TechnoSecurity&Digital 2020 March 9, 2020 to March 11, 2020, San Diego, US

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Collection, Preservation, and Analysis of Digital Video Evidence Motti Gabler This session will educate investigators, law enforcement, and prosecutors on proper methods for the collection, ...
Use Common Passwords to Access Mobile Devices Jeremy Kirby Many phones are locked and inaccessible to lab personnel. Our engineers have used algorithms and ...
Today’s Digital Investigations using Artificial Intelligence Amanda Mahan Have a case that contains 100,000 images and you are literally looking for the needle ...
The Next Generation of AI Technology Comes to Law Enforcement Jim Plitt T3K, Law Enforcement's Global Partner presenting its AI solutions: LEAP: Law Enforcement Analytic Platform, for ...
Artificial Intelligence (AI) and Machine Learning (ML): Force Multipliers Used to Both Protect and Attack Our Critical Infrastructure Matt Stamper In military parlance, a force multiplier can change the outcome of a battle or a ...
FBI Next Generation Identification Michael Lohmann The session will include a high-level overview of the FBI Next Generation Identification (NGI) System ...
Finding the Best Starting Point for Insider Threats and Other Workplace Investigations Trey Amick More than half of data breaches reported by organizations are insider incidents — either through ...
Protecting your Data and System from Ransomware Saves Money and is Good for Business Don Malloy Growth in Ransomware attacks are targeting both small and large organizations alike. The number of ...
Where Should I start with the NIST Cyber Security Framework? John Riley There are a number of frameworks available to base your organizations' cybersecurity on but the ...
Tips and Tricks with Blacklight 2019R3 Stephanie Thompson Blacklight 2019R3 brought some new and improved functionality and we will show some of the ...
Cellphone Data: Investigation, Analysis and Presenting Your Case to Others Adeel Khamisa Cellphone data plays an increasingly relevant role as evidence in many of the cases analysts ...
Catalina: A Voyage Through Apple's New Artifacts Derrick Donnelly Hear from the Apple experts how Catalina’s new organization of system verses user files may ...
From 0 to Accreditation Mark Spooner What does it take to bring a digital forensic lab into full accreditation status? The ...
Proving a Negative: Case Studies Illustrating Methods to Safeguard the Organization from Something That Didn’t Happen D. Kall Loper Organizations face growing scrutiny and uncertainty over breach and cyber incident response. Regulators and public ...
Android App Analysis Tarah Melton With the millions of applications available to users on Android devices, it becomes impossible for ...
Identification, Acquisition and Analysis of Vehicle Systems using the iVe Ecosystem Ben Lemere Vehicles hold a vast amount of data that can be used to uncover critical information ...
Large Scale Digital Forensics Investigations Ibrahim Saruhan When the size of a digital forensics investigation gets bigger, it gets more difficult to ...
Cloud data methods for capture Amber Schroader As more and more data move to the cloud understanding some of the ins and ...
Cyber Incident Response- Preparing for the Inevitable! Matt Jorgensen It seems that almost every day we hear reports of another cyber incident involving a ...
LAW ENFORCEMENT ONLY: Using Drone Forensics in Criminal Investigations Erik Modisett As technology evolves, so must law enforcement's approach to digital forensics. No longer can an ...
Discussion of the New T2 Examination Capability with Encase and a Discussion of Processing Speeds and Optimization with Encase David Petty This talk will include demonstration of our capability to image a T2 equipped Apple device ...
Hands-On with DATAPILOT 10: The Acquisition Device You Need. Jeremy Kirby : FASTER, FRIENDLIER, MORE AFFORDABLE: Be the first to see our new cutting-edge technology for ...
Keynote: Artificial Intelligence and the Future of Cybersecurity Roman Yampolskiy The rise of AI-enabled cyberattacks is expected to cause an explosion of network penetrations, personal ...
2020 Vision: Preparing for the California Consumer Privacy Act Joseph Pochron , Justine Hauswirth Although California’s Consumer Privacy Act (CCPA) was intended to govern digital giants like Facebook, it ...
macOS: Forensic Artifacts and Techniques that are Essential for Mac Investigations Trey Amick Mac investigations can be challenging for a number of reasons. Learn about the Apple File ...
Peak Inside Windows Memory: A Toolbox Approach Lynita Hinsch Join Lyn Hinsch for the fundamentals of memory analysis using industry proven open source software ...
What Surveillance Capitalism Means For You: Cybersecurity & Privacy Threats Posed by Smartphones, Tablet PCs and Connected Products Rex Lee Attendees will learn cybersecurity, privacy, civil liberty and safety threats associated with surveillance and data ...
Aggregating Data from Disparate Data Sources Dave Muessig The advent of new, cost-effective acquisition tools like Datapliot, ADF, E3, and other products has ...
Bridging Accessibility Between Mobile Phone and Vehicle Data Ben Donnelly With the recent partnership between BlackBag and Berla, investigators now have the ability to export ...
Advanced Image Analysis in Digital Forensics Justin Tolman In recent years, digital forensics has undergone a major shift from primarily analyzing desktop computers ...
Performing a Professional Web Application Penetration Test Scott Miller This session will describe how to approach a professional web application penetration test, including where ...
Using Open Source Tools in an Attempt to Defeat Encryption Felipe Chee Trying to defeat encryption with a word list increases your odds of bypassing encrypted file(s). ...
Addressing the Serious Threat of Cybercrime with Magnet AXIOM Cyber Trey Melton Cybercrime provides its own unique challenges. Every case of fraud, workplace harassment, insider threats, identify ...
Hands-On with DATAPILOT 10: The Acquisition Device You Need Jeremy Kirby FASTER, FRIENDLIER, MORE AFFORDABLE: Be the first to see our new cutting-edge technology for acquiring ...
New Data Types in eDiscovery & Forensics John Novoa While the collection phase of legal discovery only consumes between 8-12% of each dollar spent ...
A Forensic Look at Windows® 10 Timeline Using SQL Queries to Exploit the Data Rob Attoe The Windows 10 introduced a new feature named “Timeline” which has seen enhancements in subsequent ...
Iran, GeoPolitics and Cyber War, Past, Present and Future: A look at the tools and tactics of the Nation State Adversary. Steven Bolt This session will explore the past and present for the Iranian cyber threat, from initial ...
Cybercrime Driven by Cryptocurrency Johnmichael Ohare Cybercrime orchestration in the deep and the dark web is fueled by Cryptocurrency. In this ...
RECON LAB Jason Roslewich This demo will take attendees through RECON LAB, the only full forensic suite designed natively ...
The Intersection of Privacy & Security Sergio Garcia A security issue occurs when a hacker gains unauthorized access to a system. Privacy issues, ...
Deconstructing Threat Intel Jeff Norlin There are commonly held beliefs about threat intelligence and how it solves defense in depth ...
Fake or Genuine? Forensically Authenticating Emails Arman Gungor Email evidence often plays a central role in legal proceedings, and fraudulent emails being passed ...
WhatsApp Forensics: Evidence Hide-and-Seek Amanda Mahan WhatsApp is, without a doubt, the most popular messenger in the world with over 1.5 ...
Forensic Explorer –-Advanced Forensic Software Graham Thackray N/A
From the Crime Scene to the Courtroom: Using Analytics to Analyze Mobile Forensic Data and Overcome “the Big Data Challenge” Kevin Leonpacher One of today’s biggest challenges for investigators, forensic examiners and others is to sift through ...
APFS Imaging Considerations for Forensic Examiners Jason Rafferty Roslewicz Join Jason Roslewicz, CEO of SUMURI in a discussion on best practices for triaging Mac ...
Macquisition Triage and Live Collection Demo Stephanie Thompson You asked for it! Come see if the newest capabilities in Macquisition to include the ...
Forensics in the Cloud Dave Muessig This session will discuss the process of forensics in the cloud. We will look at ...
Discover Vehicle Data Ben Lemere The automotive industry is one of the leading industries in the world, topping 2.6 trillion ...
Early Riser Session: The Dark Web & Crypto Currency Investigations Joe Gupta Under the cloak of darkness, criminals are using tools for privacy and anonymity to commit ...
AI’s Role in Enabling Next Gen Forensic Defense and Protection Salvatore Stolfo , Rick Grinell , Candan Carbone Leading experts explore the latest trends and best practices in leveraging AI in the world ...
Digital Evidence from Social Networking Sites & Smartphone Apps Julie Dang According to Statista.com in 2018, 2.62 billion of Internet users worldwide were social network users ...
Managing Security Risks from the Department Level to the Boardroom Karlene Padhiar By 2020, 100% of large enterprises will be asked to report to their board of ...
New Ways to Commit Crimes... and New Ways to Solve Them (with cars) Andrea Amico Modern vehicles pack increasing amounts of connected sensors and features… which can be exploited by ...
Building a Future-Proof Architecture to Store and Manage your Digital Evidence Jerry Armstrong As computer technology advances, the amount of data being generated and stored worldwide is also ...
Cyber AI: Fighting Back with Autonomous Response Steven Gerry The digital enterprise is constantly expanding, with new IoT, cloud, and operational technologies all challenging ...
Intro to Blockchain & Crypto Currency Investigations Lab John Wilson With the increasing importance of privacy and security in today's business world coupled with the ...
Securing the Digital Homeland Joseph Oregon This session will discuss the cyber security landscape, including current and emerging threats that attendees ...
Collaborative Review Using Intella Connect Rob Attoe Large scale investigations require a collaborative approach to examine data quickly and efficiently, which leads ...
Digital Video Evidence: The Quest for Accuracy and Competence Jessica Nerida This session offers you a fundamental understanding of forensic video analysis. Get thinking about the ...
Applying Machine Learning to Investigations Chester Hosmer There is great promise, myths and confusion regarding Machine Learning (ML) and Artificial Intelligence (AI). ...
Butterfly Effect Theory – Lone Wolf Shooter Syndrome Johnmichael Ohare In the last few years, mass casualty shootings have posed increasing threats and are rapidly ...
Mitigating Risk Through Threat Hunting Steven Thompson What do many of the top security breaches over the last few years have in ...
CCleaner© – Is This Tool The End of Forensic Investigations As We Know it? Charles Giglia The CCleaner website targets users wanting to “Speed up and Optimize” their PCs. CCleaner can ...
Graykey & Apple iOS/Devices Jonathan Oszust This presentation will explain how Grayshift is able to use its next generation access forensic ...
Cruising on a Security Data Lake: Solving Big Data Challenges in SECOPS Charles Herring Researchers at WitFoo in conjunction with The University of Chicago and representatives from Law Enforcement, ...
Investigating Fake Digital Photos Chester Hosmer The global impact resulting from the distribution of doctored digital photographs has reached an epidemic ...
Protecting Active Directory: Detecting Insider and Privileged Attacks Derek Melber Active Directory is the keystone for nearly every enterprise in the world. With this being ...