Aikaterini: I’m Aikaterini Kanta. I’m a PhD candidate with University College Dublin, and I’m really glad to be here today. I’m going to talk to you about my PhD research. So, about contextual based decryption.
So, the average number … Read more
Aikaterini: I’m Aikaterini Kanta. I’m a PhD candidate with University College Dublin, and I’m really glad to be here today. I’m going to talk to you about my PhD research. So, about contextual based decryption.
So, the average number … Read more
Julie O’Shea: Hi, everyone. Thanks for joining today’s webinar: Uncovering Windows Registry Data and the Latest Mac Artifacts. I’m Julie O’Shea and I’m the Product Marketing Manager here at Cellebrite Enterprise Solutions. Before we get started, there are … Read more
Gaëtan Michelet: So good morning, everyone. Today I will present the project we are working on with Frank Breitinger and Graham Horsman. This project is “Towards a working definition and classification for automation in the context of digital forensic”. … Read more
It’s no secret that the rapid pace of digital transformation is placing increasing pressure on digital forensic investigators. For years, the technology landscape has been introducing new devices capable of holding and managing larger amounts of data, from tablets and … Read more
Research published last month covered a wide range of issues in digital forensics, from limitations and challenges to new tools and techniques and lessons for those in higher education.
The National Institute … Read more
Magnet Forensics is very excited to share some of the great new features in Magnet REVIEW 4.0—helping digital forensic examiners bring their investigators and the evidence they need together by enabling secure agency-wide collaboration anytime and from anywhere!
With the … Read more
Bruce Nikkel: …paper of the session is from Jens-Petter Sandvik and his colleagues at NTNU, and it’s on “Quantifying Data Volatility for IoT Forensics With Examples From Contiki OS.”
Jens-Petter: Yeah. Thank you. So, I’m Jens-Petter Sandvik and … Read more
GrayKey collections contain more than just the file system of an iOS device and this additional data is often overlooked. A notable example of this is the GrayKey passcode history file. Learn from Grayshift subject matter experts as they provide … Read more
Bruce Nikkel: Okay, thanks everyone. I hope you enjoyed the break. Welcome to the first session: session one, with the theme of file system forensics. We have two interesting papers in this session. The first one is a systematic … Read more
Detego Global, the creators of Ballistic Imager, the world’s fastest forensic imaging tool, the award-winning field-triage solution and the acclaimed Unified Investigations Platform, has teamed up with Forensic Computers Incorporated (FCI) to announce a series of webinars to celebrate their … Read more
Hans: So our keynote for today. Actually, I ran into Emre (online, of course) Tinaztepe from Binalyze in December. It was an interesting online meeting. I had to understand their technology.
And I’m sure Emre’s going to tell us about … Read more
University College Dublin has launched a new Masters in Cybersecurity. The new course is supported by funding from Ireland’s Higher Education Authority funded Human Capital Initiative, through the Advance Centre. Single modules from the new programme will also … Read more
Hello, everyone. Jordan here with the Oxygen Forensics training team. Welcome to another OxyCast webinar. Today, I’ll be showing you how granular the export options are in Oxygen Forensic Detective, and how to produce a report that will meet your … Read more
Edinburgh based tech company Cyacomb announces Former Chief of Police Mike Burridge as VP of Sales for North America expansion
Cyacomb has appointed Mike Burridge as VP Sales North America, to build on over 30 customer wins in the region … Read more
Chris Hargreaves: Without further ado, we can start the formal program and I’ll hand over to Serge Droz – I did my best there – for the first keynote of the week. Thank you.
Serge: So, this technology … Read more
With a focus on complex electronic crimes, attacks, and intrusions at the national, state, and local levels, the Digital Forensics for National Security Symposium facilitates discussions among defense, intelligence, government, industry, nonprofit, and academic stakeholders on how digital forensic tools … Read more