a US Navy employee is charged with attempting to provide nuclear reactor operating manuals from US submarines to a foreign intelligence ser ...
    • Cellebrite Lab
    Atlantic 1
    Learn about the Carpenter decision and how courts have analyzed the Reasonable Expectation of Privacy in the digital world since its decision.  We will discuss scenarios including; pole cameras, licen ...
    • Magnet Lab
    Atlantic 2
    • Sponsor Demo
    Heron
    Android forensics is becoming more and more complicated due to updated security measures and the massive amount of Android devices. While these security measures were in fact put in place to protect t ...
    • Sponsor Demo
    Osprey
    This presentation takes a deep dive into Image Exif data, and recovering that information when the tool can't. This presentation will address a common result in data carving where thumbnails are carve ...
    • Information Security
    Tides 1/2
    Defending a your critical infrastructure and key resources is a complicated endeavor. There are numerous threat actors and each of them has distinct techniques they prefer to use when attacking your i ...
    • Information Security
    Oleander B
    This session is focused on taking “the technical” and making it understandable for an audience of varying technical levels. It walks attendees through the kill chain of an enterprise ransomware incide ...
    • Forensics
    Oleander A
    As more and more data move to the cloud understanding some of the ins and outs of how and what you can capture is important for any examiner. This session will review how the cloud is storing data whe ...
    • Forensics
    Atlantic 3
    Every forensic examination starts with getting the right image. In the Mac Forensics world, understanding what to image and how to properly acquire an image has never been more complicated. For the ti ...
    • Cellebrite Lab
    Atlantic 1
    Overcoming access and compatibility challenges related to make, model, and version of a mobile device can consume the digital forensics process and budgets. Cellebrite has introduced a new offering to ...
    • Magnet Lab
    Atlantic 2
    Hands-On Lab This 50-minute hands-on lab will focus on the newly added features of AXIOM 6.0. Make the most out of the new mail explorer, cloud token recovery, new cloud insights, Refined Results – Us ...
    • Sponsor Demo
    Heron
    This session will explore finding evidence of child abuse (or terrorist material) on suspect devices (on scene) in seconds or minutes, replacing processes that take weeks or months in a forensics lab.
    • Sponsor Demo
    Osprey
    DATAPILOT debuts new technology for acquiring evidence data directly from Apple & Android watches. Also being showcased are new “fast extraction” methods and the ability to find hidden networks. Be th ...
    • Forensics
    Oleander A
    Cloud Forensics has become a term that is used to mean many things. This session will focus on both leveraging cloud infrastructure to conduct forensic exams allowing for scaling, and acquisition and ...
    • Audit/Risk Management
    Atlantic 3
    Organizations depend on third-party commercial software not only for securing their networks, but also for managing and storing customer data, financial accounting and reporting, and fulfillment of co ...
    • Information Security
    Oleander B
    During this session, attendees will learn how Nation States, Non-Nation State Actors, Hacktivists, enterprise cyber criminals, shadow government agencies, terrorist organizations, loosely affiliated g ...
    • Cellebrite Lab
    Atlantic 1
    Come join an open conversation between a mobile forensic trainer and a previous student. The discussion will walk through the experience of getting started in mobile forensics including the victories, ...
    • Magnet Lab
    Atlantic 2
    With posts and comments on social media playing a larger role in investigations, the need to collect and analyze that data has also grown.  Social media data can provide timely evidence to an ongoing ...
    • Sponsor Demo
    Osprey
    In this hands-on lab, you will activate a screen lock and secure boot encryption password on a Samsung Galaxy device with an Exynos chipset. Then, experience the "thrill of victory" as you not only by ...
    • Forensics
    Tides 1/2
    KAPE is a free non-commercial DFIR tool enabling fast, targeted, and defensible collections. This is a hands-on lab that will cover the fundamentals of KAPE. During this lab, attendees will learn firs ...
    • Audit/Risk Management
    Atlantic 3
    NERC, HIPAA, FERPA, NYDFS...the list of regulatory regimes seems to grow exponentially each year. For many industries and organizations, there is a defined framework or guidelines to operate in from a ...
    • Information Security
    Oleander B
    ICS security and cybersecurity depend on identity and access management (IAM). With the advent of 5G, the density and interconnectedness of the IOT is driving IAM to include the identities of sensors, ...
    • Forensics
    Oleander A
    This session will explore the digital forensics difficulties (and possible solutions) facing Law Enforcement & Military Operations. The presenter will delve into options and methodologies used by thes ...
    • Magnet Lab
    Atlantic 2
    Hands-On Lab In this hands-on lab instructors will explore the pain points of DVR Examinations as well as explore out DVR Examiners can help solve these issues. Common issues with identifying digital ...
    • Cellebrite Lab
    Atlantic 1
    You may know “Nothing to See Here? I Beg To DFIR” as a series of interactive “tips and tricks” webinars. Here’s your chance to witness the magic LIVE and IN PERSON! Hosts Heather Mahalik, Ronen Engler ...
    • Sponsor Demo
    Osprey
    If one "thrill of victory" wasn't enough, come back to this hands-on lab for more. In this lab, you will enact a checkra1n jailbreak of a live iPhone. This extraction will allow keychain access and th ...
Wednesday, May 11, 2022
    • Keynote
    Oleander A/B
    Too often we assume that the tool does the forensic analysis. As much as tools help us analyze data, the tools cannot do the job for us. You are the Picasso of forensics, not the paintbrush, and there ...
    • Audit/Risk Management
    Atlantic 3
    Your business is completely shut down due to ransomware. How did this happen? Unbeknownst to you, your vendor has been hacked, resulting in the halt of your operations. Learn how to mitigate your risk ...
    • Information Security
    Tides 1/2
    Ransomware attacks, demands and payments spurred politicians and legislators to take-action against the cybercriminal eco-system. Incident reporting regulations, such as CINA, CIRA and RDA add to the ...
    • Cellebrite Lab
    Atlantic 1
    A typical investigation comes with many challenges. Managing the investigation, and the evidence that comes with, shouldn’t be one of them. Streamline and simplify your investigative management, break ...
    • Magnet Lab
    Atlantic 2
    • Sponsor Demo
    Osprey
    Every day, corporations are faced with insider and outsider threats. Because of that, the Zero-Trust security approach is quickly becoming the standard for both corporations and federal agencies. Whil ...
    • Sponsor Demo
    Heron
    Do you deal with CSAM, Domestic Extremism, Financial Crime, Organized or Drug-related Crime? Are you are interested to learn more about the most disruptive AI Solutions on the market? Do you want to e ...
    • Forensics
    Oleander A
    Using SSH keys when connecting to remote hosts provides an additional layer of security. Getting SSH keys setup can be challenging. This presentation will step through SSH key creation, and the steps ...
    • Investigations
    Oleander B
    A Google reverse location search, commonly referred to as a geofence, is a multi-step search warrant and analysis process that can generate powerful leads. With an increasing number of detectives usin ...
    • Forensics
    Atlantic 3
    Legal qualifications of any testifying expert witness have evolved since the landmark Frye case, as well as the more sweeping Daubert case, and continue to evolve as technology advances, as these case ...
    • Forensics
    Oleander A
    This session will explore different Darknets commonly used for criminal activity and how data is transferred across these networks. The presenter will describe how these networks are accessed and acti ...
    • Information Security
    Tides 1/2
    Everyone is aware of the everyday threats to organizations and sometimes with real impact to our everyday lives. The Colonial Pipeline ransomware attack caused a run on gas stations in the eastern US ...
    • Cellebrite Lab
    Atlantic 1
    We’re living in a digital world. Investigators are faced with an enormous volume of data and digital evidence, which requires filtering and analyzing. This session will help you speed up your investig ...
    • Magnet Lab
    Atlantic 2
    "In the current environment where many people are working remotely and data is being stored in cloud locations, the need respond to unique forensic data collection and review challenges has never been ...
    • Sponsor Demo
    Heron
    iOS forensics has been a hot topic over the last few years, especially with the release of iOS 15. Apple is constantly strengthening its security measures of their devices. This was designed to safegu ...
    • Sponsor Demo
    Osprey
    As the adoption of digital assets grows, illicit actors are increasingly turning to cryptocurrencies like Bitcoin to facilitate a range of illicit activity in a borderless, rapidly evolving digital ec ...
    • Forensics
    Oleander B
    Video recordings are ubiquitous in both modern investigations and inside the courtroom, yet there are still common misconceptions when handling video evidence or introducing evidence in court. This se ...
    • Information Security
    Tides 1/2
    The first 48 hours after a cyber incident are the most critical time for an organization that has been the victim of a cyber crime. Who? What? Where? How? Why? These are questions every business that ...
    • Audit/Risk Management
    Atlantic 3
    Over the last 1-2 years, COVID-19 has served as a catalyst for growing supply chain disruptions that have generated impacts on organizations throughout the world. Supply chains disruptions have become ...
    • Forensics
    Oleander A
    How do you develop a wellness program for sworn and non-sworn investigators? Law enforcement wellness programs often focus on sworn officers. There are many non-sworn functions in law enforcement – in ...
    • Cellebrite Lab
    Atlantic 1
    Digital evidence plays a large role in the vast majority of cases today. Some of that evidence is likely to reside within open, publicly available sources on the web. Conducting effective OSINT resear ...
    • Magnet Lab
    Atlantic 2
    With Apple’s joining of the Bluetooth tracker market with the AirTag, their worldwide device network means that it’s easier than ever to track our items. However, what happens when someone slips an Ai ...
    • Sponsor Demo
    Heron
    Join John Day from the SUMURI software department for an overview of all the new exciting new features RECON LAB added this year. RECON LAB had a major release at the start of this year that added a v ...
    • Sponsor Demo
    Osprey
    Backlogs in digital investigations are a growing problem that challenge examiners and investigators on a daily basis. With the growing amount of data collected - from devices of all types - the requir ...
    • Audit/Risk Management
    Atlantic 3
    There are a number of frameworks available to base your organizations’ cybersecurity and privacy programs on but the latest of these has been provided to us by the US Government. There will be somethi ...
    • Investigations
    Oleander B
    Social Network Analysis has been a fundamental process when identifying threat networks, conducting due diligence and background investigations, or closing exposure to insider threats. Traditional soc ...
    • Forensics
    Oleander A
    The United States Secret Service and the FBI arrested a hacker in Europe. After he was extradited back to the US he was debriefed. The presenter was one of the Secret Service agents that participated ...
    • Cellebrite Lab
    Atlantic 1
    This will be a case study of the investigation and apprehension of a prolific internet terrorist, but from the perspective of a small-town law enforcement officer. Hernandez was a very disciplined cyb ...
    • Magnet Lab
    Atlantic 2
    Magnet Forensics pioneered the artifacts-first approach which gave examiners a very clear starting point for their digital forensics investigations. Now, with the introduction of YARA rule scanning in ...
    • Sponsor Demo
    Heron
    Properly handling cell phones and other mobile device evidence from the point of seizure to the point of analysis can be confusing. Different agencies may employ different procedures, with little in t ...
    • Sponsor Demo
    Osprey
    EnCase Forensic is a court-proven solution for finding, decrypting, collecting, and preserving forensic data from a wide variety of devices, while ensuring evidence integrity and seamlessly integratin ...
    • Information Security
    Tides 1/2
    This session is intended to be an interactive cyber scenario for a table top exercise. It will show how a scenario unfolds using real world cases and examples. The audience will be asked both direct a ...
    • Investigations
    Oleander B
    OSINT collection and exploitation is becoming increasingly important across investigations of all types. The speaker will address significant challenges in this field, and will address the pros and co ...
    • Forensics
    Oleander A
    Despite a valiant effort, the phone is still locked or under attack, but you need information now. Time to escalate. In this session, we’ll go after computer and cloud account data to gather the evide ...
    • Information Security
    Atlantic 3
    This session will share five cost-effective tips to secure your small business, municipal government, school, and or regional hospital
    • Cellebrite Lab
    Atlantic 1
    Overcoming access and compatibility challenges related to make, model, and version of a mobile device can consume the digital forensics process and budgets. Cellebrite has introduced a new offering to ...
    • Magnet Lab
    Atlantic 2
    Are the days of coming in over the weekend or late at night to kick off a process behind us? How about the days of sharing reports and case data via removable media? Modernizing your lab to meet the g ...
Thursday, May 12, 2022
    • Forensics
    Oleander B
    An overview of standard business email compromise investigations, discussing methodology, data collection, data analysis and reporting. Microsoft Office 365 and Google Workspace email environments wil ...
    • Forensics
    Oleander A
    With the release of Windows 11 examiners are bracing themselves for analysis of potentially many new artifacts within the Operating System and possible file system changes which have not yet been enco ...
    • Information Security
    Tides 1/2
    Brent and Tim will detail their war stories, and common security issues that have led to successful covert physical, wireless, and red team assessments against government and commercial clients. For e ...
    • Cellebrite Lab
    Atlantic 1
    Now that hybrid working environments are the new normal, enterprises need the ability to easily gather data remotely as well as on-premises. In 95% of investigations, text messages and conversations a ...
    • Magnet Lab
    Atlantic 2
    In Incident Response, reducing the time to collect and analyze the data is crucial. With the proliferation of ransomware, you may only have the tools in your pocket to depend on. Join Forensic Consult ...
    • Audit/Risk Management
    Atlantic 3
    The desire to produce Continuous Integration (CI) and Continuous Deployment (CD) application software can backfire due to poor design and testing procedures, putting your organization at significant r ...
    • Investigations
    Tides 1/2
    Human Trafficking has increased exponentially as technology has given traffickers access to countless victims. Fraud & financial crime helps fund trafficking operations and these crimes help trafficke ...
    • Forensics
    Oleander B
    Attendees will gain an overall understanding of Employee Departure and Insider Risk Programs, including current trends and findings. This session will cover the need for a multi-layered proactive stra ...
    • Forensics
    Oleander A
    Google Takeouts can contain a wealth of information from a variety of devices using Google accounts. This can include data from Android devices, Chromebooks, Chrome Browser used on multiple devices, G ...
    • Cellebrite Lab
    Atlantic 1
    As the security features on mobile devices continue to advance, examiners must grow their skillsets to ensure lawful data collections are not compromised and that privacy is always maintained. Advance ...
    • Magnet Lab
    Atlantic 2
    Magnet AUTOMATE Enterprise is a new solution that provides parallel processing of multiple target endpoints and evidence sources while automating manual tasks in the forensics workflow. The result? Yo ...
    • Investigations
    Atlantic 3
    The rise of video surveillance devices by citizens and businesses presents an opportunity for police departments. They can leverage these resources through a digital evidence management system which c ...
    • Forensics
    Oleander A
    Artificial intelligence and machine learning have the potential to reinvent investigative methods.The session will identify the hot spots in the use of a modern system, identify the upsides and downsi ...
    • Investigations
    Oleander B
    Computer networks continue to increase in complexity. Industrial Control Systems, Human-Machine Interfaces, Programmable Logic Controllers, and other systems can change conditions in the physical worl ...
    • Forensics
    Tides 1/2
    A plethora of tools exist today for OSINT collection of digital media ushering in the next generation of OSINT analysis tools. In this presentation we’ll dive into the techniques used for analyzing di ...
    • Cellebrite Lab
    Atlantic 1
    We’re living in a digital world. Investigators are faced with an enormous volume of data and digital evidence, which requires filtering and analyzing. This session will help you speed up your investig ...
    • Magnet Lab
    Atlantic 2
    Shipping sensitive evidence on USB drives or requiring investigators to travel to the lab can waste critical investigation time and may introduce security risks. Plus, training investigators to use mu ...

2022 Sponsors


QUOTE

  • Techno Myrtle Beach 2021 was a great return to face-to-face tradeshows. The transition back to in person events was handled very smoothly and overall the tradeshow was well run. Excited to attend more Techno shows in the other locations and to return to Myrtle Beach next year!
    Jack Raubach, Marketing Director, Forensic Computers
  • Thank you to everyone at the Techno Security & Digital Forensics Conference for organizing another epic event. The training and networking with the best of the best in this field was amazing, as always!! It was so good to see some familiar faces and meet so many new people too.
    Robert Smith, Investigator/Managing Partner, TechSmart Solutions LLC
  • Booth traffic was nearly nonstop at all times. Exactly what we had hoped for, with overwhelmingly positive feedback and high interest from federal, military, law enforcement and private sector cyber incident response firms.
    Amy Moles, CEO-Co-Founder, ArcPoint Forensics
  • Four days of intensive, focused cybersecurity and digital forensics training. Perfect for us "old-timers" looking for new products and vendors, as well as great refresher and new training. The curriculum is flexible, efficient, effective, and fun.
    David R. Lease, PhD, Vice President, Evolver, LLC
  • This conference is not only a wealth of information, but it is a great way to network with people and vendors from all over the world. Whether you are new to the digital security world or a seasoned veteran, this is the conference to attend.
    Justin Kutski, DEA/TFO, North Charleston Police Department
  • Techno Security and Digital Forensics Conference is consistently among the best in our industry, for sponsors and attendees alike. We always learn new things and have the opportunity to interact with our customers, and people we haven't met before. It's a great event.
    Bill Teel, President, Teel Technologies

Secure Your Booth Today!

Secure Your Booth Today!

Connect with professionals looking for the latest tools, training, networking, and solutions to industry challenges.

Learn More