On August 3-4, attendees joined us in-person in Austin or tuned in Live Online for the SANS DFIR Summit 2023!
We invited Ashton Rodenhiser of Mind's Eye Creative to create graphic recordings of our Summit presentations. If you missed a talk or are looking to view the Summit through a visual lens, take a look at the recordings below.
*If you registered for the Summit, video recordings are available on your Summit Access page in your SANS Portal.
Digital Forensics: The Foundation of All Cyber Investigations
Chris Tarbell, Founding Partner, NAXO.jpg)
Once More unto the Data-Breach: Navigating Investigations of Unconventional Data Sources
Devon Ackerman, Global DFIR Services Leader, Kroll Cyber RiskDavid Sigmundson, Associate Managing Director, Kroll
Anthony Woodburn, Senior Associate, Kroll

Leveraging Digital Footprints for Darkweb Investigations and Attack Surface Management
Saumay Srivastava, Threat Intelligence Analyst, Threat-Tool
Picture Perfect: The Power of Attack Path Diagrams in DFIR Investigations
David Pany, Manager, MandiantBrad Slaybaugh, Incident Response Lead, Mandiant

Fast Forensics and Threat Hunting with Yamato Security Tools
Zachary Mathis, Associate Instructor.jpg)
EKS Incident Response and Forensic Analysis
Jonathon Poling, Principal Consultant - Threat Detection / Incident Response, Amazon Web Services (AWS)
A New Perspective on Resource-Level Cloud Forensics
Chris Doman, Co-Founder & CTO, Cado Security
Incident Analysis Case Study Focusing on .NET malware
Hirokazu Murakami, Senior Researcher, CyCraft.jpg)
I Want The Log I Can't Have
John Stoner, Global Principal Security Strategist, Google Cloud
Beyond the Basics: Microsoft 365 Attacks We Didn't See Coming
John Ailes, Senior Consultant - DFIR, AonJulia Paluch, DFIR Consultant, Aon

Keynote | Bridging the Gap: Integrating Digital Forensics with Open Source Intelligence
Matt Edmondson, Principal Instructor.jpg)
2 Meta 2 Oculus
Sadie Gauthier, SROC Engineer, SANS InstituteBrian Moran, CTO, BriMor Labs

Forensic Investigation of Email Client Tool Marks
Arman Gungor, CEO, Metaspike
What Can DFIQ Do For You?
Ryan Benson, Security Engineer, GoogleJon Brown,Technical Program Manager, Google
.jpg)
Special Delivery: Defending and Investigating Advanced Intrusions on Secure Email Gateways
Fernando Tomlinson, Technical Manager, Digital Forensics and Incident Response, MandiantNader Zaveri, Senior Manager - Incident Response & Remediation, Mandiant/Google Cloud
The Truth About USB "Serial Numbers" – Redux
Kevin Ripa, Senior Instructor
Windows Search Index: The Forensic Artifact You've Been Searching For
Phalgun Kulkarni, DFIR Consultant, AonJulia Paluch, DFIR Consultant, Aon
Direct Handling of AWS Snapshots: Reading Files in a Snap!
Matthew Seyer, Lead Specialist, KPMG, LLP.jpg)
Differential File System Analysis for the Quick Win
Kenneth Hartman, Certified Instructor
If you'd like to check out our other upcoming Summits, you can view the latest listing here.