Where G33ks Gather
Abstracts & Bios
Virtual PFIC Portal
Network Virtually
Recordings Available
Until Dec 31st
PFIC 2023 Abstracts
Abstracts are listed in the order they show in the main agenda.
Malware & Ransomware Analysis Techniques (2 Hour Training)
This 2-hour training will walk you through an examination of a Windows 11 computer that has been compromised with ransomware. You’ll learn where to look for artifacts and how to use E3 to conduct the examination.
Dave Shaver, DFIR Guru
Dave has been a digital forensic examiner since 1999 and works for the united states government.
Cryptocurrency Ins and Outs (2 Hour Training)
With the increasing importance of privacy and security in today’s business world coupled with the advancement and acceptance of cryptocurrencies such as Bitcoin and Ethereum, today’s digital forensic professional is behind the proverbial power curve if they do not have a basic understanding of emerging blockchain, cryptocurrency, and digital asset technologies. During this session we will cover the following topics: Understand blockchain and transaction technologies; Examine raw data on blockchain ledgers; Research information about specific addresses and transactions; discuss exchanges; lastly talk about NFTs or blockchain-based digital assets.
John Wilson, Haystack ID
John Wilson is a highly motivated, strategic, results-oriented leader with over 20 years of experience in the information security and risk management field, focused on building strong Security Governance, Policies & Procedures, INFOSEC Teams, providing expert leadership, and assisting diverse organizations with developing and defining enterprise-level information security programs, which balance strong security practices with the needs of the business.
John provides expertise and expert witness services to help companies address various matters related to digital forensics and electronic discovery (eDiscovery), including leading investigations, and ensuring proper preservation of evidence items and chain of custody. He develops processes, creates workflows, leads implementation projects as well as GDPR data mapping services for clients, including major financial institutions, Fortune 100 companies, AmLaw 100 law firms as well as many other organizations small and large. In addition, he provides expert witness services and consulting in matters of all sizes. His work spans some of the largest litigations and matters on record in the United States and many of the 46 countries where he has worked on cases.
Digital Forensics Artifacts & Future
There is so much data just waiting to be found. In this session, a review of new artifacts that have come to light over the last year from computers, cloud, and smartphones. The future of your digital investigations lives with the artifacts and what can and cannot be recovered and processed.
Amber Schroader, Paraben
Over the past three decades, Ms. Schroader has been a driving force for innovation in digital forensics. Ms. Schroader has developed numerous software programs, courses, and guides in the areas of recovering data from smartphones, computer hard drives, cloud, email, and gaming systems. Ms. Schroader established protocols for the seizure and processing of digital evidence that have been used by numerous organizations throughout the world. Ms. Schroader has coined the concept of the “360-degree approach to digital forensics” and “Forensics of Everything-FoE” with her focus on unique problems in digital evidence and solutions. Ms. Schroader has been a huge industry influence in pushing for a big-picture consideration of digital evidence. An accomplished design architect, curriculum developer, and instructor; Ms. Schroader has written and taught numerous classes for this specialized field as well as founded multiple certifications. Ms. Schroader continues to support her through book contributions and other industry speaking engagements.
OSINT & Social Media Breadcrumbs (2 Hour Training)
Over the past year since our last presentation, we’ve performed GEO OSINT analysis of events to analyze the locations, chronology, behaviors, sentiment, and disinformation. The lack of metadata found in social media, can disrupt an investigation and therefore requires enhanced analysis to uncover altered images, geolocation breadcrumbs, sentiment, and more to build a chronology of events. In this session, we take a new and innovative way to map the locations of individuals and events. We’ll walk the audience through our analysis to help investigators bring further intelligence to their data acquisitions and drive deeper investigation into meaningful artifacts. A demo will also be included to highlight the methodologies used for the analysis.
Mike Raggo, CEO & Co-Founder, SilentSignals, Inc.
Michael T. Raggo has over 20 years of security research experience. During this time, he has uncovered and ethically disclosed vulnerabilities in products including Samsung, Checkpoint, and Netgear. His research has been highlighted on television’s CNN Tech, and numerous media publications including TIME, Forbes, Bloomberg, Dark Reading, TechCrunch, TechTarget, The Register, and countless others. Michael is the author of Mobile Data Loss: Threats & Countermeasures and Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols for Syngress Books co-authored with Chet Hosmer, and is a contributing author to Information Security the Complete Reference 2nd Edition. His Data Hiding book is also included at the NSA’s National Cryptologic Museum at Ft. Meade. A former security trainer, Michael has briefed international defense agencies including the FBI, Pentagon, and Queensland Police; is a former participating member of FSISAC/BITS and PCI Council, and is a frequent presenter at security conferences, including Black Hat, DEF CON, Gartner, RSA, DoD Cyber Crime, OWASP, HackCon Norway, and SANS. He was also awarded the Pentagon’s Certificate of Appreciation.
Chet Hosmer, Co-Founder, SilentSignals, Inc.
Chet serves as an Assistant Professor of Practice at the University of Arizona in the Cyber Operations program where he is teaching and researching the application of Python and Machine Learning to advanced cybersecurity challenges. Chet is also the founder of Python Forensics, Inc. a non-profit organization focused on the collaborative development of open-source investigative technologies using Python and other popular scripting languages.
Chet has made numerous appearances to discuss emerging cyber threats including NPR, ABC News, Forbes, IEEE, The New York Times, The Washington Post, Government Computer News, Salon.com and Wired Magazine. He has 7 published books with Elsevier and Apress that focus on data hiding, passive network defense strategies, forensics, PowerShell, and IoT.