Wilmington, NC

June 5-8, 2023

Wilmington Convention Center

Hero Default

hero__default

Thursday, May 12, 2022

The 2022 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
    • Forensics
    Oleander B
    An overview of standard business email compromise investigations, discussing methodology, data collection, data analysis and reporting. Microsoft Office 365 and Google Workspace email environments wil ...
    • Forensics
    Oleander A
    With the release of Windows 11 examiners are bracing themselves for analysis of potentially many new artifacts within the Operating System and possible file system changes which have not yet been enco ...
    • Information Security
    Tides 1/2
    Brent and Tim will detail their war stories, and common security issues that have led to successful covert physical, wireless, and red team assessments against government and commercial clients. For e ...
    • Cellebrite Lab
    Atlantic 1
    Now that hybrid working environments are the new normal, enterprises need the ability to easily gather data remotely as well as on-premises. In 95% of investigations, text messages and conversations a ...
    • Magnet Lab
    Atlantic 2
    In Incident Response, reducing the time to collect and analyze the data is crucial. With the proliferation of ransomware, you may only have the tools in your pocket to depend on. Join Forensic Consult ...
    • Audit/Risk Management
    Atlantic 3
    The desire to produce Continuous Integration (CI) and Continuous Deployment (CD) application software can backfire due to poor design and testing procedures, putting your organization at significant r ...
    • Investigations
    Tides 1/2
    Human Trafficking has increased exponentially as technology has given traffickers access to countless victims. Fraud & financial crime helps fund trafficking operations and these crimes help trafficke ...
    • Forensics
    Oleander B
    Attendees will gain an overall understanding of Employee Departure and Insider Risk Programs, including current trends and findings. This session will cover the need for a multi-layered proactive stra ...
    • Forensics
    Oleander A
    Google Takeouts can contain a wealth of information from a variety of devices using Google accounts. This can include data from Android devices, Chromebooks, Chrome Browser used on multiple devices, G ...
    • Cellebrite Lab
    Atlantic 1
    As the security features on mobile devices continue to advance, examiners must grow their skillsets to ensure lawful data collections are not compromised and that privacy is always maintained. Advance ...
    • Magnet Lab
    Atlantic 2
    Magnet AUTOMATE Enterprise is a new solution that provides parallel processing of multiple target endpoints and evidence sources while automating manual tasks in the forensics workflow. The result? Yo ...
    • Investigations
    Atlantic 3
    The rise of video surveillance devices by citizens and businesses presents an opportunity for police departments. They can leverage these resources through a digital evidence management system which c ...
    • Forensics
    Oleander A
    Artificial intelligence and machine learning have the potential to reinvent investigative methods.The session will identify the hot spots in the use of a modern system, identify the upsides and downsi ...
    • Investigations
    Oleander B
    Computer networks continue to increase in complexity. Industrial Control Systems, Human-Machine Interfaces, Programmable Logic Controllers, and other systems can change conditions in the physical worl ...
    • Forensics
    Tides 1/2
    A plethora of tools exist today for OSINT collection of digital media ushering in the next generation of OSINT analysis tools. In this presentation we’ll dive into the techniques used for analyzing di ...
    • Cellebrite Lab
    Atlantic 1
    We’re living in a digital world. Investigators are faced with an enormous volume of data and digital evidence, which requires filtering and analyzing. This session will help you speed up your investig ...
    • Magnet Lab
    Atlantic 2
    Shipping sensitive evidence on USB drives or requiring investigators to travel to the lab can waste critical investigation time and may introduce security risks. Plus, training investigators to use mu ...

2022 Sponsors


QUOTE

  • Techno Myrtle Beach 2021 was a great return to face-to-face tradeshows. The transition back to in person events was handled very smoothly and overall the tradeshow was well run. Excited to attend more Techno shows in the other locations and to return to Myrtle Beach next year!
    Jack Raubach, Marketing Director, Forensic Computers
  • Thank you to everyone at the Techno Security & Digital Forensics Conference for organizing another epic event. The training and networking with the best of the best in this field was amazing, as always!! It was so good to see some familiar faces and meet so many new people too.
    Robert Smith, Investigator/Managing Partner, TechSmart Solutions LLC
  • Booth traffic was nearly nonstop at all times. Exactly what we had hoped for, with overwhelmingly positive feedback and high interest from federal, military, law enforcement and private sector cyber incident response firms.
    Amy Moles, CEO-Co-Founder, ArcPoint Forensics
  • Four days of intensive, focused cybersecurity and digital forensics training. Perfect for us "old-timers" looking for new products and vendors, as well as great refresher and new training. The curriculum is flexible, efficient, effective, and fun.
    David R. Lease, PhD, Vice President, Evolver, LLC
  • This conference is not only a wealth of information, but it is a great way to network with people and vendors from all over the world. Whether you are new to the digital security world or a seasoned veteran, this is the conference to attend.
    Justin Kutski, DEA/TFO, North Charleston Police Department
  • Techno Security and Digital Forensics Conference is consistently among the best in our industry, for sponsors and attendees alike. We always learn new things and have the opportunity to interact with our customers, and people we haven't met before. It's a great event.
    Bill Teel, President, Teel Technologies

Secure Your Booth Today!

Secure Your Booth Today!

Connect with professionals looking for the latest tools, training, networking, and solutions to industry challenges.

Learn More