June 5—8, 2023

Belkasoft at Techno Security & Digital Forensics Conference

Come to meet us at the most important gathering of private and government actors and policymakers, dedicated to the digital forensics and computer security industries.

Belkasoft is a global leader in digital forensics and incident response software that helps customers in over 130 countries to solve digital forensic cases, respond to cyber incidents, conduct eDiscovery investigations, and protect precious business assets from cyber threats. Come to see us at the Belkasoft booth right by the entrance, to learn more about our solutions and products.

Get 'em all!

Belkasoft invites you to collect a mega-collection of Techno Security-only challenge coins!

For every Belkasoft presentation you attend at the conference, you'll receive a dedicated coin. There are a total of 8 presentations divided into 4 tracks based on different topics, with each track consisting of 2 talks. Each track has its own unique color and corresponding coin. It doesn't matter which of the two lectures from a track you attend, you will receive a coin in the corresponding color (if you attend both, only one coin will be given).

Here are the tracks and their corresponding coins:

Computer Forensics Track

Mobile Forensics Track

SQLite Forensics Track

Corporate Cyber Incident Response Track

Now, how do you display these four separate challenge coins? Attend the ultimate lecture on the latest version of Belkasoft X and receive a magnificent wooden coin rack in an unusual round shape, instead of a metal rack! With this rack, you can proudly showcase your complete collection.

Lead the way in DFIR with us and collect them all! Good luck!

Program

Open This Window: Analysis of Windows File Systems, Volume Shadow Copy Snapshots, and Encrypted Data

12:00 PM — 12:50 PM
Salon B
Red coin

Join Belkasoft for the presentation on digital forensics with a focus on Windows forensics, including analysis of file systems, volume shadow copy snapshots, and encrypted data. In this presentation, we'll provide you with the overview of how Belkasoft X helps you to effectively analyze and interpret data stored on Windows file systems, and investigate volume shadow copy snapshots. You'll learn how to uncover crucial information, even from encrypted data. We'll explore the intricacies of volume shadow copy snapshots and show you how to take advantage of them to uncover deleted files and data. Our expert speaker will also cover the brute-force capabilities of Belkasoft X to uncover encrypted data, whether from whole disk encryption or file-based encryption.

If you attend this presentation, you will receive the Red Belkasoft challenge coin.

John Asmussen
John Asmussen
Digital Forensic Trainer—Belkasoft

The Cat and Mouse Game With iOS Forensics. How to Acquire and Examine Apple Devices with Belkasoft X

2:00 PM — 2:50 PM
Salon B
Yellow coin

Get ready for 2023 with the latest updates on iOS forensics from Belkasoft! As Apple continues to tighten its security measures, including remote wiping, data transfer restrictions, and stronger PIN requirements, digital investigations are becoming increasingly difficult. With iOS 16, even checkm8 acquisition is effectively dead. In this session, we'll explore the cutting-edge advancements in iOS forensics and dive into the proper process for acquiring and analyzing iDevices with the powerful Belkasoft X tool. Don't miss this opportunity to stay ahead of the cat-and-mouse game with Apple's security measures.

If you attend this presentation, you will receive the Yellow Belkasoft challenge coin.

John Asmussen
John Asmussen
Digital Forensic Trainer—Belkasoft

Uncovering the Secrets: The Art and Science of SQLite Forensics. Part 1, SQLite 101

4:00 PM — 4:50 PM
Salon B
Blue coin

This is the first of two sessions designed for digital forensics investigators and cyber incident responders who want to learn more about SQLite forensics and how to extract as much information as possible from their data sources. SQLite is a widely popular database format that is extensively used across many different platforms. Both iOS and Android devices use SQLite as a storage format of choice, with built-in and third-party applications relying on it to store and organize their data. Examples include WhatsApp, Telegram, Chrome, and thousands of other applications, including a wide range of desktop applications. As such, every digital forensics investigator and cyber incident responder must understand the various SQLite features and peculiarities, and use the proper DFIR tools for their investigation. In this session, we will cover SQLite basics, peculiarities, and data recovery methods available for SQLite. We will also discuss the potential consequences of using the wrong SQLite tool in a DFIR investigation.

If you attend this presentation, you will receive the Blue Belkasoft challenge coin.

John Asmussen
John Asmussen
Digital Forensic Trainer—Belkasoft

iOS Forensics – The Good, The Bad, and The Ugly

09:30 AM — 10:20 AM
Salon С

iOS devices are becoming more and more complicated to acquire due to enhanced security and continuous advances in operating systems. This session will discuss the lifecycle of iOS versions and devices, to include major changes in iOS updates, what implications they bring to examiners, how forensic tools continue to evolve to attempt to obtain as much data as possible from these devices, and additional roadblocks and workarounds for the everyday digital forensic examiners or investigators.

John Asmussen
John Asmussen
Digital Forensic Trainer—Belkasoft

Uncovering the Secrets: The Art and Science of SQLite Forensics. Part 2, Advanced SQLite Forensics

10:30 AM — 11:20 AM
Salon A
Blue coin

This is the second of two sessions designed for digital forensics investigators and cyber incident responders who want to learn more about SQLite forensics and how to extract as much information as possible from their data sources. SQLite is a widely popular database format that is extensively used across many different platforms. Both iOS and Android devices use SQLite as a storage format of choice, with built-in and third-party applications relying on it to store and organize their data. Examples include WhatsApp, Telegram, Chrome, and thousands of other applications, including a wide range of desktop applications. As such, every digital forensics investigator and cyber incident responder must understand the various SQLite features and peculiarities, and use the proper DFIR tools for their investigation. In this session, we will dive into advanced SQLite forensics, covering SQL queries, specific features of Belkasoft X viewer, data conversions, and artifact extraction from SQLite databases.

If you attend this presentation, you will receive the Blue Belkasoft challenge coin.

John Asmussen
John Asmussen
Digital Forensic Trainer—Belkasoft

Following the Trail: Hunting for Cyber Attackers and Their Malicious Payloads

1:00 PM — 2:20 PM
Salon A
Green coin

“How was the network initially compromised?” This is the question that cyber incident responders hear every time they're called to do their job. Nowadays, most cyberattacks—including advanced targeted attacks—start from a simple phishing email with a weaponized attachment or web link. In this presentation, we will examine the most common initial infection vectors and show how Belkasoft X can help incident responders and forensic analysts find the necessary evidence. Additionally, we will discuss the common forensic artifacts that point to code execution on Windows systems. Join us as we explore the trail that cyber attackers leave behind and the methods to track them down.

If you attend this presentation, you will receive the Green Belkasoft challenge coin.

John Asmussen
John Asmussen
Digital Forensic Trainer—Belkasoft

Androids Unplugged: Analyzing the Inner Workings of Your Robot Companion. Modern acquisition methods of Android devices

10:30 AM — 11:20 AM
Salon A
Yellow coin

Looking to dive into the complex world of Android forensics? Look no further than this presentation with Belkasoft X! With the sheer variety of Android devices on the market, digital forensic investigators need to have a nuanced understanding of each vendor's specific models and their unique characteristics. Join our expert for an in-depth exploration of the many factors that go into acquiring data from a diverse array of Android phones, including those powered by Qualcomm, MediaTek, Spreadtrum, and many more. You'll come away from this session equipped with the knowledge and techniques you need to confidently tackle any Android forensic investigation using Belkasoft X.

If you attend this presentation, you will receive the Yellow Belkasoft challenge coin.

John Asmussen
John Asmussen
Digital Forensic Trainer—Belkasoft

Who Ate My Apple? macOS Forensics with Belkasoft X

3:30 PM — 4:20 PM
Salon B
Red coin

In this presentation, we'll provide an in-depth review of macOS system artifacts and demonstrate why they are crucial in DFIR investigations. We'll explore how to analyze APFS and various artifacts to uncover evidence of user activity and system settings, and network connections, including autoruns, notifications, and preferences. Our expert speaker will also discuss the T2 security chip and its forensic implications. We'll demonstrate how to acquire data from devices with the T2 security chip using Belkasoft X and highlight the challenges associated with this type of acquisition. Finally, we'll delve into the world of macOS application artifacts and showcase how Belkasoft X can extract and analyze data from various macOS applications. You'll learn how to uncover vital information that can help piece together a timeline of events, and demonstrate the capabilities of the tool when it comes to application artifact analysis.

If you attend this presentation, you will receive the Red Belkasoft challenge coin.

John Asmussen
John Asmussen
Digital Forensic Trainer—Belkasoft

Taking Your Investigations to the Next Level: Boosting Your DFIR Skills with Belkasoft X

4:30 PM — 5:20 PM
Salon B
Ultimate coin

Get ready for a wild ride as we take a deep dive into the latest Belkasoft X product! This session is packed with tricks and tips that will help you become a more effective investigator and save precious time. We'll explore how Belkasoft X supports heterogeneous device cases, including computers, mobiles, drones, and clouds, making it easier than ever to extract and recover critical artifacts. With out-of-the-box extraction capabilities and powerful automation tools, you'll be able to streamline your workflow and supercharge your investigation process. But wait, there's more! We'll also take a look at the exciting cloud execution capabilities of this amazing tool and the ways to orchestrate your workflow including both Belkasoft and third-party tools. Don't miss out on this epic presentation! In this session we will discuss the ways the latest Belkasoft X product allows you to be more effective and save your time with multiple usable tricks. We will discuss heterogeneous device cases (having computers, mobiles, drones and clouds inside the same case), out-of-the-box artifact extraction and recovery, automation and orchestration Belkasoft and other tools inside your workflow, and complete the presentation with discussion of powerful cloud execution capabilities of the tool.

If you attend this presentation, you will receive the Ultimate Belkasoft Coin Rack Holder, which will hold together all the coins you collected on other tracks we had (red, yellow, blue, and green). Learn how to become a better DFIR investigator with Belkasoft and at the same time make your Belkasoft TechnoSecurity coin collection complete!

John Asmussen
John Asmussen
Digital Forensic Trainer—Belkasoft

Blinded by the SQLite

09:00 AM — 09:50 AM
Salon D

SQLite databases are the most widely used and established databases for mobile devices due to their lightweight structure, no requirements for dependencies, and full control by developers. This session will dive deep into SQLite databases, covering content ranging from basic to advanced. The talk will cover different components such as Pages, Freelist, Journal Files, Write Ahead Logs, Unallocated space, and the importance of performing your SQLite examinations within a forensic viewer

John Asmussen
John Asmussen
Digital Forensic Trainer—Belkasoft

Unmasking the Intruders: Tracing Cyber Threat Actors' Every Move

10:00 AM — 10:50 AM
Salon A
Green coin

In today's threat landscape, bad actors are not just content with gaining initial access to a target network, but rather they aim to establish a persistent presence and move laterally to compromise larger networks. In this session, we will examine the most common techniques used by attackers to achieve persistence and lateral movement. We will review the persistence mechanisms and files widely used in cyberattacks targeted at Windows devices and the most common techniques adversaries use for lateral movement. We will also demonstrate how Belkasoft X can help cyber incident responders in uncovering the tactics and techniques used by cyber threat actors. With Belkasoft X, investigators can trace every move of the attackers, identify the lateral movement paths, and detect the persistence mechanisms that cybercriminals use to maintain control over the compromised systems. In addition, we will cover the use of YARA rules and Sigma rules, which are powerful tools for detecting and classifying malware and suspicious activities. Join us to learn how Belkasoft X can help you in unmasking the intruders and tracing their every move.

If you attend this presentation, you will receive the Green Belkasoft challenge coin.

John Asmussen
John Asmussen
Digital Forensic Trainer—Belkasoft

Master your Drone

Found something special inside your conference gift package? Unleash your inner pilot and dive into the world of DIY drones. Download the step-by-step instructions, and in no time, you'll have your very own paper drone soaring through the skies. This is as easy, as Drone Forensics with Belkasoft!

Download the drone scheme

Need more information?

Learn more about Belkasoft, its services and solutions for law enforcement, corporate customers and academics.

Get started