Skip to main content

Wednesday, October 29

Image

Wednesday, October 29

Loading
    • Cybersecurity
    Pacific F-G
    As organizations rely more on mobile devices to stay connected with internal systems for productivity and to work remotely, the attack surface mobile computing presents has exponential increased. In r ...
    • Forensics
    Pacific C
    This session explores real-world forensic investigations into cybercrime targeting mobile money wallet systems operated by banks, fintechs, and telecoms in Africa. Through detailed case studies, atten ...
    • Investigations
    Pacific D
    As anonymization tools become commonplace, criminals increasingly exploit anonymous networks to evade detection. Understanding these networks is crucial for investigators tackling cybercrime and OSINT ...
    • Forensics
    Pacific E
    This session will offer attendees insights and recommendations on how to manage a digital forensic laboratory and implement best practices. Topics covered include laboratory processes, procedures, qua ...
    • eDiscovery
    Pacific F-G
    Abstract Proposal: Whether you call them hyperlinked files, modern attachments or pointers to files in messages, we will discuss new developments impacting eDiscovery and digital investigations and wh ...
    • Investigations
    Pacific E
    Abstract Proposal: Traffickers increasingly exploit technology to groom, recruit, and control victims. This session highlights how multidisciplinary teams—analysts, prosecutors, and social workers—col ...
    • Cybersecurity
    Pacific D
    The rush to integrate AI into threat detection has outpaced practical guidance for security teams. This session cuts through the marketing noise, offering real-world examples of AI-enhanced threat hun ...
    • Forensics
    Pacific D
    This session presents a case study on forensic analysis of SQLite databases from Android and iOS apps not supported by commercial tools. Using open-source solutions and custom parsers, the session sho ...
    • Investigations
    Pacific F-G
    This session addresses the challenges of detecting lateral movement, data access, and exfiltration on Windows systems during DFIR investigations. Traditional sources like Windows Event Logs are limite ...