Digital Forensics

9:00-9:50 – In Conclusion… An exploration of Conclusions and Opinions in Digital Forensics

Dr. Mark Pollitt, Digital Evidence Professional Services, Inc.

10:00 – 11:50 – Marc Rogers and Kate Seigfried-Spellar – Purdue University

A Digital Forensics Tool for Language-Based Analysis of Child Sex Offender Chats

The Chat Analysis Triage Tool (CATT) is a digital forensic tool that analyzes chats between offenders and minors. Our preliminary results show language-based differences between minors and contact vs. fantasy-driven offenders. We believe this digital forensic tool will assist law enforcement in their ability triage and allocate resources to the more dangerous cases involving contact-driven offenders.


12:00 – 1:00 – Lunch

1:00 – 1:50 – Drone Forensics 1

Rob Attoe, Spyder Forensics

2:00 – 2:50 – Drone Forensics 2

Rob Attoe, Spyder Forensics

Information Security

9:00 AM

TBA

10:00 am

Tess Schrodinger

On Business Etiquette and Professionalism in the Workplace 

Abstract

Abstract: Preparing for your first career or just a new career? Join Tess as she shares some of the top concerns voiced by project managers, clients, team members, and professionals in the information technology and information security environment. Find out what top ten complaints are voiced by those in the work place then learn about general business etiquette and professionalism that can help you stand out from your peers when interviewing for any position from entry level to the C Suite. Tess will share common protocols as well as tools and techniques anyone can use to brush up their first impression or fine tune where they currently are.

Bio

Bio: Tess is a CISO and mentor who works with a diverse range of individuals both professionally and personally. She believes that you should never let success get to your head or failure get to your heart.

Tess has spoken and taught at a number of conferences to include DEFCON, Shmoocon, AIDE, and BSides on a variety of topics to include Counter-Intelligence and Insider Threat, Cryptography,  Bio-Hacking, and Quantum Computing. 

Tess holds several academic agrees and certificates from multiple universities and strives to use her varied and vast experience to bring value to every project she contributes to. In her spare time she completes triathlons and is learning to dance the Argentine Tango.

11:00 AM

Dr. Tom Moore
TBA

Abstract

Abstract: TBA

Bio

Dr. Trevor Bihl received the B.S. and M.S. degrees in electrical engineering from Ohio University, Athens, OH, and the Ph.D. degree from the Air Force Institute of Technology, Wright-Patterson AFB, OH. He is currently a Research Engineer with the Air Force Research Laboratory, Sensors Directorate. From 2009-2016 he was a Research Associate of Operations Research with the Air Force Institute of Technology. He is also an Adjunct Assistant Professor of Pharmacology and Toxicology, and Industrial Engineering with Wright State University, Dayton, OH, where he teaches classes in applied statistics, biostatistics, and engineering. His research interests are in the areas of pattern recognition and multivariate statistics. Dr. Bihl is a member of Eta Kappa Nu (Electrical Engineering Society), Alpha Kappa Delta (Sociology Society), Tau Beta Pi, the Institute of Electrical and Electronics Engineers (IEEE) and the Institute for Operations Research and Management Sciences (INFORMS).

12:00 PM

Lunch

1:00 PM

Mike Baker –  TBA

Abstract

Abstract: TBA

Bio

Mike is the Founder & Lead Researcher for BHaFSec, LLC. in Ann Arbor, and also contributes to buffing up the AppSec program at Arbor Networks. He’s been involved in the infosec arena since the late 90’s, and has been recognized by organizations ranging from Google, AT&T, MIT, NASA/JPL, and many others.

2:00 pm Joe Oney

Apache log analysis made easy!

Abstract

Abstract: TBA

Abstract: Web server logs contain extremely valuable information to attack analysis and detection, but manual analysis of Apache server logs can be intimidating, especially on high traffic sites. This talk will go over different aspects of Apache logs, using Python Pandas and Jupyter Notebooks to make routine analysis easy and repeatable.

Bio

Bio: Joe Oney is an Information Security Manager for UPS and a Cyber Intelligence Analyst for the Kentucky Air National Guard. He holds industry certifications in Continuous Monitoring, Forensics, Web Application Defense, and Threat Intelligence.

3:00 pm

Josh Brunty

        Potentially unnecessary and unwanted programs (a.k.a. PUPs)

Abstract

Abstract: Potentially unnecessary and unwanted programs (a.k.a. PUPs), while not inherently malicious, increases an organization’s attack overall surface and exposes systems to additional threats extending well beyond the common software vulnerabilities. Widely distributed software such as built-in toolbars, search utilities, and browser extensions, are being repeatedly used for nefarious purposes, both on PC and mobile-based operating systems. This talk will discuss how attackers are leveraging these widely used general tools to conduct sophisticated and targeted attacks, distribute malware, and maintain persistence within a given network. This presentation will also discuss detection, mitigation, and network forensic tactics to combat the newest iteration of these types of attacks.

Bio

Bio: Josh Brunty is an Assistant Professor of Digital Forensics and Information Assurance at Marshall University in Huntington, WV.  Josh is a former digital forensics laboratory manager and examiner with over a decade of experience in the field of digital forensics and high-tech crime investigation. Prior to joining Marshall, Josh spent several years as a digital forensics examiner and laboratory technical leader assisting in many high-profile cases for agencies around his home state of West Virginia, as well as serving on several federal and state-level cyber-crime task forces and panels. Josh has authored books, book chapters, journal publications, and has spoken at various conferences around the world on topics involving digital forensics, mobile device forensics, network forensics and deep packet analysis, and social media forensics. He is currently a member of the NIST Organization of Scientific Area Committee (OSAC) on Digital Evidence, focusing on standards and best practices in digital forensics.