Select Page

PFIC Agenda

You are never short on great content at PFIC. You get 100% of all the content in your track. No need to choose you to get it ALL!

Conference Opening Training

SEPTEMBER 22nd

All classes are Open Enrollment. All meals on September 22nd are on your own.

Applying Machine Learning to Digital Investigations – Now

This training will run from 8:00 AM to 5:00 PM. Do not change course at mid-day.

Instructor Chet Hosmer

There is a great promise, myths, and confusion regarding Machine Learning (ML) and Artificial Intelligence (AI).

This hands-on full-day training will introduce what machine learning is, how it is different from Artificial intelligence and how this can be applied to digital investigation challenges today.

This is not a theoretical lecture, rather participants will spend a full day working through real ML challenges and solutions using Python, Jupyter and several key Machine Learning Libraries.

 

Morning Session (Introduction)

  • What is Machine Learning and how can it be applied within digital investigations
  • Setup and installation of Jupyter on Student Computers (Windows or Mac) No pre-installation before the class is required.
  • Hands-on Introduction to Jupyter and Python ML platform
  • Introduction and hands-on experimentation with Jupyter / Python tools and libraries
    • Numpy
    • Matplotlib
    • Pandas
    • Scikit-Learn

 Afternoon Session (Application and Challenge Problems)

  • Using ML to Categorize Files by Content
    • Training
    • Prediction
  • Using ML to Identify Visual Objects
    • Training
    • Prediction
  • Using ML to identify Indications of Compromise
    • Training
    • Prediction

All session participants will receive open source solutions to each Challenge Problem.

Available Partial Day Training

Open Enrollment for any class. All meals are on your own.

8:00 AM to 10:30 AM

Analysis of Risk. Threats and Posed Solutions of 5G

Instructor Larry Liebrock

University of Idaho

 

5G network technology will provide broadband access everywhere, enable higher user mobility, and facilitate connectivity of a massive number of devices (e.g. Internet of Things (IoT)) in a trusted, reliable and economically affordable way. The main information technological enablers:  cloud computing, Software Defined Networking (SDN) and Network Function Virtualization (NFV) are maturing toward widespread utilization in 5G. However, there are pressing security challenges in these technologies coupled with the growing concerns for user privacy and surveillance. In this tutorial, I provide an overview of the security challenges in these technologies and the issues of privacy and surveillance in 5G infrastructures. Furthermore, I will propose some present potential security solutions to these risks, challenges and future directions for secure, trusted 5G systems in cyber-physical environments.

11:00 AM to 12:30 PM

Introduction to Mobile App Analysis

Instructor Amber Schroader

Paraben Corporation

 

Learn what data is recoverable from popular Apps on both Apple and Android devices. This class will focus on proper expectations of data when it comes to mobile App analysis. A review of popular Apps will be part of the class with a walk through a case. Both parsed and unparsed data from a variety of different acquisition types.

1:30 PM to 5:30 PM

CryptoCurrency Investigations 

Instructor John Wilson

Haystack ID

 

September 23rd

When you register for PFIC you select a track either the Novice or Master track. Each of the conference days you can attend with your track to ensure you get 100% of the content in that track. If you find something in the other track of interest please pop in and take a look.

}

8:00am – 9:00am

Bear Hall

NOVICE TRACK

Introduction to Windows Forensics

Dave Shaver

 

}

8:00am – 9:00am

Bison 4-5

MASTERS TRACK

Omnipod Insulin Pumps: Vulnerabilities and Proposed Security Measures

Naveed Yazdi

}

9:00am – 10:00am

Bear Hall

NOVICE TRACK

I Rest My Case

Tyler Hatch, DFI Forensics 

 

}

9:00am – 10:00am

Bison 4-5

MASTERS TRACK

Reviewing Data for Beach Notifications

Warren Kruse, Consilio

 

}

10:30am – 11:30am

Bear Hall

NOVICE TRACK

Hard Drive Imaging

Greg Dominguez, Wiebetech

}

10:30am – 11:30am

Bison Hall 4-5

MASTERS TRACK 

Creating VM’s from Forensic Images for Courtroom Presentation

Jeff Shackelford, PassMark Software

}

11:30am – 12:30pm

BEAR Hall

NOVICE TRACK

Modern Data Types Introduction: Slack, cloud, and communication platforms

John Wilson, Haystack ID

 

}

11:30am – 12:30pm

BISON HALL 4-5

MASTERS TRACK

Gaming with Your Evidence

Amber Schroader, Paraben Corporation

 

}

1:30pm – 2:30pm

Bear Hall

NOVICE TRACK

Analyzing WiFi connections

Yuri Gubanov, Belkasoft

 

}

1:30pm – 2:30pm

BISON HALL 4-5

MASTERS LAB

Using Modern Digital Forensics Tools To Hunt the Most Advanced Threat Actors

Keatron Evans, KM Cyber Security

 

}

3:00pm – 4:00pm

Bear Hall

NOVICE TRACK

 Incident Response for Business Email Compromise – Searching for SSNs and Credit Card Numbers in mailboxes Acquisition and using the predefined REGEX content search

Michael Zinn, Microsystems Management Technology Consultants

 

 

}

3:00pm – 5:00pm

Bison hall 4-5

MASTERS TRACK

Deepfake Forensic Investigations

Chet Hosmer, Python Forensics 

 

}

4:00pm – 5:00pm

Bear Hall

NOVICE TRACK

Setting up your own digital forensic lab

Amber Schroader & Others

 

 

September 24th

}

8:00am – 9:00am

Bear Hall

NOVICE TRACK

Mobile Forensics Triage

Susteen 

 

}

8:00am – 9:00am

Bison 4-5

MASTERS TRACK

Legal Issues of 5G

Don Wochna

}

9:00am – 10:00am

Bear Hall

NOVICE TRACK

 

}

9:00am – 10:00am

Bison 4-5

MASTERS TRACK

 

}

10:30am – 11:30am

Bear Hall

NOVICE TRACK

Introduction to Hacking Web Applications & Pen Testing

Scott Miller, Synopsys

}

10:30am – 11:30am

Bison Hall 4-5

MASTERS TRACK

#OSINT: Knowledge is Power Stephen Ramey, Aperture Cyber Advisors LLC 

}

11:30am – 12:30pm

BEAR Hall

NOVICE TRACK

 Computer Forensics: Advanced Analysis for the Basic Examiner

Jeff Shackelford, PassMark Software

 

}

11:30am – 12:30pm

BISON HALL 4-5

MASTERS TRACK

Ins and Outs of Cloud Data

Greg Kipper, Paraben Corporation 

}

1:30pm – 2:30pm

Bear Hall

NOVICE TRACK

 

}

1:30pm – 2:30pm

BISON HALL 4-5

MASTERS TRACK

Advanced Windows 10 Forensics

Dave Shaver

 

}

3:00pm – 5:00pm

Bear Hall

NOVICE TRACK

Tips & Tricks in Digital Investigations

Michael Menz, Kipp Loving , & Mark Menz

 

 

 

}

3:00pm – 4:00pm

Bison hall 4-5

MASTERS TRACK

 Finding the needle in the haystack with Incident Investigation

Yuri Gubanov, Belkasoft

}

4:00pm – 5:00pm

bison hall 4-5

MASTERS TRACK

 

 

September 25th

}

8:00am – Noon

bison hall 4-5

Raspberry Pi build day 2.0 will focus on expanding the options for using a Raspberry Pi in investigations.

Instructor Chet Hosmer

Pricing options are based on hardware configurations. Hardware purchased will go home with the student. All students are welcome to bring their own Pi and select that pricing option

  • Participants Build a Pi 4 from the ground UP
  • Students will focus on using the Raspberry Pi for target network host sweep
  • Look for open ports on a network
  • Monitor network to create a baseline
  • Investigate abnormalities in network
  • Review of Raspberry Pi Hats