Abstracts & Speaker Bios
Get into the details of all the innovative ideas and concepts that you can learn at PFIC.
All times listed are Mountain Time Zone.
Pre-Event Training Sessions
Live Twitter OSINT Investigations
8:00 AM to Noon
Mike Raggo and Chet Hosmer SilentSignals Inc.
1:30 PM to 3:30 PM
In this training, we will be going over different technologies and methods you may come against while conducting National and international investigations.
We will go into using Technology (from forensics to TSCM) to determine potential threats, as well as some new, and exciting ways of gathering actionable intelligence.
Our last topic will cover utilizing technologies you carry, to protect yourself while traveling, and running investigations abroad.
Stephen is a Security and Investigations Professional with extensive experience conducting special investigations. His experience investigating government corruption, exposing human trafficking, directing counterintelligence operations, and defeating organized crime, demonstrates his intense focus on being diverse and seeking only the most challenging cases. At Conflict International, Stephen is responsible for planning and leading investigations and security operations across the enterprise. Stephen’s experience on a global scale allows him to conduct high profile special and private investigations for government, private individuals, and corporate clients. His vast network and highly placed contacts in over 90 countries provides unmatched access and placement while enabling Conflict International to provide discreet and sound solutions for their clients. Stephen proudly served in the United States Army and is a Veteran of Operation Iraqi Freedom and the Global War on Terror. Stephen’s commitment to the International Security and Investigations Profession is demonstrated through his membership in the World Association of Detectives where he serves as the United States Ambassador and Sergeant at Arms. In addition, Stephen was accepted as an overseas member of the Association of British Investigators and the National Council of Investigation and Security Services. Stephen holds certifications in various intelligence disciplines to include courses in Technical Surveillance Countermeasures (TSCM), Certified Master Anti-Terrorism Specialist (CMAS), Intelligence / Counterintelligence Specialist (OIS), Combating Human Trafficking, Instructor and Master Trainer of Lie Detection, and many more. In 2020 he was awarded Instructor of the Year in Human Lie Detection. As an international guest speaker, Stephen has spoken and lectured for the World Association of Detectives, International Foundation of Cultural Properties Protection, Society of Professional Investigators, the Global Security Connection Conference, and the BlackBerry Security Submit as well as several others. Stephen has been featured in various national and international media outlets regarding investigations in international criminal cases, human trafficking, and was reported by the Daily Mail in 2018 as “instrumental” in the release of an American citizen facing the death penalty [in a Chinese prison] for a crime he did not commit.
3:30 PM to 5:30 PM
The West’s Global War on Terrorism has served to increase the intelligence value and targeting potential for hostile actors, who are increasingly making use of a rich variety of digital devices. The present – seize, conduct a chain of custody, transport, forensically image, investigate, report, and secure forensics cycle – have limited utility in meeting fast-cycle intelligence collection and exploitation in non-permissive combat settings. Certain law enforcement and intelligence are developing, seeking to perfect, validate and deploy more of an on-site, in situ – intelligence exploitation for the terrorist suspect-device-data-communications continuum. We will present and critically discuss a case dealing with a terrorism suspect – describe an emerging set of tactics, techniques, and procedures for critical consideration. . A protocol fieldcraft technique will be demonstrated. Note that: This is a fast-moving discussion at the advanced level. Attendees should have recent hands-on digital forensics experience. A copy of the materials will be posted after the presentation.
Larry Leibrock, Idaho State University/Idaho National Lab
Larry Leibrock, Ph.D. DA, MBA is a US Army combat veteran and former US Government Intelligence Officer. He served in air cavalry, Special Forces, and airborne infantry assignments in the US, Asia, Europe, and the Middle East. He was selected to join the USG AFPAK HANDS and IRAN CADRE programs. Larry has broad knowledge, skills, and field experience in crime scene exploitation, digital forensics investigations, and cyber threat intelligence reporting. Larry has training and certifications in a broad range of intelligence, forensics, and data mining tools. He has been involved in digital forensics investigations ranging from GPS devices to super-computers. He has provided expert testimony in administrative, civil and criminal cases in both the US and international settings. He has taught forensics tradecraft and cyber-security topics to professionals in the US Government, allied forces, and university students. He has taught at University of Texas, Emory, Center of Disease Control, US Army War College, Monterrey Tech, Harvard University, Helsinki School of Economics and National Intelligence University. He has authored peer-reviewed publications dealing with case development for cyber-security and digital forensics. He presently serves as a member of the Idaho State University College of Science and Engineering faculty.
Wednesday September 15
8:00 AM to 9:00 AM
The Digital Data & Social Media of Digital Gaming
Over 1.2 billion people play online gaming and it has become a hub of data for potential investigations. The average gaming session lasts hours where interaction into an entirely new virtual world can leave fingerprints of conversations, relationships, and data. Jump into this virtual reality of online gaming to see what new information can be gathered from this emerging social network. You will learn the different popular gaming environments, social media tools used by gamers, and their associated artifacts.
Amber Schroader, CEO & Founder, Paraben Corporation
Throughout the past two decades,
9:00 AM to 10:00 AM
Introduction to Hacking Web Applications & Pen Testing
Unless you’ve worked as a professional penetration tester, the actual process of testing an application and generating and delivering a
report is probably a mystery to you. Some web applications are quite big – where do you even start?
As a Security Consultant, I test new applications every week or every other week while maintaining a high level of consistency and quality. This is not something I was able to do when I started, and it was developed through effective training and experience.
In this talk, I’ll describe how to approach a professional web application penetration test, including where in the application to start, what kinds of tests to do, and how to know when to stop. I’ll talk through several tools and processes that help me to focus my efforts on certain parts of the application without losing significant coverage on the rest of it.
By the end of this talk, you should have a good foundation for becoming a penetration tester and understanding why applications fail and how to find the issues about which your clients care most.
Scott Miller, Accenture
Scott Miller is a Security Consultant at Accenture and performs vulnerability assessments and penetration tests for Accenture’s clients, with his favorite domains being network and web. He enjoys traveling and attending conferences and recruiting events related to security and/or diversity and inclusion. Scott also enjoys fitness and doing activities like kayaking, hiking, and boxing.
10:30 AM to 11:30 AM
Forensic Analysis of Fake Multimedia
In this session, we’ll focus on the media aspects of fake news, disinformation campaigns, and fake intel with deep analysis of altered images, audio, and video to uncover methods used to twist narratives and mislead perceptions. We’ll dive into the taxonomy of fake photos, deepfakes, phishing audio fraud attacks, fake rallies, nation-state fake intelligence, and media-generated to inspire mass hysteria. We’ll then further categorize these threats by their TTPs and provide methods for enhancing detection and response strategies. We’ll also demonstrate our Python Machine Learning-based media analysis tool to demonstrate detection of fake media gathered from news sites and social media, and provide deep and tangible insights into this systemic problem.
Mike Raggo, SilentSignals Inc.
Michael T. Raggo (Co-Founder, SilentSignals, Inc.) has over 20 years of security research experience. During this time, he has uncovered and ethically disclosed vulnerabilities in products including Samsung, Checkpoint, and Netgear. His research has been highlighted on television’s CNN Tech, and numerous media publications including TIME, Forbes, Bloomberg, Dark Reading, TechCrunch, TechTarget, The Register, and countless others. Michael is also the author of Mobile Data Loss: Threats & Countermeasures and Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols for Syngress Books co-authored with Chet Hosmer and is a contributing author to Information Security the Complete Reference 2nd Edition. His Data Hiding book is also included at the NSA’s National Cryptologic Museum at Ft. Meade. A former security trainer, Michael has briefed international defense agencies including the FBI, Pentagon, and Queensland Police; is a former participating member of FSISAC/BITS and PCI Council, and is a frequent presenter at security conferences, including Black Hat, DEF CON, Gartner, RSA, DoD Cyber Crime, OWASP, HackCon Norway, and SANS. He was also awarded the Pentagon’s Certificate of Appreciation.
Chet Hosmer, Python Nation
Chet Hosmer is the Founder of Python Forensics, Inc. a non-profit organization focused on the collaborative development of open source investigative technologies using the Python programming language. Chet has been researching and developing technology and training surrounding forensics, digital investigation and steganography for over two decades. He has made numerous appearances to discuss emerging cyber threats including National Public Radio’s Kojo Nnamdi show, ABC’s Primetime Thursday, NHK Japan, CrimeCrime TechTV and ABC News Australia. He has also been a frequent contributor to technical and news stories relating to cyber security and forensics and has been interviewed and quoted by IEEE, The New York Times, The Washington Post, Government Computer News, Salon.com and Wired Magazine.
Chet is the author of five recent Elsevier/Syngress Books:
- Passive Python Network Mapping,
- Python Forensics,
- Integrating Python with Leading Computer Forensic Platforms,
- Data Hiding which is co/authored with Mike Raggo,
- and Executing Windows Command Line Investigation, which is co/authored with Joshua Bartolomie and Ms. Rosanne Pelli
Chet serves an Assistant Professor of Practice at the University of Arizona in the Cyber Operations program where he is teaching Violent Python, Using Python for Advanced Cyber Analytics (ML) and Cyber Deception.
Chet delivers keynote and plenary talks on various cyber security related topics around the world each year. He is also well-known as the Co-Founder of WetStone Technologies, Inc. a renowned cyber security organization developing malware and steganography solutions in use by Law Enforcement, Defense and the Private sector world-wide.
11:30 AM to 12:30 PM
Social Engineering in 2021
- Case Studies
- Potential Victims of Social Engineering
- The Dangers of Successful Social Engineering Campaigns
- Types of Social Engineering Attacks
- Preventive Measures Against Social Engineering
- Reactionary Steps for Victims of Social Engineering
- Prognosis of Social Engineering in 2021
Christopher Salgado is a highly accomplished and trusted security and investigations leader with more than 19 years in cyber and physical investigations as well as security. Throughout his career, he has effectively assisted several companies, including Fortune 50 companies, in various capacities, including via the installation of numerous innovative and efficient processes in the topics of investigations, security, brand protection, threat management, business continuity, intelligence, operations, recruiting, customer service, employee morale, and leadership. The companies that have benefitted from his services span across the spectrum of industries, including social media, pharmaceutical, luxury brands (clothing, jewelry, etc.), consumables, automotive, electronics, film production, streaming services, entertainment, and insurance. He has also assisted investigations firms and law firms across the globe. Christopher Salgado is a contributing author to PI Magazine on cyber and social media investigations and a member of the London Speaker Bureau.
- Co-Founder of All Points Investigations, LLC, a global cyber and physical investigations firm.
- Former managing investigator at Facebook.
- Featured in multiple interviews and articles on effective cyber and physical investigations.
- Christopher Salgado has trained numerous investigators, members of law enforcement, corporations and law firms globally on effective cyber and physical investigations.
- Christopher Salgado currently offers aggressive cyber investigations training to investigators and companies across the globe.
1:30 PM to 2:30 PM
Reviewing Data for Beach Notifications
Join James and Warren as they discuss the process surrounding data mining and review following a cyber incident. The conversation will cover data collection post forensic analysis, the use of technology to identify sensitive material as well as strategies to reduce populations requiring review. Additionally, the panel will discuss review strategies focused on creating efficiencies in downstream workflows such as jurisdictional analysis and notification.
Warren Kruse, Consilio
Warren Kruse is a vice president with Consilio, an eDiscovery and document review service provider. He has spent the last thirty years between law enforcement and as a consultant supporting various agencies with incident response, computer forensics, and eDiscovery.
Warren, co-author of “Computer Forensics: Incident Response Essentials”, is the past International President of the High Crime Investigative Association (HTCIA) and Past President of the Digital Forensics Certification Board (DFCB).
He has supported projects across a wide range of major U.S. corporations and agencies. In addition, he led a team of computer forensic experts in a three-year engagement in support of a fraud investigation task force at the world’s largest international cooperative organization. Recipient of the HTCIA “High Tech Case of the Year” award, Kruse was recognized for his forensic analysis conducted on a case surrounding the theft of intellectual property and trade secrets on the billion-dollar “Comtraid” matter; was a court-appointed expert, and testified as a computer forensic expert for the US Securities and Exchange Commission (SEC).
He has a Master of Science, Digital Investigation Management and a Bachelor of Science, Digital Forensics from Champlain College.
James Jansen, Consilio
James Jansen leads Cyber Incident Response Services at Consilio, a global leader in eDiscovery and consulting services.
As the Global Lead of Cyber Incident Response Services and senior member of Consilio’s Client Services team, James focuses on helping clients and their counsel develop and implement effective strategies based on the needs of their matter.
With more than a decade of legal and eDiscovery experience, James has consulted on and managed highly complex engagements for clients across a range of industries including the financial, insurance and technology sectors. As the Global Lead for Consilio’s Cyber Incident Response Services, James uses this expertise to assist clients impacted by a range of cyber incidents including Business Email Compromise, Ransomware and Data Exfiltration. Working hand in hand with clients, their breach counsel, and cyber forensic firms, James and his team offer clients a range of services when responding to a Cyber Incident including data collection and hosting, analytics driven data mining, document review, and notification report generation.
Additionally, James is an adjunct professor at Wake Forest University School Law where he teaches a course on Electronic Discovery. He is also a frequent CLE panelist on topics relating to both Cyber Incident Response and eDiscovery.
James received his undergraduate degree from the University of North Carolina at Chapel Hill and his law degree from Wake Forest University School of Law in Winston Salem, NC. He is based in Raleigh, NC and has maintained an active license to practice law in North Carolina since 2007.
3:00 PM to 4:00 PM
DFIR Toolmarks: Extending detection, analysis, and attribution
Typical CTI products do not delve into DFIR toolmarks, and typical DFIR business models and training obviate analysts from developing toolmarks. However, DFIR toolmarks have been leveraged to enable higher fidelity detections, further analysis, and develop more granular attribution.
Harlan Carvey has been a DFIR practitioner for over two decades and been engaged in information security practices for another decade beyond that. After leaving active duty, Harlan was leading teams conducting vulnerability assessments and “war dialing” in the private sector before moving into DFIR full time. During his time, Harlan has engaged in a wide range of analysis and response, from malware eradication to AUP violations to targeted, nation-state threat hunting and response. Harlan is an accomplished public speaker and a prolific published author.
4:00 PM to 5:00 PM
ForensICS | Breach Investigation in ICS/SCADA
It has been a big challenge when Industrial Control Systems got compromised due to the limitations of skillful professionals in the OT environment.
In Generation IV, the ability to conduct both live analysis and memory acquisitions has opened the door for Forensicators who have an understanding of ICS/SCADA systems.
In this talk, it will be demonstrated how to acquire a memory dump in a system running under Windows OS in a forensically sound manner when a breach is assumed..
- Gain a fundamental understanding of the OT environment.
- Learn the practical steps of memory acquisition for forensics investigation from a compromised OT system.
- Equip the CERT/DFIR/CSIRT team of the applied forensics in ICS/SCADA.
- Formulate Incident Response playbook in OT.
Art Rebultan Principal DFIR, Envision-Digital International
Art Rebultan has more than 18 years of experience combined as an IT and OT professional with a background in PCI-DSS audit management, Unix/Linux security and systems administration, R&D, VAPT, TVM, Risk Management, Counterintelligence, and currently leading the global Digital Forensics and Incident Response program in an AIoT/IIoT/ICS/OT/Edge Computing company. Holding a master’s degree in IT with a concentration in E-Commerce security. He has also a professional graduate diploma in Digital Forensics and Cyber Security as continuing education. Specializing in Computer Forensics, Network Intrusion, Data Breach, Cybercrime Investigation, Malware Analysis, and Reverse Engineering. Security content writer and public speaker as past-time hobby and uncovered 7 zero-day malware during IOC extractions from Forensics analysis. Krav Maga practitioner, Judoka, and a license level 2 Freediver.
Thursday September 16
8:00 AM to 9:00 AM
Mobile Device Management & Stalking & Surveillance
This seminar will explore the interpretation ( and misinterpretation) of common Mobile Device Management artifacts resident on electronic devices. The presenters have experienced several cases throughout the past year in which individuals have turned to forensic analysts to explain the existence of MDM artifacts resident upon their electronic devices without their knowledge or consent. In many cases, the artifacts can be traced to the interdependence of, and data sharing capabilities of, apple and android products. In at least one case, the inaccurate explanation of MDM artifacts led one client to initiate legal action against the client’s spouse’s employer.
Don Wochna, Wochna Law Office
I am one of a few experienced litigators in the United States to have been certified as a Computer and Mobile Device Forensic Examiner and to have testified in federal and state courts. Beginning in 1999, I focused the Wochna Law Firm on criminal defense cases in which evidence is found on computers, cell phones, and/or networks. Leveraging my 37 years practicing law and my 20 years as a consulting and testifying digital forensic expert, I accept engagements from Criminal Defense attorneys and law firms in the United States looking to leverage a strategic insight into electronic evidence that can only be delivered by an attorney who is also an electronic evidence expert.
In 1983, I obtained my law degree from Law School, the University of Chicago where I first observed the need for simple and effective explanations of complicated technical concepts that underlie many criminal defense matters in the modern electronic society. I strive for explanations that are understood by attorneys, judges, clients, and jurors that do not have significant technical backgrounds. Contact me today to give your case the edge it needs.
Director of Information Security and Data Privacy Law. Providing strategic leadership of global information security and data privacy within cloud-hosted and geographically dispersed regions. Experience mostly centered on the healthcare industry with some energy sector consultancies.
Born and educated in England. I hold dual UK and USA Citizenship. My professional career has included living and working for five years in Tokyo, Japan. Plus lived and worked in Europe, Asia, and now in North America. Relevant professional certifications include CISM, CIPM & HICCSP & CDPSE.
9:00 AM to 10:00 AM
Multi-INT Enabled Discovery: Digital Forensics at Cloud Scale
Multi-INT Enabled Discovery (MINTED) is a platform developed by the Microsoft Azure Special Capabilities, Infrastructure, and Innovation (ASCII) team. It enables users to extract intelligence using state-of-the-art AI models, quickly identify trends and anomalies, and visualize actionable results. In the world of Digital Forensics, this provides new insights into raw data by showing analysts these trends and anomalies across data types. In this presentation, I will walk through how MINTED, combined with cloud, can empower analysts everywhere with the critical information they need to succeed in their mission.
Joel Day is a Technology Strategist focused on Intel Community and DoD Accounts. He has been with Microsoft since 2011, where he started as an Application Development Consultant, working on digitally transforming the IC. His current focuses include building Cloud Native applications, deploying Internet of Things solutions, bringing AI to the Edge, and implementing DevSecOps. He lives dangerously by constantly installing beta software on his production laptop, and he always normalizes his data sets.
Chris is honored to have served within the military Special Operations community of the US Navy SEALs over the last 20 years. As a SEAL he led teams ranging in size from 16 to 200+, in missions ranging from unconventional warfare to counterinsurgency to Presidential protection and SOF strategy development. His favorite role was leading a fusion team consisting of SEAL operators and cross-disciplinary analysts charged with developing US resources in denied areas of the world.
Most recently Chris was the Head of Analytics at a non-profit organization dedicated to supporting Special Operations veterans transitioning from the military to corporate roles, where he provided decision and analytics support to the CEO and her staff. He is now working on a cleared data science team at Microsoft, building solutions for government customers in the national security sphere.
Chris has a Masters in Data Science from the UC Berkeley MIDS program and is a big fan of Python dictionary comprehensions.
10:30 AM to 11:30 AM
Tools and Techniques for Linux Skeptics
WindowsOS is your preferred platform (understandably). But you can turbocharge your forensic work by adding Linux innovations to your toolbox. Two dynamic Forensicators will show you how.
In this session you will learn how to:
* Add Linux to your workbench can save you time and money
* Validating results uncovered from Microsoft Windows tools
* Use Linux on your existing computer(s)
* Better leverage file systems
* Use Linux outside your lab
* Use Linux in court
Ira Victor has more than 25 years of information security and digital forensics experience. Ira first installed Linux on a “WinTel” computer at about the time RedHat Linux v3 (stable) became available. Ira is named as co-developer on multiple U.S. patents related to information security. His professional background includes work in messaging, incident response, digital forensics, and eDiscovery. Mr. Victor coauthored ground-breaking legislation on information security, privacy and digital forensics in his home state of Nevada. Ira has earned and maintained certifications from GIAC and ISACA.
Kevin Fisher has been a foundation in the Paraben support team for 10 years. Kevin’s dedication to the Paraben customers goes well beyond work hours with volunteering to help them in his free time as well. Kevin has had a love of computers for many years and that love and passion come through with all of his time and effort he puts into Paraben. Kevin loves all the Paraben tools, but E3:DS has a special place in his heart because of the challenge it is as no two devices are the same.
11:30 AM to 12:30 PM
Coffee, Tea or NVMe
On March 1, 2011 the NVM Express (NVMe) specification was released. Though not as long a history as mechanical or SSD hard drives, NVMe touts faster read and write speeds, somewhat easier to install, and bypasses the SATA bus completely. With all of this, NVMe is poised to make a significant impact on computing. This presentation explores NVMe for the digital forensics lab. How can we use it, how can we collect from it, and can it make a significant enough impact to encourage more of its use in our labs.
A comparison has been made between SATA III mechanical hard drives, SATA III SSD hard drives, and NVMe storage. Standard benchmarking software has been used, and also the processing of a suspect hard drive has been run using all three different media. An examination of how we can collect data from a suspect drive in a forensically sound manner is also part of this talk.
Tim Carver, The University of Alabama, Huntsville
Prof. Timothy A. Carver holds a Bachelor of Science in Computer Science and Electronics Engineering, a Master of Science in Computer Science, and is ABD on his Ph.D. Over the years, he has designed and programmed video games, consulted at General Electric Aircraft Engines, and run his own business, He fell in love with teaching and has served in various faculty positions at The University of Cincinnati and other universities.
Currently, Prof. Carver teaches at The University of Alabama in Huntsville. He is a practicing Forensic Computer Examiner, a member of the International Society of Forensic Computer Examiners (ISFCE) and is a member of the Board of Directors for the High Tech Crime Consortium (HTCC). Because of his research on Bitcoin Forensics, Prof. Carver has been asked to consult on several cases and provide training to quite a few law enforcement organizations in recent years. He has also been referenced by the National Security Agency for his knowledge of Bitcoin.
1:30 PM to 2:30 PM
Windows 11 Forensics
With every new upgrade/update to Windows, forensic artifacts also change. In this 50-minute class, we will cover a few new artifact locations in Windows 11 to assist you in your examinations. Learn what you might be missing in the next evolution of Windows.
Dave Shaver, Digital Forensic Examiner
Dave Shaver has been a digital forensic examiner since 1999. He currently is working for the U.S. Government.
3:00 PM to 4:00 PM
The cat and mouse game with iOS Forensics
iOS forensics has been a hot topic over the last few years. Apple is constantly strengthening its security measures on their devices such as iPhones, iPADs, Apple TV, Apple Watch etc. This was designed to prevent hackers and by doing so law enforcement investigators access to its devices, Things like remote phone wiping, not allowing the passing of data through lightning cable, requests to enter a PIN after potentially suspicious actions (like changing a SIM card), 6-digit PIN by default etc, make digital investigations much more difficult.
There are, however, some breakthrough advances in the field of Apple device forensics, such as checkm8, unc0ver and checkra1n jailbreaks, as well as advances in agent-based acquisition. These advances gave investigators the forgotten possibility to acquire so-called “full file system copy”, which has far more data than a regular iTunes backup. Under some circumstances, there is a possibility to acquire data and keychain even without a jailbreak!
Jared Luebbert , Belkasoft
Jared Luebbert is a Digital Forensics Expert and Litigation Support Professional with years of experience performing digital forensic collection and analysis worldwide. He is the Forensic Sales Engineer for Belkasoft in North America and the founder and lead examiner of Gateway Forensics, a veteran-owned digital forensics company located in Maryland. Jared has worked on cases from a variety of industries including Energy, Manufacturing and High Technology, Medical, and Real Estate. He has assisted clients with patent infringement damages assessments, financial fraud, civil and criminal law matters, mobile device & computer forensics, intrusion detection, and incident response.
4:00 PM to 5:00 PM
A Holistic Approach to Combatting Ransomware AI
The ever-evolving digital age affects every critical infrastructure on a global scale. IoT devices leverage the Internet to enable on-demand control and data feed to transform innocuous devices into powerful smart tech. IoT has transcended into a movement, shifting to what is now referred to as the Internet of Everything. The implications of IoE on the cybersecurity landscape are vast. Threat actors will continue to invest heavily in the exploitation of new technologies to advance the efficiency and decisiveness of their criminal operations. Experts estimate that in 2021 global ransomware attacks will reach a total of $6 trillion in damages, and it is forecasted that the sophistication of disruptive methods of attack will only increase. The methods of attack are beginning to include machine learning AI’s which allow threat actors to stealthily traverse an environment and attack specific targets autonomously, resulting in attacks that are more difficult to detect, prevent, and investigate. The uptick in deepfake technology over the last two years has also provided additional capabilities for threat actors to leverage, including elaborately convincing fabricated voice, image and video content. Faced with the threat of increasingly advanced ransomware attacks, sophisticated protections must be implemented. AI powered threat detection tools can identify patterns of malicious behavior and autonomously prevent intrusions and pacify deepfakes. Organizations must adopt a holistic approach when combatting AI ransomware, leveraging machine learning neural networks, to keep up with the advancing threat landscape.
Richard D’Souza, CyberClan
Richard D’Souza is the Owner and CEO of CyberClan. CyberClan has been providing cybersecurity services since its inception in 2006. Richard brings over 20 years of comprehensive cybersecurity experience in areas including incident response, computer forensics, secure architecture, security assessment, auditing, cyber extortion, and dark web investigation. Richard has conducted hundreds of vulnerability assessments and penetration tests, as well as business transformation computing efforts and architecture decisions in various IT environments including the gaming industry, government, foreign embassy, insurance, critical infrastructure, telecommunications, and engineering. His deep knowledge in identification and prioritization, in addition to authorship of critical cloud security architecture decisions, requirements, guidelines, policies, and procedures across multiple domains provide expertise to lead in any complex security enterprise. In addition, Richard was the Managing Director of Operations and Head of Information Security at UK based Accredited Test Facility (ATF) where he established the ATF’s Canadian operations with particular emphasis in security auditing, compliance testing, sales and business development.
End of Event-Recordings will be made available by the following week.
“If you have not looked at attending the Paraben Forensic Innovation Conference you should. The DFIR event has great talks and lots of hands-on lab tracks. Even though the conference is called Paraben, there are a lot of other forensic companies there. And, you can talk to lots of real users. Unlike other conferences that cost thousands, this digital forensics conference is affordable for any budget. Bonus: It's in Park City UT. I plan to be there every year!"
Ira Victor, Chief Forensic Analyst