Wilmington, NC

June 5-8, 2023

Wilmington Convention Center

Hero Default

hero__default

Monday, May 9, 2022

The 2022 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
    • Information Security
    Oleander A
    Microsoft office applications offer various security measures such as locking a document. This presentation discusses what Office documents are, as a collection of XML files, discusses some of the bui ...
    • Forensics
    Oleander B
    AI is having a profound impact on modern lives, including significant changes to child sexual abuse (CSA) investigations. We will discuss insights gained by Semantics 21 from its cutting-edge AI advan ...
    • Cellebrite Lab
    Atlantic 1
    Join us for this unique session to learn about the latest happenings in the domain of forensic access, enabled by vulnerability research and device exploitation. This session will be held by past and ...
    • Magnet Lab
    Atlantic 2
    RAM is the gatekeeper to the Operating System, and Memory Analysis is quickly becoming an integral part of every malware and incident response investigation. Windows memory can contain an abundance of ...
    • Forensics
    Atlantic 3
    With the steady increase in Drone use by criminal entities, law enforcement must be prepared to add this expansive dataset to their case package. Learn how to successfully integrate this evidence into ...
    • Investigations
    Tides 1/2
    Learn how to extract information from Twitter and Instagram for your investigation. This session will show you how to use free tools to pull images, videos, and collect data from specific locations.
    • Investigations
    Oleander B
    Every day holds the potential for new AI applications, paving the way for future possibilities to assist in investigations. AI-based technology has become essential for crime prevention, prediction, s ...
    • Forensics
    Tides 1/2
    With the amount of data being stored on today's vehicles, the challenge is how to properly harness it for your investigations. Knowing how and when it is generated, is critical when using it as key ev ...
    • Information Security
    Atlantic 3
    Lying deep in every network is Active Directory. It is like a Frankenstein, connected to nearly every application, service, and device. The beast is always changing, which makes it more hideous every ...
    • Forensics
    Oleander A
    Deep Fakes have heightened interest in video authentication. But can a Digital Video Recorder (DVR) be fooled into playing back fake footage? During this session, the presenter will share the attempts ...
    • Cellebrite Lab
    Atlantic 1
    In this session especially for the Lab, attendees will discover the latest UFED collection options for trending devices and encryption methods from Cellebrite. Plus, empower yourself and your digital ...
    • Magnet Lab
    Atlantic 2
    Not all Android extractions are created equal. Mobile device security, user settings and encryption can all play a role in the types of acquisitions available and the evidentiary artifacts. Join Matt ...
    • Forensics
    Tides 1/2
    As an experienced digital forensic examiner who has testified in local, state, and federal court trials, it is vital to perfect the skill of testifying. When giving testimony, the examiner must become ...
    • Audit/Risk Management
    Atlantic 3
    A challenge for Security professionals is getting Management “on board” with security initiatives. Business managers and executives are hired for business expertise, not security expertise. However, w ...
    • Forensics
    Oleander A
    Digital forensic investigators generally struggle with the extraction of evidence from mobile devices when it comes to encrypted, third-party applications such as Signal, Wickr, and Telegram. These ap ...
    • Information Security
    Oleander B
    The ransomware ecosystem in the Dark Web has provided resources to a distributed threat posed by insiders. Recent threat intelligence indicates that the anonymity of the Dark Web and wide spread avail ...
    • Magnet Lab
    Atlantic 2
    This workshop will walk the participants through a Ransomware Investigations and give them a high level understanding of how to work this type of investigation."
    • Cellebrite Lab
    Atlantic 1
    A typical investigation comes with many challenges. Managing the investigation, and the evidence that comes with, shouldn’t be one of them. Streamline and simplify your investigative management, break ...
    • Investigations
    Oleander A
    As the type of evidence law enforcement has to manage becomes increasingly digital, it presents challenges in how to store, ingest, manage, analyze, report and collaborate on that evidence in an effic ...
    • Information Security
    Tides 1/2
    For over a decade the Department of Defense (DoD) has been trying to increase the cyber security capability of its contractors. That effort, now in its fifth iteration, has included mandated improveme ...
    • Forensics
    Oleander B
    Applying Machine Learning to Challenging Digital Forensics Problems Machine Learning offers great promise when applied to digital forensics. The question is how we can apply ML to digital forensics to ...
    • Cellebrite Lab
    Atlantic 1
    Learn how the Surete du Quebec has adapted and modified their investigative workflow, and significantly brought down their case back log. New technologies and techniques, plus thinking outside of the ...
    • Magnet Lab
    Atlantic 2
    With the recent integration capabilities between Magnet and Berla, investigators can now import a proprietary iVe file format into Axiom and analyze it alongside other device data. In this session we ...
    • Forensics
    Atlantic 3
    In this session, attendees will learn how to validate the proper operation of their write blockers. The presentation will show Windows, Mac and Linux methods for testing write blocking tools. This ses ...
    • Investigations
    Tides 1/2
    This session will highlight the common issues investigators face in the creation of the final report. Every expert committed in the forensics analysis process starts from being assigned to a case and ...
    • Forensics
    Oleander B
    As recent cases have shown, video evidence is becoming more and more prevalent. As such, understanding what is happening, the timing of events, and even the speed of a vehicle have increasingly relied ...
    • Forensics
    Oleander A
    Pick the scenario … you have to prove or disprove something and your proof is locked away in a phone. The phone is encrypted and locked when you power it on. What to do? Try an exploit? Brute force th ...
    • Cellebrite Lab
    Atlantic 1
    This session will focus on discussion of the ever-increasing use of geofence warrants by law enforcement. Law enforcement is seeing increased challenges when it comes to obtaining and using data for i ...
    • Magnet Lab
    Atlantic 2
    In today's world where the amount of digital data is exponentially growing and will undoubtedly always be witness to a crime, time to evidence is crucial for digital forensics professionals. From chat ...
    • Investigations
    Atlantic 3
    For encrypted data on iOS and other mobile devices, the path to data recovery often requires getting the device to turn on and boot natively. This can be a hardship for many devices that have accident ...

2022 Sponsors


QUOTE

  • Techno Myrtle Beach 2021 was a great return to face-to-face tradeshows. The transition back to in person events was handled very smoothly and overall the tradeshow was well run. Excited to attend more Techno shows in the other locations and to return to Myrtle Beach next year!
    Jack Raubach, Marketing Director, Forensic Computers
  • Thank you to everyone at the Techno Security & Digital Forensics Conference for organizing another epic event. The training and networking with the best of the best in this field was amazing, as always!! It was so good to see some familiar faces and meet so many new people too.
    Robert Smith, Investigator/Managing Partner, TechSmart Solutions LLC
  • Booth traffic was nearly nonstop at all times. Exactly what we had hoped for, with overwhelmingly positive feedback and high interest from federal, military, law enforcement and private sector cyber incident response firms.
    Amy Moles, CEO-Co-Founder, ArcPoint Forensics
  • Four days of intensive, focused cybersecurity and digital forensics training. Perfect for us "old-timers" looking for new products and vendors, as well as great refresher and new training. The curriculum is flexible, efficient, effective, and fun.
    David R. Lease, PhD, Vice President, Evolver, LLC
  • This conference is not only a wealth of information, but it is a great way to network with people and vendors from all over the world. Whether you are new to the digital security world or a seasoned veteran, this is the conference to attend.
    Justin Kutski, DEA/TFO, North Charleston Police Department
  • Techno Security and Digital Forensics Conference is consistently among the best in our industry, for sponsors and attendees alike. We always learn new things and have the opportunity to interact with our customers, and people we haven't met before. It's a great event.
    Bill Teel, President, Teel Technologies

Secure Your Booth Today!

Secure Your Booth Today!

Connect with professionals looking for the latest tools, training, networking, and solutions to industry challenges.

Learn More