San Antonio, TX

Sept. 30 – Oct. 2, 2019

Hyatt Regency Hill Country Resort and Spa

Hero Default

hero__default

Tuesday, October 1, 2019

The 2019 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorney’s/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
Tuesday, October 01, 2019
    • Keynote
    Independence 1-2
    The rise of AI-enabled cyberattacks is expected to cause an explosion of network penetrations, personal data thefts, and an epidemic-level spread of intelligent computer viruses as well as fake forens ...
    • Audit/Risk Management
    Independence 6
    In this session we will review data breach and cybersecurity essentials with a focus on risk management in contracts and vendor collaboration. Join us to review the current threat landscape, the key e ...
    • Investigations
    Independence 3
    The global impact resulting from the distribution of doctored digital photographs has reached an epidemic proportion. These digitally altered photos are distributed through social media, news outlets, ...
    • Information Security
    Independence 2
    Organizations face growing scrutiny and uncertainty over breach and cyber incident response. Regulators and public perception demand that corporations disclose before even understand the issue. Three ...
    • Forensics
    Independence 1
    In many cases, memory analysis can provide access to evidence you can’t obtain through “dead-box” forensics alone. Decrypted data, network activity, chat records, carved files, usernames and passwords ...
    • Sponsor Demo
    Independence 8
    Digital investigations are becoming increasingly complex due to the volumes of data to be processed, remote locations of user files in the cloud and diversity of file types. Intella cuts through these ...
    • Sponsor Demo
    Independence 7
    The demo highlights the new DittoX86, a bootable device that prepares a computer system for forensic imaging. This device eliminates the need to disassemble the computer to remove the hard drive. The ...
    • Forensics
    Independence 1
    This session will address Apple File System (APFS) unique characteristics, forensic imaging methods of APFS Macs, and items of consideration for APFS analysis on different forensic platforms.
    • Forensics
    Independence 6
    One of the biggest hurdles in computer forensic testimony, is figuring out how best to approach all the technical terms, procedures and evidence that needs to be explained and presented to a “non-tech ...
    • Information Security
    Independence 3
    You’ve probably heard the phrase, “knowledge is power”, and you understand what it means, but have you applied this to your current state of your cybersecurity defenses? This session is all about how ...
    • Sponsor Demo
    Independence 8
    Come see the unbelievable innovation built into Oxygen Forensic Detective. Oxygen Forensics will include in it's flagship application the ability for investigators to categorize human faces using it's ...
    • Sponsor Demo
    Independence 7
    Investigators are under increasing pressure to respond to challenges that the wide range of digital evidence sources and the diverse range of digital devices presents. In addition to laptops, computer ...
    • Investigations
    Independence 3
    Madoff had returns on his $65 billion Ponzi scheme averaging between 10 to 20% annually with a few thousand investors, Stanford’s $8 billion scheme had over 18,000 investors. Old school Ponzis just ca ...
    • Forensics
    Independence 1
    The CCleaner website targets users wanting to “Speed up and Optimize” their PCs. CCleaner can delete internet history, cookies, caches, and temporary files. Among the destruction of Internet artifacts ...
    • Audit/Risk Management
    Independence 2
    In today’s environment, every company looks to a security framework or certification to guide their progress. But with the number of options, requirements from customers and regulations can lead to ch ...
    • Sponsor Demo
    Independence 7
    NOTE: This demo is for Law Enforcement only. Proof of identification will be required to attend. Learn about the game-changing GrayKey device and its ability to go beyond backup files to get at file s ...
    • Information Security
    Independence 6
    This session will discuss the cyber security landscape, including current and emerging threats that attendees need to be aware of today and in the near future. The presenter will explore the role of t ...
    • Sponsor Demo
    Independence 8
    Join us for a demo on best practices for automatically discovering, storing, managing and changing credentials for privileged user and application accounts. You’ll learn: To secure, rotate and manage ...
    • Audit/Risk Management
    Independence 6
    The disciplines of Information Security and IT Audit are quite different and require different skill sets. However, they have many common goals and objectives. For example, both are tasked with ensuri ...
    • Investigations
    Independence 3
    The Dark Web is the breeding ground for malicious activity targeting public and private sectors. Threat actors looking to stay anonymous on the Dark Web slip up even with efforts to conceal their iden ...
    • Forensics
    Independence 1
    Fitbit, Apple Watch, and Samsung devices not only track the heart rate, but also the location, payment information, messages, and more. This session will discuss how can this data be extracted? What i ...
    • Information Security
    Independence 2
    PowerShell is a favorite tool of a range of threat actors. State actors, criminal gangs, and individual hackers have all incorporated PowerShell in highly effective “fileless” attacks, resulting in da ...
    • Sponsor Demo
    Independence 7
    To securely triage, acquire, investigate, and report the findings of your digital investigations, you must have the right combination of forensic hardware and software at your disposal. OpenText™ EnCa ...
    • Forensics
    Independence 1
    With the increasing usage of cryptocurrencies and blockchains in today's world, eDiscovery professionals need to understand how these emerging technologies should be considered and investigated as par ...
    • Audit/Risk Management
    Independence 6
    While both the GDPR and the CaCPA have caused panic and fear in most corporate circles with rigorous rules and serious consequences, an in-depth review of all aspects of an organization will create an ...
    • Information Security
    Independence 2
    It's a common belief that SysAdmins make great Infosec professionals. Many believe this is due to their wide knowledge of software and technologies. In reality, it's because THEY KNOW WHERE THE DEAD B ...
    • Forensics
    Independence 3
    This updated session is designed to help investigators understand what data may be available from UAVs and what types of questions the data can answer. Then, using data from real world events, the pre ...

2019 Sponsors

QUOTE

  • I met the most fantastic people from all over the world... from public and private arenas. I truly believe knowledge and knowledge sharing will be the key to our survival in this age of technology.
    Vicki Latham, Director of Communications and Development, 4theONE Foundation
  • As usual at a Techno Security & Digital Forensics Conference, we spoke with a great mix of serious prospects and current customers, thank you!
    John Graham, Director of Sales and Business Development, Atola Technology
  • This conference was very beneficial to my work education. The classes that were provided helped create ideas and solutions to use in my current role.
    Scott Broeker, IT Analyst II – Applications, Caterpillar
  • There was a wealth of information in the short 1-hour segments which allowed you to set your own path and avoid the sessions that were not relevant to you.
    Chris Klimosko, Digital Forensic Examiner, Edmonton Police Service
  • The attendees were quality and had a high level of engagement with sponsors. I was also pleasantly surprised at the number of international attendees. There were lots of folks from Sweden, Denmark, and Germany, all of whom stopped by the booth and were interested in our products (always nice!).
    Jack Raubach, Marketing Director, Forensic Computers

SECURE YOUR BOOTH TODAY!

SECURE YOUR BOOTH TODAY!

Connect with professionals looking for the latest tools, training, networking, and solutions to industry challenges.

LEARN MORE