Wednesday, October 29
We're sorry, but we couldn't find any results that match your search criteria. Please try again with different keywords or filters.
Loading
-
- Cybersecurity
Pacific F-GAs organizations rely more on mobile devices to stay connected with internal systems for productivity and to work remotely, the attack surface mobile computing presents has exponential increased. In r ... -
- Forensics
Pacific CThis session explores real-world forensic investigations into cybercrime targeting mobile money wallet systems operated by banks, fintechs, and telecoms in Africa. Through detailed case studies, atten ... -
- Investigations
Pacific DAs anonymization tools become commonplace, criminals increasingly exploit anonymous networks to evade detection. Understanding these networks is crucial for investigators tackling cybercrime and OSINT ...Speaker(s) -
- Forensics
Pacific EThis session will offer attendees insights and recommendations on how to manage a digital forensic laboratory and implement best practices. Topics covered include laboratory processes, procedures, qua ... -
- eDiscovery
Pacific F-GAbstract Proposal: Whether you call them hyperlinked files, modern attachments or pointers to files in messages, we will discuss new developments impacting eDiscovery and digital investigations and wh ... -
- Investigations
Pacific EAbstract Proposal: Traffickers increasingly exploit technology to groom, recruit, and control victims. This session highlights how multidisciplinary teams—analysts, prosecutors, and social workers—col ... -
- Cybersecurity
Pacific DThe rush to integrate AI into threat detection has outpaced practical guidance for security teams. This session cuts through the marketing noise, offering real-world examples of AI-enhanced threat hun ... -
- Forensics
Pacific DThis session presents a case study on forensic analysis of SQLite databases from Android and iOS apps not supported by commercial tools. Using open-source solutions and custom parsers, the session sho ... -
- Investigations
Pacific F-GThis session addresses the challenges of detecting lateral movement, data access, and exfiltration on Windows systems during DFIR investigations. Traditional sources like Windows Event Logs are limite ...