Skip to main content

2025 Conference Program

Image

2025 Conference Program

The 2025 Conference Program is defined by primary topics. Therefore, each session has a primary topic designation for attendees to quickly find those sessions of relevance and importance to them. Sessions are also classified by both Target Level (Beginner, Intermediate, Advanced or All) and Target Audience (Corporate/Private Sector, Government, Investigators, Law Enforcement/Police, Prosecutors/Attorneys/Legal).

To sort by topics, audience, and levels to find the program that best suits your needs, click on Filters.

For a list of all sessions by day, please click on the day/date link.

Note - classifications are simply a guide to help attendees select the best sessions for individual needs/experience, and by no means should exclude or deter anyone from attending a session of interest.

Loading
Monday, October 27, 2025
    • Keynote
    Pacific D-E
    Join us for a powerful and eye-opening presentation by Erin West, a leading expert in combating transnational organized crime and the founder of Operation Shamrock. In this engaging one-hour talk, Eri ...
    • Investigations
    Pacific C
    AI is revolutionizing Open-Source Intelligence (OSINT) for digital investigations, providing analysts & investigators with powerful tools to identify risks & enhance situational awareness. But AI-gene ...
    • Forensics
    Pacific H-I
    This presentation introduces a proof of concept (POC) aimed at addressing the challenge of triaging large volumes of audio files. The common method of reviewing audio on a 1:1 ratio is time-consuming ...
    • eDiscovery
    Pacific F-G
    Based on analysis from the eDiscovery Today blog by Editor and Chief Contributor Doug Austin, this session explores four recurring trends that are redefining digital forensic workflows and eDiscovery ...
    • Cybersecurity
    Pacific C
    Microsoft Active Directory is 25! Over 98% of organizations still use it, as it is key to the enterprise. Do your IT and security teams give this part of your enterprise enough attention to ensure it ...
    • eDiscovery
    Pacific F-G
    This session offers insights into key eDiscovery methodologies—particularly those aligned with the EDRM (Electronic Discovery Reference Model)—and shares why this framework is essential for Forensic a ...
    • Forensics
    Pacific D
    Strong digital investigations rely on diverse evidence sources. The Six Pillars of Digital Evidence—physical devices, video footage, call records, vehicle infotainment systems, OSINT, and cloud data—s ...
    • Forensics
    Pacific E
    This session demonstrates how organizations can implement enterprise-grade AI fraud detection using entirely open-source tools. Additionally, the session will review the benefits of implementation, cu ...
    • Investigations
    Pacific E
    The dark web is a hidden digital battleground where predators exploit encryption and cryptocurrency to traffic children beyond the reach of traditional law enforcement. This powerful session takes you ...
    • Investigations
    Pacific C
    In mobile forensics, extracting data is just the start—the real value lies in building clear, compelling narratives that investigators and attorneys can understand. This session covers techniques for ...
    • Forensics
    Pacific F-G
    Prolific threat actors in the last year have thrived on double-extortion; proving the ransomware economy remains strong. To hold organizations hostage, identity is now the target of adversary tactics, ...
    • Cybersecurity
    Pacific D
    This session will help attendees understand the threat landscape and gain insights into how cybercriminals are leveraging Generative AI, including deepfakes, to execute sophisticated financial fraud s ...
    • Cybersecurity
    Pacific C
    Abstract Proposal: Strong cybersecurity controls can only be applied to data when an organization knows which data is the most sensitive or the most important. Many organizations attempt to protect th ...
    • Investigations
    Pacific D
    Investigators face mounting pressure to analyze massive data volumes quickly while maintaining evidentiary integrity. This session delivers practical triage and selective extraction strategies that re ...
    • eDiscovery
    Pacific F-G
    Artificial intelligence (AI) and, more specifically, Generative AI (Gen AI) have taken the world by storm. It has led to government investigations, state and local regulation, and civil actions arisin ...
    • Investigations
    Pacific F-G
    Abstract Proposal: By leveraging advanced AI and machine learning techniques, we can significantly enhance the efficiency and accuracy of threat detection processes. We will dive into examples like th ...
    • Forensics
    Pacific D
    This session will walk through the forensics of a case related to the alleged theft of high value company data. This case is a real whodunit - a riddle, wrapped in a mystery inside an enigma, and stuf ...
    • Cybersecurity
    Pacific C
    AI tools like ChatGPT and Copilot have become indispensable in developers' daily workflows. AI can help eliminate a lot of toil from the developer's day-to-day. But the hidden dangers it introduces ar ...
Tuesday, October 28, 2025
    • Cybersecurity
    Pacific E
    Digital images are increasingly used to hide malware using steganography. This session explores the history of data hiding, real-world cases of image-based attacks, and the TTPs used by cybercriminals ...
    • Forensics
    Pacific C
    This session showcases how Punjab Police leveraged digital forensics to dismantle two international scam call centers that defrauded over 100,000 victims globally. It highlights live evidence seizure, ...
    • Investigations
    Pacific F-G
    Professionals in cybercrime, digital forensics, and law enforcement are routinely exposed to graphic content, high-stakes decision-making, and overwhelming caseloads—conditions that contribute to cumu ...
    • Cybersecurity
    Pacific C
    The dark web gives us an unprecedented window into the cybercriminal underground. Monitoring dark web forums, marketplaces, and hidden sites allows us to gather intelligence directly from the source – ...
    • Investigations
    Pacific D
    Mobile forensic examiners often work in silos, extracting data and handing off reports to investigators who may not know where to begin. This session explores how to bridge that gap by rethinking how ...
    • Forensics
    Pacific E
    Generative AI (ChatGPT, Gemini, Llama 4, etc.) is an evolutionary technology taking all industries by storm. Most collaboration, social media, and messaging apps have or will be embedding this product ...
    • Cybersecurity
    Pacific C
    A Joint speaking session on best practices in managing Artificial Intelligence in your ofganization. The session will discuss highlights from the NIST Artificial Intelligence Risk Management Framework ...
    • eDiscovery
    Pacific F-G
    This practical session explores innovative approaches to managing eDiscovery productions while maintaining compliance and controlling costs in today's data-intensive litigation environment. Attendees ...
    • Investigations
    Pacific D
    Artificial intelligence is transforming investigative techniques, offering powerful new capabilities in digital forensics, OSINT, and investigation. This session provides a practical overview of how A ...
    • Investigations
    Pacific C
    Within our contemporary world, Artificial Intelligence (AI) is increasingly used both personally and professionally to replace everything from jobs and judgment. With caution, it can also be used both ...
    • eDiscovery
    Pacific F-G
    As mobile data proliferates and artificial intelligence enters legal workflows, courts are increasingly weighing in on what constitutes defensible, ethical, and proportional eDiscovery. This session e ...
    • Forensics
    Pacific D
    This session shares a study that examines the reliability of Apple's geolocation confidence factor in digital forensic data extracted from iPhones. By comparing extracted GPS points to a known referen ...
    • Cybersecurity
    Pacific F-G
    Designed for all industry sectors and organization types, Cybersecurity Framework (CSF) 2.0 is the tool for you. In 32 pages, it outlines 108 essential goals for organizational and management prioriti ...
    • Forensics
    Pacific D
    IoT devices are everywhere and causing potential chaos with the data they collect and store. With risks to digital security and information sharing they are becoming a prime suspect in digital evidenc ...
    • Investigations
    Pacific E
    On August 5, 2020, a fire engulfed a home in the Green Valley Ranch neighborhood of Denver, Colorado, taking the lives of three adults and two children - immigrants from Senegal who had no apparent co ...
    • Forensics
    Pacific F-G
    This session will discuss the importance of zero trust for forensic integrity, how AI/ML can be used to accelerate investigations, and share how integration, not just tools, is the future of forensics ...
    • Investigations
    Pacific D
    Staying anonymous online in 2025 requires far more than a VPN. Platforms now correlate data from browser fingerprints, OS-level signals, geolocation, and behavioral patterns to identify users. This se ...
    • Forensics
    Pacific C
    Abstract Proposal: Forensic examination of USB device activity is crucial for many different types of investigations. Findings of connections are useful for proof of data exfiltration and/or identifyi ...
Wednesday, October 29, 2025
    • Cybersecurity
    Pacific F-G
    As organizations rely more on mobile devices to stay connected with internal systems for productivity and to work remotely, the attack surface mobile computing presents has exponential increased. In r ...
    • Forensics
    Pacific C
    This session explores real-world forensic investigations into cybercrime targeting mobile money wallet systems operated by banks, fintechs, and telecoms in Africa. Through detailed case studies, atten ...
    • Investigations
    Pacific D
    As anonymization tools become commonplace, criminals increasingly exploit anonymous networks to evade detection. Understanding these networks is crucial for investigators tackling cybercrime and OSINT ...
    • Forensics
    Pacific E
    This session will offer attendees insights and recommendations on how to manage a digital forensic laboratory and implement best practices. Topics covered include laboratory processes, procedures, qua ...
    • eDiscovery
    Pacific F-G
    Abstract Proposal: Whether you call them hyperlinked files, modern attachments or pointers to files in messages, we will discuss new developments impacting eDiscovery and digital investigations and wh ...
    • Cybersecurity
    Pacific D
    The rush to integrate AI into threat detection has outpaced practical guidance for security teams. This session cuts through the marketing noise, offering real-world examples of AI-enhanced threat hun ...
    • Investigations
    Pacific E
    Abstract Proposal: Traffickers increasingly exploit technology to groom, recruit, and control victims. This session highlights how multidisciplinary teams—analysts, prosecutors, and social workers—col ...
    • Forensics
    Pacific D
    This session presents a case study on forensic analysis of SQLite databases from Android and iOS apps not supported by commercial tools. Using open-source solutions and custom parsers, the session sho ...
    • Investigations
    Pacific F-G
    This session addresses the challenges of detecting lateral movement, data access, and exfiltration on Windows systems during DFIR investigations. Traditional sources like Windows Event Logs are limite ...
Tuesday, October 27, 2026
    • Forensics
    Pacific D
    Deepfakes & image manipulation are a growing threat to investigations. As examiners, you need to confidently authenticate visual evidence. During an investigation, this becomes vital in identifying vi ...