San Antonio, TX

Sept. 30 – Oct. 2, 2019

Hyatt Regency Hill Country Resort and Spa

Hero Default

hero__default

Wednesday, October 2, 2019

The 2019 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorney’s/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
Wednesday, October 02, 2019
    • Investigations
    Independence 1
    The Dark Web has changed dramatically in the past 18 months with the number of sites and services decreasing significantly. But illegal activity via Internet connected systems continues to rise. This ...
    • Information Security
    Independence 2
    This session will discuss proven methods of bypassing popular physical security controls and employees, using only publicly available tools and social engineering. Attendees will hear war stories from ...
    • Audit/Risk Management
    Independence 6
    Given the many factors inside an organization it is becoming increasingly difficult to pinpoint not only where attacks are coming from, but what has been impacted (i.e what data or resources were impa ...
    • Investigations
    Independence 3
    Today’s online investigative research is more than a simple Google search or a profile check on social media. We have an extraordinary amount of information floating throughout the internet, and linge ...
    • Sponsor Demo
    Independence 7
    Using multiple analysis techniques can be beneficial in any type of investigation. Learn how to correlate different artifacts with each other and see the connections that occur between data across mul ...
    • Forensics
    Independence 1
    With the rapid development and adoption of mobile apps and the sheer volume of online communications, law enforcement agencies often play catch up when extracting app data and reporting on it in a rel ...
    • Sponsor Demo
    Independence 8
    The Dark Web is intentionally hidden and anonymous where users can hide their identity and network traffic. It requires a special browser to access called The Onion Router (TOR) and it also requires k ...
    • Forensics
    Independence 1
    This session will highlight important strategies, tools, techniques and planning to consider for your hunting engagements. We will highlight realities of the relationship between incident response, cy ...
    • Forensics
    Independence 3
    This session will cover the most popular software methods of modern mobile device acquisition. The presenter will share how you can navigate through the file system of obtained dumps, what types of ev ...
    • Information Security
    Independence 6
    This session will share a case study covering how a partnership developed a cloud management platform that inherently provides security orchestration and automation to meet selected security baselines ...
    • Sponsor Demo
    Independence 7
    Blacklight is known for its ability in capturing artifacts from Mac computers, but it has significant capability in capturing Windows artifacts as well. Blacklight can be your everyday forensic analys ...
    • Investigations
    Independence 6
    Data volumes are exploding as are potential data sources requiring analysis for investigations. Wading through such volumes can take time that corporations don't have and have unnecessarily high costs ...
    • Information Security
    Independence 2
    Between October 2009 through the end of 2017, 164 million patient records were affected in 1,138 health data breaches. Most research indicates that users account for roughly 25 percent of breaches whe ...
    • Forensics
    Independence 3
    Establishing a Statement of Work (SOW) to manage the engagement and delivery outcomes is a non-negotiable. You owe it to yourself and your customer to establish and document mutual agreement on the wo ...
    • Forensics
    Independence 1
    This session will delve into locating and extracting social media artifacts on mobile phones using available forensics tools, conducive to an investigation. Taking this knowledge, the session will the ...
    • Sponsor Demo
    Independence 8
    This demo will take attendees through RECON LAB, the only full forensic suite designed natively on the Mac platform to harness the power of a Mac. Access over 270 timestamps and all Apple Extended Met ...
    • Forensics
    Independence 1
    Jurors are becoming more skeptical of forensic evidence and the authenticity of what is being presented in court. In the era of cyber warfare and technical innovation, digital media can be easily mani ...
    • Investigations
    Independence 6
    As infrastructure transitions to a cloud and container paradigm, it poses new challenges for intrusion detection, threat investigation and hunting, and compliance & audit. The challenges stem from fun ...
    • Investigations
    Independence 3
    Join Stephen Arnold for a deeper discussion about the Dark Web and recent updates.

2019 Sponsors

QUOTE

  • I met the most fantastic people from all over the world... from public and private arenas. I truly believe knowledge and knowledge sharing will be the key to our survival in this age of technology.
    Vicki Latham, Director of Communications and Development, 4theONE Foundation
  • As usual at a Techno Security & Digital Forensics Conference, we spoke with a great mix of serious prospects and current customers, thank you!
    John Graham, Director of Sales and Business Development, Atola Technology
  • This conference was very beneficial to my work education. The classes that were provided helped create ideas and solutions to use in my current role.
    Scott Broeker, IT Analyst II – Applications, Caterpillar
  • There was a wealth of information in the short 1-hour segments which allowed you to set your own path and avoid the sessions that were not relevant to you.
    Chris Klimosko, Digital Forensic Examiner, Edmonton Police Service
  • The attendees were quality and had a high level of engagement with sponsors. I was also pleasantly surprised at the number of international attendees. There were lots of folks from Sweden, Denmark, and Germany, all of whom stopped by the booth and were interested in our products (always nice!).
    Jack Raubach, Marketing Director, Forensic Computers

SECURE YOUR BOOTH TODAY!

SECURE YOUR BOOTH TODAY!

Connect with professionals looking for the latest tools, training, networking, and solutions to industry challenges.

LEARN MORE