Wilmington, NC

June 5-8, 2023

Wilmington Convention Center

Hero Default

hero__default

Tuesday, May 10, 2022

The 2022 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
    • Keynote
    Oleander A/B
    With hackers, hostile foreign powers and cyber criminals finding new vulnerabilities to exploit on an almost daily basis, constant vigilance is needed to protect the nation’s critical infrastructure f ...
    • Forensics
    Tides 1/2
    Malware analysis can be learned on your own by reading “The Art of Malware Analysis.” While there are some excellent tools available, these tools can be very expensive. Last summer we got some great n ...
    • Information Security
    Atlantic 3
    As organizations move infrastructure to the cloud, the need for automating processes has become a requirement. No longer can operations administrators spend countless hours clicking through web interf ...
    • Forensics
    Oleander B
    Location data is crucial in most investigations. However, while it's important to understand where someone was, it is potentially more important to understand what they were doing at the location in t ...
    • Investigations
    Oleander A
    This will be an overview of the use of onsite mobile forensics during in-field operations targeting human trafficking. We will discuss the role of mobile forensics in conducting offender-focused inves ...
    • Magnet Lab
    Atlantic 2
    Hands-On Lab: This 50-minute hands-on lab will include a walk-through of the acquisition of cloud-hosted data and focus on the hands-on analysis of data from both Amazon Web Services and Microsoft. Yo ...
    • Cellebrite Lab
    Atlantic 1
    A typical investigation comes with many challenges. Managing the investigation, and the evidence that comes with, shouldn’t be one of them. Streamline and simplify your investigative management, break ...
    • Sponsor Demo
    Heron
    GrayKey collections contain more than just the file system of an iOS device and this additional data is often overlooked. A notable example of this is the GrayKey passcode history file. Learn from Gra ...
    • Sponsor Demo
    Osprey
    Investigators are under increasing pressure to respond to challenges that the wide range of digital evidence sources and the diverse range of digital devices presents. In addition to laptops, computer ...
    • Information Security
    Oleander B
    Consumer reporting agency Equifax was breached in 2017 to the tune of 140+ million consumer records, more than half the adults in the USA at the time. Four years later, from comprehensive analysis of ...
    • Forensics
    Oleander A
    With more complex and sophisticated vehicles, the data originating within a motor vehicle can be overwhelming and confusing. The number of vehicle manufacturers, the capabilities of each system and th ...
    • Investigations
    Atlantic 3
    This session will discuss the mass amounts of data available from social media platforms, such as Google, Facebook, Instagram, Apple iCloud and Snapchat that you can gain to aid in today’s criminal ca ...
    • Forensics
    Tides 1/2
    In one of the most interesting current insider threat cases, a US Navy employee is charged with attempting to provide nuclear reactor operating manuals from US submarines to a foreign intelligence ser ...
    • Cellebrite Lab
    Atlantic 1
    Learn about the Carpenter decision and how courts have analyzed the Reasonable Expectation of Privacy in the digital world since its decision.  We will discuss scenarios including; pole cameras, licen ...
    • Magnet Lab
    Atlantic 2
    • Sponsor Demo
    Heron
    Android forensics is becoming more and more complicated due to updated security measures and the massive amount of Android devices. While these security measures were in fact put in place to protect t ...
    • Sponsor Demo
    Osprey
    This presentation takes a deep dive into Image Exif data, and recovering that information when the tool can't. This presentation will address a common result in data carving where thumbnails are carve ...
    • Information Security
    Tides 1/2
    Defending a your critical infrastructure and key resources is a complicated endeavor. There are numerous threat actors and each of them has distinct techniques they prefer to use when attacking your i ...
    • Information Security
    Oleander B
    This session is focused on taking “the technical” and making it understandable for an audience of varying technical levels. It walks attendees through the kill chain of an enterprise ransomware incide ...
    • Forensics
    Oleander A
    As more and more data move to the cloud understanding some of the ins and outs of how and what you can capture is important for any examiner. This session will review how the cloud is storing data whe ...
    • Forensics
    Atlantic 3
    Every forensic examination starts with getting the right image. In the Mac Forensics world, understanding what to image and how to properly acquire an image has never been more complicated. For the ti ...
    • Cellebrite Lab
    Atlantic 1
    Overcoming access and compatibility challenges related to make, model, and version of a mobile device can consume the digital forensics process and budgets. Cellebrite has introduced a new offering to ...
    • Magnet Lab
    Atlantic 2
    Hands-On Lab This 50-minute hands-on lab will focus on the newly added features of AXIOM 6.0. Make the most out of the new mail explorer, cloud token recovery, new cloud insights, Refined Results – Us ...
    • Sponsor Demo
    Heron
    This session will explore finding evidence of child abuse (or terrorist material) on suspect devices (on scene) in seconds or minutes, replacing processes that take weeks or months in a forensics lab.
    • Sponsor Demo
    Osprey
    DATAPILOT debuts new technology for acquiring evidence data directly from Apple & Android watches. Also being showcased are new “fast extraction” methods and the ability to find hidden networks. Be th ...
    • Forensics
    Oleander A
    Cloud Forensics has become a term that is used to mean many things. This session will focus on both leveraging cloud infrastructure to conduct forensic exams allowing for scaling, and acquisition and ...
    • Audit/Risk Management
    Atlantic 3
    Organizations depend on third-party commercial software not only for securing their networks, but also for managing and storing customer data, financial accounting and reporting, and fulfillment of co ...
    • Information Security
    Oleander B
    During this session, attendees will learn how Nation States, Non-Nation State Actors, Hacktivists, enterprise cyber criminals, shadow government agencies, terrorist organizations, loosely affiliated g ...
    • Cellebrite Lab
    Atlantic 1
    Come join an open conversation between a mobile forensic trainer and a previous student. The discussion will walk through the experience of getting started in mobile forensics including the victories, ...
    • Magnet Lab
    Atlantic 2
    With posts and comments on social media playing a larger role in investigations, the need to collect and analyze that data has also grown.  Social media data can provide timely evidence to an ongoing ...
    • Sponsor Demo
    Osprey
    In this hands-on lab, you will activate a screen lock and secure boot encryption password on a Samsung Galaxy device with an Exynos chipset. Then, experience the "thrill of victory" as you not only by ...
    • Forensics
    Tides 1/2
    KAPE is a free non-commercial DFIR tool enabling fast, targeted, and defensible collections. This is a hands-on lab that will cover the fundamentals of KAPE. During this lab, attendees will learn firs ...
    • Audit/Risk Management
    Atlantic 3
    NERC, HIPAA, FERPA, NYDFS...the list of regulatory regimes seems to grow exponentially each year. For many industries and organizations, there is a defined framework or guidelines to operate in from a ...
    • Information Security
    Oleander B
    ICS security and cybersecurity depend on identity and access management (IAM). With the advent of 5G, the density and interconnectedness of the IOT is driving IAM to include the identities of sensors, ...
    • Forensics
    Oleander A
    This session will explore the digital forensics difficulties (and possible solutions) facing Law Enforcement & Military Operations. The presenter will delve into options and methodologies used by thes ...
    • Magnet Lab
    Atlantic 2
    Hands-On Lab In this hands-on lab instructors will explore the pain points of DVR Examinations as well as explore out DVR Examiners can help solve these issues. Common issues with identifying digital ...
    • Cellebrite Lab
    Atlantic 1
    You may know “Nothing to See Here? I Beg To DFIR” as a series of interactive “tips and tricks” webinars. Here’s your chance to witness the magic LIVE and IN PERSON! Hosts Heather Mahalik, Ronen Engler ...
    • Sponsor Demo
    Osprey
    If one "thrill of victory" wasn't enough, come back to this hands-on lab for more. In this lab, you will enact a checkra1n jailbreak of a live iPhone. This extraction will allow keychain access and th ...

2022 Sponsors


QUOTE

  • Techno Myrtle Beach 2021 was a great return to face-to-face tradeshows. The transition back to in person events was handled very smoothly and overall the tradeshow was well run. Excited to attend more Techno shows in the other locations and to return to Myrtle Beach next year!
    Jack Raubach, Marketing Director, Forensic Computers
  • Thank you to everyone at the Techno Security & Digital Forensics Conference for organizing another epic event. The training and networking with the best of the best in this field was amazing, as always!! It was so good to see some familiar faces and meet so many new people too.
    Robert Smith, Investigator/Managing Partner, TechSmart Solutions LLC
  • Booth traffic was nearly nonstop at all times. Exactly what we had hoped for, with overwhelmingly positive feedback and high interest from federal, military, law enforcement and private sector cyber incident response firms.
    Amy Moles, CEO-Co-Founder, ArcPoint Forensics
  • Four days of intensive, focused cybersecurity and digital forensics training. Perfect for us "old-timers" looking for new products and vendors, as well as great refresher and new training. The curriculum is flexible, efficient, effective, and fun.
    David R. Lease, PhD, Vice President, Evolver, LLC
  • This conference is not only a wealth of information, but it is a great way to network with people and vendors from all over the world. Whether you are new to the digital security world or a seasoned veteran, this is the conference to attend.
    Justin Kutski, DEA/TFO, North Charleston Police Department
  • Techno Security and Digital Forensics Conference is consistently among the best in our industry, for sponsors and attendees alike. We always learn new things and have the opportunity to interact with our customers, and people we haven't met before. It's a great event.
    Bill Teel, President, Teel Technologies

Secure Your Booth Today!

Secure Your Booth Today!

Connect with professionals looking for the latest tools, training, networking, and solutions to industry challenges.

Learn More