Myrtle Beach, SC

May 31 - June 3, 2020

Marriott Resort at Grande Dunes

Hero Default

hero__default

Sunday, June 2, 2019

The 2019 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorney’s/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
Sunday, June 02, 2019
    • Forensics
    Atlantic 3
    This session will discuss several cases where the scope of the examination exceeded a simple DVR recovery. These types of advanced examinations require a significant understanding of the operation of ...
    • Forensics
    Tides 1/2
    For encrypted data on iOS and other mobile devices, the path to data recovery often requires getting the device to turn on and boot natively. This can be a hardship for many devices that have accident ...
    • Information Security
    Oleander A
    This session will cover encryption uses for day-to-day uses including application to email, browsing, mobile applications, and desktop applications. Several tools and techniques of encryption for day- ...
    • Investigations
    Oleander B
    Take your fraud cases beyond bank records, photocopies, and manual searching. In this review of two major fraud cases, learn how to leverage all aspects of digital evidence from mobile, to computers, ...
    • Magnet Forensics Lab
    Atlantic 2
    Hands-On Lab: Many of the new mobile applications that daily hit the App Store and Google Play contain features that can contain crucial evidence. Often, though, commercial forensic tools cannot keep ...
    • Cellebrite Lab
    Atlantic 1
    Hands On Lab: This demo will cover the various methods you can apply to acquire maximum data from the growing number of Apple and Android applications including those unsupported through traditional d ...
    • Cellebrite Lab
    Atlantic 1
    This session will discuss the fundamental framework of the 4th Amendment and provide information regarding the legal framework of searching and/or seizing digital data. There will be a focus on what c ...
    • Magnet Forensics Lab
    Atlantic 2
    Hands-On Lab: Learn about the game-changing GrayKey device and its ability to go beyond backup files to get at file system, process memory, and keychain data. Find out how these capabilities extend ac ...
    • Forensics
    Tides 1/2
    Previously, only large enterprises have chosen RAID as storage media, now they are also commonly found among small companies and domestic users (e.g. home NAS). Therefore, it increases the possibility ...
    • Forensics
    Oleander A
    In a landscape of digital change, cloud storage has come to be a constant. Spanning mobile devices, computers, the Internet of Things (IoT), and more, cloud storage is an important data source—and som ...
    • Audit/Risk Management
    Atlantic 3
    Law Enforcement, Government Agencies, and private sector critical infrastructure organizations have been encouraged to develop cyber intelligence capabilities as part of a well rounded information sec ...
    • Investigations
    Oleander B
    With the increasing usage of cryptocurrencies and blockchains in today's world, eDiscovery professionals need to understand how these emerging technologies should be considered and investigated as par ...
    • Forensics
    Oleander A
    During this lecture attendees will learn what type of software’s are used to access the Dark and Deep webs. They will learn what types of forensic artifacts can be found from these software’s. The pre ...
    • Information Security
    Atlantic 3
    By now, everyone is aware of the challenges we face combatting the imminent adversarial cyber threats. The solution, however, is complex and continues to be debated. In particular, the emphasis on clo ...
    • Magnet Forensics Lab
    Atlantic 2
    Hands-On Lab: As enterprises of all sizes continue to shift data into cloud-based content storage and collaboration platforms, the evidence of all kinds of threats both internal and external lives les ...
    • Cellebrite Lab
    Atlantic 1
    In 2017 the Norwalk Police Department was called to investigate the suspicious death of Kadeelyn Konstantino. As the investigation unfolded, investigators and prosecutors were able to locate evidence ...
    • Forensics
    Tides 1/2
    There can be hundreds of thousands of images on digital devices – where does an examiner start? Techniques based on file size, date created, and hash sets are a good start, but are insufficient for th ...
    • Investigations
    Oleander B
    This session will present an update of the Adolescents and Technology session from two years ago discussing the investigative challenges of adolescents and millennial's ESI. The panel will discuss the ...
    Moderator: Panelists:
    • Information Security
    Tides 1/2
    You’ve probably heard the phrase, “knowledge is power”, and you understand what it means, but have you applied this to your current state of your cybersecurity defenses? This session is all about how ...
    • Forensics
    Atlantic 3
    Forensic acquisition isn’t the known quantity that it was. With new storage devices like SSD’s and NVMe, new filesystems like APFS, and computers increasingly become locked down, the old techniques an ...
    • Cellebrite Lab
    Atlantic 1
    Learn about Cellebrite’s UFED Cloud Analyzer and how you can use it to recover forensically sound content, from more than 40 cloud applications and sources. We will describe how to export an account p ...
    • Magnet Forensics Lab
    Atlantic 2
    Hands-On Lab: Traditionally the domain of experienced forensic examiners, memory analysis can provide access to evidence you can’t obtain through “dead-box” forensics alone. In many cases, memory anal ...
    • Investigations
    Oleander A
    As an investigator, you never know when a high-profile investigation suddenly arises in your area. Time is always of the essence and public demand for a quick resolution can add a tremendous amount of ...
    • Forensics
    Oleander B
    USB forensic artifacts have been used by examiners for years; however, earlier this year, it was revealed with Windows 10 that a new event log, the Microsoft-Windows-Partition%4Diagnostics.evtx (MWPD) ...
    • Cellebrite Lab
    Atlantic 1
    This session will discuss admissibility issues involving digital data including authenticity, foundation, relevance, hearsay, the confrontation clause, and when expert testimony is required. We will p ...
    • Information Security
    Oleander A
    PowerShell is a favorite tool of a range of threat actors. State actors, criminal gangs, and individual hackers have all incorporated PowerShell in highly effective “fileless” attacks, resulting in da ...
    • Forensics
    Atlantic 3
    MicroSD cards became a true standard for portable storage devices. Due to high capacity and tiny size they are used now even for less conventional applications such as drones, video monitoring systems ...
    • Forensics
    Tides 1/2
    With 200M+ audience worldwide, Telegram Messenger is one of the most popular chat apps. Due to its increasing popularity it is met more and more often in digital investigations. During this session it ...
    • Magnet Forensics Lab
    Atlantic 2
    Hands-On Lab: Evidence stored in servers belonging to service providers like Facebook and Google can be crucial in a law enforcement investigation—and also among the hardest to acquire. Even when you ...

2019 Sponsors


QUOTE

  • Fantastic conference loaded with valuable information, powerful resources, and networking opportunities. A unique Cybersecurity and Digital Forensics unparalleled platform.
    Orit D. Gruber, Chief CLT, College of Staten Island
  • It was another great Techno event for us, we had fantastic booth traffic, thank you! As always, we saw a great mix of very important current customers and some good new prospects. We signed on for Techno Security & Digital Forensics Conference in California because we expect the usual excellent “Techno” results.
    John Graham, Director of Sales and Business Development, Atola Technology
  • I have participated in the Techno Security & Digital Forensics Conference since 2011 and highly recommend it to anyone in the DFIR community considering attending in the future. I experienced an immediate return on investment after the first day’s training sessions. The personal interaction and professional training available at the Techno Security & Digital Forensics Conference is simply the best in the industry.
    Will Baggett, DFIR Analyst, R. W. Grant Consulting
  • Thanks for a great event. I can't thank you enough for the quality of the event and staff. We generated more solid leads at this event than any other we have attended this year. Thanks for going the extra mile it's always a pleasure to work with you. Look forward to seeing you in San Antonio!
    Jason Roslewicz, Chief Executive Officer, Sumuri
  • The Techno Security & Digital Forensics is an incredible conference for everyone form security practitioners to forensics experts. The breadth and diversity of information shared at the conference gives all attendees an opportunity to leave the conference educated or at least exposed to a variety of security disciplines. I would recommend this conference to anyone from the curious to those seeking to further their education and knowledge base in the industry.
    Brian Bannister, Chief Information Security Officer, S.C. Department of Health and Environmental Con

SECURE YOUR BOOTH TODAY!

SECURE YOUR BOOTH TODAY!

Connect with professionals looking for the latest tools, training, networking, and solutions to industry challenges.

LEARN MORE