Skip to main content

Techno Security & Digital Forensics Conference

2023 Conference Program

Image

2023 Conference Program

The 2023 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
Monday, September 11, 2023
    • Investigations
    Ballroom G
     In an investigation, every piece of information is important. One thing can be that critical piece that can decide the whole case.Some things are physical and some can be visual. Sometimes it is some ...
    • Forensics
    Ballroom F
    Traditional accreditation standards applied to mainstream forensic science are perceived as not applicable to digital forensic practitioners. A report by the National Institute for Science and Technol ...
    • Cybersecurity
    Ballroom B
     An incomplete Zero Trust implementation leads to a false sense of security. A successful Zero Trust approach begins with continuous monitoring to understand evolving network devices, resources and co ...
    • Investigations
    Ballroom C
    Since the adoption of computers and mobile devices by civilian populations, law enforcement has relied more on the user-created data harbored within these devices to reveal information. Like all techn ...
    • Forensics
    Ballroom H
    This session will include a mock case study, going through how there are two sides to the coin. Using an iPhone and Android from a prosecution perspective and a defense perspective. Shows how the dele ...
    • Forensics
    Ballroom F
    This session will share how to recover data from SQLCipher encrypted databases. They are used by popular applications such as Signal, Wickr or Silent Circle. Being able to recover data means you are a ...
    • eDiscovery
    Ballroom H
    A panel of industry practitioners will discuss the benefit eDiscovery has to a variety of industries and institutions. The panel will explore eDiscovery processes and their convergence with areas such ...
    • Forensics
    Ballroom C
     Timestamps are a crucial aspect of forensic investigations, and the accurate interpretation of timestamps is essential in building an accurate timeline of events. However, the intricacies of Mac time ...
    • Investigations
    Ballroom B
    In today's ever-expanding digital landscape, Open Source Intelligence (OSINT) has emerged as a powerful tool for gaining knowledge and insights. However, it is crucial to recognize both the advantages ...
    • Cybersecurity
    Ballroom G
    Some of the benefits that this unique authentication approach solves is the break-one, break-all syndrome. It also provides for the symbiosis of secure cloud technology & immutable unique HW token. It ...
    • Sponsor Demo
    Ballroom A
    Join us for an interactive conference session focused on the powerful new Physical Analyzer Ultra and get a sneak peek into our roadmap. Come learn about the latest enhancements in our newest tool and ...
    • Forensics
    Ballroom C
    With today’s overwhelming volume of digital evidence, investigators are often forced to triage through terabytes of data. This process often results in longer lead times and unnecessary delays in work ...
    • Investigations
    Ballroom F
    iOS Forensics – The Good, The Bad, and The Ugly iOS devices are becoming more and more complicated to acquire due to enhanced security and continuous advances in operating systems. This session will d ...
    • Forensics
    Ballroom B
    YOU are a genius. YOU are the best forensic examiner or attorney, ever. YOU found the smoking gun evidence and are perfectly confident in the truth of what happened based on the facts of the investiga ...
    • Cybersecurity
    Ballroom H
    Artificial intelligence (AI) is rapidly changing our world, and it has the potential to improve our lives in many ways. AI can be used to automate tasks, make predictions, and generate creative conten ...
    • Sponsor Demo
    Ballroom A
    With Nashville Metro Police facing digital evidence processing backlogs ranging from weeks to several months, Detective Chad Gish knew change was needed if his Criminal Investigations Division forensi ...
    • Forensics
    Ballroom C
    How can we trust a file when we don't know the source? This session will show how we can begin to examine the video evidence we receive from the public or a victim in order to prove the content is una ...
    • Investigations
    Ballroom H
    This session will explore cloud and network-based evidence sources that are likely to be available in corporate insider threat investigations. Corporate and Law Enforcement investigators need to be aw ...
    • Forensics
    Ballroom G
    In light of the increasing involvement of digital devices in criminal activities and the exponential growth of data generated by such devices, it is imperative for investigators to explore advanced ap ...
    • Forensics
    Ballroom F
    Most examiners, no matter how skilled, dread testifying. Nonetheless, it is a necessary evil and the final work product for many cases. This session will cover how to properly prepare for and execute ...
    • Sponsor Demo
    Ballroom A
    In this session, we will take a deep dive into XRY Pro and our different techniques to ensure you are getting the most data out of your extractions. Here we will showcase Unisoc BFU extraction and wal ...
    • Forensics
    Ballroom B
    For encrypted data on iOS and other mobile devices, the path to data recovery often requires getting the device to turn on and boot natively. This can be a hardship for many devices that have accident ...
Tuesday, September 12, 2023
    • Keynote
    Ballroom B/C
    You mastered the forensic software and hardware. But, have your mastered the DFIR investigative mindset? To successfully build and close cases, you need to think like a detective and set into action y ...
    • Cybersecurity
    Ballroom H
    This session will be an open mic, where the audience can ask the presenter anything about AD security! Bring your best questions and get the inside scoop on everything AD security! We can discuss basi ...
    • Forensics
    Ballroom G
    There is an ever-increasing volume and variety of communications generated by businesses requiring new methodologies to tackle. It has the potential to create preservation, processing and review issue ...
    • Sponsor Demo
    Ballroom A
    Get ready for a wild ride as we take a deep dive into the latest Belkasoft X product! This session is packed with tricks and tips that will help you become a more effective investigator and save preci ...
    • Investigations
    Ballroom F
    This session will share a case study about a child by the name of Alani C. Alani was lured off of the gaming app Roblox and groomed starting at the age of 9. At the age of 11 Alani was taken by her ad ...
    • Cybersecurity
    Ballroom G
    During this session, attendees will discover three of the key obfuscation techniques attackers use to break down defenses and exploit systems through undetectable means, including impersonation, trust ...
    • eDiscovery
    Ballroom H
    Unfortunately, mass disasters happen. These might be "natural" or "manmade." In either scenario, electronic information will likely be the center of government investigations and litigation, both civi ...
    • Forensics
    Ballroom B
    You've completed your Digital Forensic Investigation. Months pass and you receive a subpoena to testify. What do I need to know? Who do I talk to? How do I prepare? The goal of this session it to prep ...
    • Forensics
    Ballroom C
    As digital forensic practitioners, it is crucial that we elevate the science by building standard operating procedures based on known best practices – because your training, experience and documentati ...
    • Sponsor Demo
    Ballroom A
    Mobile devices have become indispensable tools in the modern workplace, enabling more than just checking email. Employees now browse the web, access sensitive company data, and conduct daily business ...
    • Cybersecurity
    Ballroom G
    AI’s impact to the threat landscape and challenges, volumes of events, staffing shortages, expertise deficiencies, siloed security controls. Statistics will be shared from the recent Ponemon Institute ...
    • Cybersecurity
    Ballroom H
    Web 3 is here, it’s evolving around us, and it’s already changing the way our clients do business. As counselors and technologists, we must embrace new web frameworks, and prepare for new risks. In th ...
    • Forensics
    Ballroom C
    This session will share how to use open-source data to discover historical location information for vehicles that do not store GPS data or vehicles that you may not have physical access to. The sessio ...
    • Investigations
    Ballroom F
     The reality of modern computing is that much of the user data that investigators rely on is no longer stored on the device. With encryption already creating more challenges for forensic investigators ...
    • Forensics
    Ballroom B
    Threat hunting includes insider threats as well as outside intrusion. These vectors can leave behind evidence that will give a bigger picture of malicious activity. Evidence is not limited to IPS, IDS ...
    • Forensics
    Ballroom C
    While leveraging cloud service offerings is normal in other industries, for law enforcement – particularly in digital forensics – the cloud has been thought of as a frontier which only the bold few ha ...
    • eDiscovery
    Ballroom H
    eDiscovery and investigations are two critical components of legal process, yet they are often viewed as separate and distinct practices. In reality, these two areas are closely intertwined and unders ...
    • Cybersecurity
    Ballroom G
    This session will discuss industrial robot hacks & hacks against traditional IT & cloud assets. The presenter will share stories from the trenches—secrets & lies involving cybercriminals, nation-state ...
    • Investigations
    Ballroom F
    This panel discussion will share a case study of a cryptocurrency investigation. It will walk through the steps taken start the investigation to the point of recovering assets using both open source a ...
    • Sponsor Demo
    Ballroom A
    The proper handling of cell phones and other mobile devices as forensic evidence, from the point of seizure to the point of analysis, can be a challenging task. Different agencies may follow varying p ...
    • Forensics
    Ballroom B
    In digital forensics investigations, there is an increasing need to acquire and examine memory from servers and other computers. To fill this need, there have been recent updates to powerful open-sour ...
    • Forensics
    Ballroom F
    This session will delve into the world of RAM decoding and explore the significant advantages it offers in uncovering a potential goldmine of data that would otherwise be missed with a standard mobile ...
    • Forensics
    Ballroom C
    Today’s expert MUST have a working device to recovering usable data. What if the device is damaged? Do you risk sending it to a repair shop? Do you declare it unrecoverable? This session will cover mo ...
    • Cybersecurity
    Ballroom G
     A challenge for Security professionals is getting Management “on board” with security initiatives. Business managers and executives are hired for business expertise, not security expertise. However, ...
    • eDiscovery
    Ballroom H
    Working in the shadows of projects where clients are highly visible and with much of their reputation and future at stake can cause a significant amount of stress. There can be significant pressure wi ...
    • Sponsor Demo
    Ballroom A
    This demo session will highlight how Ciphertrace, a Mastercard company and Cellebrite partner together to tackle scams through the identification of crypto artifacts in an investigation.
Wednesday, September 13, 2023
    • Cybersecurity
    Ballroom H
    Federal agencies face growing challenges that no one understands better than acting security practitioners. But the public sector has a perspective on cybersecurity risk management that can benefit pr ...
    • Forensics
    Ballroom C
    Investigators are coping with an increasing number of CSA investigations on devices, data, and often fewer digital forensic examiners. To manage these converging challenges, we need to develop workflo ...
    • Forensics
    Ballroom G
    The Python programming language continues to be a mainstay within the digital forensics environment and enjoys a large user community that continues to supply libraries and frameworks that directly im ...
    • Forensics
    Ballroom F
    This session will dissect Snapchat data obtained from mobile phones extractions. The presenter will dive into obscure serialized format (protobufs) to uncover information needed to recover juicy conte ...
    • Investigations
    Ballroom B
    A Google Reverse Location Search (Geofence), is a multi-step search warrant and analysis process that can generate powerful leads. With an increasing number of detectives using geofence search warrant ...
    • Forensics
    Ballroom F
    UAS has proven to add in many challenges to our National Airspace safety, not to mention National Security implications. Remote ID is in effect as of April 21, 2021, and requires the broadcast of airc ...
    • Forensics
    Ballroom C
    During this session, the presenter will share first-hand how he as a successful forensic examiner has transitioned from a law enforcement career to a private sector career – sharing how he did it and ...
    • eDiscovery
    Ballroom G
    The emergence of emojis in text messages and collaboration platforms are posing all kinds of challenges. Yes, there is the technical approach on how to parse the funny faces into readable and searchab ...
    • Investigations
    Ballroom H
    This session will cover the importance of understanding the Dark web for investigators. It will discuss what investigators need to get on the Dark web and what possible value it is for OSINT collectio ...
    • Investigations
    Ballroom H
    Phones, emails, social media, and Google, all provide an abundance of information that can be used to enhance your prosecution. But, how do you present and use this information in court? This session ...
    • Cybersecurity
    Ballroom C
     The new remote work along with newer technologies and data growth has taken everyone by surprise and worst of all, most organizations can’t keep up and struggle to have ‘their house’ in order when it ...
    • Forensics
    Ballroom F
    This session will focus on the analysis of video, still image, and audio evidence involving firearms. The presenter will examine digital evidence examples from real cases where firearms were used or w ...
    • Investigations
    Ballroom G
     This past year, Censys uncovered a Russian ransomware group within its data by identifying suspicious hosts and leveraging historical analysis and technical pivots. The journey began with open source ...
    • Forensics
    Ballroom B
    Do you work cases containing large volumes of data? And do you want to benefit from good software and international knowledge how to handle this data? Learn more about Hansken: a platform that is spec ...
    • Forensics
    Ballroom G
     Digital evidence is volatile and fragile, so it's essential to preserve data as soon as possible following a loss event like a motor vehicle collision. With so many claims based upon alleged driver d ...
    • eDiscovery
    Ballroom F
    As more companies have moved to remote work or at least a hybrid remote/office model for day-to-day operations, employees are using new products for internal and external communications. The messages ...
    • Forensics
    Ballroom B
    The session will cover various aspects of Windows memory forensics, including the fundamentals of memory analysis, volatile data collection, and the tools commonly used. It will explore the importance ...
    • Forensics
    Ballroom C
    This session shares how Linux DFIR can help cybersecurity professionals. Attendees will learn of use cases, preparation, and response techniques so they can take away and prepare their own Linux envir ...
    • Forensics
    Ballroom H
    Email forensics has become a vital part of digital forensic investigations. This session will explore subtle marks that email clients leave on email messages as they interact with them and how such ma ...