San Antonio, TX

Sept. 30 – Oct. 2, 2019

Hyatt Regency Hill Country Resort and Spa

Hero Default

hero__default

2019 Conference Program

The 2019 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorney’s/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
Monday, September 30, 2019
    • Forensics
    Independence 3
    About two years ago there was a noticeable rise in “fake news websites” and “deceptive news articles,” many shared as “genuine” on social media. On the digital forensic front, was a corresponding incr ...
    • Information Security
    Independence 2
    Being a hacker no longer requires you to be sophisticated and technologically savvy. Today, all a person needs is a credit card and no ethics. With the rise of “script kiddies” and devices like a Wi-F ...
    • Forensics
    Independence 1
    The use of drones is rapidly growing and expanding into criminal enterprises and terrorist organizations. Correctional facilities and deployed militaries are now dealing with UAV’s on a regular basis ...
    • Audit/Risk Management
    Independence 6
    This interactive session will focus on the California Consumer Privacy Act going into effect 01/01/2020, and any changes that occurred since its unanimous passing. The presenter will discuss: Key part ...
    • Forensics
    Independence 1
    Mac investigations can be challenging for a number of reasons. Learn about the Apple File System (APFS) and the changes made as part of the update from HFS+, while discussing the best techniques for s ...
    • Investigations
    Independence 3
    This session will discuss the effects of the Darknet and its markets, specifically how fake IDs are easily accessible on the Darknet and its market places. This makes it possible for a terrorist to tr ...
    • Information Security
    Independence 2
    While this session is targeted at those facing the dilemma of understanding the need to secure their business but struggling with how to do so. In this session, the presenter will demonstrate the a co ...
    • Forensics
    Independence 1
    The Activity Timeline feature was released in Windows 10 version 1803. It tracks many types of activity including websites accessed, documents opened and edited, applications executed, and even detail ...
    • Information Security
    Independence 3
    There are numerous cybersecurity products, architectures, and cyber risk management best practices to help harden your enterprise perimeter, improve preventive and detective controls, and mature overa ...
    • Investigations
    Independence 6
    With people's habits in communications (interpersonal or public) range from text messages, group chats, social media etc., the evidence in investigations spans many data types. During this session, th ...
    • Information Security
    Independence 2
    During this session attendees will learn: New threats posed by intrusive android (Google), Apple, and Microsoft apps that enable app and platform developers, from around the world, to monitor, track, ...
    • Forensics
    Independence 3
    This session will discuss advanced phone forensic methods, including software hacking by utilizing system vulnerabilities and hardware level of hacking such as JTAG, ISP and chip-off. The session will ...
    • Audit/Risk Management
    Independence 6
    US Data Protection law is highly complex and fragmented. How did we get here, how does this structure affect operations and compliance, and what does the future hold? The session will discuss the pres ...
    • Information Security
    Independence 2
    Cyberattacks against our public and private institutions from nation-state and cyber-criminal threat actors are on the rise at alarming rates. With the ever-evolving threat landscape and the growing s ...
    • Forensics
    Independence 1
    Cyber threat intelligence and analytic is among one of the fastest growing interdisciplinary fields of research bringing together researchers from different fields such as digital forensics, political ...
Tuesday, October 01, 2019
    • Keynote
    Independence 1-2
    The rise of AI-enabled cyberattacks is expected to cause an explosion of network penetrations, personal data thefts, and an epidemic-level spread of intelligent computer viruses as well as fake forens ...
    • Sponsor Demo
    Independence 8
    Digital investigations are becoming increasingly complex due to the volumes of data to be processed, remote locations of user files in the cloud and diversity of file types. Intella cuts through these ...
    • Sponsor Demo
    Independence 7
    The demo highlights the new DittoX86, a bootable device that prepares a computer system for forensic imaging. This device eliminates the need to disassemble the computer to remove the hard drive. The ...
    • Audit/Risk Management
    Independence 6
    In this session we will review data breach and cybersecurity essentials with a focus on risk management in contracts and vendor collaboration. Join us to review the current threat landscape, the key e ...
    • Forensics
    Independence 1
    In many cases, memory analysis can provide access to evidence you can’t obtain through “dead-box” forensics alone. Decrypted data, network activity, chat records, carved files, usernames and passwords ...
    • Investigations
    Independence 3
    The global impact resulting from the distribution of doctored digital photographs has reached an epidemic proportion. These digitally altered photos are distributed through social media, news outlets, ...
    • Information Security
    Independence 2
    Organizations face growing scrutiny and uncertainty over breach and cyber incident response. Regulators and public perception demand that corporations disclose before even understand the issue. Three ...
    • Forensics
    Independence 6
    One of the biggest hurdles in computer forensic testimony, is figuring out how best to approach all the technical terms, procedures and evidence that needs to be explained and presented to a “non-tech ...
    • Forensics
    Independence 1
    This session will address Apple File System (APFS) unique characteristics, forensic imaging methods of APFS Macs, and items of consideration for APFS analysis on different forensic platforms.
    • Sponsor Demo
    Independence 7
    Investigators are under increasing pressure to respond to challenges that the wide range of digital evidence sources and the diverse range of digital devices presents. In addition to laptops, computer ...
    • Sponsor Demo
    Independence 8
    Come see the unbelievable innovation built into Oxygen Forensic Detective. Oxygen Forensics will include in it's flagship application the ability for investigators to categorize human faces using it's ...
    • Information Security
    Independence 3
    You’ve probably heard the phrase, “knowledge is power”, and you understand what it means, but have you applied this to your current state of your cybersecurity defenses? This session is all about how ...
    • Information Security
    Independence 6
    This session will discuss the cyber security landscape, including current and emerging threats that attendees need to be aware of today and in the near future. The presenter will explore the role of t ...
    • Sponsor Demo
    Independence 7
    NOTE: This demo is for Law Enforcement only. Proof of identification will be required to attend. Learn about the game-changing GrayKey device and its ability to go beyond backup files to get at file s ...
    • Sponsor Demo
    Independence 8
    Join us for a demo on best practices for automatically discovering, storing, managing and changing credentials for privileged user and application accounts. You’ll learn: To secure, rotate and manage ...
    • Investigations
    Independence 3
    Madoff had returns on his $65 billion Ponzi scheme averaging between 10 to 20% annually with a few thousand investors, Stanford’s $8 billion scheme had over 18,000 investors. Old school Ponzis just ca ...
    • Forensics
    Independence 1
    The CCleaner website targets users wanting to “Speed up and Optimize” their PCs. CCleaner can delete internet history, cookies, caches, and temporary files. Among the destruction of Internet artifacts ...
    • Audit/Risk Management
    Independence 2
    In today’s environment, every company looks to a security framework or certification to guide their progress. But with the number of options, requirements from customers and regulations can lead to ch ...
    • Audit/Risk Management
    Independence 6
    The disciplines of Information Security and IT Audit are quite different and require different skill sets. However, they have many common goals and objectives. For example, both are tasked with ensuri ...
    • Investigations
    Independence 3
    The Dark Web is the breeding ground for malicious activity targeting public and private sectors. Threat actors looking to stay anonymous on the Dark Web slip up even with efforts to conceal their iden ...
    • Forensics
    Independence 1
    Fitbit, Apple Watch, and Samsung devices not only track the heart rate, but also the location, payment information, messages, and more. This session will discuss how can this data be extracted? What i ...
    • Sponsor Demo
    Independence 7
    To securely triage, acquire, investigate, and report the findings of your digital investigations, you must have the right combination of forensic hardware and software at your disposal. OpenText™ EnCa ...
    • Information Security
    Independence 2
    PowerShell is a favorite tool of a range of threat actors. State actors, criminal gangs, and individual hackers have all incorporated PowerShell in highly effective “fileless” attacks, resulting in da ...
    • Information Security
    Independence 2
    It's a common belief that SysAdmins make great Infosec professionals. Many believe this is due to their wide knowledge of software and technologies. In reality, it's because THEY KNOW WHERE THE DEAD B ...
    • Forensics
    Independence 3
    This updated session is designed to help investigators understand what data may be available from UAVs and what types of questions the data can answer. Then, using data from real world events, the pre ...
    • Audit/Risk Management
    Independence 6
    While both the GDPR and the CaCPA have caused panic and fear in most corporate circles with rigorous rules and serious consequences, an in-depth review of all aspects of an organization will create an ...
    • Forensics
    Independence 1
    With the increasing usage of cryptocurrencies and blockchains in today's world, eDiscovery professionals need to understand how these emerging technologies should be considered and investigated as par ...
Wednesday, October 02, 2019
    • Investigations
    Independence 1
    The Dark Web has changed dramatically in the past 18 months with the number of sites and services decreasing significantly. But illegal activity via Internet connected systems continues to rise. This ...
    • Forensics
    Independence 1
    With the rapid development and adoption of mobile apps and the sheer volume of online communications, law enforcement agencies often play catch up when extracting app data and reporting on it in a rel ...
    • Sponsor Demo
    Independence 7
    Using multiple analysis techniques can be beneficial in any type of investigation. Learn how to correlate different artifacts with each other and see the connections that occur between data across mul ...
    • Sponsor Demo
    Independence 8
    The Dark Web is intentionally hidden and anonymous where users can hide their identity and network traffic. It requires a special browser to access called The Onion Router (TOR) and it also requires k ...
    • Information Security
    Independence 2
    This session will discuss proven methods of bypassing popular physical security controls and employees, using only publicly available tools and social engineering. Attendees will hear war stories from ...
    • Audit/Risk Management
    Independence 6
    Given the many factors inside an organization it is becoming increasingly difficult to pinpoint not only where attacks are coming from, but what has been impacted (i.e what data or resources were impa ...
    • Investigations
    Independence 3
    Today’s online investigative research is more than a simple Google search or a profile check on social media. We have an extraordinary amount of information floating throughout the internet, and linge ...
    • Forensics
    Independence 3
    This session will cover the most popular software methods of modern mobile device acquisition. The presenter will share how you can navigate through the file system of obtained dumps, what types of ev ...
    • Forensics
    Independence 1
    This session will highlight important strategies, tools, techniques and planning to consider for your hunting engagements. We will highlight realities of the relationship between incident response, cy ...
    • Information Security
    Independence 6
    This session will share a case study covering how a partnership developed a cloud management platform that inherently provides security orchestration and automation to meet selected security baselines ...
    • Sponsor Demo
    Independence 7
    Blacklight is known for its ability in capturing artifacts from Mac computers, but it has significant capability in capturing Windows artifacts as well. Blacklight can be your everyday forensic analys ...
    • Sponsor Demo
    Independence 8
    This demo will take attendees through RECON LAB, the only full forensic suite designed natively on the Mac platform to harness the power of a Mac. Access over 270 timestamps and all Apple Extended Met ...
    • Information Security
    Independence 2
    Between October 2009 through the end of 2017, 164 million patient records were affected in 1,138 health data breaches. Most research indicates that users account for roughly 25 percent of breaches whe ...
    • Investigations
    Independence 6
    Data volumes are exploding as are potential data sources requiring analysis for investigations. Wading through such volumes can take time that corporations don't have and have unnecessarily high costs ...
    • Forensics
    Independence 3
    Establishing a Statement of Work (SOW) to manage the engagement and delivery outcomes is a non-negotiable. You owe it to yourself and your customer to establish and document mutual agreement on the wo ...
    • Forensics
    Independence 1
    This session will delve into locating and extracting social media artifacts on mobile phones using available forensics tools, conducive to an investigation. Taking this knowledge, the session will the ...
    • Investigations
    Independence 6
    As infrastructure transitions to a cloud and container paradigm, it poses new challenges for intrusion detection, threat investigation and hunting, and compliance & audit. The challenges stem from fun ...
    • Forensics
    Independence 1
    Jurors are becoming more skeptical of forensic evidence and the authenticity of what is being presented in court. In the era of cyber warfare and technical innovation, digital media can be easily mani ...
    • Investigations
    Independence 3
    Join Stephen Arnold for a deeper discussion about the Dark Web and recent updates.

2019 Sponsors

QUOTE

  • I met the most fantastic people from all over the world... from public and private arenas. I truly believe knowledge and knowledge sharing will be the key to our survival in this age of technology.
    Vicki Latham, Director of Communications and Development, 4theONE Foundation
  • As usual at a Techno Security & Digital Forensics Conference, we spoke with a great mix of serious prospects and current customers, thank you!
    John Graham, Director of Sales and Business Development, Atola Technology
  • This conference was very beneficial to my work education. The classes that were provided helped create ideas and solutions to use in my current role.
    Scott Broeker, IT Analyst II – Applications, Caterpillar
  • There was a wealth of information in the short 1-hour segments which allowed you to set your own path and avoid the sessions that were not relevant to you.
    Chris Klimosko, Digital Forensic Examiner, Edmonton Police Service
  • The attendees were quality and had a high level of engagement with sponsors. I was also pleasantly surprised at the number of international attendees. There were lots of folks from Sweden, Denmark, and Germany, all of whom stopped by the booth and were interested in our products (always nice!).
    Jack Raubach, Marketing Director, Forensic Computers

SECURE YOUR BOOTH TODAY!

SECURE YOUR BOOTH TODAY!

Connect with professionals looking for the latest tools, training, networking, and solutions to industry challenges.

LEARN MORE