Myrtle Beach, SC

May 31 - June 3, 2020

Marriott Resort at Grande Dunes

Hero Default

hero__default

Monday, June 3, 2019

The 2019 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorney’s/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
Monday, June 03, 2019
    • Keynote
    Oleander A/B
    Cybercriminals are taking hacking to the next level, by leveraging ever-more-sophisticated tool-sets and increasingly mature techniques. Ransomware, banking trojans, and cryptojacking are constantly e ...
    • Sponsor Demo
    Heron
    This workshop session will explain how attendees can use Oxygen Forensics’ free and innovative 64-bit JetEngine utility to quickly parse large volumes of data and leverage advanced analytical tools to ...
    • Cellebrite Lab
    Atlantic 1
    When time is of the essence and you are tasked with reviewing evidence that you suspect resides on a specific app or in a cloud source, learn how to perform a full-file system selective extraction. Un ...
    • Magnet Forensics Lab
    Atlantic 2
    Hands-On Lab: As enterprises of all sizes continue to shift data into cloud-based content storage and collaboration platforms, the evidence of all kinds of threats both internal and external lives les ...
    • Sponsor Demo
    Osprey
    An introduction to a CJIS compliant cloud based Pen Register solution for Law Enforcement
    • Information Security
    Tides 1/2
    More and more enterprises are using Big Data for business applications and analytics. Security analytics applications also use Big Data.Placing so much data in on a shared ecosystem certainly has its ...
    • Investigations
    Oleander B
    Every day, more than 115 people in the United States die after overdosing on opioids. The misuse of and addiction to opioids—including prescription pain relievers, heroin, and synthetic opioids such a ...
    • Forensics
    Oleander A
    This session is designed to help investigators understand what data may be available from UAVs and what types of questions the data can answer. Then, using data from real world events, we will guide a ...
    • Audit/Risk Management
    Atlantic 3
    During this session, attendees will understand: How to define “reasonable” in a way that makes sense to business, judges, and regulators; How to design and run a risk assessment that is meaningful to ...
    • Investigations
    Tides 1/2
    This session will provide an in-depth look into cellular networks and call detail records (CDR’s) from any cell phone provider. The presenters will share how to understand CDRs, how to use CDRs and wh ...
    • Forensics
    Oleander A
    Chromebooks have been taking over the classroom and are an up and coming issue for forensic examiners. This session will delve into our research into the forensics of the Chrome OS and Chromebooks. Th ...
    • Information Security
    Oleander B
    This session will explore an abridged history of hackers, hooligans, and heists. It will also examine new ways of approaching cybersecurity to mitigate nefarious acts by focusing on actual security ef ...
    • Sponsor Demo
    Heron
    With the latest versions of Belkasoft Evidence Center (BEC), you can analyze mobile and computer devices, volatile memory, download and investigate cloud data, conduct remote forensics and incident re ...
    • Sponsor Demo
    Osprey
    T3K, Law Enforcement's Global Partner presenting its AI solutions including; LEAP: Law Enforcement Analytic Product (triaging and analytical tool applicable for border control, anti-terrorism and anti ...
    • Magnet Forensics Lab
    Atlantic 2
    Hands-On Lab: Evidence stored in servers belonging to service providers like Facebook and Google can be crucial in a law enforcement investigation—and also among the hardest to acquire. Even when you ...
    • Cellebrite Lab
    Atlantic 1
    The instructor, Clark Walton, a forensic examiner and licensed attorney, will walk through various technical scenarios of forensic investigations specifically as they relate to the theft of confidenti ...
    • Cellebrite Lab
    Atlantic 1
    Moderated by Buddy Tidwell. Please join us for an open panel discussion with DME Forensics, iNPUT-ACE and Cellebrite to discuss how CCTV and Home surveillance systems are assisting law enforcement wit ...
    • Sponsor Demo
    Osprey
    One of the big challenges for investigators today is to quickly sift through and make sense of the tremendous volumes of data found on mobile devices. Having tools capable of identifying vital evident ...
    • Magnet Forensics Lab
    Atlantic 2
    Hands-On Lab: Learn about the game-changing GrayKey device and its ability to go beyond backup files to get at file system, process memory, and keychain data. Find out how these capabilities extend ac ...
    • Sponsor Demo
    Heron
    The demo highlights the new DittoX86, a bootable device that prepares a computer system for forensic imaging. This device eliminates the need to disassemble the computer to remove the hard drive. We w ...
    • Forensics
    Atlantic 3
    The evolution of the digital forensic and investigations job market over the next decade will usher in a new and hyper-focused valuation of functional domain and software certification. DFIR professio ...
    • Investigations
    Tides 1/2
    In this day and age, no matter where an individual goes, new raw data is being created and collected. A cell phone can be tracked through its Wi-Fi connection as one walks through the mall to alert st ...
    • Forensics
    Oleander A
    This session will delve into locating and extracting social media artifacts on mobile phones using available forensics tools, conducive to an investigation. Taking this knowledge, the session will the ...
    • Information Security
    Oleander B
    The web is a powerful tool for criminal investigators who use it to gather information about criminals, and learn about their activities, interests and motivations. However, online investigators need ...
    • Forensics
    Oleander B
    Current attack vectors indicate that nefarious attacks are increasingly targeting IoT wireless infrastructures throughout Cyber and Physical networks. Yet most organizations lack a defense-in-depth st ...
    • Audit/Risk Management
    Atlantic 3
    The NIST Risk Management Framework (RMF) is a 7-step process that you can use to architect and engineer a security program for your IT systems and data. Though not prescriptive, the RMF suggests best ...
    • Information Security
    Oleander A
    This session will share a case study demonstrating the dangers of sending personal and financial information via email and how criminals could exploit it, and how they in fact did it. During this sess ...
    • Forensics
    Tides 1/2
    A modern-day vehicle typically has 50-70 electronic control units (ECUs) or computers running on five different networks. User and vehicle data can be stored on these ECUs that can help investigators ...
    • Magnet Forensics Lab
    Atlantic 2
    Hands-On Lab: Traditionally the domain of experienced forensic examiners, memory analysis can provide access to evidence you can’t obtain through “dead-box” forensics alone. In many cases, memory anal ...
    • Sponsor Demo
    Heron
    Investigators are under increasing pressure to respond to challenges that the wide range of digital evidence sources and the diverse range of digital devices presents. In addition to laptops, computer ...
    • Cellebrite Lab
    Atlantic 1
    Come see the power of Cellebrite as we unveil our on-premise iOS and Advanced Android solution. As part of our Digital Intelligence Platform, we will show how you can unlock and extract iOS data to ac ...
    • Sponsor Demo
    Osprey
    Investigating iOS devices has been a challenge for the mobile forensics industry for quite some time. Apple has continuously restricted or limited access to their devices over the past few years claim ...
    • Cellebrite Lab
    Atlantic 1
    Hands On Lab: From accessing data from damaged and non-functional Android devices, to extracting data from Android devices that are encrypted and locked, Qualcomm’s Emergency Download Mode empowers ex ...
    • Magnet Forensics Lab
    Atlantic 2
    Hands-On Lab: Many of the new mobile applications that daily hit the App Store and Google Play contain features that can contain crucial evidence. Often, though, commercial forensic tools cannot keep ...
    • Forensics
    Oleander B
    This session will address Privacy features built into Apple's newest Operating System, identify unique OS artifacts, and discuss acquisitions/system configuration of Mac OS Mojave systems.
    • Information Security
    Tides 1/2
    Cyber Threat Intelligence (CTI) can be invaluable to incident response, Security Operations Center (SOC) activities, and general information security. However, there is often a disconnect between CTI ...
    • Forensics
    Oleander A
    Virtually every electronic in our lives can be connected to the Internet. What are the security risks of having so many devices connected? This session will identify vulnerabilities your company may n ...
    • Investigations
    Atlantic 3
    This session will share how to decipher if a case involving mobile or other digital devices require a full forensic examination and how to determine if the information at hand can get us to a successf ...

2019 Sponsors


QUOTE

  • Fantastic conference loaded with valuable information, powerful resources, and networking opportunities. A unique Cybersecurity and Digital Forensics unparalleled platform.
    Orit D. Gruber, Chief CLT, College of Staten Island
  • It was another great Techno event for us, we had fantastic booth traffic, thank you! As always, we saw a great mix of very important current customers and some good new prospects. We signed on for Techno Security & Digital Forensics Conference in California because we expect the usual excellent “Techno” results.
    John Graham, Director of Sales and Business Development, Atola Technology
  • I have participated in the Techno Security & Digital Forensics Conference since 2011 and highly recommend it to anyone in the DFIR community considering attending in the future. I experienced an immediate return on investment after the first day’s training sessions. The personal interaction and professional training available at the Techno Security & Digital Forensics Conference is simply the best in the industry.
    Will Baggett, DFIR Analyst, R. W. Grant Consulting
  • Thanks for a great event. I can't thank you enough for the quality of the event and staff. We generated more solid leads at this event than any other we have attended this year. Thanks for going the extra mile it's always a pleasure to work with you. Look forward to seeing you in San Antonio!
    Jason Roslewicz, Chief Executive Officer, Sumuri
  • The Techno Security & Digital Forensics is an incredible conference for everyone form security practitioners to forensics experts. The breadth and diversity of information shared at the conference gives all attendees an opportunity to leave the conference educated or at least exposed to a variety of security disciplines. I would recommend this conference to anyone from the curious to those seeking to further their education and knowledge base in the industry.
    Brian Bannister, Chief Information Security Officer, S.C. Department of Health and Environmental Con

SECURE YOUR BOOTH TODAY!

SECURE YOUR BOOTH TODAY!

Connect with professionals looking for the latest tools, training, networking, and solutions to industry challenges.

LEARN MORE