2020 HTCIA Virtual International Conference

2020 HTCIA Virtual International Conference September 28 - October 2, 2020

Course Details

Monday, September 28, 202005:07:18
Welcome & Opening Remarks 00:15:10
Law Enforcement Operations at Uber 00:55:26
When Cyber Criminals Go Back To Their Roots: Inventory Theft Through L2 Hacking 00:45:55
The Cat and Mouse Game with iOS Forensics 00:50:46
Today's Digital Investigations Using Artificial Intelligence 00:37:15
Forensics in the Corporate Cloud 00:57:28
Exposing Bluetooth Low Energy (BLE) and BLE Mesh Threats to Law Enforcement and Unsuspecting Targets 00:45:18
Tuesday, September 29, 202009:43:09
Analyzing WiFi Connections 00:42:37
Arizona Department of Public Safety's Facial Recognition Section 01:02:00
GPS Investigations: An IoT Primer 00:47:32
"Cyber Sleuthing" - Investigation Resources 00:55:24
Opening - SIM Swap – Investigations, Scope, & Impact 00:43:18
Emerging Data Types in eDiscovery & Forensics 01:04:00
Drones and the Fourth Amendment 00:46:23
Hacking Your Way Into Security! 01:01:25
Broken Arrow 00:59:50
The Beginners Guide To Modern Mobile Device Extraction 00:42:46
Media Cache: A Hidden Vault of Evidence in Seagate Hard Disk Drives 00:57:54
Wednesday, September 30, 202008:48:37
Advanced Chip-Off Forensics 00:50:00
Cell Site Analysis and Data Validation: Bringing the Digital Environment to Justice 01:17:00
Phone Forensics to the Edge of Possibilities in 2020 - From Software Hacking to Chip-Off 00:53:48
Analyzing USB Connections 00:49:16
Forensic Investigation of Emails Altered on The Server 00:57:06
Forensic Artifacts and Techniques that are Essential for Mac Investigations 00:52:28
Identifying a Fraud Network from a Single Website or Email Address 00:51:37
Why We are Losing the War on Cyber Crime 00:37:22
Search and Seizure in the Digital Realm 00:53:06
Amazon Web Services as a Digital Crime Scene Location 00:46:54
Thursday, October 1, 202006:44:42
The Psychology Behind Computer Forensic Reporting and What Everyone Misses 00:45:50
Application Fraud Insights - Case Studies on Automation and Manual Click Farms 00:53:02
Intro to Griffeye Analyze DI 00:51:46
CyberTech Girls & GenCyber Girls - Digital Forensics for Kids 00:30:08
Microsoft 365 and OneDrive Forensic Update 01:03:58
How Was that Breach Detected? 00:45:28
Analyzing Video Evidence: Common Errors in Interpretation 00:57:18
Blurred lines on Resilience - Visualizing the Cyber Security Battlefield 00:57:12
Friday, October 2, 202006:48:01
TikTok, Telegram, and Other Social Media OSINT Investigations 00:38:48
The Intersection of Privacy & Security 00:52:28
Digital Evidence from Social Networking Sites & Smartphone Apps 00:52:47
Mostly Cloud with a Chance of Fog 00:56:58
Checkm8 Checkra1n and Beyond - iOS Full FileSystem 00:49:22
DeepFake Forensics Investigations 00:49:32
What if an App is Not Supported? 00:46:45
Creating VM’s from Forensic Images for Courtroom Presentation 01:01:21
Vendor Showcase Section03:56:55
Belkasoft Vendor Showcase 9/28 00:30:52
Skopenow Vendor Showcase 9/29 00:19:34
Grayshift Vendor Showcase 9/30 00:19:48
DME Forensics Vendor Showcase 9/30 00:14:50
OpenText Vendor Showcase 10/1 00:22:58
Susteen Vendor Showcase 10/1 00:22:13
Belkasoft Vendor Showcase 9/30 00:26:45
Susteen Vendor Showcase #2 10/1 00:13:12
Skopenow Vendor Showcase 10/1 00:16:40
Belkasoft Vendor Showcase 10/1 00:37:15
DeSales University Vendor Showcase 00:12:48
© Copyright 2024 | Terms | Privacy | MC LMS, Inc. | Designed by Boldare