By browsing this site, you are agreeing to our cookie policy. More Information

Sessions

Enfuse 2018 Agenda Coming Soon.
Take a look at our 2017 Agenda with over 110 sessions full of best practices, tips & tricks, and hands-on training.

Register for Enfuse 2018

Sessions

Track

Role

Skill Level

Format

Keynotes

                
Cybersecurity: Tools, Practices & Trends
The sophistication and effectiveness of hackers, criminals, and nation states is mounting.  Are you prepared?  Do you know their techniques?  Are you able to find indicators of compromise before they have fully invaded your infrastructure?  This security track will focus on the latest tools, tactics and techniques for detecting and responding to advanced threats. You will:

•  Learn how to employ the latest techniques in detecting advanced threats
•  Come away with new tools and practical knowledge to improve your skills in incident response
•  Advance your understanding of new attack artifacts and analysis methodology
Incident Response: Return To A Trusted State
The sophistication and effectiveness of hackers, criminals, and nation states is mounting.  Are you prepared for the inevitable breach?  This security track will focus on new developments in incident response, from best practices in IR procedure to the latest tools and techniques for investigating and remediating a security incident.

You will:
•  Learn how to build an incident response plan
•  Come away with new tools and practical knowledge to improve your skills in incident response
•  Advance your understanding of new attack artifacts and analysis methodology
Data Governance, Compliance & Risk

                
Conducting Digital Forensic Investigations - Advanced
You’re committed  to perfecting your craft, both in the classroom and in the field. You’re rigorous, rational, and ready for your digital investigations. You’ve learned through experience that if your tools and techniques stay the same, you’re falling behind. You’ve read the books. Maybe you know who wrote them. Maybe you wrote the book. This track will share new techniques to integrate into your digital investigation routine, and put you in contact with your peers: others who know what it’s like to have nowhere else to turn. These sessions will showcase the latest techniques in exposing and understanding file system artifacts, operating system behavior, communication technologies, and practical ways to find efficiencies in your workflow.
Conducting Digital Forensic Investigations - Basic
Whether you’re a seasoned investigator or just getting started, it’s important to hone your craft.  Focusing on real-world forensic use cases and presented by seasoned investigators and long-time EnCase users, these sessions will focus on practical forensic investigation techniques like decryption tools, best practices in reporting, mobile investigations, analysis of file systems and social media and many more. You’ll learn about forensic hardware and on-site investigations, hear tips and tricks from Guidance Software’s technical services team, and discover how you can save time and speed your investigations by developing your own EnScripts.
eDiscovery
Whether you’re an attorney, paralegal, or e-discovery practitioner, when your company is involved in litigation, it can seem like a battlefield.  Knowing the latest developments in e-discovery processes, regulations, and technology solutions can help you gain control and mitigate risks associated with simply managing your company’s business.  Explore a variety of e-discovery-related topics from the perspectives of federal judges, federal prosecutors, in-house counsel, outside counsel, industry analysts, and technical experts.
Guidance Basics
Are you new to EnCase® products and want to shorten your learning curve? Or do you just need a comprehensive overview?  The Guidance Basics track is for you.  Attend one of these introductory courses to kick-start your familiarity with these powerful tools.
General
 

Monday, May 22

3:30PM - 5:00PM

First Timers Session

Daniel Smyth, Instructor II, Guidance Software
5:00PM - 6:30PM

First Timers Session

Daniel Smyth, Instructor II, Guidance Software
6:30PM - 8:30PM

Welcome Reception

Tuesday, May 23

8:00AM - 9:00AM

How to Combat Fileless Malware

Idan Levin, CTO & Co-Founder, Hexadite
8:00AM - 9:00AM

Ransomware For the Non-Engineer

Nick Hyatt, Senior Consultant, Optiv
8:00AM - 9:00AM

Investigative Forensics

Matt McFadden, Director, Training, Guidance Software
8:00AM - 9:00AM

PCI is Turning Into SOX

Robert Brenis, Director of IT Governance, Risk & Compliance, Signet Jewelers
8:00AM - 9:00AM

Internet of Things Forensics

Jonathan Rajewski, Director & Digital Forensics Professor, Champlain College
8:00AM - 9:00AM

EnCE® Prep

Anthony "Tony" Balzanto, Instructor II, Guidance Software
Carly Wood, Instructor I, Guidance Software
8:00AM - 9:00AM

How Soon Do You Want This? Managing Large Data Sets in eDiscovery Requests

Jennifer Randall, Principal eDiscovery Analyst, Fidelity Investments LLC
8:00AM - 9:00AM

EnCase + RelativityOne

Sponsored by kCura, .
Brian Vile, Product Management, kCura
Anthony Di Bello, Sr. Director, Product Marketing, Guidance Software
9:15AM - 10:00AM

Opening Keynote

Patrick Dennis, President & CEO, Guidance Software
11:00AM - 12:00PM

Accountability. Responsibility. Culpability. Welcome To Life Under A Microscope

Jarrett Kolthoff, CEO/Founder, SpearTip
Larry McClain, Director of Digital Forensics, SpearTip
11:00AM - 12:00PM

Tips and Tricks

Mark Menz, Principal, MJMenz
Mike Menz, ., HP
Kip Loving, Officer, High Tech Task Force
11:00AM - 12:00PM

Operational Security

Gerard Johansen, Senior Information Security Consultant, Intrinium
11:00AM - 12:00PM

Writing EnScripts for EnVestigators Pt. 1

Lance Mueller, Incident Response & Forensics, Absolute
11:00AM - 12:00PM

EnCase Endpoint Security Fundamentals Part 1

Jeremy Le-Roy, Instructor III, Guidance Software
Edward Garren, Instructor III, Guidance Software
11:00AM - 12:00PM

The Discovery Explosion: Strategies For Managing Large-Scale Discovery Cases

Matt McCartney, Forensic Technology and Discovery Services, Ernst & Young
Erin Corbett, Manager, Ernst & Young
11:00AM - 12:00PM

Asset Mapping with Python

Chet Hosmer, Founder, Python Forensics
11:00AM - 12:00PM

Where Did It Come From? Where Does It Go?

Sponsored by kCura, .
Jacob Cross, Relativity Solutions Specialist, kCura
Nik Balepur, Solutions Architect, kCura
11:00AM - 12:00PM

GDPR and the Future of Sensitive Data – Exploring Global Readiness for GDPR and the Shift in Global Privacy Regulations with SC Magazine

Illena Armstrong, VP Editorial, SC Media
Anthony Di Bello, Sr. Director, Product Marketing, Guidance Software
Charles Choe, Product Marketing Manager, Guidance Software
1:30PM - 2:30PM

Cyber Attacks In Banking and eCommerce - Defending Your Customers

Simon Collins, Cybersecurity Director, Ernst & Young
1:30PM - 2:30PM

It's Not If But When: How to Create Your Cyber Incident Response Plan

Lucie Hayward, Managing Consultant, Kroll
Michael Quinn, Associate Managing Director, Kroll
1:30PM - 2:30PM

Dealing with Degraded Media in Forensic Investigations

Scott Gibbs, Director of Digital Forensics, Direct Data Discovery
Glenn Sakaguchi, Director of R&D, We Recover Data
1:30PM - 2:30PM

GEAR Up the new GRC Model for the Modern Enterprise

Elvis Moreland, Head Cyber Security and Risk Management Consulting, Atos
1:30PM - 2:30PM

Writing EnScripts for EnVestigators Pt. 2

Lance Mueller, Incident Response & Forensics, Absolute
1:30PM - 2:30PM

EnCase Endpoint Security Fundamentals Part 2

Jeremy Le-Roy, Instructor III, Guidance Software
Edward Garren, Instructor III, Guidance Software
1:30PM - 2:30PM

Working With Lawyers From Preparation Through Trial

Brian Chase, President, Chase Technology Consulting
1:30PM - 2:30PM

Dos and Don'ts of Forensic and eDiscovery Evidence Handling

Sponsored by kCura, .
William Lederer, Chief Security Officer, kCura
Matthew Christoff, eDiscovery and Information Governance Associate, Seyfarth Shaw
1:30PM - 2:30PM

Analyzing Hardware for EnCase Optimization

Sponsored by Digital Intelligence, .
Jim Woodring, Senior Systems Engineer, Digital Intelligence
1:30PM - 2:30PM

Don't Cry, You Have EnCase!

Roger Andras, Principal Solutions Consultant, Guidance Software
2:30PM - 3:30PM

Case Study: Data Extraction Involving Severely Damaged Mobile Devices

Brian Smith, Manager of Technology, Cellebrite
Sponsored By Cellebrite, .
3:30PM - 4:30PM

Using PowerShell and PHP to Make Endpoint Security Work Faster

Simon Key, Course/Curriculum Developer III, Guidance Software
Jeremy Le-Roy, Instructor III, Guidance Software
3:30PM - 4:30PM

Responding to Targeted Network Attacks Pt. 1

Stephen Windsor, President, Maddrix
3:30PM - 4:30PM

Smartphones and Connection to IoT: Finding the Data

Amber Schroader, CEO & Founder, Paraben Corporation
3:30PM - 4:30PM

Insider Risk: How To Eat The Elephant

Scott Van Nice, Insider Risk and Forensic Manager, Procter & Gamble
3:30PM - 4:30PM

USB Attacks: Analysis and Methodology

James Habben, Investigator, Verizon Enterprise Solutions
3:30PM - 4:30PM

Certified Forensic Security Responder (CFSR) Review Pt 1

Matt McFadden, Director, Training, Guidance Software
Anthony "Tony" Balzanto, Instructor II, Guidance Software
3:30PM - 4:30PM

e-Discovery to Cybersecurity: Transitioning Your Career

Jared Cosiglia, President, TRU Staffing Partners
3:30PM - 4:30PM

Search, Analyze, and Act: How RelativityOne & EnCase Supercharge Investigations

Sponsored by kCura, .
Doug Kaminski, Director, Major Accounts, kCura
3:30PM - 4:30PM

Deploying An Enhanced Forensics Architecture

Sponsored By Cellebrite, .
Kevin McNamara, Senior System Engineer, Cellebrite
5:00PM - 6:00PM

Tracking Ransomware: Using Behavior to Identify New Threats

Jessica Bair, Senior Manager of Business Development, Cisco Security
5:00PM - 6:00PM

Responding to Targeted Network Attacks Pt. 2

Stephen Windsor, President, Maddrix
5:00PM - 6:00PM

Password Cracking With Commercial and Open Source Tools

Michael Harrison, Open System Developer, NTAC
5:00PM - 6:00PM

Corporate Cyber Compliance & Risk

Max Aulakh, Chief Security Architect, MAFAZO Cyber Governance
5:00PM - 6:00PM

Digital Forensic Readiness: From Reactive to Proactive Process

Jason Sachowski, Director, Security Forensics & Civil Investigations, Scotiabank
5:00PM - 6:00PM

Certified Forensic Security Responder (CFSR) Review Pt 2

Matt McFadden, Director, Training, Guidance Software
Anthony "Tony" Balzanto, Instructor II, Guidance Software
5:00PM - 6:00PM

Can I Get A Translation?

Bonnie Kennedy, eDiscovery Manager, Delta Air Lines
Kelly Sanders, Digital Forensics Manager, Coca-Cola
Kim-An Hernandez, Senior Counsel eDiscovery & Knowledge Management, International Paper
Amy Scearcy, eDiscovery Manager/VP, US Bank
5:00PM - 6:00PM

Take the Driver’s Seat with Advanced Cell Phone Analysis

Sponsored By Cellebrite, .
Brian Smith, Manager of Technology, Cellebrite
5:00PM - 6:00PM

From Amazon Echo to Google: 2017 Data Discovery Legal Update

Sponsored by kCura, .
David Horrigan, E-Discovery Counsel and Legal Content Director, kCura
Ed McAndrew, Partner, Ballard Spahr LLP, formerly U.S. Department of Justice
6:00PM - 7:00PM

Expo Hall Happy Hour

Wednesday, May 24

9:00AM - 10:00AM

6 Degrees of Forensics

Robert DeCicco, Managing Director, Berkeley Research Group
Jonathan Rajewski, Director & Digital Forensics Professor, Champlain College
Daniel Roffman, Managing Director, FTI Consulting
Sheryl Falk, Attorney, Winston Strawn
9:00AM - 10:00AM

The Altering Corporate Liabilities and Transatlantic Data Flows

Anna Aurora Wennakoski, Independent, Research Professional
9:00AM - 10:00AM

Seeing Evil with EITT

Bryan Koehn, Consulting Manager, Guidance Software
Chris Rogers, Senior Consultant, Guidance Software
Isaiah Griego, Senior Consultant, Guidance Software
9:00AM - 10:00AM

EnCE® Prep

Anthony "Tony" Balzanto, Instructor II, Guidance Software
Carly Wood, Instructor I, Guidance Software
9:00AM - 10:00AM

EnCEP® Review

Daniel Smyth, Instructor II, Guidance Software
9:00AM - 10:00AM

Dissecting Ransomware: Art and Analyses

Cindy Jenkins, Senior Security Engineer, University of Washington Medical Center
Melissa D. Halll, Security Engineer, University of Washington Medical Center
9:00AM - 10:00AM

Verizon 2017 DBIR Report

Suzanne Widup, Senior Analyst, Verizon
9:00AM - 10:00AM

Best Practices for Legally Obtaining Data from the Cloud

Sponsored By Cellebrite, .
Brian Smith, Manager of Technology, Cellebrite
9:00AM - 10:00AM

The State of the Phish and Response

Mike Saurbaugh, Director, Technical Alliances, PhishMe
9:00AM - 10:00AM

Machine Reasoning and Forensic Automation for Enterprise Security

Greg Hoglund, CEO, Outlier Security
9:00AM - 10:00AM

Next Gen Forensics – The Intersection of Forensics & Incident Response

Mario Vuksan, CEO, ReversingLabs
David Nides, MD Cyber Response Services, KPMG
Alexander Kirkland, Manager Forensics and eDiscovery, SunTrust
Paul Shomo, Security Strategist, Guidance Software, and Dark Reading Contributor, Guidance Software
10:30AM - 11:30AM

Industry Keynote: Theresa Payton, Former White House CIO

Theresa Payton, CEO; Former White House CIO, Fortalice Solutions; Dark Cubed
1:00PM - 2:00PM

There’s Malware in Your Blindspot! Embracing Defense in Depth

Paul Shomo, Security Strategist, Guidance Software, and Dark Reading Contributor, Guidance Software
1:00PM - 2:00PM

Incident Response, The First 24 Hours

Paul Kubler, Digital Forensics Examiner, LIFARS, Inc.
Sewook Seo, Digital Forensics and Cyber Security Examiner, LIFARS
1:00PM - 2:00PM

Social Media: Digital Evidence Preservation and Innovative Technology Developments

Julie Lewis, Founder & CEO, Digital Mountain
1:00PM - 2:00PM

The New Frontier of Privacy, Security, and Related M&A Considerations Pt. 1

James Sherer, Partner, BakerHostetler
Dan Meyers, President, Consulting & Information Governance , TransPerfect Legal Solutions
Brett Tarr, Counsel, Litigation & E-Discovery, CAESARS Entertainment Corporation
Kimberly Quan, COO/VP, Information Governance, Dragon Discovery
1:00PM - 2:00PM

Applying Graph Theory to Analyzing Digital Evidence Pt 1

Chuck Easttom, Computer Scientist, CEC
1:00PM - 2:00PM

Certified Forensic Security Responder (CFSR) Review Pt 1

Matt McFadden, Director, Training, Guidance Software
Anthony "Tony" Balzanto, Instructor II, Guidance Software
1:00PM - 2:00PM

Cloud Collections for Security and Discovery Practitioners Pt. 1

Aaron W. Bennett, Senior Field Engineer, Guidance Software
Daniel Smyth, Instructor II, Guidance Software
1:00PM - 2:00PM

Verizon DBD

Darren Windham, Sr Security Consultant, Verizon
Hayden Williams, Senior Security Consultant, Verizon
1:00PM - 2:00PM

Technical Services Tips and Tricks

Steven Schwinn, Sr. Technical Services Engineer, Guidance Software
Graham Jenkins, Senior Technical Services Engineer, Guidance Software
1:00PM - 2:00PM

A Primer on Current Android Device Forensics

Sponsored By Cellebrite, .
Ronen Engler, Sr. Manager of Technology & Innovation, Cellebrite
1:00PM - 2:00PM

Internet of Things Forensics

Jonathan Rajewski, Director & Digital Forensics Professor, Champlain College
2:30PM - 3:30PM

Remote Desktop Cache Internals

Simon Key, Course/Curriculum Developer III, Guidance Software
2:30PM - 3:30PM

Forensic Report Writing

Joseph Greenfield, Associate Professor of Information Technology Practice , University of Southern California
Pierson Clair, Faculty, University of Southern California
2:30PM - 3:30PM

The New Frontier of Privacy, Security, and Related M&A Considerations Pt. 2

James Sherer, Partner, BakerHostetler
Dan Meyers, President, Consulting & Information Governance , TransPerfect Legal Solutions
Brett Tarr, Counsel, Litigation & E-Discovery, CAESARS Entertainment Corporation
Kimberly Quan, COO/VP, Information Governance, Dragon Discovery
2:30PM - 3:30PM

Applying Graph Theory to Analyzing Digital Evidence Pt 2

Chuck Easttom, Computer Scientist, CEC
2:30PM - 3:30PM

Certified Forensic Security Responder (CFSR) Review Pt 2

Matt McFadden, Director, Training, Guidance Software
Anthony "Tony" Balzanto, Instructor II, Guidance Software
2:30PM - 3:30PM

Cloud Collections for Security and Discovery Practitioners Pt. 2

Aaron W. Bennett, Senior Field Engineer, Guidance Software
Daniel Smyth, Instructor II, Guidance Software
2:30PM - 3:30PM

Know Normal, Find Evil- - Windows 10 Edition

Jacob "Jake" Williams, Forensics Analyst, Rendition Infosec
2:30PM - 3:30PM

PCIe SSD Forensics. New Rules, New Tools

Jeff Hedlesky, Forensic Evangelist-FBU, Guidance Software
2:30PM - 3:30PM

Advanced Malicious Document Analysis

Vincent Lo, Senior Incident Responder, Incident Response
4:30PM - 5:30PM

Project VIC and EnCase® 8

Arnold Guerin, Technology/Innovation, RCMP Canadian Police Centre for Missing and Exploited Children
4:30PM - 5:30PM

Cyber Security and Cyber Breaches from Your Business Lawyer's Perspective

Kathy Winger, Attorney/Owner, Law Offices of Kathy Delaney Winger
4:30PM - 5:30PM

Best of Breed EDR with EnCase® Endpoint Security v6

Anthony Di Bello, Sr. Director, Product Marketing, Guidance Software
4:30PM - 5:30PM

EnCase® Endpoint Investigators Fundamentals

Simon Key, Course/Curriculum Developer III, Guidance Software
Anthony "Tony" Balzanto, Instructor II, Guidance Software
4:30PM - 5:30PM

Digital Forensics on Compromised Web Applications

Ondrej Krehel, CEO & Founder, LIFARS, LLC
Michal Hojcska, Software Security Engineer, LIFARS, Inc
4:30PM - 5:30PM

Stakeholder Approach to Building a Cyber Security Program

William Perry, Chief Information Security Officer, Cal State University
4:30PM - 5:30PM

Passwords, Encryption and Preparing Your Engagement for Analysis

Ken Pyle, Partner, DFDR Consulting
4:30PM - 5:30PM

Mac Hardware Triage & Acquisition

Pierson Clair, Faculty, University of Southern California
4:30PM - 5:30PM

Full Case Automation

Daniel Smyth, Instructor II, Guidance Software
4:30PM - 5:30PM

Analyzing Hardware for EnCase Optimization

Sponsored by Digital Intelligence, .
Jim Woodring, Senior Systems Engineer, Digital Intelligence
7:00PM - 10:00PM

SANS DFIR NetWars Tournament

Jacob "Jake" Williams, Forensics Analyst, Rendition Infosec

Thursday, May 25

8:30AM - 9:30AM

Why Websites Are Still Vulnerable: An E-Commerce Live Hacking Demonstration

David Ellis, VP of Investigations, SecurityMetrics
8:30AM - 9:30AM

Using EnScript to Make Your Life Easier Pt. 1

Suzanne Widup, Senior Analyst, Verizon
James Habben, Investigator, Verizon Enterprise Solutions
Bill Tarioli, Independent Consultant, Independent Consultant
8:30AM - 9:30AM

EnCase® Forensic 8 - The Pathway to Success: What’s New & What’s Improved

Rajan Udeshi, Product Management Specialist, Guidance Software
8:30AM - 9:30AM

Reaching the Board: IT/Cyber and Payments Risk Reporting Pt. 1

Jerald Garner, National Field Supervisor, NCUA
8:30AM - 9:30AM

Incident Response with EnCase® Endpoint Security Part 1

Jeremy Le-Roy, Instructor III, Guidance Software
Edward Garren, Instructor III, Guidance Software
8:30AM - 9:30AM

MAC Time, Mac Times, and more

Lee Whitfield, Director of Forensics, Digital Discovery
8:30AM - 9:30AM

What Lurks Beneath: Beyond Automated Carving

Kim Thomson, Instructor/Examiner, H-11 Digital Forensics
Kastriot Gjoka, Chief of Computer and Audio-Video Forensic Sector, Scientific Police Institute, Albanian State Police
8:30AM - 9:30AM

Guidance Trainers Share Their Know-how and Answer Your Questions

8:30AM - 9:30AM

Tips and Tricks

Mark Menz, Principal, MJMenz
Mike Menz, ., HP
Kip Loving, Officer, High Tech Task Force
9:45AM - 10:45AM

Enfuse Closing Session

11:00AM - 12:00PM

Using EnScript to Make Your Life Easier Pt. 2

Suzanne Widup, Senior Analyst, Verizon
James Habben, Investigator, Verizon Enterprise Solutions
Bill Tarioli, Independent Consultant, Independent Consultant
11:00AM - 12:00PM

EnCase® Endpoint Investigator: Everything You Need To Know

Rajan Udeshi, Product Management Specialist, Guidance Software
11:00AM - 12:00PM

Reaching the Board; IT/Cyber and Payments Risk Reporting Pt. 2

Jerald Garner, National Field Supervisor, NCUA
11:00AM - 12:00PM

Incident Response with EnCase® Endpoint Security Part 2

Jeremy Le-Roy, Instructor III, Guidance Software
Edward Garren, Instructor III, Guidance Software
11:00AM - 12:00PM

Legal Discovery & the iPhone: Not Just A Problem for Law Enforcement

Joseph Pochron, Director, Forensic Technology & Consulting, Transperfect Legal Solutions
11:00AM - 12:00PM

Nine Security Threats Posed by Connection Devices

Davitt Potter, Technical Director, Arrow Electronics
11:00AM - 12:00PM

Efficient Decryption

Dmitry Sumin, President, Passware