Digital Forensics track is highlighted in Blue
Information Security track is highlighted in Green
Monday April 21st 2014 | |
---|---|
8:00 – 8:45 | Registration |
8:45 – 9:00 | Welcome |
9:00 – 9:50 | “First Responder:Digital” First Responder: Digital Evidence” AIDE Staff |
9:50 – 10:00 | Break |
10:00 – 10:50 | “First Responder: Digital Evidence” AIDE Staff |
10:50 – 11:00 | Break |
11:00 – 11:50 | “First Responder: Digital Evidence” AIDE Staff |
12:00 – 1:00 | Lunch |
1:00 – 1:50 | “Digital Evidence for Investigators Part 1: Using DE to Connect the Dots” |
1:50 – 2:00 | Break |
2:00 – 2:50 | “Digital Evidence for Investigators Part 2: Suspect Behind the Keyboard” |
2:50 – 3:00 | Break |
3:00 – 3:50 | “Digital Evidence for Investigators Part 3: Legal” Peggy Brown, Assistant Prosecutor, Cabell County, WV |
3:50 – 4:00 | Break |
4:00 – 4:50 | “Digital Evidence for Investigators Part 4: Interview and Interrogation of Tech Suspect” |
Tuesday April 22nd 2014 | |
8:00 – 8:45 | Registration |
8:45 – 9:00 | Welcome |
9:00 – 9:50 | “Social Media as an Intelligence Tool: Practical, Legal, and Ethical Considerations” Dave Abbruzzino, Director, Open Source Intelligence Exchange (OSIX) Fairmont State University |
9:50 – 10:00 | Break |
10:00 – 10:50 | “Operational Security for Social Media Research” OSIX-FSU Staff |
10:50 – 11:00 | Break |
11:00 – 11:50 | “Social Media Research Techniques” OSIX-FSU Staff |
12:00 – 1:00 | Lunch |
1:00 – 1:50 | “Social Media and Disaster Response” OSIX-FSU Staff) |
1:50 – 2:00 | Break |
2:00 – 2:50 | |
“Fusion Liaison Officer Program” West Virginia Intelligence Fusion Center | |
2:50 – 3:00 | Break |
3:00 – 3:50 | LM WISDOM Demonstration – Lockheed Martin Corporation |
3:50 – 4:00 | Break |
4:00 – 4:50 | |
Wednesday April 23rd 2014 | |
8:00 – 8:45 | |
8:45 – 9:00 | |
9:00 – 9:50 | |
9:50 – 10:00 | Break |
10:00 – 10:50 | |
10:50 – 11:00 | Break |
11:00 – 11:50 | |
12:00 – 1:00 | Lunch |
1:00 – 1:50 | |
1:50 – 2:00 | Break |
2:00 – 2:50 | |
2:50 – 3:00 | Break |
3:00 – 3:50 | |
3:50 – 4:00 | Break |
4:00 – 4:50 | |
Thursday April 24th 2014 | |
8:00 – 8:45 | Registration |
8:45 – 9:00 | Welcome |
9:00 – 9:50 | “Cyber Crime Sentencing: Is it really out of “Whack”? Dr. Marc Rogers, Purdue University |
9:00 – 9:50 | “Perspectives on IT Security in Health Care” Mike McCarthy, Marshall University School of Medicine CIO |
9:50 – 10:00 | Break |
10:00 – 10:50 | “App Attack.” Christopher Vance, WV State Police |
“Katana: A Live Flash Drive for Forensics and More” JP Dunning | |
10:50 – 11:00 | Break |
11:00 – 11:50 | |
“PrOSINT-Practical Open Source Intelligence” Calvin Britton | |
12:00 – 1:00 | Lunch |
1:00 – 1:50 | Mobile Phone Seizure Certification (BK Forensics) Josh Brunty, Assistant Professor, Marshall University |
“Clear and Present Danger: Current Research on Insider Threat” Tess Schrodinger | |
1:50 – 2:00 | Break |
2:00 – 2:50 | Mobile Phone Seizure Certification (BK Forensics) Josh Brunty, Assistant Professor, Marshall University |
“Intro to Penetration Testing” Bill Gardner, Assistant Professor, Marshall University | |
2:50 – 3:00 | Break |
3:00 – 3:50 | Mobile Phone Seizure Certification (BK Forensics) Josh Brunty, Assistant Professor, Marshall University |
“Intro to Penetration Testing” Bill Gardner, Assistant Professor, Marshall University | |
3:50 – 4:00 | Break |
4:00 – 4:50 | Mobile Phone Seizure Certification (BK Forensics) Josh Brunty, Assistant Professor, Marshall University |
“Intro to Penetration Testing” Bill Gardner, Assistant Professor, Marshall University | |
Friday April 25th 2014 | |
8:00 – 8:45 | Registration |
8:45 – 9:00 | Welcome |
9:00 – 9:50 | “Overview of Cryptography” Dr. Gary Kessler, Embry-Riddle Aeronautical University |
“Fundamentals of Linux Privilege Escalation” Elliott Cutright | |
9:50 – 10:00 | Break |
10:00 – 10:50 | “Overview of Cryptography” Part 2. Dr. Gary Kessler, Embry-Riddle Aeronautical University |
“Another Log to Analyze- Utilizing DNS to Discover Malware in Your Network” Nathan Magniez | |
10:50 – 11:00 | Break |
11:00 – 11:50 | “Mobile Forensics Fixes.” Christopher Vance, WV State Police |
“Step On In, The Water’s Fine! – An Introduction to Security Testing Within A Virtualized Environment” Tom Moore | |
12:00 – 1:00 | Lunch |
1:00 – 1:50 | “Writing a Digital Forensics Report.” Dr. Gary Kessler, Embry-Riddle Aeronautical University |
Keynote – Moving the Industry Forward – The Purple Team– Dave Kennedy | |
1:50 – 2:00 | Break |
2:00 – 2:50 | “Writing a Digital Forensics Report” Part 2. Dr. Gary Kessler, Embry-Riddle Aeronautical University“How Hackers for Charity (Possibly) Saved Me a LOT of Money” Branden and Emily Miller |
2:50 – 3:00 | Break |
3:00 – 3:50 | “Windows 8 Surface PC and Office 365 artifacts.” Rob Attoe, Senior Vice President of Investigations Training and Services NUIX |
3:50 – 4:00 | Break |
4:00 – 4:50 | “Cloud Forensics.” Rob Attoe, Senior Vice President of Investigations Training and Services NUIX |