Your browser does not support viewing this document. Click here to download the document.
2016 WACCI Confernece Breakout Sessions - Updated 09/08/16
Subpoenas and Warrants for Documents Determination of Child Pornography -- David Maas
Getting the Most Out of Cell Phone Forensics -- Rick McQuown, Milwaukee Police Department, High Tech Crime Unit
[Bring your laptop with your Cellebrite Dongles for your Physical Analyzer for hands on lab – as time permits]
Using Code in Digital Forensics and Incident Response -- Dan Jerger, Quest Consultants International
Introduction to Digital Forensics -- Shawn Bostick
UCD Free Tool-- Colm Stapleton, University College Dublin
JTAG for Dummies - Rick McQuown, Milwaukee Police Department, High Tech Crime Unit
Into the Rabbit Hole- Guide to Large Corporation Investigations for Law Enforcement -- Brian McDonough
Chip Off (Two Sessions Scheduled) -- Dean Delalski, Green Bay Police Department & Dan McGhee, Marathon County Sheriff’s Office
Running an Undercover ICAC Operation -- Jim Valley
Live Hacking Demo -- Zach Grace
Understanding Virtual Currency for the Investigator -- Kyle Rau, United States Postal Inspector
How to Annoy a Penetration Tester: Understanding tricks besides exploits that get us in and other topics -- Mark Lachniet
Train the Trainer- Creating ICAC Speaker Presentations -- Carl Waterstreet, WI DOJ, DCI
Forensics in the Field: Live system Analysis -- Jeff Shackelford, PassMark/ OS Forensics
Computer Crime Interviews: Tying the interview and analysis together -- Joe Mech, WI DOJ, DCI
Introduction to FreeNet -- Joe Mech, WI DOJ, DCI
Beyond Button Pushing: Digging into your eDiscovery Data -- Kathy Helenek, Digital Intelligence
Using Multiple Tools Together-- Kyle Van Haren, WI DOJ, DCI
Identification and Video Evidence: Beyond Reasonable Doubt -- Mary Ellen Karst and Scott Kuntz
Security Camera Insecurity - Joe Cicero
SSD Forensics -- Jeff Hedlesky, Guidance Software
Think Outside the Device: Leveraging Computers and the Cloud in Mobile Device Forensics -- John Carney
Improving Digital Forensics Results from Solid State Storage -- Greg Andrzejewski, Gillware
Crafting Search Warrants to Avoid 'Scope' Problems and to Preserve Investigative Flexibility -- AUSA Tim O'Shea, US DOJ
Windows Registry Artifacts: From 3.1 to 10 -- Matt Petersen, FBI
Crimes Against Children Case Preparation and Presentation in Court -- Gordon Kowaleski & Shawano Co. DA
Getting the Most Out of Cell Phone Forensics -- Rick McQuown, Milwaukee Police Department, High Tech Crime Unit
[Bring your laptop with your Cellebrite Dongles for your Physical Analyzer for hands on lab – as time permits]
Using Code in Digital Forensics and Incident Response -- Dan Jerger, Quest Consultants International
Introduction to Digital Forensics -- Shawn Bostick
UCD Free Tool-- Colm Stapleton, University College Dublin
JTAG for Dummies - Rick McQuown, Milwaukee Police Department, High Tech Crime Unit
Into the Rabbit Hole- Guide to Large Corporation Investigations for Law Enforcement -- Brian McDonough
Chip Off (Two Sessions Scheduled) -- Dean Delalski, Green Bay Police Department & Dan McGhee, Marathon County Sheriff’s Office
Running an Undercover ICAC Operation -- Jim Valley
Live Hacking Demo -- Zach Grace
Understanding Virtual Currency for the Investigator -- Kyle Rau, United States Postal Inspector
How to Annoy a Penetration Tester: Understanding tricks besides exploits that get us in and other topics -- Mark Lachniet
Train the Trainer- Creating ICAC Speaker Presentations -- Carl Waterstreet, WI DOJ, DCI
Forensics in the Field: Live system Analysis -- Jeff Shackelford, PassMark/ OS Forensics
Computer Crime Interviews: Tying the interview and analysis together -- Joe Mech, WI DOJ, DCI
Introduction to FreeNet -- Joe Mech, WI DOJ, DCI
Beyond Button Pushing: Digging into your eDiscovery Data -- Kathy Helenek, Digital Intelligence
Using Multiple Tools Together-- Kyle Van Haren, WI DOJ, DCI
Identification and Video Evidence: Beyond Reasonable Doubt -- Mary Ellen Karst and Scott Kuntz
Security Camera Insecurity - Joe Cicero
SSD Forensics -- Jeff Hedlesky, Guidance Software
Think Outside the Device: Leveraging Computers and the Cloud in Mobile Device Forensics -- John Carney
Improving Digital Forensics Results from Solid State Storage -- Greg Andrzejewski, Gillware
Crafting Search Warrants to Avoid 'Scope' Problems and to Preserve Investigative Flexibility -- AUSA Tim O'Shea, US DOJ
Windows Registry Artifacts: From 3.1 to 10 -- Matt Petersen, FBI
Crimes Against Children Case Preparation and Presentation in Court -- Gordon Kowaleski & Shawano Co. DA