San Antonio, TX

Sept. 30 – Oct. 2, 2019

Hyatt Regency Hill Country Resort and Spa

Hero Default

hero__default

Monday, September 30, 2019

The 2019 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorney’s/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
Monday, September 30, 2019
    • Forensics
    Independence 3
    About two years ago there was a noticeable rise in “fake news websites” and “deceptive news articles,” many shared as “genuine” on social media. On the digital forensic front, was a corresponding incr ...
    • Information Security
    Independence 2
    Being a hacker no longer requires you to be sophisticated and technologically savvy. Today, all a person needs is a credit card and no ethics. With the rise of “script kiddies” and devices like a Wi-F ...
    • Forensics
    Independence 1
    The use of drones is rapidly growing and expanding into criminal enterprises and terrorist organizations. Correctional facilities and deployed militaries are now dealing with UAV’s on a regular basis ...
    • Audit/Risk Management
    Independence 6
    This interactive session will focus on the California Consumer Privacy Act going into effect 01/01/2020, and any changes that occurred since its unanimous passing. The presenter will discuss: Key part ...
    • Information Security
    Independence 2
    While this session is targeted at those facing the dilemma of understanding the need to secure their business but struggling with how to do so. In this session, the presenter will demonstrate the a co ...
    • Investigations
    Independence 3
    This session will discuss the effects of the Darknet and its markets, specifically how fake IDs are easily accessible on the Darknet and its market places. This makes it possible for a terrorist to tr ...
    • Forensics
    Independence 1
    Mac investigations can be challenging for a number of reasons. Learn about the Apple File System (APFS) and the changes made as part of the update from HFS+, while discussing the best techniques for s ...
    • Forensics
    Independence 1
    The Activity Timeline feature was released in Windows 10 version 1803. It tracks many types of activity including websites accessed, documents opened and edited, applications executed, and even detail ...
    • Information Security
    Independence 3
    There are numerous cybersecurity products, architectures, and cyber risk management best practices to help harden your enterprise perimeter, improve preventive and detective controls, and mature overa ...
    • Investigations
    Independence 6
    With people's habits in communications (interpersonal or public) range from text messages, group chats, social media etc., the evidence in investigations spans many data types. During this session, th ...
    • Information Security
    Independence 2
    During this session attendees will learn: New threats posed by intrusive android (Google), Apple, and Microsoft apps that enable app and platform developers, from around the world, to monitor, track, ...
    • Forensics
    Independence 1
    Cyber threat intelligence and analytic is among one of the fastest growing interdisciplinary fields of research bringing together researchers from different fields such as digital forensics, political ...
    • Information Security
    Independence 2
    Cyberattacks against our public and private institutions from nation-state and cyber-criminal threat actors are on the rise at alarming rates. With the ever-evolving threat landscape and the growing s ...
    • Audit/Risk Management
    Independence 6
    US Data Protection law is highly complex and fragmented. How did we get here, how does this structure affect operations and compliance, and what does the future hold? The session will discuss the pres ...
    • Forensics
    Independence 3
    This session will discuss advanced phone forensic methods, including software hacking by utilizing system vulnerabilities and hardware level of hacking such as JTAG, ISP and chip-off. The session will ...

2019 Sponsors

QUOTE

  • I met the most fantastic people from all over the world... from public and private arenas. I truly believe knowledge and knowledge sharing will be the key to our survival in this age of technology.
    Vicki Latham, Director of Communications and Development, 4theONE Foundation
  • As usual at a Techno Security & Digital Forensics Conference, we spoke with a great mix of serious prospects and current customers, thank you!
    John Graham, Director of Sales and Business Development, Atola Technology
  • This conference was very beneficial to my work education. The classes that were provided helped create ideas and solutions to use in my current role.
    Scott Broeker, IT Analyst II – Applications, Caterpillar
  • There was a wealth of information in the short 1-hour segments which allowed you to set your own path and avoid the sessions that were not relevant to you.
    Chris Klimosko, Digital Forensic Examiner, Edmonton Police Service
  • The attendees were quality and had a high level of engagement with sponsors. I was also pleasantly surprised at the number of international attendees. There were lots of folks from Sweden, Denmark, and Germany, all of whom stopped by the booth and were interested in our products (always nice!).
    Jack Raubach, Marketing Director, Forensic Computers

SECURE YOUR BOOTH TODAY!

SECURE YOUR BOOTH TODAY!

Connect with professionals looking for the latest tools, training, networking, and solutions to industry challenges.

LEARN MORE