The 2022 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).
To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.
For a list of all sessions by day, please click on the day/date link.
Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.
With hackers, hostile foreign powers and cyber criminals finding new vulnerabilities to exploit on an almost daily basis, constant vigilance is needed to protect the nation’s critical infrastructure f ...
Malware analysis can be learned on your own by reading “The Art of Malware Analysis.” While there are some excellent tools available, these tools can be very expensive. Last summer we got some great n ...
As organizations move infrastructure to the cloud, the need for automating processes has become a requirement. No longer can operations administrators spend countless hours clicking through web interf ...
Location data is crucial in most investigations. However, while it's important to understand where someone was, it is potentially more important to understand what they were doing at the location in t ...
This will be an overview of the use of onsite mobile forensics during in-field operations targeting human trafficking. We will discuss the role of mobile forensics in conducting offender-focused inves ...
Hands-On Lab: This 50-minute hands-on lab will include a walk-through of the acquisition of cloud-hosted data and focus on the hands-on analysis of data from both Amazon Web Services and Microsoft. Yo ...
A typical investigation comes with many challenges. Managing the investigation, and the evidence that comes with, shouldn’t be one of them. Streamline and simplify your investigative management, break ...
GrayKey collections contain more than just the file system of an iOS device and this additional data is often overlooked. A notable example of this is the GrayKey passcode history file. Learn from Gra ...
Investigators are under increasing pressure to respond to challenges that the wide range of digital evidence sources and the diverse range of digital devices presents. In addition to laptops, computer ...
Consumer reporting agency Equifax was breached in 2017 to the tune of 140+ million consumer records, more than half the adults in the USA at the time. Four years later, from comprehensive analysis of ...
With more complex and sophisticated vehicles, the data originating within a motor vehicle can be overwhelming and confusing. The number of vehicle manufacturers, the capabilities of each system and th ...
This session will discuss the mass amounts of data available from social media platforms, such as Google, Facebook, Instagram, Apple iCloud and Snapchat that you can gain to aid in today’s criminal ca ...
In one of the most interesting current insider threat cases, a US Navy employee is charged with attempting to provide nuclear reactor operating manuals from US submarines to a foreign intelligence ser ...
Learn about the Carpenter decision and how courts have analyzed the Reasonable Expectation of Privacy in the digital world since its decision. We will discuss scenarios including; pole cameras, licen ...
Android forensics is becoming more and more complicated due to updated security measures and the massive amount of Android devices. While these security measures were in fact put in place to protect t ...
This presentation takes a deep dive into Image Exif data, and recovering that information when the tool can't. This presentation will address a common result in data carving where thumbnails are carve ...
Defending a your critical infrastructure and key resources is a complicated endeavor. There are numerous threat actors and each of them has distinct techniques they prefer to use when attacking your i ...
This session is focused on taking “the technical” and making it understandable for an audience of varying technical levels. It walks attendees through the kill chain of an enterprise ransomware incide ...
As more and more data move to the cloud understanding some of the ins and outs of how and what you can capture is important for any examiner. This session will review how the cloud is storing data whe ...
Every forensic examination starts with getting the right image. In the Mac Forensics world, understanding what to image and how to properly acquire an image has never been more complicated. For the ti ...
Overcoming access and compatibility challenges related to make, model, and version of a mobile device can consume the digital forensics process and budgets. Cellebrite has introduced a new offering to ...
Hands-On Lab This 50-minute hands-on lab will focus on the newly added features of AXIOM 6.0. Make the most out of the new mail explorer, cloud token recovery, new cloud insights, Refined Results – Us ...
This session will explore finding evidence of child abuse (or terrorist material) on suspect devices (on scene) in seconds or minutes, replacing processes that take weeks or months in a forensics lab.
DATAPILOT debuts new technology for acquiring evidence data directly from Apple & Android watches. Also being showcased are new “fast extraction” methods and the ability to find hidden networks. Be th ...
Cloud Forensics has become a term that is used to mean many things. This session will focus on both leveraging cloud infrastructure to conduct forensic exams allowing for scaling, and acquisition and ...
Organizations depend on third-party commercial software not only for securing their networks, but also for managing and storing customer data, financial accounting and reporting, and fulfillment of co ...
During this session, attendees will learn how Nation States, Non-Nation State Actors, Hacktivists, enterprise cyber criminals, shadow government agencies, terrorist organizations, loosely affiliated g ...
Come join an open conversation between a mobile forensic trainer and a previous student. The discussion will walk through the experience of getting started in mobile forensics including the victories, ...
With posts and comments on social media playing a larger role in investigations, the need to collect and analyze that data has also grown. Social media data can provide timely evidence to an ongoing ...
In this hands-on lab, you will activate a screen lock and secure boot encryption password on a Samsung Galaxy device with an Exynos chipset. Then, experience the "thrill of victory" as you not only by ...
KAPE is a free non-commercial DFIR tool enabling fast, targeted, and defensible collections. This is a hands-on lab that will cover the fundamentals of KAPE. During this lab, attendees will learn firs ...
NERC, HIPAA, FERPA, NYDFS...the list of regulatory regimes seems to grow exponentially each year. For many industries and organizations, there is a defined framework or guidelines to operate in from a ...
ICS security and cybersecurity depend on identity and access management (IAM). With the advent of 5G, the density and interconnectedness of the IOT is driving IAM to include the identities of sensors, ...
This session will explore the digital forensics difficulties (and possible solutions) facing Law Enforcement & Military Operations. The presenter will delve into options and methodologies used by thes ...
Hands-On Lab In this hands-on lab instructors will explore the pain points of DVR Examinations as well as explore out DVR Examiners can help solve these issues. Common issues with identifying digital ...
You may know “Nothing to See Here? I Beg To DFIR” as a series of interactive “tips and tricks” webinars. Here’s your chance to witness the magic LIVE and IN PERSON! Hosts Heather Mahalik, Ronen Engler ...
If one "thrill of victory" wasn't enough, come back to this hands-on lab for more. In this lab, you will enact a checkra1n jailbreak of a live iPhone. This extraction will allow keychain access and th ...
Techno Myrtle Beach 2021 was a great return to face-to-face tradeshows. The transition back to in person events was handled very smoothly and overall the tradeshow was well run. Excited to attend more Techno shows in the other locations and to return to Myrtle Beach next year!
Jack Raubach, Marketing Director, Forensic Computers
Thank you to everyone at the Techno Security & Digital Forensics Conference for organizing another epic event. The training and networking with the best of the best in this field was amazing, as always!! It was so good to see some familiar faces and meet so many new people too.
Robert Smith, Investigator/Managing Partner, TechSmart Solutions LLC
Booth traffic was nearly nonstop at all times. Exactly what we had hoped for, with overwhelmingly positive feedback and high interest from federal, military, law enforcement and private sector cyber incident response firms.
Amy Moles, CEO-Co-Founder, ArcPoint Forensics
Four days of intensive, focused cybersecurity and digital forensics training. Perfect for us "old-timers" looking for new products and vendors, as well as great refresher and new training. The curriculum is flexible, efficient, effective, and fun.
David R. Lease, PhD, Vice President, Evolver, LLC
This conference is not only a wealth of information, but it is a great way to network with people and vendors from all over the world. Whether you are new to the digital security world or a seasoned veteran, this is the conference to attend.
Justin Kutski, DEA/TFO, North Charleston Police Department
Techno Security and Digital Forensics Conference is consistently among the best in our industry, for sponsors and attendees alike. We always learn new things and have the opportunity to interact with our customers, and people we haven't met before. It's a great event.
Bill Teel, President, Teel Technologies
Secure Your Booth Today!
Connect with professionals looking for the latest tools, training, networking, and solutions to industry challenges.