TechnoSecurity&DigitalForensics 2019 June 2, 2019 to June 6, 2019, Myrtle Beach, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Advanced DVR Analysis Case Studies Jimmy Schroering This session will discuss several cases where the scope of the examination exceeded a simple ...
Common Repairable iPhone Logic Board Problems: Fix the Board, Recover the Data Jessa Jones For encrypted data on iOS and other mobile devices, the path to data recovery often ...
Encryption for Everyday Applications Nima Zahadat This session will cover encryption uses for day-to-day uses including application to email, browsing, mobile ...
Digital Evidence in Fraud Investigations: Case Study Ed Colangelo Take your fraud cases beyond bank records, photocopies, and manual searching. In this review of ...
Supporting the Unsupported: Carving, Parsing, and Creating Custom Artifacts: Christopher Vance Hands-On Lab: Many of the new mobile applications that daily hit the App Store and ...
Maximize Your Data Access Utilizing New Physical Analyzer Capabilities Danny Garcia Hands On Lab: This demo will cover the various methods you can apply to acquire ...
Fourth Amendment Search and Seizure of Digital Data Judge Mark Mcginnis This session will discuss the fundamental framework of the 4th Amendment and provide information regarding ...
Using GrayKey and AXIOM to Acquire and Parse iOS Data that Other Tools Miss Christopher Vance , Christopher Miles Hands-On Lab: Learn about the game-changing GrayKey device and its ability to go beyond backup ...
Making Complex Issues Simple: A Unique Method to Extract Data from RAID with Lost Configuration Mike Vysochin Previously, only large enterprises have chosen RAID as storage media, now they are also commonly ...
More Substance Than Vapor: When and Why to Include Evidence from the Cloud in Your Investigations Trey Amick In a landscape of digital change, cloud storage has come to be a constant. Spanning ...
Deriving Intelligence Requirements from Risk Management Artifacts Kristi Horton Law Enforcement, Government Agencies, and private sector critical infrastructure organizations have been encouraged to develop ...
Blockchain and eDiscovery: The Legal Impact of BlockChain Technology John Wilson With the increasing usage of cryptocurrencies and blockchains in today's world, eDiscovery professionals need to ...
A.I. See You: Leveraging Deep Learning to Triage Pictures and Video Matt Mcfadden There can be hundreds of thousands of images on digital devices – where does an ...
Fostering a Resilient Cybersecurity Culture: The Keys to Success in Creating a Talented and Engaged Cyber Workforce Matt Donato By now, everyone is aware of the challenges we face combatting the imminent adversarial cyber ...
OSINT Forensics: How to Determine if Your Subject Has Been Visiting the Deep or Dark Web? Anthony Reves During this lecture attendees will learn what type of software’s are used to access the ...
Forensics in the Corporate Cloud: How to Conduct Office 365 and Google Suite Investigations Jamey Tubbs Hands-On Lab: As enterprises of all sizes continue to shift data into cloud-based content storage ...
The Art of the Possible: End-to-End Best Practices to Close Your Most Challenging Investigations Richard Michael In 2017 the Norwalk Police Department was called to investigate the suspicious death of Kadeelyn ...
Investigating the Millennial Mind: Understanding the Use and Impact of Technology on Today's Youth Roxanne Ellington , Jessica Levitan This session will present an update of the Adolescents and Technology session from two years ...
Hack Yourself, Before the Hackers Do Steve Mcgregory You’ve probably heard the phrase, “knowledge is power”, and you understand what it means, but ...
From Dead Box to Live Memory: Breathing Context into Forensic Investigations Jamey Tubbs Hands-On Lab: Traditionally the domain of experienced forensic examiners, memory analysis can provide access to ...
Forensic Acquisition of Modern Evidence: A Roadmap to What’s Changed Bradley Schatz Forensic acquisition isn’t the known quantity that it was. With new storage devices like SSD’s ...
Cloud Forensics for Your Investigation Justin Mchenry Learn about Cellebrite’s UFED Cloud Analyzer and how you can use it to recover forensically ...
High Profile Investigations and How Technology Today Impacts Them Chris Spradley As an investigator, you never know when a high-profile investigation suddenly arises in your area. ...
New USB Forensics Bob Osgood USB forensic artifacts have been used by examiners for years; however, earlier this year, it ...
The Admissibility of Digital Data Judge Michael This session will discuss admissibility issues involving digital data including authenticity, foundation, relevance, hearsay, the ...
Data recovery from damaged microSD cards and other monolithic devices Igor Loskutov MicroSD cards became a true standard for portable storage devices. Due to high capacity and ...
Detecting and Investigating Malicious PowerShell Hoke Smith PowerShell is a favorite tool of a range of threat actors. State actors, criminal gangs, ...
Telegram Messenger Investigation on Mobile Devices Yuri Gubanov With 200M+ audience worldwide, Telegram Messenger is one of the most popular chat apps. Due ...
Cloud Forensics for Law Enforcement: Get the Evidence You Need to Move Cases Forward Christopher Vance Hands-On Lab: Evidence stored in servers belonging to service providers like Facebook and Google can ...
Keynote: Emerging Threats and How to Counter Them Sherri Davidoff Cybercriminals are taking hacking to the next level, by leveraging ever-more-sophisticated tool-sets and increasingly mature ...
Get the Data You Need in Less Than 20 Minutes with Selective Extraction Danny Cole When time is of the essence and you are tasked with reviewing evidence that you ...
Virtual Pen Registers™ Sy Ray An introduction to a CJIS compliant cloud based Pen Register solution for Law Enforcement
UAS Forensics - Visualizing the Data Greg Kovar This session is designed to help investigators understand what data may be available from UAVs ...
Introduction to Security Architecture for Big Data: How to securely use your Big Data ecosystem Mark Graves More and more enterprises are using Big Data for business applications and analytics. Security analytics ...
Opioid Crisis in America: From Digital Clues to a murder conviction Ed Michael Every day, more than 115 people in the United States die after overdosing on opioids. ...
The Questions a Judge Will Ask You After a Data Breach Tod Ferran During this session, attendees will understand: How to define “reasonable” in a way that makes ...
Cellular Technology, Mapping, & Analysis Scott Eicher This session will provide an in-depth look into cellular networks and call detail records (CDR’s) ...
Chrome Nuts and Bolts: ChromeOS/Chromebook Forensics Jessica Hyde Chromebooks have been taking over the classroom and are an up and coming issue for ...
Hackers, Hooligans, Heists, & History Christine Stevenson This session will explore an abridged history of hackers, hooligans, and heists. It will also ...
SQLite forensics and Memory Forensics with Belkasoft Evidence Center, All-in-One Forensic Solution Yuri Gubanov With the latest versions of Belkasoft Evidence Center (BEC), you can analyze mobile and computer ...
The Next Generation of AI Technology Comes to Law Enforcement Jim Plitt T3K, Law Enforcement's Global Partner presenting its AI solutions including; LEAP: Law Enforcement Analytic Product ...
Leading a Corporate Investigation: Acquisition Through Testimony Clark Walton The instructor, Clark Walton, a forensic examiner and licensed attorney, will walk through various technical ...
Accelerating Your Investigation with Video Evidence & Analytics N/a Moderated by Buddy Tidwell. Please join us for an open panel discussion with DME Forensics, ...
From Custody to Courtroom: Using Analytics & Visualization to Analyze Mobile Forensic Data and Overcome “the Big Data Challenge” Jacob Leonpacher One of the big challenges for investigators today is to quickly sift through and make ...
Simplify Forensic Imaging: Bootable Forensic Imager and New Features on Ditto Greg Dominguez The demo highlights the new DittoX86, a bootable device that prepares a computer system for ...
Forensic Certifications: Why, Which, and in What Order Jared Coseglia , Nathan Brush The evolution of the digital forensic and investigations job market over the next decade will ...
Bringing Data Analytics Into Your Investigation Steven Konecny In this day and age, no matter where an individual goes, new raw data is ...
Social Media Analysis and Counter-Terrorism Abdul Hassan This session will delve into locating and extracting social media artifacts on mobile phones using ...
Protecting Your Identity When Performing Online Investigations Zuly Gonzalez The web is a powerful tool for criminal investigators who use it to gather information ...
IoT Wireless Network Forensics Mike Raggo Current attack vectors indicate that nefarious attacks are increasingly targeting IoT wireless infrastructures throughout Cyber ...
Understanding the NIST Risk Management Framework Denise Tawwab The NIST Risk Management Framework (RMF) is a 7-step process that you can use to ...
Case Study: Three Letters Company Delivering Valuable Information Via Email and How We Can Hack It. Ondrej Freitas This session will share a case study demonstrating the dangers of sending personal and financial ...
Discover Vehicle Data: Vehicle Infotainment & Telematics System Forensics Ben Lemere A modern-day vehicle typically has 50-70 electronic control units (ECUs) or computers running on five ...
UFED Premium – the Only On-Premise Solution for Both iOS and Advanced Android Devices Brian Raspante Come see the power of Cellebrite as we unveil our on-premise iOS and Advanced Android ...
Crime Scenes to Courtroom – Processing, Investigating and Presenting Digital Evidence From All Sources To Show The Big Picture In A Holistic View Robert O'leary Investigators are under increasing pressure to respond to challenges that the wide range of digital ...
Grayshift & Magnet Forensics: Slaying iOS Investigations David Vance Investigating iOS devices has been a challenge for the mobile forensics industry for quite some ...
Understanding Qualcomm's EDL Mode Justin Leavitt Hands On Lab: From accessing data from damaged and non-functional Android devices, to extracting data ...
Supporting the Unsupported: Carving, Parsing, and Creating Custom Artifacts Christopher Vance Hands-On Lab: Many of the new mobile applications that daily hit the App Store and ...
Integrating Cyber Threat Intelligence Into Your Security Team and Your Organization: Not Just Another Open Source Intelligence How To D. Lefebvre Cyber Threat Intelligence (CTI) can be invaluable to incident response, Security Operations Center (SOC) activities, ...
Internet of Everything Lee Reiber Virtually every electronic in our lives can be connected to the Internet. What are the ...
APFS Imaging Considerations for Forensic Examiners Jason Roslewicz This session will address Privacy features built into Apple's newest Operating System, identify unique OS ...
Rapid Triage & Digital Investigations on iOS, Android, Mac, Windows, & More Richard Frawley This session will share how to decipher if a case involving mobile or other digital ...
Early Riser Session: Dark Web, Version 2: The New Challenge for LE Stephen Arnold The Dark Web has changed dramatically in the past 18 months with the number of ...
CCleaner© – Is This Tool The End of Forensic Investigations As We Know it? Katherine Helenek The CCleaner website targets users wanting to “Speed up and Optimize” their PCs. CCleaner can ...
Finding the Hidden Evidence on iOS and Android Devices Christopher Vance Increasing public scrutiny around the privacy implications of mobile OSes like iOS and Android means ...
We've Been Robbed! Understanding Adversary Exfiltration Techniques David Vargas The unfortunate fact is that most organizations will be compromised -- and after being compromised ...
Finding the Best Starting Point for Insider Threats and Other Workplace Investigations Trey Amick More than half of data breaches reported by organizations are insider incidents — either through ...
Managing the Changing Dynamic of Digital Forensics Nick Drehel Mobile device investigations are growing exponentially. The number of mobile phones being examined has increased ...
EnCase Forensic + Tableau: Powerful Solutions for the Entire Digital Forensic Investigation Lifecycle Jeff Hedlesky To securely triage, acquire, investigate, and report the findings of your digital investigations, you must ...
Carpenter vs USA – Understanding Reasonable Expectation of Privacy and the Proper Methods to Search and Seize Digital Data Judge Mark Mcginnis The United States Supreme Court held that individuals have a reasonable expectation of privacy in ...
The California Consumer Privacy Act & its Effect on the US Privacy Landscape Harvey Belikovskiy This interactive session will focus on the California Consumer Privacy Act going into effect 01/01/2020, ...
Building a Timeline of User Activity Across Devices Tarah Melton Almost any type of investigation can benefit from timeline analysis to help understand what the ...
Legal Qualifications of a Testifying Digital Forensics Expert Witness in State and Federal Courts in Criminal or Civil Cases Herbert Joe Legal qualifications of any investigator, like a digital forensics examiner, to testify as an expert ...
Emoji: The Hidden Forensic Artifact? Preston Farley One of the most popular new ways people communicate in cybersapce today is via the ...
Revolutionizing DFIR: Innovations, Advancements, and Game-Changing Technology for Investigators Lee Reiber Technological advancements won’t wait for investigators to catch up. If you are going to do ...
New DATAPILOT 10 Field Triage Device: Acquire Immediate Evidence from Mass-Casualty Events Jeremy Kirby Learn how to acquire immediate digital evidence in the field.
System Files Tricks for Forensic Investigation and Incident Response Yuri Gubanov : System files may tell you a lot about the user or malware actions on ...
Extracting Data from Webpages and Social Media using free, easy to use tools. Kevin Delong This session will show you step-by-step how to use free tools and the Chrome web ...
Introduction to Chip-Off Forensics Jerome Diamond This session will provide attendees with an introduction into chip-off forensics. The presenter will share ...
DHS Cyber Services and Protecting Critical Infrastructure Klint Walker An overview of current threats and trends in Cyber Security along with an explanation of ...
Malware Analysis and Reverse Engineering for dummies Luiz Cordeiro This session will focus on introducing Malware Analysis and Reverse Engineering. The idea is to ...
GrayKey and Magnet AXIOM: Bringing Platforms Together for Justice Christopher Miles The combination of GrayKey and Magnet AXIOM has dramatically changed the way law enforcement conducts ...
Thinking DFIRently: Utilizing Technology to Work Smarter Than Ever Jessica Hyde "We’ve passed the early stages of digital forensics. The early processes and methods that we ...
Cyber Supply Chain Security Matthew Caldwell Cyber supply chain security is the identification of risks involving vendors, suppliers, partners and other ...
Auditing Cyber Defense Technologies Stephen Head Auditing the many cyber defense technologies currently being deployed to defend organizations against cyber-attack is ...
“Private” Browsing: Your Secret is Not Safe - Forensic Analysis of Private Browsing Mode Activity Joe Walsh Most modern web browsers offer private browsing modes, but how private are they? This session ...
Leveraging Technology and AI to Expedite Investigative Efforts John Mchenry An in-depth analysis of how advanced analytics can improve your investigative process and why analytics ...
xBit Digital Case Management; A Proven Lab Solution Designed for the Forensic Investigator and Managers. Nolan Tracy Organize your digital forensic case data with xBit, the digital case management solution built to ...
Overcoming Challenges with the Admissibility of Digital Evidence Ed Colangelo , Judge Mark Mcginnis During this interactive panel discussion led by Wisconsin Circuit Court Judge Mark McGinnis, attendees will ...
Zip File Forensics Blazer Catzen In addition to addressing the date irregularities that occur when unzipping files we will delve ...
Identifying Darknet Suspects: When Law Enforcement Hacks N/a Increasingly, drug dealers and child abusers are using darknet anonymising technologies to peddle their wares ...
Preserving Casework Integrity from Chaos: Using Magnet ATLAS Kevin Martinez Westchester County District Attorney's Office needed more with regard to tracking evidence, data, assets, and ...
Putting the Intelligence Back in Threat Intel (Because Math) Edward Mccabe Threat Intelligence isn't about having a sea of honeypots, raw source feeds of bad IP ...
How I Would Attack SQL Server Brian Kelley This isn’t a talk about best practices or how to configure your system. It’s designed ...
Forensic Identification of Fake Digital Photos Chet Hosmer The phenomena of Fake Photos, Audio recordings, and Video have become viral. Just one example ...
macOS: Forensic Artifacts and Techniques That are Essential for Mac Investigations Trey Amick Mac investigations can be challenging for a number of reasons. Learn about the Apple File ...
Good Fences Make Good Neighbors - Auditing the CyberSecurity of Your Network DMZ Ken Cutler Today’s Internet connections are typically shielded by a Demilitarized Zone (DMZ), a critical CyberSecurity buffer ...
Virtual Currency Investigations: Hands-On Lab and Lecture Eric Huber Cryptocurrencies used extensively as key payment method of the underground economy and to facilitate many ...
Android Virtualization with MAGNET App Simulator Tarah Melton While the recovery of essential data from your evidence is paramount, presenting that data can ...
Cyber Security Considerations for Small and Medium Businesses Corey Nachreiner US small businesses contributed over half the total $17 trillion GDP, and yet at least ...
Windows® 10 Timeline Forensic Analysis Rob Attoe The Windows 10 April 2018 update (1803) introduced a new feature named “Timeline” which has ...
Processing of Mobile Devices from Victims or Witnesses Martin Novak , Suddhir Aggarwal , Gokila Dorai Existing law enforcement tools to collect evidence from mobile devices are designed based on the ...
Risk Management Framework (RMF) Implementation: A Real World Analysis James Dodmead Are you worried about the cybersecurity posture of your system, but not sure that you ...
Go-Go Gadget, Smartwatch! An Investigation of Wearable Devices & Their Forensic Value Jesse Odom After attending this session, attendees will have an enhanced understanding of how smartwatch wearable devices ...