TechnoSecurity&DigitalForensics 2019 Sept. 30, 2019 to Oct. 2, 2019, San Antonio, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Fake, Fraud and Forgeries: A "Forensicator’s" Guide to Questioned Digital Document Examination Eugene Filipowicz About two years ago there was a noticeable rise in “fake news websites” and “deceptive ...
How to Inform and Defend Yourselves During the Rise of Cyberattacks-in-a-Box: The Danger of Off-the-Shelf Tools Bret Piatt Being a hacker no longer requires you to be sophisticated and technologically savvy. Today, all ...
UAV (Drone) Forensic Analysis Rob Attoe The use of drones is rapidly growing and expanding into criminal enterprises and terrorist organizations. ...
The California Privacy Act & Its Effect on the US Privacy Landscape Harvey Belilovskiy This interactive session will focus on the California Consumer Privacy Act going into effect 01/01/2020, ...
macOS: Forensic Artifacts and Techniques that are Essential for Mac Investigations Trey Amick Mac investigations can be challenging for a number of reasons. Learn about the Apple File ...
Dark Cloud, Terrorism and Identity Fraud: Not Just Somebody Else’s Problem. Jamie Clarke This session will discuss the effects of the Darknet and its markets, specifically how fake ...
I Know I Need to Secure My Business, Where Do I Start? Denise Kinsey While this session is targeted at those facing the dilemma of understanding the need to ...
Forensic Analysis of the Windows 10 Activity Timeline Vico Marziale The Activity Timeline feature was released in Windows 10 version 1803. It tracks many types ...
When the Cyber Intrusion Alarm Rings, Will You Know? Norman Comstock There are numerous cybersecurity products, architectures, and cyber risk management best practices to help harden ...
Linked Data Analysis - Why All Data Should be Linked in Investigations Trent Livingston With people's habits in communications (interpersonal or public) range from text messages, group chats, social ...
Mitigate Cybersecurity Threats Posed by Intrusive Apps, Smartphones, Connected Products, and B.Y.O.D. Programs Rex Lee During this session attendees will learn: New threats posed by intrusive android (Google), Apple, and ...
Taking Phone Forensics to the Edge of Possibilities - From Software Hacking to Chip-off Dusan Kozusnik This session will discuss advanced phone forensic methods, including software hacking by utilizing system vulnerabilities ...
US Data Protection Law: Past, Present, and Future Natalie Wilson US Data Protection law is highly complex and fragmented. How did we get here, how ...
The 007 Spy Games of the Bits, Bytes and Nibbles Elena Steinke Cyberattacks against our public and private institutions from nation-state and cyber-criminal threat actors are on ...
Cyber Security Threat and Forensic Intelligence Kim-kwang Raymond Choo Cyber threat intelligence and analytic is among one of the fastest growing interdisciplinary fields of ...
Keynote: Artificial Intelligence and the Future of Cybersecurity Roman Yampolskiy The rise of AI-enabled cyberattacks is expected to cause an explosion of network penetrations, personal ...
Advanced Analysis Workflows using Intella Rob Attoe Digital investigations are becoming increasingly complex due to the volumes of data to be processed, ...
Simplify Forensic Imaging: Bootable Forensic Imager and new features on Ditto Greg Dominguez The demo highlights the new DittoX86, a bootable device that prepares a computer system for ...
Cybersecurity Risk Management - Aligning Contracts with Reality Justin Freeman In this session we will review data breach and cybersecurity essentials with a focus on ...
Deep in the Heart of Windows Memory Analysis Tarah Melton In many cases, memory analysis can provide access to evidence you can’t obtain through “dead-box” ...
Investigating Fake Digital Photos Chester Hosmer The global impact resulting from the distribution of doctored digital photographs has reached an epidemic ...
Proving a Negative: Case Studies Illustrating Methods to Safeguard the Organization from Something That Didn’t Happen D. Lefebvre Organizations face growing scrutiny and uncertainty over breach and cyber incident response. Regulators and public ...
Creating VM’s from Forensic Images for Courtroom Presentation Jeff Shackelford One of the biggest hurdles in computer forensic testimony, is figuring out how best to ...
APFS Imaging Considerations for Forensic Examiners Jason Roslewich This session will address Apple File System (APFS) unique characteristics, forensic imaging methods of APFS ...
Crime Scenes to Courtroom – Processing, Investigating and Presenting Digital Evidence From All Sources To Show The Big Picture In A Holistic View Robert O'leary Investigators are under increasing pressure to respond to challenges that the wide range of digital ...
Oxygen Forensic Detective 12.0 Lee Reiber Come see the unbelievable innovation built into Oxygen Forensic Detective. Oxygen Forensics will include in ...
Hack Yourself, Before the Hackers Do Steve Mcgregory You’ve probably heard the phrase, “knowledge is power”, and you understand what it means, but ...
Securing the Digital Homeland Chad Adams This session will discuss the cyber security landscape, including current and emerging threats that attendees ...
Using GrayKey and AXIOM to Acquire and Parse iOS Data that Other Tools Miss Trey Amick Learn about the game-changing GrayKey device and its ability to go beyond backup files to ...
Secure and Protect Privileged Accounts and Credentials. Everywhere. Jimmy Milla Join us for a demo on best practices for automatically discovering, storing, managing and changing ...
Investigating 21st Century Ponzi Schemes Steven Konecny Madoff had returns on his $65 billion Ponzi scheme averaging between 10 to 20% annually ...
CCleaner© – Is This Tool The End of Forensic Investigations As We Know it? Charles Giglia The CCleaner website targets users wanting to “Speed up and Optimize” their PCs. CCleaner can ...
Demystifying Security Frameworks Richard Crane In today’s environment, every company looks to a security framework or certification to guide their ...
A Synergistic Approach to Information Security and Technology Audit John Wallace The disciplines of Information Security and IT Audit are quite different and require different skill ...
Effective Dark Web Investigation Strategies Vincent Jung The Dark Web is the breeding ground for malicious activity targeting public and private sectors. ...
Love to Work Out, but Who's Watching? Keith Lockhart Fitbit, Apple Watch, and Samsung devices not only track the heart rate, but also the ...
Solutions for the Entire Digital Forensic Investigation Lifecycle: EnCase Forensic + Tableau Jeff Martin To securely triage, acquire, investigate, and report the findings of your digital investigations, you must ...
Detecting and Investigating Malicious PowerShell Hoke Smith PowerShell is a favorite tool of a range of threat actors. State actors, criminal gangs, ...
Really Bad SysAdmin Confessions Andy Thompson It's a common belief that SysAdmins make great Infosec professionals. Many believe this is due ...
UAS Forensics - Visualizing the Data Greg Kovar This updated session is designed to help investigators understand what data may be available from ...
How the GDPR will Improve Your Bottom Line, Culture and IT Processes Steven Chesser While both the GDPR and the CaCPA have caused panic and fear in most corporate ...
Blockchain and eDiscovery: The Legal Impact of Blockchain Technology Joh Wilson With the increasing usage of cryptocurrencies and blockchains in today's world, eDiscovery professionals need to ...
Early Riser Session: Dark Web, Version 2: The New Challenge for LE Stephen Arnold The Dark Web has changed dramatically in the past 18 months with the number of ...
It's an App World: Using the Latest Exploits to Recover Data from Android Devices Will Hernandez With the rapid development and adoption of mobile apps and the sheer volume of online ...
Telling the Digital Story Using Connections and Timeline Tarah Melton Using multiple analysis techniques can be beneficial in any type of investigation. Learn how to ...
Media Sonar Toolkit: Effective Dark Web Investigation Vincent Jung The Dark Web is intentionally hidden and anonymous where users can hide their identity and ...
Breaking Into Your Building: A Hacker’s Guide to Unauthorized Access Brent Roberts This session will discuss proven methods of bypassing popular physical security controls and employees, using ...
Information Security Risk and the Need for Artificial Intelligence Michael Dagrossa Given the many factors inside an organization it is becoming increasingly difficult to pinpoint not ...
Social Media, Digital Evidence and What Lurks in the Cloud Cynthia Navarro Today’s online investigative research is more than a simple Google search or a profile check ...
Mobile Device Acquisition Approaches Brad Robin This session will cover the most popular software methods of modern mobile device acquisition. The ...
Crawl, Monitor, Walk, Detect, Run like Heck- Stages of Building and Executing a Threat Hunting Program O Galloway This session will highlight important strategies, tools, techniques and planning to consider for your hunting ...
In the Trenches with Cloud Security Automation Ken Kerns This session will share a case study covering how a partnership developed a cloud management ...
Windows Artifacts with Blacklight Stephanie Thompson Blacklight is known for its ability in capturing artifacts from Mac computers, but it has ...
RECON LAB Steve Whalen This demo will take attendees through RECON LAB, the only full forensic suite designed natively ...
Examining Security Threat Avoidance Theories Barbara Hewitt Between October 2009 through the end of 2017, 164 million patient records were affected in ...
Concept Searching: Reveal Possible Issues and Risks that Keywords Miss Warren Miller Data volumes are exploding as are potential data sources requiring analysis for investigations. Wading through ...
Investigations-Legal-Forensic "Statements of Work" - Don't Get Caught Without It Gregg Braunton Establishing a Statement of Work (SOW) to manage the engagement and delivery outcomes is a ...
Social Media Analysis and Counter-Terrorism Abdul Hassan This session will delve into locating and extracting social media artifacts on mobile phones using ...
Teaching a New Dog Old Tricks - Intrusion Detection, Threat Investigation, and Compliance for the Cloud Using Osquery Milan Shah As infrastructure transitions to a cloud and container paradigm, it poses new challenges for intrusion ...
Digital Forensics in the Era of Fake News Jerry Bui Jurors are becoming more skeptical of forensic evidence and the authenticity of what is being ...
Dark Web Update Discussion Stephen Arnold Join Stephen Arnold for a deeper discussion about the Dark Web and recent updates.