The 2022 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).
To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.
For a list of all sessions by day, please click on the day/date link.
Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.
Microsoft office applications offer various security measures such as locking a document. This presentation discusses what Office documents are, as a collection of XML files, discusses some of the bui ...
AI is having a profound impact on modern lives, including significant changes to child sexual abuse (CSA) investigations. We will discuss insights gained by Semantics 21 from its cutting-edge AI advan ...
Join us for this unique session to learn about the latest happenings in the domain of forensic access, enabled by vulnerability research and device exploitation. This session will be held by past and ...
RAM is the gatekeeper to the Operating System, and Memory Analysis is quickly becoming an integral part of every malware and incident response investigation. Windows memory can contain an abundance of ...
With the steady increase in Drone use by criminal entities, law enforcement must be prepared to add this expansive dataset to their case package. Learn how to successfully integrate this evidence into ...
Learn how to extract information from Twitter and Instagram for your investigation. This session will show you how to use free tools to pull images, videos, and collect data from specific locations.
Every day holds the potential for new AI applications, paving the way for future possibilities to assist in investigations. AI-based technology has become essential for crime prevention, prediction, s ...
With the amount of data being stored on today's vehicles, the challenge is how to properly harness it for your investigations. Knowing how and when it is generated, is critical when using it as key ev ...
Lying deep in every network is Active Directory. It is like a Frankenstein, connected to nearly every application, service, and device. The beast is always changing, which makes it more hideous every ...
Deep Fakes have heightened interest in video authentication. But can a Digital Video Recorder (DVR) be fooled into playing back fake footage? During this session, the presenter will share the attempts ...
In this session especially for the Lab, attendees will discover the latest UFED collection options for trending devices and encryption methods from Cellebrite. Plus, empower yourself and your digital ...
Not all Android extractions are created equal. Mobile device security, user settings and encryption can all play a role in the types of acquisitions available and the evidentiary artifacts. Join Matt ...
As an experienced digital forensic examiner who has testified in local, state, and federal court trials, it is vital to perfect the skill of testifying. When giving testimony, the examiner must become ...
A challenge for Security professionals is getting Management “on board” with security initiatives. Business managers and executives are hired for business expertise, not security expertise. However, w ...
Digital forensic investigators generally struggle with the extraction of evidence from mobile devices when it comes to encrypted, third-party applications such as Signal, Wickr, and Telegram. These ap ...
The ransomware ecosystem in the Dark Web has provided resources to a distributed threat posed by insiders. Recent threat intelligence indicates that the anonymity of the Dark Web and wide spread avail ...
This workshop will walk the participants through a Ransomware Investigations and give them a high level understanding of how to work this type of investigation."
A typical investigation comes with many challenges. Managing the investigation, and the evidence that comes with, shouldn’t be one of them. Streamline and simplify your investigative management, break ...
As the type of evidence law enforcement has to manage becomes increasingly digital, it presents challenges in how to store, ingest, manage, analyze, report and collaborate on that evidence in an effic ...
For over a decade the Department of Defense (DoD) has been trying to increase the cyber security capability of its contractors. That effort, now in its fifth iteration, has included mandated improveme ...
Applying Machine Learning to Challenging Digital Forensics Problems Machine Learning offers great promise when applied to digital forensics. The question is how we can apply ML to digital forensics to ...
Learn how the Surete du Quebec has adapted and modified their investigative workflow, and significantly brought down their case back log. New technologies and techniques, plus thinking outside of the ...
With the recent integration capabilities between Magnet and Berla, investigators can now import a proprietary iVe file format into Axiom and analyze it alongside other device data. In this session we ...
In this session, attendees will learn how to validate the proper operation of their write blockers. The presentation will show Windows, Mac and Linux methods for testing write blocking tools. This ses ...
This session will highlight the common issues investigators face in the creation of the final report. Every expert committed in the forensics analysis process starts from being assigned to a case and ...
As recent cases have shown, video evidence is becoming more and more prevalent. As such, understanding what is happening, the timing of events, and even the speed of a vehicle have increasingly relied ...
Pick the scenario … you have to prove or disprove something and your proof is locked away in a phone. The phone is encrypted and locked when you power it on. What to do? Try an exploit? Brute force th ...
This session will focus on discussion of the ever-increasing use of geofence warrants by law enforcement. Law enforcement is seeing increased challenges when it comes to obtaining and using data for i ...
In today's world where the amount of digital data is exponentially growing and will undoubtedly always be witness to a crime, time to evidence is crucial for digital forensics professionals. From chat ...
For encrypted data on iOS and other mobile devices, the path to data recovery often requires getting the device to turn on and boot natively. This can be a hardship for many devices that have accident ...
With hackers, hostile foreign powers and cyber criminals finding new vulnerabilities to exploit on an almost daily basis, constant vigilance is needed to protect the nation’s critical infrastructure f ...
Malware analysis can be learned on your own by reading “The Art of Malware Analysis.” While there are some excellent tools available, these tools can be very expensive. Last summer we got some great n ...
As organizations move infrastructure to the cloud, the need for automating processes has become a requirement. No longer can operations administrators spend countless hours clicking through web interf ...
Location data is crucial in most investigations. However, while it's important to understand where someone was, it is potentially more important to understand what they were doing at the location in t ...
This will be an overview of the use of onsite mobile forensics during in-field operations targeting human trafficking. We will discuss the role of mobile forensics in conducting offender-focused inves ...
Hands-On Lab: This 50-minute hands-on lab will include a walk-through of the acquisition of cloud-hosted data and focus on the hands-on analysis of data from both Amazon Web Services and Microsoft. Yo ...
A typical investigation comes with many challenges. Managing the investigation, and the evidence that comes with, shouldn’t be one of them. Streamline and simplify your investigative management, break ...
GrayKey collections contain more than just the file system of an iOS device and this additional data is often overlooked. A notable example of this is the GrayKey passcode history file. Learn from Gra ...
Investigators are under increasing pressure to respond to challenges that the wide range of digital evidence sources and the diverse range of digital devices presents. In addition to laptops, computer ...
Consumer reporting agency Equifax was breached in 2017 to the tune of 140+ million consumer records, more than half the adults in the USA at the time. Four years later, from comprehensive analysis of ...
With more complex and sophisticated vehicles, the data originating within a motor vehicle can be overwhelming and confusing. The number of vehicle manufacturers, the capabilities of each system and th ...
This session will discuss the mass amounts of data available from social media platforms, such as Google, Facebook, Instagram, Apple iCloud and Snapchat that you can gain to aid in today’s criminal ca ...
In one of the most interesting current insider threat cases, a US Navy employee is charged with attempting to provide nuclear reactor operating manuals from US submarines to a foreign intelligence ser ...
Learn about the Carpenter decision and how courts have analyzed the Reasonable Expectation of Privacy in the digital world since its decision. We will discuss scenarios including; pole cameras, licen ...
Android forensics is becoming more and more complicated due to updated security measures and the massive amount of Android devices. While these security measures were in fact put in place to protect t ...
This presentation takes a deep dive into Image Exif data, and recovering that information when the tool can't. This presentation will address a common result in data carving where thumbnails are carve ...
Defending a your critical infrastructure and key resources is a complicated endeavor. There are numerous threat actors and each of them has distinct techniques they prefer to use when attacking your i ...
This session is focused on taking “the technical” and making it understandable for an audience of varying technical levels. It walks attendees through the kill chain of an enterprise ransomware incide ...
As more and more data move to the cloud understanding some of the ins and outs of how and what you can capture is important for any examiner. This session will review how the cloud is storing data whe ...
Every forensic examination starts with getting the right image. In the Mac Forensics world, understanding what to image and how to properly acquire an image has never been more complicated. For the ti ...
Overcoming access and compatibility challenges related to make, model, and version of a mobile device can consume the digital forensics process and budgets. Cellebrite has introduced a new offering to ...
Hands-On Lab This 50-minute hands-on lab will focus on the newly added features of AXIOM 6.0. Make the most out of the new mail explorer, cloud token recovery, new cloud insights, Refined Results – Us ...
This session will explore finding evidence of child abuse (or terrorist material) on suspect devices (on scene) in seconds or minutes, replacing processes that take weeks or months in a forensics lab.
DATAPILOT debuts new technology for acquiring evidence data directly from Apple & Android watches. Also being showcased are new “fast extraction” methods and the ability to find hidden networks. Be th ...
Cloud Forensics has become a term that is used to mean many things. This session will focus on both leveraging cloud infrastructure to conduct forensic exams allowing for scaling, and acquisition and ...
Organizations depend on third-party commercial software not only for securing their networks, but also for managing and storing customer data, financial accounting and reporting, and fulfillment of co ...
During this session, attendees will learn how Nation States, Non-Nation State Actors, Hacktivists, enterprise cyber criminals, shadow government agencies, terrorist organizations, loosely affiliated g ...
Come join an open conversation between a mobile forensic trainer and a previous student. The discussion will walk through the experience of getting started in mobile forensics including the victories, ...
With posts and comments on social media playing a larger role in investigations, the need to collect and analyze that data has also grown. Social media data can provide timely evidence to an ongoing ...
In this hands-on lab, you will activate a screen lock and secure boot encryption password on a Samsung Galaxy device with an Exynos chipset. Then, experience the "thrill of victory" as you not only by ...
KAPE is a free non-commercial DFIR tool enabling fast, targeted, and defensible collections. This is a hands-on lab that will cover the fundamentals of KAPE. During this lab, attendees will learn firs ...
NERC, HIPAA, FERPA, NYDFS...the list of regulatory regimes seems to grow exponentially each year. For many industries and organizations, there is a defined framework or guidelines to operate in from a ...
ICS security and cybersecurity depend on identity and access management (IAM). With the advent of 5G, the density and interconnectedness of the IOT is driving IAM to include the identities of sensors, ...
This session will explore the digital forensics difficulties (and possible solutions) facing Law Enforcement & Military Operations. The presenter will delve into options and methodologies used by thes ...
Hands-On Lab In this hands-on lab instructors will explore the pain points of DVR Examinations as well as explore out DVR Examiners can help solve these issues. Common issues with identifying digital ...
You may know “Nothing to See Here? I Beg To DFIR” as a series of interactive “tips and tricks” webinars. Here’s your chance to witness the magic LIVE and IN PERSON! Hosts Heather Mahalik, Ronen Engler ...
If one "thrill of victory" wasn't enough, come back to this hands-on lab for more. In this lab, you will enact a checkra1n jailbreak of a live iPhone. This extraction will allow keychain access and th ...
Too often we assume that the tool does the forensic analysis. As much as tools help us analyze data, the tools cannot do the job for us. You are the Picasso of forensics, not the paintbrush, and there ...
Your business is completely shut down due to ransomware. How did this happen? Unbeknownst to you, your vendor has been hacked, resulting in the halt of your operations. Learn how to mitigate your risk ...
Ransomware attacks, demands and payments spurred politicians and legislators to take-action against the cybercriminal eco-system. Incident reporting regulations, such as CINA, CIRA and RDA add to the ...
A typical investigation comes with many challenges. Managing the investigation, and the evidence that comes with, shouldn’t be one of them. Streamline and simplify your investigative management, break ...
Every day, corporations are faced with insider and outsider threats. Because of that, the Zero-Trust security approach is quickly becoming the standard for both corporations and federal agencies. Whil ...
Do you deal with CSAM, Domestic Extremism, Financial Crime, Organized or Drug-related Crime? Are you are interested to learn more about the most disruptive AI Solutions on the market? Do you want to e ...
Using SSH keys when connecting to remote hosts provides an additional layer of security. Getting SSH keys setup can be challenging. This presentation will step through SSH key creation, and the steps ...
A Google reverse location search, commonly referred to as a geofence, is a multi-step search warrant and analysis process that can generate powerful leads. With an increasing number of detectives usin ...
Legal qualifications of any testifying expert witness have evolved since the landmark Frye case, as well as the more sweeping Daubert case, and continue to evolve as technology advances, as these case ...
This session will explore different Darknets commonly used for criminal activity and how data is transferred across these networks. The presenter will describe how these networks are accessed and acti ...
Everyone is aware of the everyday threats to organizations and sometimes with real impact to our everyday lives. The Colonial Pipeline ransomware attack caused a run on gas stations in the eastern US ...
We’re living in a digital world. Investigators are faced with an enormous volume of data and digital evidence, which requires filtering and analyzing. This session will help you speed up your investig ...
"In the current environment where many people are working remotely and data is being stored in cloud locations, the need respond to unique forensic data collection and review challenges has never been ...
iOS forensics has been a hot topic over the last few years, especially with the release of iOS 15. Apple is constantly strengthening its security measures of their devices. This was designed to safegu ...
As the adoption of digital assets grows, illicit actors are increasingly turning to cryptocurrencies like Bitcoin to facilitate a range of illicit activity in a borderless, rapidly evolving digital ec ...
Video recordings are ubiquitous in both modern investigations and inside the courtroom, yet there are still common misconceptions when handling video evidence or introducing evidence in court. This se ...
The first 48 hours after a cyber incident are the most critical time for an organization that has been the victim of a cyber crime. Who? What? Where? How? Why? These are questions every business that ...
Over the last 1-2 years, COVID-19 has served as a catalyst for growing supply chain disruptions that have generated impacts on organizations throughout the world. Supply chains disruptions have become ...
How do you develop a wellness program for sworn and non-sworn investigators? Law enforcement wellness programs often focus on sworn officers. There are many non-sworn functions in law enforcement – in ...
Digital evidence plays a large role in the vast majority of cases today. Some of that evidence is likely to reside within open, publicly available sources on the web. Conducting effective OSINT resear ...
With Apple’s joining of the Bluetooth tracker market with the AirTag, their worldwide device network means that it’s easier than ever to track our items. However, what happens when someone slips an Ai ...
Join John Day from the SUMURI software department for an overview of all the new exciting new features RECON LAB added this year. RECON LAB had a major release at the start of this year that added a v ...
Backlogs in digital investigations are a growing problem that challenge examiners and investigators on a daily basis. With the growing amount of data collected - from devices of all types - the requir ...
There are a number of frameworks available to base your organizations’ cybersecurity and privacy programs on but the latest of these has been provided to us by the US Government. There will be somethi ...
Social Network Analysis has been a fundamental process when identifying threat networks, conducting due diligence and background investigations, or closing exposure to insider threats. Traditional soc ...
The United States Secret Service and the FBI arrested a hacker in Europe. After he was extradited back to the US he was debriefed. The presenter was one of the Secret Service agents that participated ...
This will be a case study of the investigation and apprehension of a prolific internet terrorist, but from the perspective of a small-town law enforcement officer. Hernandez was a very disciplined cyb ...
Magnet Forensics pioneered the artifacts-first approach which gave examiners a very clear starting point for their digital forensics investigations. Now, with the introduction of YARA rule scanning in ...
Properly handling cell phones and other mobile device evidence from the point of seizure to the point of analysis can be confusing. Different agencies may employ different procedures, with little in t ...
EnCase Forensic is a court-proven solution for finding, decrypting, collecting, and preserving forensic data from a wide variety of devices, while ensuring evidence integrity and seamlessly integratin ...
This session is intended to be an interactive cyber scenario for a table top exercise. It will show how a scenario unfolds using real world cases and examples. The audience will be asked both direct a ...
OSINT collection and exploitation is becoming increasingly important across investigations of all types. The speaker will address significant challenges in this field, and will address the pros and co ...
Despite a valiant effort, the phone is still locked or under attack, but you need information now. Time to escalate. In this session, we’ll go after computer and cloud account data to gather the evide ...
Overcoming access and compatibility challenges related to make, model, and version of a mobile device can consume the digital forensics process and budgets. Cellebrite has introduced a new offering to ...
Are the days of coming in over the weekend or late at night to kick off a process behind us? How about the days of sharing reports and case data via removable media? Modernizing your lab to meet the g ...
An overview of standard business email compromise investigations, discussing methodology, data collection, data analysis and reporting. Microsoft Office 365 and Google Workspace email environments wil ...
With the release of Windows 11 examiners are bracing themselves for analysis of potentially many new artifacts within the Operating System and possible file system changes which have not yet been enco ...
Brent and Tim will detail their war stories, and common security issues that have led to successful covert physical, wireless, and red team assessments against government and commercial clients. For e ...
Now that hybrid working environments are the new normal, enterprises need the ability to easily gather data remotely as well as on-premises. In 95% of investigations, text messages and conversations a ...
In Incident Response, reducing the time to collect and analyze the data is crucial. With the proliferation of ransomware, you may only have the tools in your pocket to depend on. Join Forensic Consult ...
The desire to produce Continuous Integration (CI) and Continuous Deployment (CD) application software can backfire due to poor design and testing procedures, putting your organization at significant r ...
Human Trafficking has increased exponentially as technology has given traffickers access to countless victims. Fraud & financial crime helps fund trafficking operations and these crimes help trafficke ...
Attendees will gain an overall understanding of Employee Departure and Insider Risk Programs, including current trends and findings. This session will cover the need for a multi-layered proactive stra ...
Google Takeouts can contain a wealth of information from a variety of devices using Google accounts. This can include data from Android devices, Chromebooks, Chrome Browser used on multiple devices, G ...
As the security features on mobile devices continue to advance, examiners must grow their skillsets to ensure lawful data collections are not compromised and that privacy is always maintained. Advance ...
Magnet AUTOMATE Enterprise is a new solution that provides parallel processing of multiple target endpoints and evidence sources while automating manual tasks in the forensics workflow. The result? Yo ...
The rise of video surveillance devices by citizens and businesses presents an opportunity for police departments. They can leverage these resources through a digital evidence management system which c ...
Artificial intelligence and machine learning have the potential to reinvent investigative methods.The session will identify the hot spots in the use of a modern system, identify the upsides and downsi ...
Computer networks continue to increase in complexity. Industrial Control Systems, Human-Machine Interfaces, Programmable Logic Controllers, and other systems can change conditions in the physical worl ...
A plethora of tools exist today for OSINT collection of digital media ushering in the next generation of OSINT analysis tools. In this presentation we’ll dive into the techniques used for analyzing di ...
We’re living in a digital world. Investigators are faced with an enormous volume of data and digital evidence, which requires filtering and analyzing. This session will help you speed up your investig ...
Shipping sensitive evidence on USB drives or requiring investigators to travel to the lab can waste critical investigation time and may introduce security risks. Plus, training investigators to use mu ...
Techno Myrtle Beach 2021 was a great return to face-to-face tradeshows. The transition back to in person events was handled very smoothly and overall the tradeshow was well run. Excited to attend more Techno shows in the other locations and to return to Myrtle Beach next year!
Jack Raubach, Marketing Director, Forensic Computers
Thank you to everyone at the Techno Security & Digital Forensics Conference for organizing another epic event. The training and networking with the best of the best in this field was amazing, as always!! It was so good to see some familiar faces and meet so many new people too.
Robert Smith, Investigator/Managing Partner, TechSmart Solutions LLC
Booth traffic was nearly nonstop at all times. Exactly what we had hoped for, with overwhelmingly positive feedback and high interest from federal, military, law enforcement and private sector cyber incident response firms.
Amy Moles, CEO-Co-Founder, ArcPoint Forensics
Four days of intensive, focused cybersecurity and digital forensics training. Perfect for us "old-timers" looking for new products and vendors, as well as great refresher and new training. The curriculum is flexible, efficient, effective, and fun.
David R. Lease, PhD, Vice President, Evolver, LLC
This conference is not only a wealth of information, but it is a great way to network with people and vendors from all over the world. Whether you are new to the digital security world or a seasoned veteran, this is the conference to attend.
Justin Kutski, DEA/TFO, North Charleston Police Department
Techno Security and Digital Forensics Conference is consistently among the best in our industry, for sponsors and attendees alike. We always learn new things and have the opportunity to interact with our customers, and people we haven't met before. It's a great event.
Bill Teel, President, Teel Technologies
Secure Your Booth Today!
Connect with professionals looking for the latest tools, training, networking, and solutions to industry challenges.