Skip to main content

2024 Conference Program

Image

2024 Conference Program

The 2024 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
Monday, September 16, 2024
    • Forensics
    Ballroom B
    In the world of recycling and silicon shortages, more old, recycled memory chips are finding new homes in brand-new devices. However, these chips often retain data from their previous lives and owners ...
    • Forensics
    Ballroom G
    This session delves into the profound impact AI technologies have on enhancing the efficiency, accuracy, and scope of digital forensic analysis. Through machine learning algorithms, AI enables acceler ...
    • Cybersecurity
    Ballroom F
    Integrating SIEM with XDR enhances cybersecurity by leveraging SIEM’s log management alongside XDR’s telemetry. This combination improves visibility, expedites threat detection, and simplifies respons ...
    • Cybersecurity
    Ballroom C
    Today the global threat landscape regarding cybersecurity has changed dramatically due the evolution of AI integrated products and services coupled with advancements in quantum computing. Global threa ...
    • Investigations
    Ballroom A
    With the development of the internet came a new tool for criminals to conduct illegal activity. With the emergence of the dark web and cryptocurrency, criminals gained anonymity for their illicit tran ...
    • Forensics
    Ballroom D
    The Department of Homeland Security Science and Technology Directorate (DHS S&T), Forensics and Criminal Investigation Program leverages advanced digital forensics tools to combat human trafficking. T ...
    • Cybersecurity
    Ballroom C
    On April Fool’s Day this year, Microsoft released the first cybersecurity-trained LLM called Copilot for Security. Promising to deliver increased efficiency and capabilities for defenders to improve s ...
    • Investigations
    Ballroom A
    This session will equip attendees with the knowledge and tools necessary to identify AI-generated images in their investigative practices. Attendees will gain a deep understanding of the AI-generated ...
    • Investigations
    Ballroom G
    As digital devices in investigations grow exponentially, investigators face the challenge of analyzing vast amounts of data. This session explores the combination of digital forensics triage, selectiv ...
    • Forensics
    Ballroom B
    The prevalence of high-quality AI created media has brought a new age of disinformation and distrust to society. How does this relate to evidence admissibility in criminal investigations and legal pro ...
    • eDiscovery
    Ballroom F
    For years the ediscovery community has mastered the collection of email messages and the family of “attachments” but today we face an interesting conundrum: are linked files the equivalent of an “atta ...
    • Sponsor Demo
    Ballroom D
    Join Cellebrite’s Senior Technical Manager, Matt Goeckel, as he works through an investigation from beginning to end using Cellebrite’s Solution Portfolio.
    • Investigations
    Ballroom A
    When government organizations and private sector companies collaborate effectively, cybercriminals don’t stand a chance. This session will share the case study of how LockBit, a ransomware group, resp ...
    • Forensics
    Ballroom G
    As cloud use and access becomes more integral to investigations, what does “cloud” really mean in today’s forensics? A look at how to differentiate and address cloud approaches in various forensics co ...
    • Cybersecurity
    Ballroom F
    Supply chains are increasingly interconnected and complex, creating vulnerabilities that malicious actors can exploit. This session explores the growing threat of supply chain attacks and discusses st ...
    • Cybersecurity
    Ballroom C
    In the rapidly evolving field of cybersecurity, swift and effective incident response is essential, especially in macOS environments. This session will teach participants how to efficiently collect an ...
    • Investigations
    Ballroom B
    This session will be led by an investigative expert who will discuss investigative techniques and best-practices in Crimes Against Children Investigations.
    • Sponsor Demo
    Ballroom D
    Effective, fast, and precise incident response is a team effort. When your forensics tools don’t speak the same language as the IR team, sharing critical information becomes inefficient, leading to de ...
    • Forensics
    Ballroom B
    Digital forensics professionals are increasingly encountering privacy-focused tools like Linux Tails, which present unique challenges when conducting investigations. During this session, the intricaci ...
    • Cybersecurity
    Ballroom C
    Microsoft, CIS, NIST, CISA, etc. all state that preventative security is far more valuable than detecting security exploits. This makes sense, as we all rely on our home being secured with locks on wi ...
    • Investigations
    Ballroom G
    A detailed and step-by-step account of how a team of investigators was able to locate a criminal suspect by using blockchain forensic tools, metadata from NFTs, and traditional OSINT methods, the iden ...
    • Investigations
    Ballroom F
    Google is everyone's go-to search engine, but most people aren't utilizing it to the full capability. By mastering the art of Google Boolean operators and advanced search features, you will learn how ...
    • Forensics
    Ballroom A
    During this session, attendees will hear actual cases of how digital forensics played a role in homicide investigations. From recovering deleted video to cached data, phone being powered down, smartwa ...
    • Sponsor Demo
    Ballroom D
    Information leaks and intellectual property theft are escalating, challenging even the most advanced organizations. Traditional security measures are insufficient, demanding a revolutionary approach t ...
Tuesday, September 17, 2024
    • Keynote
    Ballroom B/C
    As we immerse ourselves into the revolutionizing era of AI, the world of cybersecurity and digital forensics is confronted with unprecedented challenges as well as opportunities. During this powerful ...
    • Forensics
    Ballroom G
    In this session, a unique case study will be explored where thorough analysis of forensic images of an individual’s computers revealed compelling evidence of covert activity. The investigative steps u ...
    • Forensics
    Ballroom F
    AI image synthesis tools based on diffusion models, such as Dall-E, Stable Diffusion, and Midjourney, allow users to create realistic-looking images by writing a text input. Often, these tools can cre ...
    • Sponsor Demo
    Ballroom D
    Join MSAB where they highlight the importance of setting a digital strategy prior to commencing your investigation, making considerations regarding your tool set up and other factors that affect your ...
    • Investigations
    Ballroom A
    This Case Study discusses "Operation Bayonet"which was the international effort to dismantle AlphaBay. AlphaBay Market was a Tor-based darkweb market which was the largest in history—featuring hundred ...
    • Forensics
    Ballroom B
    This workshop invites you to bring your own Mac for an immersive, practical experience. We’ll dive into the specifics of macOS, exploring how to manually collect key forensic data like active network ...
    • Cybersecurity
    Ballroom C
    Many organizations are already exploring the use of AI for their enterprises, experiencing growing pains and barriers to entry. Challenges span from trust and bias to accurate information, alongside n ...
    • Forensics
    Ballroom G
    In an era where the lines between reality and simulation are increasingly blurred, the proliferation of AI-generated fake video presents society with unprecedented challenges. From misinformation camp ...
    • eDiscovery
    Ballroom F
    Join Angie Nolet and Bree Murphy, In-House Counsel and Sr. Solutions Consultant, respectively, by day and Co-Hosts of eDiscovery Chicks: the Podcast About All Things eDiscovery & Legal Tech by night, ...
    • Sponsor Demo
    Ballroom D
    Practitioners spend roughly 20% of case time on extraction and 80% on parsing and analysis. Oxygen Forensic ® Detective's faster parsing and legendary analytical tools get law enforcement examiners th ...
    • Forensics
    Ballroom C
    Communication is a skill that evolves continuously throughout a career. This session will focus on identifying critical communication skills for digital forensics and incident response practitioners. ...
    • Cybersecurity
    Ballroom F
    Instead of assuming that code is developed security, we can take a Sec OPS perspective - ensuing that API traffic is inspected using a web application firewall, then inspecting requests to ensure they ...
    • Investigations
    Ballroom G
    Understanding the true essence of Open Source Intelligence (OSINT) is a challenge due to its wide-ranging applications across various fields. From military and law enforcement to government, corporati ...
    • Cybersecurity
    Ballroom A
    With modern 3D-printers entering the “plug-and-play"realm of use, their appearance is becoming more and more common. The idea of crafting your own hidden spaces or even weapons at home without any way ...
    • Forensics
    Ballroom B
    This session will share insights and research on the Wasted Application, from how it works to what data can be recovered once the application is activated. The "Wasted"app is a security-focused applic ...
    • Sponsor Demo
    Ballroom D
    In this hands-on demonstration, participants will learn to leverage the offline, AI-powered advanced analytics of Detego Analyse AI+. This powerful tool helps reduce case backlogs, improve investigati ...
    • Cybersecurity
    Ballroom G
    Determining an organization's cybersecurity budget was traditionally calculated as a percentage of IT spend, but that metric no longer fits. This question is significantly harder to answer and require ...
    • Forensics
    Ballroom C
    In today's world of anti-forensics, the dreaded "factory reset situation"is a significant concern. Whether caused by local wipes from apps like Wasted or remote wipes, the outcome is typically the sam ...
    • Cybersecurity
    Ballroom B
    One of the most challenging aspects of Post Breach Response is Data Mining. Although a rather simple concept, it is anything but simple in practice. Data Mining is the workflow to identify the individ ...
    • Forensics
    Ballroom A
    U.S. Customs and Border Protection’s Center for Air and Marine Drone Exploitation (CAMDEx) will highlight the latest techniques involving Unmanned System (UxS) forensics. As this genre of digital fore ...
    • Sponsor Demo
    Ballroom D
    The proper handling of cell phones and other mobile devices as forensic evidence, from the point of seizure to the point of analysis, can be a challenging task. Different agencies may follow varying p ...
    • Investigations
    Ballroom F
    This case study shares how a construction superintendent Todd Engles, who produced CSAM with multiple 9–12-year-old girls on multiple social media platforms to include Discord, TikTok and Instagram. T ...
    • Investigations
    Ballroom C
    Secure email gateways are prime targets, as seen with the recent Barracuda ESG vulnerability (CVE-2023-28686). This session will dissect real-world intrusions stemming from this exploit. Attacker tact ...
    • Forensics
    Ballroom B
    This session focuses on the challenges of finding AI traces in Windows systems from a digital forensics point of view. It will examine how AI interacts with the operating system and the difficulties i ...
    • Investigations
    Ballroom G
    Dark web usage has expanded, the crimes there have increased, the requirement for understanding Dark web investigations has escalated. This session discusses how investigators need to rethink approach ...
    • Cybersecurity
    Ballroom F
    This session dives into conquering the challenge of vulnerability management by exploring methods for implementing a scalable program. During this session the speaker will discuss automated patching s ...
    • Forensics
    Ballroom A
    U.S. Customs and Border Protection’s Center for Air and Marine Drone Exploitation (CAMDEx) will provide participants with a hand-on practical lab to demonstrate different avenues to exploit some of th ...
    • Sponsor Demo
    Ballroom D
    DATAPILOT First-to-market acquisition capabilities for Apple Vision Pro & Meta Quest VR headsets. Be the first to see our new technology capable of pulling multiple types of data from VR headsets. DAT ...
Wednesday, September 18, 2024
    • Forensics
    Ballroom C
    Modern mobile applications are expanding in both capabilities and complexity, often integrating web application "engines"from third-party sources. This integration introduces new storage locations for ...
    • eDiscovery
    Ballroom F
    New to Corporate E-Discovery forensics? This session introduces you to its basic concepts as you kick-start your professional journey into this discipline. Highlight importance and what to look out fo ...
    • Cybersecurity
    Ballroom G
    While AI can be used in many positive ways for powerful data analytics, people are also using AI for malicious purposes. One area of increasing concern is the use of AI to create deep fakes to manipul ...
    • Forensics
    Ballroom B
    In this session on digital forensics, attendees delve into the crucial field of Windows Crash Dump analysis, emphasizing its significance in the investigative process. Attendees gain insight into the ...
    • Sponsor Demo
    Ballroom D
    Session details in progress.
    • Investigations
    Ballroom A
    Come hear about how one ICAC case turned into an episode of the docuseries Undercover Underage. Daniel Bowling, a professional golfer, began communicating with who he believed to be a 15-year-old, but ...
    • Forensics
    Ballroom G
    Contrary to the popular digital forensic belief, the investigation does not start, nor end, with the phone. Rather, successful investigations depend on a complex array of efforts conducted by numerous ...
    • Forensics
    Ballroom F
    An overview of standard business email compromise investigations, discussing methodology, data collection, data analysis, and reporting. Microsoft Office 365 and Google Workspace email environments wi ...
    • Cybersecurity
    Ballroom C
    Discover how to secure your serverless computing infrastructure at scale while achieving regulatory compliance. Learn about unique risks in serverless architectures and techniques to manage them, addr ...
    • Investigations
    Ballroom B
    In this session, we will explore various artifacts on Windows computers that can demonstrate user activity and attribute specific actions to individual users. By examining different types of evidence ...
    • Sponsor Demo
    Ballroom D
    This session will provide an overview of the different Crime Lab and Field solutions available to Forensic Examiners, Investigators and Crime Analysts, as well as Defense & Corporate Investigators. Le ...
    • Forensics
    Ballroom F
    This session explores the transformative use of Artificial Intelligence (AI) in law enforcement, particularly its application in analyzing suspect habits and preferences to expedite device decryption ...
    • Cybersecurity
    Ballroom C
    To combat new threats and rising workloads, police departments look to advanced technology like high-resolution cameras, AI-enabled analytics, and increasingly connected systems that can share video a ...
    • Cybersecurity
    Ballroom A
    This session will focus on mitigating the use of AI/ML (GAN/AML) as an offensive weapon in cybersecurity attacks. Attendees will learn: How to use AI as an offensive weapon; Definitions and examples o ...
    • Investigations
    Ballroom G
    Insight into investigations involving the illicit use of digital assets and cryptocurrency, to include pig-butchering and romance scams. These investigations focus on dismantling the laundering networ ...
    • Forensics
    Ballroom B
    We are encountering a new class of cyber attacks termed advanced persistent threats that are being encountered in our national and global power systems. These represent a challenge to trusted operatio ...
    • Cybersecurity
    Ballroom G
    While believability of an AI (Turing test) is important in many applications, the need for forensic truth is paramount in cybersecurity application. In this session, we will evaluate methods for train ...
    • Cybersecurity
    Ballroom A
    This session maps out the cyber visibility process and demonstrates how to achieve success with this methodology. Key terms introduced include "blindspot reduction,"cyber protection, cybersecurity rea ...
    • Forensics
    Ballroom F
    This session focuses on the Linux DFIR and will feature a comparison of at least two popular volatile data collection tools, highlighting their performance and results. Attendees will gain insights in ...
    • eDiscovery
    Ballroom C
    This session will discuss various tools that are available to recreate the scene more easily, and faster. The presenter will share examples of these tools providing attendees with live examples and co ...