Tuesday, October 28
We're sorry, but we couldn't find any results that match your search criteria. Please try again with different keywords or filters.
Loading
-
-
- Cybersecurity
Pacific EDigital images are increasingly used to hide malware using steganography. This session explores the history of data hiding, real-world cases of image-based attacks, and the TTPs used by cybercriminals ... -
- Investigations
Pacific F-GAbstract Proposal: Traffickers increasingly exploit technology to groom, recruit, and control victims. This session highlights how multidisciplinary teams—analysts, prosecutors, and social workers—col ... -
- Forensics
Pacific DDeepfakes & image manipulation are a growing threat to investigations. As examiners, you need to confidently authenticate visual evidence. During an investigation, this becomes vital in identifying vi ... -
- Forensics
Pacific CThis session showcases how Punjab Police leveraged digital forensics to dismantle two international scam call centers that defrauded over 100,000 victims globally. It highlights live evidence seizure, ... -
- Sponsor Demo
Pacific H-IMagnet Automate can save you time by automatically running processes against your data set, allowing you time to spend with your family instead of constantly having to run to the lab or logging in rem ... -
- Cybersecurity
Pacific CThe dark web gives us an unprecedented window into the cybercriminal underground. Monitoring dark web forums, marketplaces, and hidden sites allows us to gather intelligence directly from the source – ... -
- Investigations
Pacific DMobile forensic examiners often work in silos, extracting data and handing off reports to investigators who may not know where to begin. This session explores how to bridge that gap by rethinking how ... -
- Forensics
Pacific EGenerative AI (ChatGPT, Gemini, Llama 4, etc.) is an evolutionary technology taking all industries by storm. Most collaboration, social media, and messaging apps have or will be embedding this product ... -
- Sponsor Demo
Pacific H-IThe proper handling of cell phones and other mobile devices as forensic evidence, from the point of seizure to the point of analysis, can be a challenging task. Different agencies may follow varying p ...Speaker(s) -
-
- Cybersecurity
Pacific CA Joint speaking session on best practices in managing Artificial Intelligence in your ofganization. The session will discuss highlights from the NIST Artificial Intelligence Risk Management Framework ... -
- eDiscovery
Pacific F-GThis practical session explores innovative approaches to managing eDiscovery productions while maintaining compliance and controlling costs in today's data-intensive litigation environment. Attendees ... -
- Investigations
Pacific DArtificial intelligence is transforming investigative techniques, offering powerful new capabilities in digital forensics, OSINT, and investigation. This session provides a practical overview of how A ...Speaker(s) -
- Forensics
Pacific EDigital forensic tools are powerful but they’re not magic. In the real world, examiners often face partial parses, unsupported data, or artifacts that slip through the cracks when relying solely on ou ... -
- Sponsor Demo
Pacific H-IToday’s investigators face mounting evidence backlogs and increasing pressure to deliver results fast. Detego is purpose-built to give you the speed, clarity and confidence needed to stay ahead. From ... -
-
- Investigations
Pacific CWithin our contemporary world, Artificial Intelligence (AI) is increasingly used both personally and professionally to replace everything from jobs to judgment. With competence and caution, it can als ... -
- eDiscovery
Pacific F-GAs mobile data proliferates and artificial intelligence enters legal workflows, courts are increasingly weighing in on what constitutes defensible, ethical, and proportional eDiscovery. This session e ... -
- Forensics
Pacific DThis session shares a study that examines the reliability of Apple's geolocation confidence factor in digital forensic data extracted from iPhones. By comparing extracted GPS points to a known referen ... -
- Sponsor Demo
Pacific H-IDATAPILOT continues to advance its field and lab acquisition capabilities, providing investigators with efficient, reliable tools to extract and analyze digital evidence quickly. Rapid, on-scene acqui ...Speaker(s) -
Pacific E
-
- Cybersecurity
Pacific E• Practitioners in the criminal investigation and private sector DFIR spaces are familiar with the acquisition, parsing, and analysis of communication artifacts from iOS devices. This session will foc ... -
-
- Cybersecurity
Pacific F-GDesigned for all industry sectors and organization types, Cybersecurity Framework (CSF) 2.0 is the tool for you. In 32 pages, it outlines 108 essential goals for organizational and management prioriti ... -
- Forensics
Pacific DIoT devices are everywhere and causing potential chaos with the data they collect and store. With risks to digital security and information sharing they are becoming a prime suspect in digital evidenc ...Speaker(s) -
- Investigations
Pacific EOn August 5, 2020, a fire engulfed a home in the Green Valley Ranch neighborhood of Denver, Colorado, taking the lives of three adults and two children - immigrants from Senegal who had no apparent co ... -
- Investigations
Pacific CThis case study details the investigation that led to the 22.5-year federal prison sentence of Jose Antonio Quiroz-Martinez in a child exploitation case. Attendees will learn how quick reaction by pat ... -
- Sponsor Demo
Pacific H-IForensics is a time-consuming process, often taking months to complete. Traditional data collection methods, whether in the field or lab, contribute to increased workloads and case backlogs. By automa ... -
- Forensics
Pacific F-GThis session will discuss the importance of zero trust for forensic integrity, how AI/ML can be used to accelerate investigations, and share how integration, not just tools, is the future of forensics ... -
- Forensics
Pacific CAbstract Proposal: Forensic examination of USB device activity is crucial for many different types of investigations. Findings of connections are useful for proof of data exfiltration and/or identifyi ... -
- Forensics
Pacific FoyerJoin Officer Amber Banning and ESD K9 Phoebe of the San Diego Police Department and ICAC Task Force for a demonstration and Q&A session. Learn how ESD K9s are specially trained to detect electronic st ...

