Skip to main content

Techno Security & Digital Forensics Conference

Monday, September 11, 2023

Image

Monday, September 11, 2023

The 2023 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
12:00 PM
    • Investigations
    Ballroom G
     In an investigation, every piece of information is important. One thing can be that critical piece that can decide the whole case.Some things are physical and some can be visual. Sometimes it is some ...
    • Forensics
    Ballroom F
    Traditional accreditation standards applied to mainstream forensic science are perceived as not applicable to digital forensic practitioners. A report by the National Institute for Science and Technol ...
    • Cybersecurity
    Ballroom B
     An incomplete Zero Trust implementation leads to a false sense of security. A successful Zero Trust approach begins with continuous monitoring to understand evolving network devices, resources and co ...
    • Investigations
    Ballroom C
    Since the adoption of computers and mobile devices by civilian populations, law enforcement has relied more on the user-created data harbored within these devices to reveal information. Like all techn ...
    • Forensics
    Ballroom H
    This session will include a mock case study, going through how there are two sides to the coin. Using an iPhone and Android from a prosecution perspective and a defense perspective. Shows how the dele ...
1:15 PM
    • Forensics
    Ballroom F
    This session will share how to recover data from SQLCipher encrypted databases. They are used by popular applications such as Signal, Wickr or Silent Circle. Being able to recover data means you are a ...
    • eDiscovery
    Ballroom H
    A panel of industry practitioners will discuss the benefit eDiscovery has to a variety of industries and institutions. The panel will explore eDiscovery processes and their convergence with areas such ...
    • Forensics
    Ballroom C
     Timestamps are a crucial aspect of forensic investigations, and the accurate interpretation of timestamps is essential in building an accurate timeline of events. However, the intricacies of Mac time ...
    • Investigations
    Ballroom B
    In today's ever-expanding digital landscape, Open Source Intelligence (OSINT) has emerged as a powerful tool for gaining knowledge and insights. However, it is crucial to recognize both the advantages ...
    • Cybersecurity
    Ballroom G
    Some of the benefits that this unique authentication approach solves is the break-one, break-all syndrome. It also provides for the symbiosis of secure cloud technology & immutable unique HW token. It ...
    • Sponsor Demo
    Ballroom A
    Join us for an interactive conference session focused on the powerful new Physical Analyzer Ultra and get a sneak peek into our roadmap. Come learn about the latest enhancements in our newest tool and ...
2:45 PM
    • Forensics
    Ballroom C
    With today’s overwhelming volume of digital evidence, investigators are often forced to triage through terabytes of data. This process often results in longer lead times and unnecessary delays in work ...
    • Investigations
    Ballroom F
    iOS Forensics – The Good, The Bad, and The Ugly iOS devices are becoming more and more complicated to acquire due to enhanced security and continuous advances in operating systems. This session will d ...
    • Forensics
    Ballroom B
    YOU are a genius. YOU are the best forensic examiner or attorney, ever. YOU found the smoking gun evidence and are perfectly confident in the truth of what happened based on the facts of the investiga ...
    • Cybersecurity
    Ballroom H
    Artificial intelligence (AI) is rapidly changing our world, and it has the potential to improve our lives in many ways. AI can be used to automate tasks, make predictions, and generate creative conten ...
    • Sponsor Demo
    Ballroom A
    With Nashville Metro Police facing digital evidence processing backlogs ranging from weeks to several months, Detective Chad Gish knew change was needed if his Criminal Investigations Division forensi ...
4:00 PM
    • Forensics
    Ballroom C
    How can we trust a file when we don't know the source? This session will show how we can begin to examine the video evidence we receive from the public or a victim in order to prove the content is una ...
    • Investigations
    Ballroom H
    This session will explore cloud and network-based evidence sources that are likely to be available in corporate insider threat investigations. Corporate and Law Enforcement investigators need to be aw ...
    • Forensics
    Ballroom G
    In light of the increasing involvement of digital devices in criminal activities and the exponential growth of data generated by such devices, it is imperative for investigators to explore advanced ap ...
    • Forensics
    Ballroom F
    Most examiners, no matter how skilled, dread testifying. Nonetheless, it is a necessary evil and the final work product for many cases. This session will cover how to properly prepare for and execute ...
    • Sponsor Demo
    Ballroom A
    In this session, we will take a deep dive into XRY Pro and our different techniques to ensure you are getting the most data out of your extractions. Here we will showcase Unisoc BFU extraction and wal ...
    • Forensics
    Ballroom B
    For encrypted data on iOS and other mobile devices, the path to data recovery often requires getting the device to turn on and boot natively. This can be a hardship for many devices that have accident ...