Skip to main content

Techno Security & Digital Forensics Conference

Wednesday, September 13, 2023

Image

Wednesday, September 13, 2023

The 2023 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
9:15 AM
    • Cybersecurity
    Ballroom H
    Federal agencies face growing challenges that no one understands better than acting security practitioners. But the public sector has a perspective on cybersecurity risk management that can benefit pr ...
    • Forensics
    Ballroom C
    Investigators are coping with an increasing number of CSA investigations on devices, data, and often fewer digital forensic examiners. To manage these converging challenges, we need to develop workflo ...
    • Forensics
    Ballroom G
    The Python programming language continues to be a mainstay within the digital forensics environment and enjoys a large user community that continues to supply libraries and frameworks that directly im ...
    • Forensics
    Ballroom F
    This session will dissect Snapchat data obtained from mobile phones extractions. The presenter will dive into obscure serialized format (protobufs) to uncover information needed to recover juicy conte ...
    • Investigations
    Ballroom B
    A Google Reverse Location Search (Geofence), is a multi-step search warrant and analysis process that can generate powerful leads. With an increasing number of detectives using geofence search warrant ...
10:30 AM
    • Forensics
    Ballroom F
    UAS has proven to add in many challenges to our National Airspace safety, not to mention National Security implications. Remote ID is in effect as of April 21, 2021, and requires the broadcast of airc ...
    • Forensics
    Ballroom C
    During this session, the presenter will share first-hand how he as a successful forensic examiner has transitioned from a law enforcement career to a private sector career – sharing how he did it and ...
    • eDiscovery
    Ballroom G
    The emergence of emojis in text messages and collaboration platforms are posing all kinds of challenges. Yes, there is the technical approach on how to parse the funny faces into readable and searchab ...
    • Investigations
    Ballroom H
    This session will cover the importance of understanding the Dark web for investigators. It will discuss what investigators need to get on the Dark web and what possible value it is for OSINT collectio ...
1:15 PM
    • Investigations
    Ballroom H
    Phones, emails, social media, and Google, all provide an abundance of information that can be used to enhance your prosecution. But, how do you present and use this information in court? This session ...
    • Cybersecurity
    Ballroom C
     The new remote work along with newer technologies and data growth has taken everyone by surprise and worst of all, most organizations can’t keep up and struggle to have ‘their house’ in order when it ...
    • Forensics
    Ballroom F
    This session will focus on the analysis of video, still image, and audio evidence involving firearms. The presenter will examine digital evidence examples from real cases where firearms were used or w ...
    • Investigations
    Ballroom G
     This past year, Censys uncovered a Russian ransomware group within its data by identifying suspicious hosts and leveraging historical analysis and technical pivots. The journey began with open source ...
    • Forensics
    Ballroom B
    Do you work cases containing large volumes of data? And do you want to benefit from good software and international knowledge how to handle this data? Learn more about Hansken: a platform that is spec ...
2:30 PM
    • Forensics
    Ballroom G
     Digital evidence is volatile and fragile, so it's essential to preserve data as soon as possible following a loss event like a motor vehicle collision. With so many claims based upon alleged driver d ...
    • eDiscovery
    Ballroom F
    As more companies have moved to remote work or at least a hybrid remote/office model for day-to-day operations, employees are using new products for internal and external communications. The messages ...
    • Forensics
    Ballroom B
    The session will cover various aspects of Windows memory forensics, including the fundamentals of memory analysis, volatile data collection, and the tools commonly used. It will explore the importance ...
    • Forensics
    Ballroom C
    This session shares how Linux DFIR can help cybersecurity professionals. Attendees will learn of use cases, preparation, and response techniques so they can take away and prepare their own Linux envir ...
    • Forensics
    Ballroom H
    Email forensics has become a vital part of digital forensic investigations. This session will explore subtle marks that email clients leave on email messages as they interact with them and how such ma ...