Skip to main content

Wednesday, October 29

Image

Wednesday, October 29

Loading
    • Cybersecurity
    Pacific F-G
    As organizations rely more on mobile devices to stay connected with internal systems for productivity and to work remotely, the attack surface mobile computing presents has exponential increased. In r ...
    • Investigations
    Pacific D
    As anonymization tools become commonplace, criminals increasingly exploit anonymous networks to evade detection. Understanding these networks is crucial for investigators tackling cybercrime and OSINT ...
    • Forensics
    Pacific E
    This session will offer attendees insights and recommendations on how to manage a digital forensic laboratory and implement best practices. Topics covered include laboratory processes, procedures, qua ...
    • eDiscovery
    Pacific C
    As artificial intelligence continues to transform the legal landscape, the intersection of AI, forensic readiness, and eDiscovery has emerged as a critical area of focus for legal professionals and fo ...
    • eDiscovery
    Pacific F-G
    Abstract Proposal: Whether you call them hyperlinked files, modern attachments or pointers to files in messages, we will discuss new developments impacting eDiscovery and digital investigations and wh ...
    • Investigations
    Pacific E
    Professionals in cybercrime, digital forensics, and law enforcement are routinely exposed to graphic content, high-stakes decision-making, and overwhelming caseloads—conditions that contribute to cumu ...
    • Cybersecurity
    Pacific D
    The rush to integrate AI into threat detection has outpaced practical guidance for security teams. This session cuts through the marketing noise, offering real-world examples of AI-enhanced threat hun ...
    • Investigations
    Pacific C
    An introduction to FBI’s Level Up Program to combat Cryptocurrency Investment Fraud
    • Forensics
    Pacific D
    This session presents a case study on forensic analysis of SQLite databases from Android and iOS apps not supported by commercial tools. Using open-source solutions and custom parsers, the session sho ...
    • Investigations
    Pacific F-G
    This session addresses the challenges of detecting lateral movement, data access, and exfiltration on Windows systems during DFIR investigations. Traditional sources like Windows Event Logs are limite ...
    • Investigations
    Pacific C
    This session will share how San Diego’s Elder Justice Task Force (EJTF) is leading the nation in the fight against elder scams by arresting and prosecuting members of money laundering organizations op ...