Skip to main content

Techno Security & Digital Forensics Conference

Tuesday, September 12, 2023

Image

Tuesday, September 12, 2023

The 2023 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
8:30 AM
    • Keynote
    Ballroom B/C
    You mastered the forensic software and hardware. But, have your mastered the DFIR investigative mindset? To successfully build and close cases, you need to think like a detective and set into action y ...
9:45 AM
    • Cybersecurity
    Ballroom H
    This session will be an open mic, where the audience can ask the presenter anything about AD security! Bring your best questions and get the inside scoop on everything AD security! We can discuss basi ...
    • Forensics
    Ballroom G
    There is an ever-increasing volume and variety of communications generated by businesses requiring new methodologies to tackle. It has the potential to create preservation, processing and review issue ...
    • Sponsor Demo
    Ballroom A
    Get ready for a wild ride as we take a deep dive into the latest Belkasoft X product! This session is packed with tricks and tips that will help you become a more effective investigator and save preci ...
    • Investigations
    Ballroom F
    This session will share a case study about a child by the name of Alani C. Alani was lured off of the gaming app Roblox and groomed starting at the age of 9. At the age of 11 Alani was taken by her ad ...
11:00 AM
    • Cybersecurity
    Ballroom G
    During this session, attendees will discover three of the key obfuscation techniques attackers use to break down defenses and exploit systems through undetectable means, including impersonation, trust ...
    • eDiscovery
    Ballroom H
    Unfortunately, mass disasters happen. These might be "natural" or "manmade." In either scenario, electronic information will likely be the center of government investigations and litigation, both civi ...
    • Forensics
    Ballroom B
    You've completed your Digital Forensic Investigation. Months pass and you receive a subpoena to testify. What do I need to know? Who do I talk to? How do I prepare? The goal of this session it to prep ...
    • Forensics
    Ballroom C
    As digital forensic practitioners, it is crucial that we elevate the science by building standard operating procedures based on known best practices – because your training, experience and documentati ...
    • Sponsor Demo
    Ballroom A
    Mobile devices have become indispensable tools in the modern workplace, enabling more than just checking email. Employees now browse the web, access sensitive company data, and conduct daily business ...
1:30 PM
    • Cybersecurity
    Ballroom G
    AI’s impact to the threat landscape and challenges, volumes of events, staffing shortages, expertise deficiencies, siloed security controls. Statistics will be shared from the recent Ponemon Institute ...
    • Cybersecurity
    Ballroom H
    Web 3 is here, it’s evolving around us, and it’s already changing the way our clients do business. As counselors and technologists, we must embrace new web frameworks, and prepare for new risks. In th ...
    • Forensics
    Ballroom C
    This session will share how to use open-source data to discover historical location information for vehicles that do not store GPS data or vehicles that you may not have physical access to. The sessio ...
    • Investigations
    Ballroom F
     The reality of modern computing is that much of the user data that investigators rely on is no longer stored on the device. With encryption already creating more challenges for forensic investigators ...
    • Forensics
    Ballroom B
    Threat hunting includes insider threats as well as outside intrusion. These vectors can leave behind evidence that will give a bigger picture of malicious activity. Evidence is not limited to IPS, IDS ...
3:15 PM
    • Forensics
    Ballroom C
    While leveraging cloud service offerings is normal in other industries, for law enforcement – particularly in digital forensics – the cloud has been thought of as a frontier which only the bold few ha ...
    • eDiscovery
    Ballroom H
    eDiscovery and investigations are two critical components of legal process, yet they are often viewed as separate and distinct practices. In reality, these two areas are closely intertwined and unders ...
    • Cybersecurity
    Ballroom G
    This session will discuss industrial robot hacks & hacks against traditional IT & cloud assets. The presenter will share stories from the trenches—secrets & lies involving cybercriminals, nation-state ...
    • Investigations
    Ballroom F
    This panel discussion will share a case study of a cryptocurrency investigation. It will walk through the steps taken start the investigation to the point of recovering assets using both open source a ...
    • Sponsor Demo
    Ballroom A
    The proper handling of cell phones and other mobile devices as forensic evidence, from the point of seizure to the point of analysis, can be a challenging task. Different agencies may follow varying p ...
    • Forensics
    Ballroom B
    In digital forensics investigations, there is an increasing need to acquire and examine memory from servers and other computers. To fill this need, there have been recent updates to powerful open-sour ...
4:30 PM
    • Forensics
    Ballroom F
    This session will delve into the world of RAM decoding and explore the significant advantages it offers in uncovering a potential goldmine of data that would otherwise be missed with a standard mobile ...
    • Forensics
    Ballroom C
    Today’s expert MUST have a working device to recovering usable data. What if the device is damaged? Do you risk sending it to a repair shop? Do you declare it unrecoverable? This session will cover mo ...
    • Cybersecurity
    Ballroom G
     A challenge for Security professionals is getting Management “on board” with security initiatives. Business managers and executives are hired for business expertise, not security expertise. However, ...
    • eDiscovery
    Ballroom H
    Working in the shadows of projects where clients are highly visible and with much of their reputation and future at stake can cause a significant amount of stress. There can be significant pressure wi ...
    • Sponsor Demo
    Ballroom A
    This demo session will highlight how Ciphertrace, a Mastercard company and Cellebrite partner together to tackle scams through the identification of crypto artifacts in an investigation.