Catalog

Search by Category
Search in Packages
Search by Format
Search by Date Range
Products are filtered by different dates, depending on the combination of live and on-demand components that they contain, and on whether any live components are over or not.
Start
End
Search by Keyword
Sort By

24 Results

  • Contains 1 Component(s)

    2020 HTCIA Virtual International Conference September 28 - October 2, 2020

    As the proliferation of surveillance cameras continues around the world, there is a common misconception that the evidence generated by these systems should speak for itself and be a “silent witness” for the trier of fact.  In this lecture, certified forensic video analyst Andrew Fredericks will guide attendees through common misunderstandings about video evidence and highlight case examples where “simply pressing play” led to inaccurate perceptions. Special focus is given to a recent Use of Force case that led to a homicide trial against a police officer – in large part because of a misinterpretation of video evidence.

    Brandon Wahl

    iNPUT-ACE

    Brandon Wahl is a LEVA certified Forensic Video Technician and manages the support services for the iNPUT-ACE software. As a Forensic Video Technician, Brandon has assisted on hundreds of video-centric investigations and continues to help agencies accurately decode proprietary video file formats, process digital multimedia evidence, and prep demonstratives for court. Brandon has been a member of the iNPUT-ACE team since the launch of the software in 2016 and currently manages the support services for the powerful software program.

  • Contains 1 Component(s)

    2020 HTCIA Virtual International Conference September 28 - October 2, 2020

    2020 HTCIA Virtual International Conference September 28 - October 2, 2020

    Rob Roj

    Senior Solutions Architect

    Shape Security

    Rob Roj, Senior Solutions Architect at Shape Security, has over 20 years of early stage start up experience with over 7 years within the Cybersecurity and Identity space.  He has been with Shape when there were only three customers and has consulted with F500 companies on incorporating an authentication security strategy that spans across IT, Security, Fraud and User Experience disciplines. Today, Shape Security protects the majority of the B2C F500 enterprises from automated & manual attacks on their Web & Mobile applications.  Shape Security has been honored "Fastest Growing Company in Silicon Valley" and has been recently acquired by F5 Networks for $1B.
  • Contains 1 Component(s)

    2020 HTCIA Virtual International Conference September 28 - October 2, 2020

    Stealing business or military secrets is a thing which attracts a lot of resources from both attackers and defenders. Since Internet traffic is more or less covered by techniques, like DLP tools (or by just disconnected important machines from the Internet), the most popular way to steal confidential or sensitive data is by employing a USB device.  During this presentation we will discuss artifacts left over plugging in USB devices to Windows, macOS and Linux computers or laptops, and how to extract and analyze them.

    Yuri Gubanov

    Belkasoft

    Yuri Gubanov, Owner and CEO, Belkasoft, a global leader in digital forensics technology, known for their sound and comprehensive forensic tools. With a team of professionals in digital forensics, data recovery and reverse engineering, Belkasoft focuses on creating technologically advanced yet easy-to-use products for investigators and forensic experts to make their work easier, faster, and more effective.

  • Contains 1 Component(s)

    2020 HTCIA Virtual International Conference September 28 - October 2, 2020

    Digital forensics is facing a lot of challenges nowadays within the fast evolving world of data storage technology. One of such challenges is shift towards embedded devices based on flash memory such as eMMC and other chips in all areas of applications. Unlike with raw flash memory, digital forensic specialist has no control over full memory access in these devices. In this presentation we will go through techniques of how to bypass controller and get access to full memory dump with practical applications.

    Sasha Sheremetov

    Rusolut

    Sasha Sheremetov brings more than 10 years of experience in the flash memory data recovery and digital forensics field. Since 2013 leading development team at Rusolut. In 2017 developed new technique to extract data from eMMC chips through NAND interface.

  • Contains 1 Component(s)

    2020 HTCIA Virtual International Conference September 28 - October 2, 2020

    Teach Law Enforcement personnel on the technology of Facial Recognition, explain how it is being used in the State of Arizona and how Law Enforcement agencies can submit a request.

    Daniel Heltemes

    Sergeant

    Arizona Department of Public Safety

    Arizona Department of Public Safety Sergeant Daniel Heltemes has twenty years of Law Enforcement experience.  He started his career in 2000, as a dispatcher with the Cochise County Sheriff’s Office.  In 2002, he became a police officer for the Benson Police Department.  In 2006, he lateraled to the Arizona Department of Public Safety as a Trooper assigned to Metro Phoenix.  Since then he has held numerous assignments including Highway Patrol, Commercial Motor Vehicle Enforcement, and worked narcotics on the Highway Interdiction Team.  In 2013, he became a Detective and was assigned to the Major Crimes District, Special Investigations Unit.  In 2015, he was promoted to Sergeant and assigned to Internal Affairs.  In 2016, he was selected to establish and create a Facial Recognition Section at the Arizona Counter Terrorism Information Center (ACTIC).  He now oversees the Department’s very successful statewide Facial Recognition program including supervising Audio/Video and Facial Recognition examiners from several different agencies. 

  • Contains 1 Component(s)

    2020 HTCIA Virtual International Conference September 28 - October 2, 2020

       Proving one single WiFi connection may solve a case. Was the suspect at a given time, connected to a specific WiFi spot, which is located in the address of interest? Was record of this connection stored in their device? Is the last connection time close to the time of a crime or incident? 

       If you can answer these questions, there will be a number of facts you can prove; however, how do you extract such information?  During this talk, we will cover the various ways to analyze Internet and other connections on Android and iOS devices as well as macOS and Windows laptops.

    Yuri Gubanov

    Belkasoft

    Yuri Gubanov, Owner and CEO, Belkasoft, a global leader in digital forensics technology, known for their sound and comprehensive forensic tools. With a team of professionals in digital forensics, data recovery and reverse engineering, Belkasoft focuses on creating technologically advanced yet easy-to-use products for investigators and forensic experts to make their work easier, faster, and more effective.

  • Contains 25 Product(s)

    Recorded content from the 2021 Canada Cyber Summit: May 4-7, 2021

    Recorded content from the 2021 Canada Cyber Summit: May 4-7, 2021

  • Contains 1 Component(s) Recorded On: 10/02/2020

    2020 HTCIA Virtual International Conference September 28 - October 2, 2020

       One of the biggest hurdles in computer forensic testimony, is figuring out how best to approach all the technical terms, procedures and evidence that needs to be explained and presented to a “non-technical” courtroom.  One of the best ways to overcome this hurdle is by providing them with a “virtual tour” of the evidence.  By harnessing forensic and VM technology, you can virtually “boot” the suspect’s system by creating a virtual machine from your forensic image file (e.g., .E01, .DD, etc.), and viewing the system just as if you had brought the computer into the courtroom and powered it on.  Judges and jurors can now see the system just as the suspect saw it, in its native Windows environment, and you will be able to present your evidence and findings in a much more efficient and effective way.  Attendees will learn the process of creating and booting a VM of a forensic image, and how they can use this process to locate additional evidence that’s not typically viewable via traditional forensic tools.  Attendees will also learn useful tips and tricks on how to successfully introduce this in a courtroom setting.

    Jeff Shackelford

    Product Manager and Digital Forensics Specialist

    PassMark Software

    Jeff Shackelford is a Product Manager and Digital Forensics Specialist for PassMark Software, makers of OSForensics. As a former Digital Forensics Lab Director, Supervisory Special Agent, and Certified Law Enforcement Instructor, Jeff has over 17 years of law enforcement experience and has been an active member, practitioner and speaker in the digital forensics and cyber-crime communities for the past 13+ years. Now with PassMark Software, Jeff utilizes his prior training and 'real-world' experience to oversee the development of PassMark’s premier digital forensics and e-Discovery toolkit, OSForensics.

  • Contains 1 Component(s) Recorded On: 10/02/2020

    HTCIA Virtual International Conference September 28 - October 2, 2020

    Not all is lost if an application is not supported by the black box approach (AKA the Get Evidence Button).  With the lion’s share of mobile devices being either Android or iOS around the world there is hope; data storage.  With data being stored in SQLite databases, Property Lists, Log Files, and other settings and investigator often has all the information at their finger tips.  Understanding the storage principles of these files, along with what can be harvested can make a rockstar out of any investigator.  Now you can become the forensic tool and uncover app data that has not been yet supported by any digital forensic company.

    Keith Lockheart

    Director of Training

    Oxygen Forensics, Inc.

       Keith Lockhart serves as the Director of Training for Oxygen Forensics, Inc. in Alexandria, VA (U.S.A). In that capacity, he provides training vision and curriculum continuity to the Oxygen Forensics user base while generating courses with customer success as their main focus. After 20 years in the DFIR education industry, Keith is globally recognized as an instructor, SME and peer who might not know the answer but will certainly help you find it!
  • Contains 1 Component(s) Recorded On: 10/02/2020

    HTCIA Virtual International Conference September 28 - October 2, 2020

    The global impact resulting from the distribution of doctored digital photographs, videos and audio has reached an epidemic proportion. These digitally altered fakes are distributed through social media, news outlets, traditional web resources and are making their way into the mainstream media.  The impact of these Deepfakes can dramatically change the way people think, act, react, believe and can ultimately cause harm. At the simplest level they represent fraud. During this presentation, I will convey real examples along with the resulting impacts that have already occurred.  Most importantly, I will demonstrate a new methodology rooted in the dark art of steganography that can actively identify these DeepFakes and even trace their origins back to their creators.

    Chet Hosmer

    Professor of Practice at the University of Arizona

    Python Forensics, Inc.

    Chet Hosmer serves a Professor of Practice at the University of Arizona in the Cyber Operations program where he is teaching Python and Machine Learning. Chet is also the Founder of Python Forensics, Inc. which is focused on the collaborative development of open source investigative technologies using Python and other popular scripting languages.