Wilmington, NC

June 5-8, 2023

Wilmington Convention Center

Hero Default

hero__default

Wednesday, May 11, 2022

The 2022 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
    • Keynote
    Oleander A/B
    Too often we assume that the tool does the forensic analysis. As much as tools help us analyze data, the tools cannot do the job for us. You are the Picasso of forensics, not the paintbrush, and there ...
    • Audit/Risk Management
    Atlantic 3
    Your business is completely shut down due to ransomware. How did this happen? Unbeknownst to you, your vendor has been hacked, resulting in the halt of your operations. Learn how to mitigate your risk ...
    • Information Security
    Tides 1/2
    Ransomware attacks, demands and payments spurred politicians and legislators to take-action against the cybercriminal eco-system. Incident reporting regulations, such as CINA, CIRA and RDA add to the ...
    • Cellebrite Lab
    Atlantic 1
    A typical investigation comes with many challenges. Managing the investigation, and the evidence that comes with, shouldn’t be one of them. Streamline and simplify your investigative management, break ...
    • Magnet Lab
    Atlantic 2
    • Sponsor Demo
    Osprey
    Every day, corporations are faced with insider and outsider threats. Because of that, the Zero-Trust security approach is quickly becoming the standard for both corporations and federal agencies. Whil ...
    • Sponsor Demo
    Heron
    Do you deal with CSAM, Domestic Extremism, Financial Crime, Organized or Drug-related Crime? Are you are interested to learn more about the most disruptive AI Solutions on the market? Do you want to e ...
    • Forensics
    Oleander A
    Using SSH keys when connecting to remote hosts provides an additional layer of security. Getting SSH keys setup can be challenging. This presentation will step through SSH key creation, and the steps ...
    • Investigations
    Oleander B
    A Google reverse location search, commonly referred to as a geofence, is a multi-step search warrant and analysis process that can generate powerful leads. With an increasing number of detectives usin ...
    • Forensics
    Atlantic 3
    Legal qualifications of any testifying expert witness have evolved since the landmark Frye case, as well as the more sweeping Daubert case, and continue to evolve as technology advances, as these case ...
    • Forensics
    Oleander A
    This session will explore different Darknets commonly used for criminal activity and how data is transferred across these networks. The presenter will describe how these networks are accessed and acti ...
    • Information Security
    Tides 1/2
    Everyone is aware of the everyday threats to organizations and sometimes with real impact to our everyday lives. The Colonial Pipeline ransomware attack caused a run on gas stations in the eastern US ...
    • Cellebrite Lab
    Atlantic 1
    We’re living in a digital world. Investigators are faced with an enormous volume of data and digital evidence, which requires filtering and analyzing. This session will help you speed up your investig ...
    • Magnet Lab
    Atlantic 2
    "In the current environment where many people are working remotely and data is being stored in cloud locations, the need respond to unique forensic data collection and review challenges has never been ...
    • Sponsor Demo
    Heron
    iOS forensics has been a hot topic over the last few years, especially with the release of iOS 15. Apple is constantly strengthening its security measures of their devices. This was designed to safegu ...
    • Sponsor Demo
    Osprey
    As the adoption of digital assets grows, illicit actors are increasingly turning to cryptocurrencies like Bitcoin to facilitate a range of illicit activity in a borderless, rapidly evolving digital ec ...
    • Forensics
    Oleander B
    Video recordings are ubiquitous in both modern investigations and inside the courtroom, yet there are still common misconceptions when handling video evidence or introducing evidence in court. This se ...
    • Information Security
    Tides 1/2
    The first 48 hours after a cyber incident are the most critical time for an organization that has been the victim of a cyber crime. Who? What? Where? How? Why? These are questions every business that ...
    • Audit/Risk Management
    Atlantic 3
    Over the last 1-2 years, COVID-19 has served as a catalyst for growing supply chain disruptions that have generated impacts on organizations throughout the world. Supply chains disruptions have become ...
    • Forensics
    Oleander A
    How do you develop a wellness program for sworn and non-sworn investigators? Law enforcement wellness programs often focus on sworn officers. There are many non-sworn functions in law enforcement – in ...
    • Cellebrite Lab
    Atlantic 1
    Digital evidence plays a large role in the vast majority of cases today. Some of that evidence is likely to reside within open, publicly available sources on the web. Conducting effective OSINT resear ...
    • Magnet Lab
    Atlantic 2
    With Apple’s joining of the Bluetooth tracker market with the AirTag, their worldwide device network means that it’s easier than ever to track our items. However, what happens when someone slips an Ai ...
    • Sponsor Demo
    Heron
    Join John Day from the SUMURI software department for an overview of all the new exciting new features RECON LAB added this year. RECON LAB had a major release at the start of this year that added a v ...
    • Sponsor Demo
    Osprey
    Backlogs in digital investigations are a growing problem that challenge examiners and investigators on a daily basis. With the growing amount of data collected - from devices of all types - the requir ...
    • Audit/Risk Management
    Atlantic 3
    There are a number of frameworks available to base your organizations’ cybersecurity and privacy programs on but the latest of these has been provided to us by the US Government. There will be somethi ...
    • Investigations
    Oleander B
    Social Network Analysis has been a fundamental process when identifying threat networks, conducting due diligence and background investigations, or closing exposure to insider threats. Traditional soc ...
    • Forensics
    Oleander A
    The United States Secret Service and the FBI arrested a hacker in Europe. After he was extradited back to the US he was debriefed. The presenter was one of the Secret Service agents that participated ...
    • Cellebrite Lab
    Atlantic 1
    This will be a case study of the investigation and apprehension of a prolific internet terrorist, but from the perspective of a small-town law enforcement officer. Hernandez was a very disciplined cyb ...
    • Magnet Lab
    Atlantic 2
    Magnet Forensics pioneered the artifacts-first approach which gave examiners a very clear starting point for their digital forensics investigations. Now, with the introduction of YARA rule scanning in ...
    • Sponsor Demo
    Heron
    Properly handling cell phones and other mobile device evidence from the point of seizure to the point of analysis can be confusing. Different agencies may employ different procedures, with little in t ...
    • Sponsor Demo
    Osprey
    EnCase Forensic is a court-proven solution for finding, decrypting, collecting, and preserving forensic data from a wide variety of devices, while ensuring evidence integrity and seamlessly integratin ...
    • Information Security
    Tides 1/2
    This session is intended to be an interactive cyber scenario for a table top exercise. It will show how a scenario unfolds using real world cases and examples. The audience will be asked both direct a ...
    • Investigations
    Oleander B
    OSINT collection and exploitation is becoming increasingly important across investigations of all types. The speaker will address significant challenges in this field, and will address the pros and co ...
    • Forensics
    Oleander A
    Despite a valiant effort, the phone is still locked or under attack, but you need information now. Time to escalate. In this session, we’ll go after computer and cloud account data to gather the evide ...
    • Information Security
    Atlantic 3
    This session will share five cost-effective tips to secure your small business, municipal government, school, and or regional hospital
    • Cellebrite Lab
    Atlantic 1
    Overcoming access and compatibility challenges related to make, model, and version of a mobile device can consume the digital forensics process and budgets. Cellebrite has introduced a new offering to ...
    • Magnet Lab
    Atlantic 2
    Are the days of coming in over the weekend or late at night to kick off a process behind us? How about the days of sharing reports and case data via removable media? Modernizing your lab to meet the g ...

2022 Sponsors


QUOTE

  • Techno Myrtle Beach 2021 was a great return to face-to-face tradeshows. The transition back to in person events was handled very smoothly and overall the tradeshow was well run. Excited to attend more Techno shows in the other locations and to return to Myrtle Beach next year!
    Jack Raubach, Marketing Director, Forensic Computers
  • Thank you to everyone at the Techno Security & Digital Forensics Conference for organizing another epic event. The training and networking with the best of the best in this field was amazing, as always!! It was so good to see some familiar faces and meet so many new people too.
    Robert Smith, Investigator/Managing Partner, TechSmart Solutions LLC
  • Booth traffic was nearly nonstop at all times. Exactly what we had hoped for, with overwhelmingly positive feedback and high interest from federal, military, law enforcement and private sector cyber incident response firms.
    Amy Moles, CEO-Co-Founder, ArcPoint Forensics
  • Four days of intensive, focused cybersecurity and digital forensics training. Perfect for us "old-timers" looking for new products and vendors, as well as great refresher and new training. The curriculum is flexible, efficient, effective, and fun.
    David R. Lease, PhD, Vice President, Evolver, LLC
  • This conference is not only a wealth of information, but it is a great way to network with people and vendors from all over the world. Whether you are new to the digital security world or a seasoned veteran, this is the conference to attend.
    Justin Kutski, DEA/TFO, North Charleston Police Department
  • Techno Security and Digital Forensics Conference is consistently among the best in our industry, for sponsors and attendees alike. We always learn new things and have the opportunity to interact with our customers, and people we haven't met before. It's a great event.
    Bill Teel, President, Teel Technologies

Secure Your Booth Today!

Secure Your Booth Today!

Connect with professionals looking for the latest tools, training, networking, and solutions to industry challenges.

Learn More