TechnoSecurity&DigitalForensics 2019 March 11, 2019 to March 13, 2019, San Diego, US

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Advanced DVR Analysis Case Studies Jimmy Schroering This session will discuss several cases where the scope of the examination exceeded a simple ...
A Synergistic Approach to Information Security and Technology Audits John Wallace The disciplines of Information Security and IT Audit are quite different and require different skill ...
Need for Speed in Forensic Evidence Acquisition Yulia Gadion In recent years both the volume of digital evidence and the number of cases in ...
Tapping Hackers to Improve Security John Baker Bug bounty programs are popping up all over the place, as more and more companies ...
Social Media Evidence Collection for eDiscovery Michael Riedijk As the next evolution of the workplace evolves, the use of social media has also ...
Understanding the Cultural Aspects of Hacking to Improve Cyber Investigations Angel Grant Have you ever wondered what motivates certain cybercriminals and why some prefer to work independently, ...
What's New in Windows 10? A lot Vico Marziale New versions of Windows 10 certainly seem to be arriving faster than previous Windows incarnations. ...
From The Hunt to Incident Response and Back Again O'shea Bowens The session will focus on techniques and strategies to foster “flexibility” for the relationship between ...
Dude, Where’s My data? Brian Hill Did a device owner delete data before you could conduct an extraction? During this demo, ...
Acquire Immediate Evidence Data from Cell Phones in the Field Jeremy Kirby Helping continue the trend of Susteen's commitment to Law Enforcement agencies throughout the US and ...
Forensic Artifacts and Techniques that are Essential for a Fraud Investigation Jamie Mcquaid Fraud investigations can be challenging for a number of reasons. They can be initiated either ...
Call Detail Record Mapping & Analysis with CellHawk Scott Bruce Are you wasting too much time mapping your CDRs by hand? Do you wish there ...
Aggregating Investigative and Forensics Resources, How Law Enforcement Agencies in San Diego Collaborate Chris Christopherson , Erik Lacom , Felipe Chee , Mark Gonyea This session will explain the benefits of inter-agency cooperation in the investigation and prosecution of ...
Taming Unstructured Big Data to Reduce Risk and Protect the Crown Jewels Nandita Padhiar 80% of all enterprise data is unstructured and is predicted to grow up to 80% ...
Making Compliance a Business Advantage Ryan Spelman Often, we fall back on examples of penalties to explain our justifications. But what if ...
Mobile App Analysis - Manually Investigating Mobile App Data & SQLite Databases James "ike" Eichbaum The challenges of investigating smartphones devices are paramount. With the rapid development of phone apps, ...
Leveraging Server Metadata in Forensic Email Investigations Arman Gungor Contents of emails can easily be altered. Focusing solely on email contents and metadata can ...
IoT & Security Legal Panel – Tackling a Data Breach Austin O'flynn , Jennifer Martin , Ron Hedges , Scott Sachs This session will share a case study that has been fused together by the moderator ...
Discover Vehicle Data: Vehicle System Forensics Discussion Don Brister A modern-day vehicle typically has 50-70 electronic control units (ECUs) or computers running on five ...
Extreme Data Recovery from Water Damaged iPhones and Androids Richard Gurecki Investigators have more tools than ever before to forensically examine phones, but what are the ...
Mobile Evidence in Peer-2-Peer Investigations Ed Michael This demo will share how investigators/examiners can use Cellebrite tools to conduct fast, on-scene examinations ...
Innovative Solutions for the Mobile Forensics Examiner Dave Katanosaka In efforts to inform the mobile forensics community the pitfalls of “push button” forensics, FINALMobile ...
Keynote: The Verification of Truth: The Future of Digital Forensics and its Role in Cybersecurity Matthew Rosenquist As the world embraces digital services and automation of critical systems, understanding risk, attributing actions, ...
Automatic Tagging and Cross-Media Correlation in Enterprise Applications Dave Ryberg See how easy it is to automate your forensic workflow to tag media during load, ...
Panning for Gold: Smart Techniques for Sifting through Mountains of Data Ashley Hernandez With cases involving multiple mobile devices, and desktops storing terabytes of data, examiners need a ...
Enhance Compliance, Reduce Risk and Increase ROI: Why You Should Care About Your Information Governance Program Glen Apelt Information Governance represents processes, defined by policies and enabled by technologies, that empower business leaders ...
Advanced Analysis Techniques for Mobile Device Evidence Ed Michael As mobile devices become more complicated to gain access to in a forensic manner, automated ...
1+1 is Not Always 2: Bypassing Multi-Factor Authentication Jeff Hovious Attackers commonly find themselves in situations in which they must access a resource which is ...
Impermanence in Forensics & eDiscovery: Collection of Ephemeral Messaging, Social Media & Other Emerging Media Jason Hale Ephemeral data is here today, gone tomorrow (or sooner). Popular ephemeral messaging applications like SnapChat ...
Know How to Respond to a Business Email Compromise Nick Ng According to figures released by the FBI in 2017, global losses resulting from Business Email ...
Using OSINT for Cryptocurrency Attribution Kirby Plessas Encryption and anonymity offered by Bitcoin and other cryptocurrencies are exploited for securing illicit transactions, ...
Magnet AXIOM & GrayKey: Slaying iOS Investigations James Mcquaid Investigating iOS devices has been a challenge for the mobile forensics industry for quite some ...
Internet of Everything Brian Hill Virtually every electronic in our lives can be connected to the Internet. What are the ...
Two Time-saving Mobile Forensic Tools You Need to See: XAMN and XEC Director James "ike" Eichbaum Digital forensic analysts and investigators have big challenges - there’s so much data on mobile ...
Cellphone Data: Formatting, Analysis, Mapping and Presentation Adeel Khamisa Cellphone data plays an increasingly relevant role as evidence in many of the cases analysts ...
Pioneers in Cyber: Reaching the Top Despite a Mountain of Obstacles Bronwen Aker , Crystal Williams , Veronica Mitchell Join us for an interactive panel discussion led by some of today’s leading women in ...
Insider Threat – Why You Should Care Kathleen Shane This session will provide attendees with an overview of insider threats from both a law ...
Digital Evidence from Social Networking Sites & Smartphone Apps Julie Navarro According to Statista.com in 2018, 2.62 billion of Internet users worldwide were social network users ...
Handling IoT Evidence So It Flows - Not Floods Jessica Hyde More than a billion connected devices – from vehicles to home appliances to wearable devices ...
Spam syndicate 2.0—Under the hood of Spambots Raashid Forster Internet bots have been widely used for various beneficial and malicious activities on the web. ...
Traces from the Cloud: Forensic Analysis of Cloud Storage Charles Giglia Cloud storage continues to grow in ease of use and popularity. Businesses use the cloud ...
The Data Trail in the CyberWorld - Protecting Internet Businesses Itay Yanovski During this session, the presenter will discuss how cyberthreat detection and response must be tailored ...
Thinking Outside the Box, an Introduction to Open-Source Investigations Erich Schmidt This is an introductory session to open-source intelligence (OSINT) for investigators and law enforcement. The ...
Advanced Analysis Techniques Rob Attoe Digital investigations are becoming increasingly complex due to the volumes of data to be processed, ...
Real-time Investigative Data Results with Whooster Richard Artz Live demonstration of all Whooster investigative database capabilities and delivery platforms to include SMS/Text Messaging, ...
Detecting and Stopping Insider Threats from USB Device Bob Osgood The theft of IP is a constant concern for organizations. Most IP theft is removed ...
Testifying on Call Detail Records Scott Bruce Cell phone call detail records (CDRs) can be a challenging topic for anyone to testify ...
Left of Boom Brian Contos The term “Left of Boom” was made popular in 2007 in reference to the U.S. ...
Drone Forensics Steve Rathbone This session comes out of the research of the largest drone forensics research program in ...
Early Riser Session: Securing the Digital Homeland: The Department of Homeland Security and the Cyber Security Landscape Jennine Gilbeau This session will discuss the cyber security landscape, including current and emerging threats that attendees ...
Early Riser Session: Current Trends in Illegal Dark Web Activity Rahul Saar This session will discuss the typical Items of criminal interest on the Dark Web. The ...
Using OSINT and Social Media to Locate and Identify Individuals Michele Stuart The internet provides investigators with the ability to ascertain information on subjects efficiently. Focusing on ...
How to Improve Your Bottom Line, Culture and IT Processes Thanks to the CaCPA and GDPR Steven Chesser While both the GDPR and the CaCPA have caused panic and fear in most corporate ...
Hacking into IoT Devices is Big Business - How to Keep the Bad Guys Out and Let the Good Guys In David Malloy This session will demonstrate where hacks are most successful, through hardware, software, firmware or the ...
APFS Imaging Considerations for Forensic Examiners Jason Roslewicz This session will address Apple File System (APFS) unique characteristics, forensic imaging methods of APFS ...
Apple’s Tween Years: iOS’ Maturation from 10 through 11 and into 12 Jessica Hyde At times over the past three years, Apple’s mobile operating system changes seemed so mercurial ...
Building a Record of Reasonableness for Your Organization's Security Program Shawn Belovich This session will look at an IT security program from a slightly different perspective. It’s ...
FBI's Next Generation Identification (NGI) System: Implementing the Future of Identification & Investigative Services Greg Scarbro The session will include a high-level overview of the FBI Next Generation Identification (NGI) System ...
The Evolution of Ransomware and a Look Ahead at Emerging Cyber Threats Michael Sitler Hospitals across the United Kingdom are crippled. Power distributers throughout Europe experience wide-spread system outages. ...
Common Cloud Migration Mistakes and How to Prevent Them Ayman Elsawah When migrating to the cloud, many companies make the same mistakes. Often called a “Lift ...
Learn Top Trade Secrets to Access Unique Investigative Data in Real Time Richard Artz During this session, attendees will discover the value of utilizing “outside the box” investigative searching ...
Location Information Exposed Brian Hill Volumes of data are collected by companies like Google and Apple to capture and document ...
Privacy for Cars: Red Teaming and Blue Teaming the Infotainment System Andrea Amico You have a suspect, but no access to their phone, You could access their vehicle, ...
Whatsapp Messenger on the Android Platform: A Forensic Examination of a Physical Device Douglas Orr This session will discuss a research study whose main objective was to develop a methodology ...
Windows PowerShell and Command Prompt as Investigative Tools Jeff Shackelford In this session, attendees will learn how to harness the power of PowerShell and the ...
Threat Hunting and Incident Response Gerard Johansen This session will focus on some of the practical aspects of Threat Hunting as well ...