BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//SUMURI - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:SUMURI
X-ORIGINAL-URL:https://sumuri.com
X-WR-CALDESC:Events for SUMURI
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20270314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20271107T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250925
DTEND;VALUE=DATE:20250926
DTSTAMP:20260405T164311
CREATED:20250815T141442Z
LAST-MODIFIED:20250826T184647Z
UID:271420-1758758400-1758844799@sumuri.com
SUMMARY:2025 Delaware NIGP Area II Conference
DESCRIPTION:Join SUMURI at the 2025 Delaware NIGP Area II Conference!\nAre you ready to discover solutions that not only meet your agency’s needs but also empower your community? SUMURI is heading to the NIGP Area II Conference & Vendor Expo\, and we want to connect with you! \nThis isn’t just another conference; it’s your chance to get ahead of the curve and see the tools that are shaping the future of public procurement. \n\nEvent Details:\nWhere: Bally’s Hotel & Conference Center\, Dover\, DE\nWhen: September 25\, 2025 \nSee more details\n \n\nYour Exclusive Booth Experience\nStop by our Booth for more than just a brochure. We’re offering an interactive experience designed for you: \n\nLive Demos:\nWitness our cutting-edge tools in action! We’ll showcase how SUMURI’s solutions can streamline your workflow and enhance your agency’s capabilities.\nExpert Consultations: Have a unique challenge? Our team will be on hand to offer personalized advice and discuss strategies tailored to your specific goals.\n\nWhy Make SUMURI Your First Stop?\n\nSolve\, Don’t Settle: Discover innovative solutions designed to tackle the real-world challenges you face in public procurement.\nConnect with the Experts: Go beyond a sales pitch. Meet the team behind the technology and build a partnership that supports your mission.\nLead the Way: Network with fellow leaders and position your agency at the forefront of efficiency and public safety.\n\nWe look forward to seeing you there!\nSave the date\, mark our booth on your map\, and get ready to be inspired. Stop by anytime—we can’t wait to connect with you in Dover!
URL:https://sumuri.com/event/2025-delaware-nigp-area-ii-conference/
LOCATION:Bally’s Hotel & Conference Center\, Dover\, DE\, Bally’s Hotel & Conference Center\, Dover\, DE
CATEGORIES:Conferences
ATTACH;FMTTYPE=image/png:https://sumuri.com/wp-content/uploads/2025/08/DPPA-NGIP-Banner.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20251006
DTEND;VALUE=DATE:20251010
DTSTAMP:20260405T164311
CREATED:20250527T135315Z
LAST-MODIFIED:20250912T152149Z
UID:265329-1759708800-1760054399@sumuri.com
SUMMARY:NW ICAC & Technology Conference 2025
DESCRIPTION:A Legacy of Innovation in Digital Forensics\nJoin SUMURI\, as we celebrate our 15th Anniversary at the NW ICAC & Technology Conference 2025. For 15 years\, SUMURI has been committed to delivering intuitive\, ethical\, and powerful forensic solutions that empower professionals in their mission to protect and investigate. \nWhy Visit SUMURI at NW ICAC?\n\nExplore Industry-Leading Software\nGet hands-on with our full suite of digital forensic tools\, including RECON LAB\, RECON ITR\, and PALADIN.\nExperience TALINO® Workstations\nSee how our high-performance forensic systems are purpose-built for speed\, reliability\, and precision.\nSupport ICAC Investigations\nDiscover how our solutions are designed to assist in sensitive investigations\, including internet crimes against children.\nMeet the Experts\nConnect with our team of seasoned forensic professionals and thought leaders driving innovation in the field.\nCelebrate a Shared Mission\nJoin us in recognizing the collective efforts of professionals dedicated to justice\, protection\, and truth.\n\nEvent Information\nEvent: NW ICAC & Technology Conference 2025\nDates: October 6–9\, 2025\nLocation: Microsoft Visitor Center\, Redmond\, WA\nBooth: 14 \n\nSUMURI Talks You Don’t Want to Miss\n\n\nMastering Live Volatile Data Collection on Macs: What Suspects Hope You Miss\nSteve Whalen\, CFCE\, CFME\, Co-Founder of SUMURI \nOctober 9\, 2025 | 2:00 PM – 3:30 PM (PDT) \n        Add to Your Agenda\n      \n\nPALADIN LTS Reforged: Fast\, Free\, and Field-Ready Forensics\nSteve Whalen\, CFCE\, CFME\, Co-Founder of SUMURI \nOctober 9\, 2025 | 3:45 PM – 5:15 PM (PDT) \n        Add to Your Agenda\n      \n \n \n\n2025 NW Regional ICAC Conference\nHosted by the ICAC Task Force Program — a national network of 4\,500+ agencies combating tech-enabled crimes against children. \n\nNew Venue: Hilton Garden Inn\, Downtown Redmond\nRaffle Prizes: Donated by Microsoft\, Seattle PD & sponsors\n\nRegister Now\n \n\nLooking Ahead\nAs we look to the future\, SUMURI remains committed to building fast\, user-friendly\, and globally trusted forensic solutions. Whether you’re in the lab\, out in the field\, or training the next generation of investigators — we’re here to support your mission. \nLet’s Connect\nWant to schedule a meeting or have questions before the event?\nReach out — we’d love to connect. \nVisit: https://sumuri.com\nEmail: hello@sumuri.com
URL:https://sumuri.com/event/nw-icac-technology-conference-2025/
LOCATION:Microsoft Campus\, 5010 NE 36th St\, Building 92 Redmond\, WA 98052-5317\, WA
CATEGORIES:Conferences
ATTACH;FMTTYPE=image/jpeg:https://sumuri.com/wp-content/uploads/2025/05/ICAC-event-page.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20251020
DTEND;VALUE=DATE:20251025
DTSTAMP:20260405T164311
CREATED:20241129T155658Z
LAST-MODIFIED:20250915T132840Z
UID:253513-1760918400-1761350399@sumuri.com
SUMMARY:MFSC-201: Online\, Eastern Daylight Time
DESCRIPTION:Advanced Practices in Mac Forensics will be presented by SUMURI from October 20 – 24 2025\, 8:00 AM to 5:00 PM EDT. \nAdvanced Practices in Mac Forensics (MFSC-201) builds upon the Best Practices in Mac Forensics (MFSC-101) course. MFSC-201 focuses on in-depth analysis techniques\, which provide the students the ability to apply what they have learned in real-world cases. \nParticipants will engage in teamwork-based learning\, guided by instructors dedicated to ensuring no one is left behind.  \nPre-requisite\nCompletion of MFSC-101 (or a comparable Mac Forensics course) is strongly recommended before taking MFSC-201. \n \n  \nMFSC-201 is the second of the two prerequisite courses required for the Certified Forensic Mac Examiner (CFME). Learn more about our training courses and how to become a CFME: https://sumuri.com/mac-training/ \nStart your journey to certification and elevate your expertise today! \n		\n			\n					\n		\n				\n				\n							\n\n						Note:\n			\n						Students will need access to a Mac computer running the current version of macOS for the course.\n			\n			\n		\n						\n				\n				\n					\n				\n				\n		\n		\n				\n					\n				\n				\n							\n							\n					\n												Need to Hide\n					\n					\n				\n							\n					\n												Topics to include but are not limited to:\n					\n							\n				\n					\n				\n				\n							\n							\n					\n												Advanced File System Analysis\n					\n					Introduction to the concept of domains within the macOS environment and locations of evidentiary artifacts and their contents. \n				\n							\n					\n												Advanced Command Line\n					\n					Work with macOS’ powerful and highly useful command-line interface to assist in forensic examinations of a Mac. \n				\n							\n					\n												macOS Log Analysis\n					\n					Learn how to identify artifacts from persistent and volatile logs\, including Apple Unified Logs. \n				\n							\n					\n												File System Event Monitoring and Analysis\n					\n					Work with live and logged File System Events to identify artifacts and determine file usage history on a volume or disk. \n				\n							\n					\n												Identifying and Analyzing Virtual Machines\n					\n					Identify the use of a VM within macOS and the procedures necessary to analyze artifacts. \n				\n							\n					\n												AppleScript and Automator\n					\n					Learn to develop custom programs and workflows to automate almost any task to simplify and enhance forensic examinations. \n				\n							\n					\n												macOS Server & Software RAIDs\n					\n					Discussion on macOS server technology and Apple software RAIDs. Learn the best practices on handling servers and Apple RAIDs. \n				\n							\n					\n												Macintosh Timeline Analysis\n					\n					Understand and identify unique macOS metadata timestamps for use in building a timeline of a file system that can retrace the suspect’s history minute by minute or second by second. \n				\n							\n					\n												iCloud Forensics\n					\n					Find and analyze iCloud artifacts and data\, such as documents\, synced with an Apple iCloud account. \n				\n							\n					\n												Time Machine Analysis\n					\n					Understand the Time Machine backup process and structure in order to find data. \n				\n							\n					\n												Unique Apple Technology\n					\n					Lean the best practices and resources available to deal with unique Apple technology such as Air Tags and Continuity. \n				\n							\n					\n												Advanced Search Techniques\n					\n					Use advanced search techniques\, both macOS native and 3rd party tools\, to find evidentiary artifacts within the macOS. \n				\n							\n					\n												Application Deconstruction\n					\n					Learn how to find any and all artifacts left behind by installed\, and in some cases uninstalled\, applications. \n				\n								\n						\n				\n					\n				\n				\n		 \n				\n										\n					\n						\n				\n				\n				\n					Secure Your Spot – Limited Seats Available!				\n				\n					\n				\n		\n					\n				\n				\n									LIMITED TIME OFFER								\n				\n				\n				\n									Use this coupon code below to get 15% discount.								\n				\n				\n				\n									“MFSC15”
URL:https://sumuri.com/event/mfsc-201-251020on/
CATEGORIES:Advanced Practices in Mac Forensics,Macintosh Forensics Training
ATTACH;FMTTYPE=image/webp:https://sumuri.com/wp-content/uploads/2024/11/MFSC-201-Online-Eastern.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20251103
DTEND;VALUE=DATE:20251108
DTSTAMP:20260405T164311
CREATED:20250828T142732Z
LAST-MODIFIED:20251002T181336Z
UID:272131-1762128000-1762559999@sumuri.com
SUMMARY:MFSC-101: Singapore
DESCRIPTION:Best Practices in Mac Forensics will be hosted in person in Singapore from November 03 – 07\, 2025\, 8:00 AM to 5:00 PM SGT\, by SUMURI in partnership with Data Expert Singapore. \nMFSC-101 is designed for both the beginner Mac examiner as well as the advanced. The knowledge you gain can be applied to any forensic tool on any platform. No sales pitch\, just Mac forensics! \n  \nMFSC-101 is the first of the two prerequisite courses required for the Certified Forensic Mac Examiner (CFME). Learn more about our training courses and how to become a CFME: https://sumuri.com/mac-training/ \nStart your journey to certification and elevate your expertise today! \n		\n			\n					\n		\n				\n				\n							\n\n						Note:\n			\n						Students will need access to a Mac computer running the current version of macOS for the course.\n			\n			\n		\n						\n				\n				\n					\n				\n				\n		\n		\n				\n					\n				\n				\n							\n							\n					\n												Need to Hide\n					\n					\n				\n							\n					\n												Topics to include but are not limited to:\n					\n							\n				\n					\n				\n				\n							\n							\n					\n												Overview of macOS Versions\n					\n					Identifies features of forensic importance in different macOS and when they appeared \n				\n							\n					\n												Understanding the Mac File System Technology\n					\n					A review of all file system technology supported by macOS such as APFS\, Core Storage\, Fusion Drives\, and macOS Extended \n				\n							\n					\n												Intel Mac Technology and Bootcamp\n					\n					Explains the forensic significance of Mac Intel Technology \n				\n							\n					\n												Silicon Mac Technology\n					\n					Explains the unique issues and forensic significance of M1 Silicon Technology \n				\n							\n					\n												Mac Security Issues and FileVault Attacks\n					\n					Current best practices for dealing with Mac Security \n				\n							\n					\n												Macintosh Search and Seizure\n					\n					Best practices for seizing Mac and iOS hardware \n				\n							\n					\n												Safely Obtaining System Information\n					\n					How to safely obtain system information without making changes to the evidence \n				\n							\n					\n												Open Firmware Passwords\n					\n					Explains OFP\, how to set and remove OFP if it is necessary \n				\n							\n					\n												Volatile Data Collection\n					\n					Discussion on unique issues concerning Mac Volatile Data\, methods to collect it\, and the need for a Trusted Utilities Disk \n				\n							\n					\n												Forensic Imaging\n					\n					Discussion and exercises on imaging Intel and M1 Silicon Macs to include issues present by Mac security features \n				\n							\n					\n												Imaging Mac RAM\n					\n					Discussion on the challenges in capturing RAM due to macOS security features \n				\n							\n					\n												Mounting Forensic Images in the macOS\n					\n					Safely mounting forensic images for Processing and analysis \n				\n							\n					\n												Indexing Forensic Images\n					\n					How to index forensic images using macOS \n				\n							\n					\n												Search Techniques Using macOS\n					\n					Creating custom search expressions  from the command-line and GUI \n				\n							\n					\n												Locating Evidence\n					\n					How to identify\, analyze and extract macOS and application artifacts such as Email\, Graphics\, Internet Artifacts\, Documents\, System Artifacts\, Instant Messaging\, logs\, and more \n				\n							\n					\n												Recovering Deleted Files\n					\n					An exercise in manually recovering deleted files and the dangers of Mac optimization \n				\n							\n					\n												Examining SQLite Databases and PLIST files\n					\n					Examining the heart of Mac data storage \n				\n							\n					\n												Using macOS for Forensics\n					\n					How to utilize built-in macOS technology for forensics \n				\n							\n					\n												Report Development\n					\n					How to create native reports using the Mac to view data properly \n				\n							\n					\n												Recommendations for Mac Forensics system configuration and hardware\n					\n					Our recommendations for commercial and non-commercial tools to assist with Mac forensics. \n				\n										\n					\n						\n				\n					\n				\n				\n		 \n				\n										\n					\n						\n				\n				\n				\n					Secure Your Spot – Limited Seats Available!				\n				\n					\n				\n		\n					\n				\n				\n									LIMITED TIME OFFER								\n				\n				\n				\n									Use this coupon code below to get 15% discount.								\n				\n				\n				\n									“MFSC15”								\n				\n					\n				\n				\n		\n  \n\nInquire About the Course
URL:https://sumuri.com/event/mfsc-101-251103sg/
CATEGORIES:Best Practices in Mac Forensics,Macintosh Forensics Training
ATTACH;FMTTYPE=image/png:https://sumuri.com/wp-content/uploads/2025/08/Data-Expert-Event-banner.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20251104
DTEND;VALUE=DATE:20251107
DTSTAMP:20260405T164311
CREATED:20250805T155544Z
LAST-MODIFIED:20251030T132931Z
UID:270697-1762214400-1762473599@sumuri.com
SUMMARY:Join SUMURI at ISS World North America 2025
DESCRIPTION:We’re Bringing Real Tools to Real Investigators\nThis November\, SUMURI will be in Washington\, D.C. for ISS World North America—an event that brings together the people doing the hard work: law enforcement\, intelligence\, and cybersecurity professionals facing today’s most complex digital investigations. \nWe’re not just showing up with marketing. We’re showing up with solutions. \nFeatured Session with Steve Whalen\n\n		\n				\n					\n		\n		\n		\n				\n				\n									Title: TALINO + PALADIN: The Gold Standard in Custom Forensic Workstations								\n				\n				\n				\n									Date: Wednesday\, November 5								\n				\n				\n				\n									Time: 4:15 — 5:00 PM								\n				\n				\n				\n		\n		\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Steve Whalen								\n				\n				\n				\n									Co-Founder\, SUMURI LLC								\n				\n				\n				\n				\n				\n					\n				\n		\n					\n				\n				\n									Steve will break down what makes the TALINO line the go-to forensic workstation for professionals across agencies. You’ll see what it looks like to get real performance in real casework—and how PALADIN helps simplify triage\, imaging\, and analysis in the field.								\n				\n				\n				\n									If you’re tired of tools that promise too much and deliver too little\, this is a session you’ll want to sit in on.								\n				\n					\n				\n				\n		\nStop by Our Booth\nWhether you’re just learning about SUMURI or already use our tools\, come by and say hello. Our team will be there to: \n\nWalk you through TALINO and PALADIN\nAnswer your technical questions\nTalk shop about actual workflows and challenges in the field\n\nWhy We’re Coming\nFor us\, it’s not about showing off—it’s about showing up. With tools that are built by former examiners\, tested in the field\, and made to make your job easier\, faster\, and more accurate. \nIf your job is to find the truth in digital evidence\, we’re here to help. See you in D.C.
URL:https://sumuri.com/event/iss-washington-conference/
LOCATION:Sheraton Atlanta Hotel\, 165 Cortland Street\, NE \, Atlanta\, GA\, 30303\, United States
CATEGORIES:Conferences
ATTACH;FMTTYPE=image/jpeg:https://sumuri.com/wp-content/uploads/2025/08/ISS-World-North-America-Event-banner-2025.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260209
DTEND;VALUE=DATE:20260214
DTSTAMP:20260405T164311
CREATED:20250804T191020Z
LAST-MODIFIED:20250820T154337Z
UID:270593-1770595200-1771027199@sumuri.com
SUMMARY:MFSC-101: Online\, Eastern Standard Time
DESCRIPTION:Best Practices in Mac Forensics will be presented by SUMURI from February 09 – 13\, 2026\, 8:00 AM to 5:00 PM EST. \nSUMURI’s Macintosh Forensic Survival Course (MFSC-101) provides vendor-neutral training that covers the process of examining a Macintosh computer from the first step to the last step in logical order. \nMFSC-101 is designed for both the beginner Mac examiner as well as the advanced. The knowledge you gain can be applied to any forensic tool on any platform. No sales pitch\, just Mac forensics! \n  \nMFSC-101 is the first of the two prerequisite courses required for the Certified Forensic Mac Examiner (CFME). Learn more about our training courses and how to become a CFME: https://sumuri.com/mac-training/ \nStart your journey to certification and elevate your expertise today! \n		\n				\n					\n				\n				\n							\n						\n				\n					 Item #2 \n									\n				\n					\n					\n				\n					\n						\n				\n					 Topics to include but are not limited to: \n									\n				\n				\n				\n									\n				\n					\n				\n				\n									\n				\n				\n				\n							\n							\n					\n												Understanding the Mac File System Technology:\n					\n					Students will gain a foundational understanding of macOS file systems\, focusing on the key differences between APFS and HFS+ and how they compare to non-Mac formats like exFAT and NTFS. The module covers challenges unique to analyzing each format\, including how macOS handles volume management with technologies like synthesized disks\, Core Storage\, and Fusion Drives. This knowledge is essential for interpreting file structures and ensuring accurate evidence collection and analysis. \n				\n							\n					\n												Understanding the Mac File System Technology:\n					\n					Learn the differences between APFS\, HFS+\, and other formats\, along with challenges in analyzing each and related technologies like synthesized disks\, Core Storage\, and Fusion Drives. \n				\n							\n					\n												Intel Mac Technology and Bootcamp:\n					\n					Understand Intel-based Mac architecture\, its differences from Apple Silicon\, and forensic considerations for Secure Enclave\, Secure Boot\, Bootcamp\, and virtualization. \n				\n							\n					\n												Silicon Mac Technology:\n					\n					Examine Apple Silicon architecture\, security features\, imaging challenges\, and how to properly seize and analyze these newer devices. \n				\n							\n					\n												Mac Security:\n					\n					Explore macOS security layers including Secure Enclave\, Secure Boot\, FileVault\, and user permissions\, plus examiner techniques for working within these constraints. \n				\n							\n					\n												Macintosh Search and Seizure:\n					\n					Learn seizure procedures to protect against risks like remote wipe\, user traps\, and evidence loss\, with a step-by-step on-scene process. \n				\n							\n					\n												Safely Obtaining System Information:\n					\n					Identify system details such as macOS version\, hardware type\, and security settings to guide acquisition decisions for live and powered-down Macs. \n				\n							\n					\n												Volatile Data Collection:\n					\n					Understand challenges in modern RAM capture and learn alternative methods for collecting valuable live-response data before it is lost. \n				\n							\n					\n												Forensic Imaging:\n					\n					Gain hands-on experience performing logical and physical imaging\, selecting source disks\, and using free tools to acquire data securely. \n				\n							\n					\n												Mounting Forensic Images in macOS:\n					\n					Safely mount images to preserve evidence while enabling access to indexed data and macOS-native search tools. \n				\n							\n					\n												Indexing and Searching Forensic Images in macOS:\n					\n					Use macOS indexing and search from both GUI and command line to locate evidence quickly and efficiently. \n				\n							\n					\n												Manual Artifact Deconstruction of First-Party Applications:\n					\n					Learn to locate\, analyze\, and extract data from Apple’s native apps\, building skills for unsupported or unfamiliar artifacts. \n				\n							\n					\n												Recovering Deleted Files on macOS:\n					\n					Test recovery methods while understanding the impact of APFS\, TRIM\, encryption\, and hardware limitations on file recovery. \n				\n							\n					\n												Examining SQLite Databases and PLIST Files:\n					\n					Locate and analyze these key artifacts with proper tools\, SQL queries\, and PLIST conversion techniques. \n				\n							\n					\n												Report Development:\n					\n					Create high-quality\, native-format reports using macOS tools to present artifacts accurately and clearly. \n				\n										\n					\n						\n				\n					\n				\n				\n		\n						\n				\n				\n					\n					\n					\n							\n				\n				\n				\n					Secure Your Spot – Limited Seats Available!				\n				\n					\n				\n		\n					\n				\n				\n							\n						\n				\n					 Item #2 \n							\n			\n			\n		\n\n						\n				\n					\n					\n				\n					\n						\n				\n					 Topics to include but are not limited to: \n							\n			\n			\n		\n\n						\n				\n				\n				\n					Understanding the Mac File System Technology				\n				\n				\n				\n									A review of all file system technology supported by macOS such as APFS\, Core Storage\, Fusion Drives\, and macOS Extended.								\n				\n				\n				\n					Intel Mac Technology and Bootcamp				\n				\n				\n				\n									Explains the forensic significance of Mac Intel Technology								\n				\n				\n				\n					Silicon Mac Technology				\n				\n				\n				\n									Explains the unique issues and forensic significance of M1 Silicon Technology								\n				\n				\n				\n					Mac Security Issues and FileVault Attacks				\n				\n				\n				\n									Current best practices for dealing with Mac Security								\n				\n				\n				\n					Macintosh Search and Seizure				\n				\n				\n				\n									Best practices for seizing Mac and iOS hardware								\n				\n				\n				\n					Safely Obtaining System Information				\n				\n				\n				\n									How to safely obtain system information without making changes to the evidence								\n				\n				\n				\n					Open Firmware Passwords				\n				\n				\n				\n									Explains OFP\, how to set and remove OFP if it is necessary								\n				\n				\n				\n					Volatile Data Collection				\n				\n				\n				\n									Discussion on unique issues concerning Mac Volatile Data\, methods to collect it\, and the need for a Trusted Utilities Disk								\n				\n				\n				\n					Forensic Imaging				\n				\n				\n				\n									Discussion and exercises on imaging Intel and M1 Silicon Macs to include issues present by Mac security features								\n				\n				\n				\n					Imaging Mac RAM				\n				\n				\n				\n									Discussion on the challenges in capturing RAM due to macOS security features								\n				\n				\n				\n					Mounting Forensic Images in the macOS				\n				\n				\n				\n									Safely mounting forensic images for Processing and analysis								\n				\n				\n				\n					Indexing Forensic Images				\n				\n				\n				\n									How to index forensic images using macOS								\n				\n				\n				\n					Search Techniques Using macOS				\n				\n				\n				\n									Creating custom search expressions  from the command-line and GUI								\n				\n				\n				\n					Locating Evidence				\n				\n				\n				\n									How to identify\, analyze and extract macOS and application artifacts such as Email\, Graphics\, Internet Artifacts\, Documents\, System Artifacts\, Instant Messaging\, logs\, and more								\n				\n				\n				\n					Recovering Deleted Files				\n				\n				\n				\n									An exercise in manually recovering deleted files and the dangers of Mac optimization								\n				\n				\n				\n					Examining SQLite Databases and PLIST files				\n				\n				\n				\n									Examining the heart of Mac data storage								\n				\n				\n				\n					Using macOS for Forensics				\n				\n				\n				\n									How to utilize built-in macOS technology for forensics								\n				\n				\n				\n					Report Development				\n				\n				\n				\n									How to create native reports using the Mac to view data properly								\n				\n				\n				\n					Recommendations for Mac Forensics system configuration and hardware				\n				\n				\n				\n									Our recommendations for commercial and non-commercial tools to assist with Mac forensics.								\n				\n				\n					\n					\n						\n				\n				\n				\n					Secure Your Spot – Limited Seats Available!
URL:https://sumuri.com/event/mfsc-101-260209on/
CATEGORIES:Best Practices in Mac Forensics,Macintosh Forensics Training
ATTACH;FMTTYPE=image/webp:https://sumuri.com/wp-content/uploads/2024/11/MFSC-101-250203ON-Event-Banner-v2.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260309
DTEND;VALUE=DATE:20260314
DTSTAMP:20260405T164311
CREATED:20250805T181124Z
LAST-MODIFIED:20251204T183039Z
UID:270728-1773014400-1773446399@sumuri.com
SUMMARY:MFSC-201: Online\, Eastern Daylight Time
DESCRIPTION:Advanced Practices in Mac Forensics will be presented by SUMURI from March 09 – 13 2026\, 8:00 AM to 5:00 PM EDT. \nAdvanced Practices in Mac Forensics (MFSC-201) builds upon the Best Practices in Mac Forensics (MFSC-101) course. MFSC-201 focuses on in-depth analysis techniques\, which provide the students the ability to apply what they have learned in real-world cases. \nParticipants will engage in teamwork-based learning\, guided by instructors dedicated to ensuring no one is left behind.  \nPre-requisite\nCompletion of MFSC-101 (or a comparable Mac Forensics course) is strongly recommended before taking MFSC-201. \n \n  \nMFSC-201 is the second of the two prerequisite courses required for the Certified Forensic Mac Examiner (CFME). Learn more about our training courses and how to become a CFME: https://sumuri.com/mac-training/ \nStart your journey to certification and elevate your expertise today! \n		\n			\n					\n		\n				\n				\n							\n\n						Note:\n			\n						Students will need access to a Mac computer running the current version of macOS for the course.\n			\n			\n		\n						\n				\n				\n					\n				\n				\n		\n		\n				\n					\n				\n				\n							\n						\n				\n					 Item #2 \n									\n				\n					\n					\n				\n					\n						\n				\n					 Topics to include but are not limited to: \n									\n				\n				\n				\n									\n				\n					\n				\n				\n									\n				\n				\n				\n							\n							\n					\n												Advanced macOS Artifact Analysis\n					\n					Deep dive into property lists\, SQLite databases\, bundle files\, and library directories to uncover key forensic evidence. \n				\n							\n					\n												Advanced macOS Artifact Analysis:\n					\n					Deep dive into property lists\, SQLite databases\, bundle files\, and library directories to uncover key forensic evidence. \n				\n							\n					\n												User and System Activity Reconstruction:\n					\n					Identify user account changes\, network connections\, attached devices\, and hibernation states to build detailed timelines. \n				\n							\n					\n												Mastering macOS Timestamps:\n					\n					Learn how to interpret POSIX and Apple Extended Attribute timestamps to track file and system events accurately. \n				\n							\n					\n												Comprehensive Log Analysis:\n					\n					Extract and interpret data from unified logs\, domain-specific logs\, and application logs to reveal user actions and system events. \n				\n							\n					\n												Application Deconstruction:\n					\n					Perform static and dynamic artifact analysis of first- and third-party applications to uncover hidden or unsupported evidence. \n				\n							\n					\n												Advanced Command Line for Forensics:\n					\n					Utilize macOS terminal commands to locate\, extract\, and analyze artifacts quickly and efficiently. \n				\n							\n					\n												Time Machine and FSEvents Forensics:\n					\n					Recover historical snapshots\, identify file changes\, and track system activity over time. \n				\n							\n					\n												RAM\, Virtual Machine\, and iOS Artifact Analysis:\n					\n					Examine volatile memory\, virtual machine images\, and iOS data stored on Macs. \n				\n							\n					\n												Custom Forensic Tool Development:\n					\n					Learn to script your own acquisition\, triage\, and data collection tools in Bash and Python. \n				\n							\n					\n												macOS Automation for Investigations:\n					\n					Leverage AppleScript and Automator to streamline repetitive forensic tasks. \n				\n										\n					\n						\n				\n					\n				\n				\n		\n						\n				\n				\n					\n					\n					\n							\n				\n				\n				\n					Secure Your Spot – Limited Seats Available!
URL:https://sumuri.com/event/mfsc-201-260309on/
CATEGORIES:Advanced Practices in Mac Forensics,Macintosh Forensics Training
ATTACH;FMTTYPE=image/webp:https://sumuri.com/wp-content/uploads/2024/11/MFSC-201-Online-Eastern.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260326
DTEND;VALUE=DATE:20260327
DTSTAMP:20260405T164311
CREATED:20260309T182806Z
LAST-MODIFIED:20260311T205317Z
UID:286622-1774483200-1774569599@sumuri.com
SUMMARY:2026 Spring Manufacturing Conference
DESCRIPTION:Join SUMURI at the Spring Manufacturing & Policy Conference! \nSUMURI is excited to participate in the Spring Manufacturing & Policy Conference\, an annual event that highlights the critical role manufacturers play in driving Delaware’s economy. The conference brings together industry leaders\, plant managers\, manufacturing professionals\, and policymakers to discuss the future of manufacturing and the policies shaping the industry. \nThe event features a keynote address from Delaware’s governor and provides valuable opportunities for attendees to connect with leaders from across the manufacturing sector. Participants can engage in meaningful discussions\, share insights\, and explore the innovations that continue to strengthen manufacturing in the First State. \n\nEvent Details:\nDates: March 26\, 2026 \nLocation: Delaware Technical Community College – Terry Campus\, Del-One Conference Center in the Education and Technology Building \nAddress: 100 Campus Drive\, Dover\, DE 19904\, United States \nBooth Staff: Jason \nBooth #: TBA \nWhat to Expect:\n\nA keynote presentation from Delaware’s governor discussing the future of manufacturing in the state\nNetworking opportunities with plant managers\, manufacturing professionals\, and policymakers\nThe announcement of the Coolest Thing Made in Delaware winner\, celebrating innovative products made in the state\n\nVisit SUMURI during the conference to connect with our team and learn more about our innovative AI solutions. \nWe look forward to seeing you at the Spring Manufacturing & Policy Conference!
URL:https://sumuri.com/event/spring-manufacturing-conference/
LOCATION:Delaware Technical Community College – Terry Campus\, Del-One Conference Center in the Education and Technology Building\, 100 Campus Drive\, Dover\, DE 19904\, United States
CATEGORIES:Conferences
ATTACH;FMTTYPE=image/webp:https://sumuri.com/wp-content/uploads/2026/03/Spring-Manufacturing-Conference-Event-Banner.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260408T090000
DTEND;TZID=America/New_York:20260408T130000
DTSTAMP:20260405T164311
CREATED:20260311T155656Z
LAST-MODIFIED:20260402T183441Z
UID:286741-1775638800-1775653200@sumuri.com
SUMMARY:2026 OpenText-SUMURI Lunch and Learn
DESCRIPTION:Efficiency in digital forensic investigations starts with the right hardware and software integration. As data volumes grow and encryption becomes the standard\, your ability to triage and image evidence quickly determines the success of your case.\nJoin our free Lunch & Learn session at the OpenText Training Center in Gaithersburg\, MD. This technical briefing focuses on how OpenText Forensic empowers you to save time by previewing images during the collection process\, ensuring your investigation starts with the most relevant data. We will also address the increasing diversity and sophistication of digital media\, demonstrating how the latest OpenText Forensic Equipment delivers reliable\, portable\, and cost-efficient imaging for any environment.\nBeyond the OpenText ecosystem\, we will dive into the power of purpose-built workstations and specialized Mac forensics. See how TALINO Forensic Workstations are engineered to support modern processing demands—including the resource-intensive requirements of running local AI—and get a technical update on RECON ITR for native imaging of the latest macOS versions and Apple Silicon.\n		\n				\n					\n				\n				\n									Tools You’ll Discover:								\n				\n				\n				\n							\n						\n				\n					 OpenText Forensic (formerly known as EnCase Forensic) \n							\n			\n			\n		\n\n						\n				\n		\n					\n				\n				\n									Streamline evidence processing and enhance efficiency. Experience how OpenText Forensic helps you save valuable time by previewing images during the collection process and optimizing the analysis of digital evidence.								\n				\n					\n				\n				\n					\n						\n				\n					 OpenText Forensic Equipment (formerly known as Tableau Forensic) \n							\n			\n			\n		\n\n						\n				\n		\n					\n				\n				\n									Explore the latest capabilities in standalone forensic imaging. Discover cost-effective and reliable solutions for quickly imaging suspect devices while maintaining strict forensic integrity in the field or the lab.								\n				\n					\n				\n				\n					\n						\n				\n					 TALINO Forensic Workstations \n							\n			\n			\n		\n\n						\n				\n		\n					\n				\n				\n									A look at the hardware backbone of modern forensics. Learn how TALINO workstations are designed by examiners to eliminate processing bottlenecks and provide the GPU and CPU power necessary for local AI implementation.								\n				\n					\n				\n				\n					\n						\n				\n					 RECON ITR \n							\n			\n			\n		\n\n						\n				\n		\n					\n				\n				\n									See what’s new with RECON ITR. We will demonstrate how to triage and image Apple Silicon Macs natively\, capturing extended metadata that other tools often miss.								\n				\n					\n				\n				\n					\n					\n						\n				\n				\n				\n									Meet the Experts:								\n				\n		\n		\n		\n		\n				\n				\n																														\n				\n				\n				\n									Speaker 1								\n				\n				\n		\n				\n				\n									Victor De La Peña								\n				\n				\n				\n									Lead Solutions Consultant\, OpenText								\n				\n				\n				\n				\n		\n		\n		\n				\n				\n																														\n				\n				\n				\n									Speaker 2								\n				\n				\n		\n				\n				\n									Jason Roslewicz								\n				\n				\n				\n									Executive Vice President Operations\, SUMURI LLC 								\n				\n				\n				\n				\n				\n				\n				\n									We look forward to sharing practical insights and technical demonstrations to help you refine your investigative workflow.								\n				\n				\n				\n									Registration Deadline: April 3\, 2026. For inquiries\, email us at hello@sumuri.com.								\n				\n				\n				\n									See you on April 8th!
URL:https://sumuri.com/event/2026-opentext-sumuri-lunch-and-learn/
LOCATION:OpenText Gaithersburg Training Center\, 6th Floor\, OpenText Gaithersburg Training Center 9711 Washingtonian Boulevard Gaithersburg\, MD 20878
CATEGORIES:2026,Conferences
ATTACH;FMTTYPE=image/png:https://sumuri.com/wp-content/uploads/2026/03/Newsletter_Lunch_and_Learn.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260427
DTEND;VALUE=DATE:20260502
DTSTAMP:20260405T164311
CREATED:20250905T172742Z
LAST-MODIFIED:20251015T144647Z
UID:272553-1777248000-1777679999@sumuri.com
SUMMARY:MFSC-101: Orlando\, Florida
DESCRIPTION:Best Practices in Mac Forensics will be presented by SUMURI from April 27 – May 1\, 2026\, 8:00 AM to 5:00 PM EDT. \nSUMURI’s Macintosh Forensic Survival Course (MFSC-101) provides vendor-neutral training that covers the process of examining a Macintosh computer from the first step to the last step in logical order. \nMFSC-101 is designed for both the beginner Mac examiner as well as the advanced. The knowledge you gain can be applied to any forensic tool on any platform. No sales pitch\, just Mac forensics! \n \n  \nMFSC-101 is the first of the two prerequisite courses required for the Certified Forensic Mac Examiner (CFME).\nStart your journey to certification and elevate your expertise today! \n		\n			\n					\n		\n				\n				\n							\n\n						Note:\n			\n						Students will need access to a Mac computer running the current version of macOS for the course.\n			\n			\n		\n						\n				\n				\n					\n				\n				\n		\n		\n				\n					\n				\n				\n									\n					\n						\n									Register Here\n					\n					\n				\n								\n				\n				\n				\n									Topics to include but are not limited to: 								\n				\n				\n				\n									\n				\n				\n				\n							\n							\n					\n												Overview of macOS Versions\n					\n					Identifies features of forensic importance in different macOS and when they appeared \n				\n							\n					\n												Overview of macOS Versions\n					\n					Identifies features of forensic importance in different macOS and when they appeared \n				\n							\n					\n												Understanding the Mac File System Technology\n					\n					A review of all file system technology supported by macOS such as APFS\, Core Storage\, Fusion Drives\, and macOS Extended \n				\n							\n					\n												Intel Mac Technology and Bootcamp\n					\n					Explains the forensic significance of Mac Intel Technology \n				\n							\n					\n												Silicon Mac Technology\n					\n					Explains the unique issues and forensic significance of M1 Silicon Technology \n				\n							\n					\n												Mac Security Issues and FileVault Attacks\n					\n					Current best practices for dealing with Mac Security \n				\n							\n					\n												Macintosh Search and Seizure\n					\n					Best practices for seizing Mac and iOS hardware \n				\n							\n					\n												Safely Obtaining System Information\n					\n					How to safely obtain system information without making changes to the evidence \n				\n							\n					\n												Open Firmware Passwords\n					\n					Explains OFP\, how to set and remove OFP if it is necessary \n				\n							\n					\n												Volatile Data Collection\n					\n					Discussion on unique issues concerning Mac Volatile Data\, methods to collect it\, and the need for a Trusted Utilities Disk \n				\n							\n					\n												Forensic Imaging\n					\n					Discussion and exercises on imaging Intel and M1 Silicon Macs to include issues present by Mac security features \n				\n							\n					\n												Imaging Mac RAM\n					\n					Discussion on the challenges in capturing RAM due to macOS security features \n				\n							\n					\n												Mounting Forensic Images in the macOS\n					\n					Safely mounting forensic images for Processing and analysis \n				\n							\n					\n												Indexing Forensic Images\n					\n					How to index forensic images using macOS \n				\n							\n					\n												Search Techniques Using macOS\n					\n					Creating custom search expressions  from the command-line and GUI \n				\n							\n					\n												Locating Evidence\n					\n					How to identify\, analyze and extract macOS and application artifacts such as Email\, Graphics\, Internet Artifacts\, Documents\, System Artifacts\, Instant Messaging\, logs\, and more \n				\n							\n					\n												Recovering Deleted Files\n					\n					An exercise in manually recovering deleted files and the dangers of Mac optimization \n				\n							\n					\n												Examining SQLite Databases and PLIST files\n					\n					Examining the heart of Mac data storage \n				\n							\n					\n												Using macOS for Forensics\n					\n					How to utilize built-in macOS technology for forensics \n				\n							\n					\n												Report Development\n					\n					How to create native reports using the Mac to view data properly \n				\n							\n					\n												Recommendations for Mac Forensics system configuration and hardware\n					\n					Our recommendations for commercial and non-commercial tools to assist with Mac forensics. \n				\n										\n					\n						\n				\n				\n				\n					Secure Your Spot – Limited Seats Available!				\n				\n		\n				\n				\n									Don’t miss out on this opportunity to enhance your capabilities as a Mac forensic expert. Book your accommodation at the Caribe Royale Hotel here. Prefer other accommodations? Just be aware that conference center parking fees may apply.								\n				\n				\n					\n				\n		\n					\n				\n				\n									LIMITED TIME OFFER								\n				\n				\n				\n									Use this coupon code below to get 15% discount.								\n				\n				\n				\n									“MFSC15”
URL:https://sumuri.com/event/mfsc-101-orlando-florida-2026/
CATEGORIES:Best Practices in Mac Forensics,Macintosh Forensics Training
ATTACH;FMTTYPE=image/png:https://sumuri.com/wp-content/uploads/2024/10/101-IACIS-Event-Banner.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260428
DTEND;VALUE=DATE:20260501
DTSTAMP:20260405T164311
CREATED:20260224T204831Z
LAST-MODIFIED:20260311T205431Z
UID:285426-1777334400-1777593599@sumuri.com
SUMMARY:2026 National Cyber Crime Conference
DESCRIPTION:Join SUMURI at the 2026 National Cyber Crime Conference! \nWe’re excited to announce that SUMURI will be participating in the National Cyber Crime Conference (NCCC) from April 28 – 30\, 2026\, at the Four Points by Sheraton Norwood\, MA. \nAs one of the premier training events for law enforcement\, prosecutors\, and forensic examiners worldwide\, the NCCC offers unparalleled opportunities to learn about the latest trends\, tools\, and techniques in digital evidence and cybercrime investigation. \n\nEvent Details:\nDates: April 28 – 30\, 2026 \nLocation: Four Points by Sheraton Norwood\, MA \nTime: 8:00 AM to 5:00 PM EDT \nBooth Staff: Jason\, Christian and Ahmad \nBooth #: TBA \nWhat to Expect:\n\nExpert-led sessions on emerging cybercrime topics\nHands-on training in forensic solutions\nNetworking with industry leaders and innovators\n\nVisit our booth to see how SUMURI continues to revolutionize forensic solutions with cutting-edge tools and technologies designed to support your mission. \nWe can’t wait to meet you and showcase our solutions built to empower your forensic investigations. See you at NCCC 2026!
URL:https://sumuri.com/event/2026-national-cyber-crime-conference/
LOCATION:Four Points by Sheraton Norwood\, 1125 Boston-Providence Turnpike\, Norwood\, MA
CATEGORIES:Conferences
ATTACH;FMTTYPE=image/webp:https://sumuri.com/wp-content/uploads/2025/02/NCCC-Event-Banner-v2.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260430
DTEND;VALUE=DATE:20260505
DTSTAMP:20260405T164311
CREATED:20260224T212200Z
LAST-MODIFIED:20260311T205454Z
UID:285438-1777507200-1777939199@sumuri.com
SUMMARY:2026 IACIS Digital Forensics Conference
DESCRIPTION:Join SUMURI at the 2026 IACIS Digital Forensics Conference! \nSUMURI is thrilled to be part of the IACIS (International Association of Computer Investigative Specialists) Digital Forensics Conference — a key event bringing together professionals in the digital forensics field from around the world. \nThe IACIS conference is a vital gathering for those in law enforcement\, cybersecurity\, and digital forensics\, offering cutting-edge training\, collaboration\, and the latest industry insights. This conference plays a crucial role in shaping the future of digital forensics through education\, research\, and industry partnerships. \n\nEvent Details:\nDates: April 30\, May 1 & May 4th \nLocation: Caribe Royale Orlando \nTime: 8:00 AM to 5:00 PM EDT \nBooth Staff: Steve & Jason \nBooth #: TBA \nWhat to Expect:\n\nIn-depth training and workshops led by industry experts\nNetworking with top digital forensics specialists\nHands-on demonstrations of innovative forensic tools and technologies\n\nVisit SUMURI at our booth to discover the latest in digital forensics solutions designed to enhance your investigative capabilities. \nWe’re looking forward to seeing you at the IACIS 2026 conference\, where we’ll continue to innovate and push the boundaries of digital forensics together!
URL:https://sumuri.com/event/2026-iacis-digital-forensics-conference/
LOCATION:Caribe Royale Hotel\, 8101 World Center Drive\, Orlando \, FL
CATEGORIES:Conferences
ATTACH;FMTTYPE=image/webp:https://sumuri.com/wp-content/uploads/2026/02/IACIS-Digital-Forensics-Conference.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260504
DTEND;VALUE=DATE:20260509
DTSTAMP:20260405T164311
CREATED:20250905T174232Z
LAST-MODIFIED:20251015T144740Z
UID:272555-1777852800-1778284799@sumuri.com
SUMMARY:MFSC-201: Orlando\, Florida
DESCRIPTION:Advanced Practices in Mac Forensics will be presented by SUMURI from May 4 – May 8\, 2026\, 8:00 AM to 5:00 PM EDT. \nAdvanced Practices in Mac Forensics (MFSC-201) builds upon the Best Practices in Mac Forensics (MFSC-101) course. MFSC-201 focuses on in-depth analysis techniques\, which provide the students the ability to apply what they have learned in real-world cases. \nParticipants will engage in teamwork-based learning\, guided by instructors dedicated to ensuring no one is left behind.  \nPrerequisite\nCompletion of MFSC-101 (or a comparable Mac Forensics course) is strongly recommended before taking MFSC-201. \n \n  \nMFSC-201 is the second of the two prerequisite courses required for the Certified Forensic Mac Examiner (CFME). Learn more about our training courses and how to become a CFME: https://sumuri.com/mac-training/ \nStart your journey to certification and elevate your expertise today! \n		\n			\n					\n		\n				\n				\n							\n\n						Note:\n			\n						Students will need access to a Mac computer running the current version of macOS for the course.\n			\n			\n		\n						\n				\n				\n					\n				\n				\n		\n		\n				\n					\n				\n				\n									\n					\n						\n									Register Here\n					\n					\n				\n								\n				\n				\n				\n									Topics to include but are not limited to:								\n				\n				\n				\n									\n				\n				\n				\n							\n							\n					\n												Advanced File System Analysis\n					\n					Introduction to the concept of domains within the macOS environment and locations of evidentiary artifacts and their contents. \n				\n							\n					\n												Advanced File System Analysis\n					\n					Introduction to the concept of domains within the macOS environment and locations of evidentiary artifacts and their contents. \n				\n							\n					\n												Advanced Command Line\n					\n					Work with macOS’ powerful and highly useful command-line interface to assist in forensic examinations of a Mac. \n				\n							\n					\n												macOS Log Analysis\n					\n					Learn how to identify artifacts from persistent and volatile logs\, including Apple Unified Logs. \n				\n							\n					\n												File System Event Monitoring and Analysis\n					\n					Work with live and logged File System Events to identify artifacts and determine file usage history on a volume or disk. \n				\n							\n					\n												Identifying and Analyzing Virtual Machines\n					\n					Identify the use of a VM within macOS and the procedures necessary to analyze artifacts. \n				\n							\n					\n												AppleScript and Automator\n					\n					Learn to develop custom programs and workflows to automate almost any task to simplify and enhance forensic examinations. \n				\n							\n					\n												macOS Server & Software RAIDs\n					\n					Discussion on macOS server technology and Apple software RAIDs. Learn the best practices on handling servers and Apple RAIDs. \n				\n							\n					\n												Macintosh Timeline Analysis\n					\n					Understand and identify unique macOS metadata timestamps for use in building a timeline of a file system that can retrace the suspect’s history minute by minute or second by second. \n				\n							\n					\n												iCloud Forensics\n					\n					Find and analyze iCloud artifacts and data\, such as documents\, synced with an Apple iCloud account. \n				\n							\n					\n												Time Machine Analysis\n					\n					Understand the Time Machine backup process and structure in order to find data. \n				\n							\n					\n												Unique Apple Technology\n					\n					Lean the best practices and resources available to deal with unique Apple technology such as Air Tags and Continuity. \n				\n							\n					\n												Advanced Search Techniques\n					\n					Use advanced search techniques\, both macOS native and 3rd party tools\, to find evidentiary artifacts within the macOS. \n				\n							\n					\n												Application Deconstruction\n					\n					Learn how to find any and all artifacts left behind by installed\, and in some cases uninstalled\, applications. \n				\n										\n					\n						\n				\n				\n				\n					Secure Your Spot – Limited Seats Available!				\n				\n		\n				\n				\n									Don’t miss out on this opportunity to enhance your capabilities as a Mac forensic expert. Book your accommodation at the Caribe Royale Hotel here. Prefer other accommodations? Just be aware that conference center parking fees may apply.
URL:https://sumuri.com/event/mfsc-201-orlando-florida-2026/
CATEGORIES:Advanced Practices in Mac Forensics,Macintosh Forensics Training
ATTACH;FMTTYPE=image/webp:https://sumuri.com/wp-content/uploads/2024/10/MFSC-201-Orlando-Florida.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260518
DTEND;VALUE=DATE:20260523
DTSTAMP:20260405T164311
CREATED:20251211T204727Z
LAST-MODIFIED:20251215T192906Z
UID:279863-1779062400-1779494399@sumuri.com
SUMMARY:MFSC-101: Online\, Central European Standard Time
DESCRIPTION:Best Practices in Mac Forensics will be presented by SUMURI from May 18 – 22\, 2026\, 8:00 AM to 5:00 PM CEST. \nSUMURI’s Macintosh Forensic Survival Course (MFSC-101) provides vendor-neutral training that covers the process of examining a Macintosh computer from the first step to the last step in logical order. \nMFSC-101 is designed for both the beginner Mac examiner as well as the advanced. The knowledge you gain can be applied to any forensic tool on any platform. No sales pitch\, just Mac forensics! \n  \nMFSC-101 is the first of the two prerequisite courses required for the Certified Forensic Mac Examiner (CFME). Learn more about our training courses and how to become a CFME: https://sumuri.com/mac-training/ \nStart your journey to certification and elevate your expertise today! \n		\n				\n					\n				\n				\n							\n						\n				\n					 Item #2 \n									\n				\n					\n					\n				\n					\n						\n				\n					 Topics to include but are not limited to: \n									\n				\n				\n				\n									\n				\n					\n				\n				\n									\n				\n				\n				\n							\n							\n					\n												Understanding the Mac File System Technology:\n					\n					Students will gain a foundational understanding of macOS file systems\, focusing on the key differences between APFS and HFS+ and how they compare to non-Mac formats like exFAT and NTFS. The module covers challenges unique to analyzing each format\, including how macOS handles volume management with technologies like synthesized disks\, Core Storage\, and Fusion Drives. This knowledge is essential for interpreting file structures and ensuring accurate evidence collection and analysis. \n				\n							\n					\n												Understanding the Mac File System Technology:\n					\n					Learn the differences between APFS\, HFS+\, and other formats\, along with challenges in analyzing each and related technologies like synthesized disks\, Core Storage\, and Fusion Drives. \n				\n							\n					\n												Intel Mac Technology and Bootcamp:\n					\n					Understand Intel-based Mac architecture\, its differences from Apple Silicon\, and forensic considerations for Secure Enclave\, Secure Boot\, Bootcamp\, and virtualization. \n				\n							\n					\n												Silicon Mac Technology:\n					\n					Examine Apple Silicon architecture\, security features\, imaging challenges\, and how to properly seize and analyze these newer devices. \n				\n							\n					\n												Mac Security:\n					\n					Explore macOS security layers including Secure Enclave\, Secure Boot\, FileVault\, and user permissions\, plus examiner techniques for working within these constraints. \n				\n							\n					\n												Macintosh Search and Seizure:\n					\n					Learn seizure procedures to protect against risks like remote wipe\, user traps\, and evidence loss\, with a step-by-step on-scene process. \n				\n							\n					\n												Safely Obtaining System Information:\n					\n					Identify system details such as macOS version\, hardware type\, and security settings to guide acquisition decisions for live and powered-down Macs. \n				\n							\n					\n												Volatile Data Collection:\n					\n					Understand challenges in modern RAM capture and learn alternative methods for collecting valuable live-response data before it is lost. \n				\n							\n					\n												Forensic Imaging:\n					\n					Gain hands-on experience performing logical and physical imaging\, selecting source disks\, and using free tools to acquire data securely. \n				\n							\n					\n												Mounting Forensic Images in macOS:\n					\n					Safely mount images to preserve evidence while enabling access to indexed data and macOS-native search tools. \n				\n							\n					\n												Indexing and Searching Forensic Images in macOS:\n					\n					Use macOS indexing and search from both GUI and command line to locate evidence quickly and efficiently. \n				\n							\n					\n												Manual Artifact Deconstruction of First-Party Applications:\n					\n					Learn to locate\, analyze\, and extract data from Apple’s native apps\, building skills for unsupported or unfamiliar artifacts. \n				\n							\n					\n												Recovering Deleted Files on macOS:\n					\n					Test recovery methods while understanding the impact of APFS\, TRIM\, encryption\, and hardware limitations on file recovery. \n				\n							\n					\n												Examining SQLite Databases and PLIST Files:\n					\n					Locate and analyze these key artifacts with proper tools\, SQL queries\, and PLIST conversion techniques. \n				\n							\n					\n												Report Development:\n					\n					Create high-quality\, native-format reports using macOS tools to present artifacts accurately and clearly. \n				\n										\n					\n						\n				\n					\n				\n				\n		\n						\n				\n				\n					\n					\n					\n							\n				\n				\n				\n					Secure Your Spot – Limited Seats Available!				\n				\n					\n				\n		\n					\n				\n				\n							\n						\n				\n					 Item #2 \n							\n			\n			\n		\n\n						\n				\n					\n					\n				\n					\n						\n				\n					 Topics to include but are not limited to: \n							\n			\n			\n		\n\n						\n				\n				\n				\n					Understanding the Mac File System Technology				\n				\n				\n				\n									A review of all file system technology supported by macOS such as APFS\, Core Storage\, Fusion Drives\, and macOS Extended.								\n				\n				\n				\n					Intel Mac Technology and Bootcamp				\n				\n				\n				\n									Explains the forensic significance of Mac Intel Technology								\n				\n				\n				\n					Silicon Mac Technology				\n				\n				\n				\n									Explains the unique issues and forensic significance of M1 Silicon Technology								\n				\n				\n				\n					Mac Security Issues and FileVault Attacks				\n				\n				\n				\n									Current best practices for dealing with Mac Security								\n				\n				\n				\n					Macintosh Search and Seizure				\n				\n				\n				\n									Best practices for seizing Mac and iOS hardware								\n				\n				\n				\n					Safely Obtaining System Information				\n				\n				\n				\n									How to safely obtain system information without making changes to the evidence								\n				\n				\n				\n					Open Firmware Passwords				\n				\n				\n				\n									Explains OFP\, how to set and remove OFP if it is necessary								\n				\n				\n				\n					Volatile Data Collection				\n				\n				\n				\n									Discussion on unique issues concerning Mac Volatile Data\, methods to collect it\, and the need for a Trusted Utilities Disk								\n				\n				\n				\n					Forensic Imaging				\n				\n				\n				\n									Discussion and exercises on imaging Intel and M1 Silicon Macs to include issues present by Mac security features								\n				\n				\n				\n					Imaging Mac RAM				\n				\n				\n				\n									Discussion on the challenges in capturing RAM due to macOS security features								\n				\n				\n				\n					Mounting Forensic Images in the macOS				\n				\n				\n				\n									Safely mounting forensic images for Processing and analysis								\n				\n				\n				\n					Indexing Forensic Images				\n				\n				\n				\n									How to index forensic images using macOS								\n				\n				\n				\n					Search Techniques Using macOS				\n				\n				\n				\n									Creating custom search expressions  from the command-line and GUI								\n				\n				\n				\n					Locating Evidence				\n				\n				\n				\n									How to identify\, analyze and extract macOS and application artifacts such as Email\, Graphics\, Internet Artifacts\, Documents\, System Artifacts\, Instant Messaging\, logs\, and more								\n				\n				\n				\n					Recovering Deleted Files				\n				\n				\n				\n									An exercise in manually recovering deleted files and the dangers of Mac optimization								\n				\n				\n				\n					Examining SQLite Databases and PLIST files				\n				\n				\n				\n									Examining the heart of Mac data storage								\n				\n				\n				\n					Using macOS for Forensics				\n				\n				\n				\n									How to utilize built-in macOS technology for forensics								\n				\n				\n				\n					Report Development				\n				\n				\n				\n									How to create native reports using the Mac to view data properly								\n				\n				\n				\n					Recommendations for Mac Forensics system configuration and hardware				\n				\n				\n				\n									Our recommendations for commercial and non-commercial tools to assist with Mac forensics.								\n				\n				\n					\n					\n						\n				\n				\n				\n					Secure Your Spot – Limited Seats Available!
URL:https://sumuri.com/event/mfsc-101-260518on/
CATEGORIES:Best Practices in Mac Forensics,Macintosh Forensics Training
ATTACH;FMTTYPE=image/webp:https://sumuri.com/wp-content/uploads/2024/11/MFSC-101-250224ON-Event-Banner-v2.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260602
DTEND;VALUE=DATE:20260605
DTSTAMP:20260405T164311
CREATED:20260224T200611Z
LAST-MODIFIED:20260311T205531Z
UID:285411-1780358400-1780617599@sumuri.com
SUMMARY:2026 Techno Security & Digital Forensics Conference East
DESCRIPTION:Join SUMURI at the Techno Security & Digital Forensics Conference 2026! \nSUMURI is excited to participate in the Techno Security & Digital Forensics Conference East\, one of the most influential events in the cybersecurity and digital forensics industries. \nThis conference brings together top professionals from corporate network security\, federal\, state\, and local law enforcement\, as well as cybersecurity industry leaders. It aims to raise global awareness on the latest developments\, training\, responsibilities\, and ethical practices in cybersecurity\, digital forensics\, and eDiscovery. \n\nEvent Details:\nDates: June 2 – 4\, 2026 \nLocation: Myrtle Beach Sheraton and Convention Center \nTime: 8:00 AM to 5:00 PM EDT \nBooth Staff: Steve\, Dakota and Justin H \nBooth #: 314 \nWhat to Expect:\n\nExpert-led discussions and training sessions\nNetworking with leaders in digital forensics and cybersecurity\nAccess to innovative tools and technologies for forensic investigations\n\nVisit SUMURI at our booth to explore the latest solutions designed to streamline your digital forensics workflow. \nWe look forward to seeing you at Techno Security 2026 and advancing the future of cybersecurity and digital forensics together!
URL:https://sumuri.com/event/2026-techno-security-digital-forensics-conference/
LOCATION:Marriott Myrtle Beach Resort\, 8400 Costa Verde Drive\, Myrtle Beach\, 29572\, United States
CATEGORIES:Conferences
ATTACH;FMTTYPE=image/webp:https://sumuri.com/wp-content/uploads/2025/02/WEBSITE_landing_page.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260720
DTEND;VALUE=DATE:20260725
DTSTAMP:20260405T164311
CREATED:20260126T151817Z
LAST-MODIFIED:20260227T204810Z
UID:283160-1784505600-1784937599@sumuri.com
SUMMARY:MFSC-101: Online\, Eastern Daylight Time
DESCRIPTION:Best Practices in Mac Forensics will be presented by SUMURI from July 20 – 24\, 2026\, 8:00 AM to 5:00 PM EDT. \nSUMURI’s Macintosh Forensic Survival Course (MFSC-101) provides vendor-neutral training that covers the process of examining a Macintosh computer from the first step to the last step in logical order. \nMFSC-101 is designed for both the beginner Mac examiner as well as the advanced. The knowledge you gain can be applied to any forensic tool on any platform. No sales pitch\, just Mac forensics! \n  \nMFSC-101 is the first of the two prerequisite courses required for the Certified Forensic Mac Examiner (CFME). Learn more about our training courses and how to become a CFME: https://sumuri.com/mac-training/ \nStart your journey to certification and elevate your expertise today! \n		\n				\n					\n				\n				\n							\n						\n				\n					 Item #2 \n									\n				\n					\n					\n				\n					\n						\n				\n					 Topics to include but are not limited to: \n									\n				\n				\n				\n									\n				\n					\n				\n				\n									\n				\n				\n				\n							\n							\n					\n												Understanding the Mac File System Technology:\n					\n					Students will gain a foundational understanding of macOS file systems\, focusing on the key differences between APFS and HFS+ and how they compare to non-Mac formats like exFAT and NTFS. The module covers challenges unique to analyzing each format\, including how macOS handles volume management with technologies like synthesized disks\, Core Storage\, and Fusion Drives. This knowledge is essential for interpreting file structures and ensuring accurate evidence collection and analysis. \n				\n							\n					\n												Understanding the Mac File System Technology:\n					\n					Learn the differences between APFS\, HFS+\, and other formats\, along with challenges in analyzing each and related technologies like synthesized disks\, Core Storage\, and Fusion Drives. \n				\n							\n					\n												Intel Mac Technology and Bootcamp:\n					\n					Understand Intel-based Mac architecture\, its differences from Apple Silicon\, and forensic considerations for Secure Enclave\, Secure Boot\, Bootcamp\, and virtualization. \n				\n							\n					\n												Silicon Mac Technology:\n					\n					Examine Apple Silicon architecture\, security features\, imaging challenges\, and how to properly seize and analyze these newer devices. \n				\n							\n					\n												Mac Security:\n					\n					Explore macOS security layers including Secure Enclave\, Secure Boot\, FileVault\, and user permissions\, plus examiner techniques for working within these constraints. \n				\n							\n					\n												Macintosh Search and Seizure:\n					\n					Learn seizure procedures to protect against risks like remote wipe\, user traps\, and evidence loss\, with a step-by-step on-scene process. \n				\n							\n					\n												Safely Obtaining System Information:\n					\n					Identify system details such as macOS version\, hardware type\, and security settings to guide acquisition decisions for live and powered-down Macs. \n				\n							\n					\n												Volatile Data Collection:\n					\n					Understand challenges in modern RAM capture and learn alternative methods for collecting valuable live-response data before it is lost. \n				\n							\n					\n												Forensic Imaging:\n					\n					Gain hands-on experience performing logical and physical imaging\, selecting source disks\, and using free tools to acquire data securely. \n				\n							\n					\n												Mounting Forensic Images in macOS:\n					\n					Safely mount images to preserve evidence while enabling access to indexed data and macOS-native search tools. \n				\n							\n					\n												Indexing and Searching Forensic Images in macOS:\n					\n					Use macOS indexing and search from both GUI and command line to locate evidence quickly and efficiently. \n				\n							\n					\n												Manual Artifact Deconstruction of First-Party Applications:\n					\n					Learn to locate\, analyze\, and extract data from Apple’s native apps\, building skills for unsupported or unfamiliar artifacts. \n				\n							\n					\n												Recovering Deleted Files on macOS:\n					\n					Test recovery methods while understanding the impact of APFS\, TRIM\, encryption\, and hardware limitations on file recovery. \n				\n							\n					\n												Examining SQLite Databases and PLIST Files:\n					\n					Locate and analyze these key artifacts with proper tools\, SQL queries\, and PLIST conversion techniques. \n				\n							\n					\n												Report Development:\n					\n					Create high-quality\, native-format reports using macOS tools to present artifacts accurately and clearly. \n				\n										\n					\n						\n				\n					\n				\n				\n		\n						\n				\n				\n					\n					\n					\n							\n				\n				\n				\n					Secure Your Spot – Limited Seats Available!				\n				\n					\n				\n		\n					\n				\n				\n							\n						\n				\n					 Item #2 \n							\n			\n			\n		\n\n						\n				\n					\n					\n				\n					\n						\n				\n					 Topics to include but are not limited to: \n							\n			\n			\n		\n\n						\n				\n				\n				\n					Understanding the Mac File System Technology				\n				\n				\n				\n									A review of all file system technology supported by macOS such as APFS\, Core Storage\, Fusion Drives\, and macOS Extended.								\n				\n				\n				\n					Intel Mac Technology and Bootcamp				\n				\n				\n				\n									Explains the forensic significance of Mac Intel Technology								\n				\n				\n				\n					Silicon Mac Technology				\n				\n				\n				\n									Explains the unique issues and forensic significance of M1 Silicon Technology								\n				\n				\n				\n					Mac Security Issues and FileVault Attacks				\n				\n				\n				\n									Current best practices for dealing with Mac Security								\n				\n				\n				\n					Macintosh Search and Seizure				\n				\n				\n				\n									Best practices for seizing Mac and iOS hardware								\n				\n				\n				\n					Safely Obtaining System Information				\n				\n				\n				\n									How to safely obtain system information without making changes to the evidence								\n				\n				\n				\n					Open Firmware Passwords				\n				\n				\n				\n									Explains OFP\, how to set and remove OFP if it is necessary								\n				\n				\n				\n					Volatile Data Collection				\n				\n				\n				\n									Discussion on unique issues concerning Mac Volatile Data\, methods to collect it\, and the need for a Trusted Utilities Disk								\n				\n				\n				\n					Forensic Imaging				\n				\n				\n				\n									Discussion and exercises on imaging Intel and M1 Silicon Macs to include issues present by Mac security features								\n				\n				\n				\n					Imaging Mac RAM				\n				\n				\n				\n									Discussion on the challenges in capturing RAM due to macOS security features								\n				\n				\n				\n					Mounting Forensic Images in the macOS				\n				\n				\n				\n									Safely mounting forensic images for Processing and analysis								\n				\n				\n				\n					Indexing Forensic Images				\n				\n				\n				\n									How to index forensic images using macOS								\n				\n				\n				\n					Search Techniques Using macOS				\n				\n				\n				\n									Creating custom search expressions  from the command-line and GUI								\n				\n				\n				\n					Locating Evidence				\n				\n				\n				\n									How to identify\, analyze and extract macOS and application artifacts such as Email\, Graphics\, Internet Artifacts\, Documents\, System Artifacts\, Instant Messaging\, logs\, and more								\n				\n				\n				\n					Recovering Deleted Files				\n				\n				\n				\n									An exercise in manually recovering deleted files and the dangers of Mac optimization								\n				\n				\n				\n					Examining SQLite Databases and PLIST files				\n				\n				\n				\n									Examining the heart of Mac data storage								\n				\n				\n				\n					Using macOS for Forensics				\n				\n				\n				\n									How to utilize built-in macOS technology for forensics								\n				\n				\n				\n					Report Development				\n				\n				\n				\n									How to create native reports using the Mac to view data properly								\n				\n				\n				\n					Recommendations for Mac Forensics system configuration and hardware				\n				\n				\n				\n									Our recommendations for commercial and non-commercial tools to assist with Mac forensics.								\n				\n				\n					\n					\n						\n				\n				\n				\n					Secure Your Spot – Limited Seats Available!
URL:https://sumuri.com/event/mfsc-101-260720on/
CATEGORIES:Best Practices in Mac Forensics,Macintosh Forensics Training
ATTACH;FMTTYPE=image/webp:https://sumuri.com/wp-content/uploads/2024/11/MFSC-101-250203ON-Event-Banner-v2.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260727
DTEND;VALUE=DATE:20260731
DTSTAMP:20260405T164311
CREATED:20260224T214740Z
LAST-MODIFIED:20260311T205559Z
UID:285444-1785110400-1785455999@sumuri.com
SUMMARY:NATIA 2026: Annual Training Conference & Technology Exhibition
DESCRIPTION:Join SUMURI at the 2026 National Technical Investigators’ Association Conference! \nSUMURI is thrilled to be part of the National Technical Investigators’ Association Conference — a key event bringing together professionals in the digital forensics field from around the world. \nThe National Technical Investigators’ Association is composed of over 3\,500 law enforcement\, intelligence\, and support personnel who provide electronic surveillance\, technical operations\, and scientific support for hundreds of federal\, military\, state\, and local agencies across the United States and around the world. \n\nEvent Details:\nDates: July 27 – 30\, 2026 \nLocation: Greater Columbus Convention Center \nTime: 8:00 AM to 5:00 PM EDT \nBooth Staff: Jason and Steve \nBooth #: 763 \nWhat to Expect:\n\nIn-depth training and workshops led by industry experts\nNetworking with top digital forensics specialists\nHands-on demonstrations of innovative forensic tools and technologies\n\nVisit SUMURI at our booth to discover the latest in digital forensics solutions designed to enhance your investigative capabilities. \nWe’re looking forward to seeing you at the NATIA 2026 conference\, where we’ll continue to innovate and push the boundaries of digital forensics together!
URL:https://sumuri.com/event/2026-national-technical-investigators-association-conference/
LOCATION:Greater Columbus Convention Center\, 400 N High St\, Columbus\, OH 43215\, United States
CATEGORIES:Conferences
ATTACH;FMTTYPE=image/webp:https://sumuri.com/wp-content/uploads/2026/02/2026-National-Technical-Investigators-Association-Conference.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260831
DTEND;VALUE=DATE:20260905
DTSTAMP:20260405T164311
CREATED:20260223T161945Z
LAST-MODIFIED:20260223T162423Z
UID:285235-1788134400-1788566399@sumuri.com
SUMMARY:MFSC-201: Online\, Eastern Daylight Time
DESCRIPTION:Advanced Practices in Mac Forensics will be presented by SUMURI from August 31 – September 4\, 2026\, 8:00 AM to 5:00 PM EDT. \nAdvanced Practices in Mac Forensics (MFSC-201) builds upon the Best Practices in Mac Forensics (MFSC-101) course. MFSC-201 focuses on in-depth analysis techniques\, which provide the students the ability to apply what they have learned in real-world cases. \nParticipants will engage in teamwork-based learning\, guided by instructors dedicated to ensuring no one is left behind.  \nPre-requisite\nCompletion of MFSC-101 (or a comparable Mac Forensics course) is strongly recommended before taking MFSC-201. \n \n  \nMFSC-201 is the second of the two prerequisite courses required for the Certified Forensic Mac Examiner (CFME). Learn more about our training courses and how to become a CFME: https://sumuri.com/mac-training/ \nStart your journey to certification and elevate your expertise today! \n		\n			\n					\n		\n				\n				\n							\n\n						Note:\n			\n						Students will need access to a Mac computer running the current version of macOS for the course.\n			\n			\n		\n						\n				\n				\n					\n				\n				\n		\n		\n				\n					\n				\n				\n							\n						\n				\n					 Item #2 \n									\n				\n					\n					\n				\n					\n						\n				\n					 Topics to include but are not limited to: \n									\n				\n				\n				\n									\n				\n					\n				\n				\n									\n				\n				\n				\n							\n							\n					\n												Advanced macOS Artifact Analysis\n					\n					Deep dive into property lists\, SQLite databases\, bundle files\, and library directories to uncover key forensic evidence. \n				\n							\n					\n												Advanced macOS Artifact Analysis:\n					\n					Deep dive into property lists\, SQLite databases\, bundle files\, and library directories to uncover key forensic evidence. \n				\n							\n					\n												User and System Activity Reconstruction:\n					\n					Identify user account changes\, network connections\, attached devices\, and hibernation states to build detailed timelines. \n				\n							\n					\n												Mastering macOS Timestamps:\n					\n					Learn how to interpret POSIX and Apple Extended Attribute timestamps to track file and system events accurately. \n				\n							\n					\n												Comprehensive Log Analysis:\n					\n					Extract and interpret data from unified logs\, domain-specific logs\, and application logs to reveal user actions and system events. \n				\n							\n					\n												Application Deconstruction:\n					\n					Perform static and dynamic artifact analysis of first- and third-party applications to uncover hidden or unsupported evidence. \n				\n							\n					\n												Advanced Command Line for Forensics:\n					\n					Utilize macOS terminal commands to locate\, extract\, and analyze artifacts quickly and efficiently. \n				\n							\n					\n												Time Machine and FSEvents Forensics:\n					\n					Recover historical snapshots\, identify file changes\, and track system activity over time. \n				\n							\n					\n												RAM\, Virtual Machine\, and iOS Artifact Analysis:\n					\n					Examine volatile memory\, virtual machine images\, and iOS data stored on Macs. \n				\n							\n					\n												Custom Forensic Tool Development:\n					\n					Learn to script your own acquisition\, triage\, and data collection tools in Bash and Python. \n				\n							\n					\n												macOS Automation for Investigations:\n					\n					Leverage AppleScript and Automator to streamline repetitive forensic tasks. \n				\n										\n					\n						\n				\n					\n				\n				\n		\n						\n				\n				\n					\n					\n					\n							\n				\n				\n				\n					Secure Your Spot – Limited Seats Available!
URL:https://sumuri.com/event/mfsc-201-260831on/
CATEGORIES:Advanced Practices in Mac Forensics,Macintosh Forensics Training
ATTACH;FMTTYPE=image/webp:https://sumuri.com/wp-content/uploads/2024/11/MFSC-201-Online-Eastern.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260921
DTEND;VALUE=DATE:20260925
DTSTAMP:20260405T164311
CREATED:20260309T185535Z
LAST-MODIFIED:20260311T205612Z
UID:286626-1789948800-1790294399@sumuri.com
SUMMARY:2026 NW ICAC & Technology Conference
DESCRIPTION:Join SUMURI at the NW ICAC & Technology Conference 2026! \nSUMURI is proud to participate in the NW ICAC & Technology Conference\, a premier event focused on combating crimes committed online against children. This important conference brings together law enforcement professionals\, investigators\, prosecutors\, and technology experts dedicated to protecting children and holding offenders accountable. \nThe conference provides a platform to share knowledge\, training\, and tools that strengthen the ability of professionals to investigate internet crimes against children and support victims. Attendees will gain valuable insights through expert-led sessions\, networking opportunities\, and technology demonstrations throughout the week. \n\nEvent Details:\nDates: September 21 – 24\, 2026 \nLocation: Hyatt Regency Bellevue \nAddress: 900 Bellevue Way NE\, Bellevue\, WA 98004\, United States \nBooth Staff: Jason and Dakota \nBooth #: TBA \nWhy Visit SUMURI at NW ICAC?\n\nExplore Industry-Leading Software\nGet hands-on with our powerful digital forensic tools\, including RECON LAB\, RECON ITR\, and PALADIN.\nExperience TALINO® Workstations\nDiscover how our high-performance forensic systems are purpose-built for speed\, reliability\, and precision in digital investigations.\nSupport ICAC Investigations\nLearn how our solutions are designed to assist investigators working on sensitive cases\, including internet crimes against children.\nMeet the Experts\nConnect with our team of forensic professionals and technology experts who are driving innovation in digital forensics.\nCelebrate a Shared Mission\nJoin professionals from across the industry who are committed to protecting children\, delivering justice\, and advancing investigative capabilities.\n\nThroughout the week\, attendees can explore sessions\, exhibitors\, sponsors\, confirmed speakers\, and networking events designed to strengthen collaboration and knowledge sharing within the ICAC community. \nVisit SUMURI during the conference to see our latest digital forensic solutions and learn how we support investigators working on critical cases around the world. \nWe look forward to seeing you at the NW ICAC & Technology Conference 2026!
URL:https://sumuri.com/event/2026-nw-icac-technology-conference/
LOCATION:Hyatt Regency Bellevue\, 900 Bellevue Way NE\, Bellevue\, WA 98004\, United States
CATEGORIES:Conferences
ATTACH;FMTTYPE=image/webp:https://sumuri.com/wp-content/uploads/2026/03/NWICAC-2026-Event-Banner.webp
END:VEVENT
END:VCALENDAR