Magnet Griffeye & officer wellness in CSAM investigations
Magnet Griffeye software plays a crucial role in digital forensics, especially in cases involving sensitive content like child exploitation material.
Magnet Griffeye software plays a crucial role in digital forensics, especially in cases involving sensitive content like child exploitation material.
This talk delves into the intricacies of macOS Lockdown Mode and its implications on digital forensics. The presentation will provide a deep dive into the technical mechanisms of Lockdown Mode, analyzing its impact on traditional forensic techniques.
Un perito informático es citado para desarrollar una o varias de las fases del proceso informático forense. Pero hay otras actividades que pueden desarrollarse, como la contrapericia informática, que pueden generar alto impacto en la causa judicial.
El entorno empresarial actual evoluciona de manera constante. La comunicación se transforma y pasa del correo electrónico tradicional a los mensajes cortos, y las fuentes de datos se amplían de los ordenadores a la nube, el IoT, los dispositivos móviles y más allá.
In criminal investigations, it is crucial to rapidly identify and assess seed words, private keys, wallets and any associated encryption/passwords. This enables assessment and seizure of assets before they are moved.
Digital forensics investigations have become a pressure cooker for law enforcement agencies. Keeping pace with demand—and addressing case backlogs—requires efficient execution of digital evidence workflows.
Digital forensics faces a critical challenge: balancing investigations with privacy protection. We introduce “privacy-preserving forensics” using advanced technologies to analyze data without compromising privacy.
The comprehensive dark web investigative presentation to date, covering various dark nets: TOR, I2P, Hyphnet, ZeroNet, IPFS, Yggdrasil, & ‘smolweb’, including the differences between them. Investigative methods for dark web investigations will be covered, as well as case studies involving mobile forensic evidence correlating to dark web usage.
Multiple Magnet Summit CTF winner, Kevin Pagano and multiple Magnet Virtual Summit CTF author, Jessica Hyde, will host a Capture The Flag workshop to share tips and strategies on how to succeed in a CTF event. This session will help prepare you to compete in a Capture The Flag contest. As part of this talk, we will review CTF style questions and best practices for solving or participating in your first CTF.
Learn more about the importance of the Windows registry in uncovering security incidents and become equipped with practical methodologies for data collection and analysis, all while underscoring the importance of automation for efficient forensic procedures.