Skip to main content

Tuesday, October 28

Image

Tuesday, October 28

Loading
    • Cybersecurity
    Pacific E
    Digital images are increasingly used to hide malware using steganography. This session explores the history of data hiding, real-world cases of image-based attacks, and the TTPs used by cybercriminals ...
    • Investigations
    Pacific F-G
    Professionals in cybercrime, digital forensics, and law enforcement are routinely exposed to graphic content, high-stakes decision-making, and overwhelming caseloads—conditions that contribute to cumu ...
    • Forensics
    Pacific C
    This session showcases how Punjab Police leveraged digital forensics to dismantle two international scam call centers that defrauded over 100,000 victims globally. It highlights live evidence seizure, ...
    • Cybersecurity
    Pacific C
    The dark web gives us an unprecedented window into the cybercriminal underground. Monitoring dark web forums, marketplaces, and hidden sites allows us to gather intelligence directly from the source – ...
    • Investigations
    Pacific D
    Mobile forensic examiners often work in silos, extracting data and handing off reports to investigators who may not know where to begin. This session explores how to bridge that gap by rethinking how ...
    • Forensics
    Pacific E
    Generative AI (ChatGPT, Gemini, Llama 4, etc.) is an evolutionary technology taking all industries by storm. Most collaboration, social media, and messaging apps have or will be embedding this product ...
    • Cybersecurity
    Pacific C
    A Joint speaking session on best practices in managing Artificial Intelligence in your ofganization. The session will discuss highlights from the NIST Artificial Intelligence Risk Management Framework ...
    • eDiscovery
    Pacific F-G
    This practical session explores innovative approaches to managing eDiscovery productions while maintaining compliance and controlling costs in today's data-intensive litigation environment. Attendees ...
    • Investigations
    Pacific D
    Artificial intelligence is transforming investigative techniques, offering powerful new capabilities in digital forensics, OSINT, and investigation. This session provides a practical overview of how A ...
    • Investigations
    Pacific C
    Within our contemporary world, Artificial Intelligence (AI) is increasingly used both personally and professionally to replace everything from jobs and judgment. With caution, it can also be used both ...
    • eDiscovery
    Pacific F-G
    As mobile data proliferates and artificial intelligence enters legal workflows, courts are increasingly weighing in on what constitutes defensible, ethical, and proportional eDiscovery. This session e ...
    • Forensics
    Pacific D
    This session shares a study that examines the reliability of Apple's geolocation confidence factor in digital forensic data extracted from iPhones. By comparing extracted GPS points to a known referen ...
    • Cybersecurity
    Pacific F-G
    Designed for all industry sectors and organization types, Cybersecurity Framework (CSF) 2.0 is the tool for you. In 32 pages, it outlines 108 essential goals for organizational and management prioriti ...
    • Forensics
    Pacific D
    IoT devices are everywhere and causing potential chaos with the data they collect and store. With risks to digital security and information sharing they are becoming a prime suspect in digital evidenc ...
    • Investigations
    Pacific E
    On August 5, 2020, a fire engulfed a home in the Green Valley Ranch neighborhood of Denver, Colorado, taking the lives of three adults and two children - immigrants from Senegal who had no apparent co ...
    • Forensics
    Pacific F-G
    This session will discuss the importance of zero trust for forensic integrity, how AI/ML can be used to accelerate investigations, and share how integration, not just tools, is the future of forensics ...
    • Investigations
    Pacific D
    Staying anonymous online in 2025 requires far more than a VPN. Platforms now correlate data from browser fingerprints, OS-level signals, geolocation, and behavioral patterns to identify users. This se ...
    • Forensics
    Pacific C
    Abstract Proposal: Forensic examination of USB device activity is crucial for many different types of investigations. Findings of connections are useful for proof of data exfiltration and/or identifyi ...