BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//SUMURI - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://sumuri.com
X-WR-CALDESC:Events for SUMURI
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250428
DTEND;VALUE=DATE:20250503
DTSTAMP:20260406T021647
CREATED:20241004T190151Z
LAST-MODIFIED:20241122T142151Z
UID:248877-1745798400-1746230399@sumuri.com
SUMMARY:MFSC-101: Orlando\, Florida
DESCRIPTION:Best Practices in Mac Forensics will be presented by SUMURI from April 28 – May 2\, 2025\, 8:00 AM to 5:00 PM EDT. \nSUMURI’s Macintosh Forensic Survival Course (MFSC-101) provides vendor-neutral training that covers the process of examining a Macintosh computer from the first step to the last step in logical order. \nMFSC-101 is designed for both the beginner Mac examiner as well as the advanced. The knowledge you gain can be applied to any forensic tool on any platform. No sales pitch\, just Mac forensics! \n \n  \nMFSC-101 is the first of the two prerequisite courses required for the Certified Forensic Mac Examiner (CFME).\nStart your journey to certification and elevate your expertise today! \n		\n			\n					\n		\n				\n				\n							\n\n						Note:\n			\n						Students will need access to a Mac computer running the current version of macOS for the course.\n			\n			\n		\n						\n				\n				\n					\n				\n				\n		\n		\n				\n					\n				\n				\n									\n					\n						\n									Register Here\n					\n					\n				\n								\n				\n				\n				\n									Topics to include but are not limited to: 								\n				\n				\n				\n									\n				\n				\n				\n							\n							\n					\n												Overview of macOS Versions\n					\n					Identifies features of forensic importance in different macOS and when they appeared \n				\n							\n					\n												Overview of macOS Versions\n					\n					Identifies features of forensic importance in different macOS and when they appeared \n				\n							\n					\n												Understanding the Mac File System Technology\n					\n					A review of all file system technology supported by macOS such as APFS\, Core Storage\, Fusion Drives\, and macOS Extended \n				\n							\n					\n												Intel Mac Technology and Bootcamp\n					\n					Explains the forensic significance of Mac Intel Technology \n				\n							\n					\n												Silicon Mac Technology\n					\n					Explains the unique issues and forensic significance of M1 Silicon Technology \n				\n							\n					\n												Mac Security Issues and FileVault Attacks\n					\n					Current best practices for dealing with Mac Security \n				\n							\n					\n												Macintosh Search and Seizure\n					\n					Best practices for seizing Mac and iOS hardware \n				\n							\n					\n												Safely Obtaining System Information\n					\n					How to safely obtain system information without making changes to the evidence \n				\n							\n					\n												Open Firmware Passwords\n					\n					Explains OFP\, how to set and remove OFP if it is necessary \n				\n							\n					\n												Volatile Data Collection\n					\n					Discussion on unique issues concerning Mac Volatile Data\, methods to collect it\, and the need for a Trusted Utilities Disk \n				\n							\n					\n												Forensic Imaging\n					\n					Discussion and exercises on imaging Intel and M1 Silicon Macs to include issues present by Mac security features \n				\n							\n					\n												Imaging Mac RAM\n					\n					Discussion on the challenges in capturing RAM due to macOS security features \n				\n							\n					\n												Mounting Forensic Images in the macOS\n					\n					Safely mounting forensic images for Processing and analysis \n				\n							\n					\n												Indexing Forensic Images\n					\n					How to index forensic images using macOS \n				\n							\n					\n												Search Techniques Using macOS\n					\n					Creating custom search expressions  from the command-line and GUI \n				\n							\n					\n												Locating Evidence\n					\n					How to identify\, analyze and extract macOS and application artifacts such as Email\, Graphics\, Internet Artifacts\, Documents\, System Artifacts\, Instant Messaging\, logs\, and more \n				\n							\n					\n												Recovering Deleted Files\n					\n					An exercise in manually recovering deleted files and the dangers of Mac optimization \n				\n							\n					\n												Examining SQLite Databases and PLIST files\n					\n					Examining the heart of Mac data storage \n				\n							\n					\n												Using macOS for Forensics\n					\n					How to utilize built-in macOS technology for forensics \n				\n							\n					\n												Report Development\n					\n					How to create native reports using the Mac to view data properly \n				\n							\n					\n												Recommendations for Mac Forensics system configuration and hardware\n					\n					Our recommendations for commercial and non-commercial tools to assist with Mac forensics. \n				\n										\n					\n						\n				\n				\n				\n					Secure Your Spot – Limited Seats Available!				\n				\n		\n				\n				\n									Don’t miss out on this opportunity to enhance your capabilities as a Mac forensic expert. Book your accommodation at the Caribe Royale Hotel here. Prefer other accommodations? Just be aware that conference center parking fees may apply.								\n				\n				\n					\n				\n		\n					\n				\n				\n									LIMITED TIME OFFER								\n				\n				\n				\n									Use this coupon code below to get 15% discount.								\n				\n				\n				\n									“MFSC15”
URL:https://sumuri.com/event/iacis-mfsc-101-best-practices-in-mac-forensics/
CATEGORIES:Best Practices in Mac Forensics,Macintosh Forensics Training
ATTACH;FMTTYPE=image/png:https://sumuri.com/wp-content/uploads/2024/10/101-IACIS-Event-Banner.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250429
DTEND;VALUE=DATE:20250502
DTSTAMP:20260406T021647
CREATED:20250212T165504Z
LAST-MODIFIED:20250407T152312Z
UID:257082-1745884800-1746143999@sumuri.com
SUMMARY:2025 National Cyber Crime Conference
DESCRIPTION:Celebrate the 15th Anniversary of SUMURI at NCCC 2025 \nJoin SUMURI at the 2025 National Cyber Crime Conference! \nWe’re excited to announce that SUMURI will be participating in the 14th Annual National Cyber Crime Conference (NCCC) from April 29 to May 1\, 2025\, at the Four Points by Sheraton Norwood\, MA. \nAs one of the premier training events for law enforcement\, prosecutors\, and forensic examiners worldwide\, the NCCC offers unparalleled opportunities to learn about the latest trends\, tools\, and techniques in digital evidence and cybercrime investigation.\n		\n				\n					\n				\n				\n									What to Expect:								\n				\n				\n				\n							\n							\n											\n													\n										Expert-led sessions on emerging cybercrime topics\n									\n								\n											\n													\n										Hands-on training in forensic solutions\n									\n								\n											\n													\n										Networking with industry leaders and innovators\n									\n						\n						\n				\n				\n				\n									Visit our booth to see how SUMURI continues to revolutionize forensic solutions with cutting-edge tools and technologies designed to support your mission.								\n				\n				\n				\n									Event Details:								\n				\n				\n				\n							\n							\n											\n													\n										Dates: April 29 – May 1\, 2025\n									\n								\n											\n													\n										Time: 7:30 AM to 5:00 PM EST\n									\n								\n											\n													\n										Location: Four Points by Sheraton Norwood\, MA\n									\n						\n						\n				\n				\n				\n									We can’t wait to meet you and showcase our solutions built to empower your forensic investigations. See you at NCCC 2025!
URL:https://sumuri.com/event/2025-national-cyber-crime-conference/
LOCATION:Four Points by Sheraton Norwood\, 1125 Boston-Providence Turnpike\, Norwood\, MA
CATEGORIES:Conferences
ATTACH;FMTTYPE=image/webp:https://sumuri.com/wp-content/uploads/2025/02/NCCC-Event-Banner-v2.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250501
DTEND;VALUE=DATE:20250506
DTSTAMP:20260406T021647
CREATED:20250131T185014Z
LAST-MODIFIED:20250409T152353Z
UID:256437-1746057600-1746489599@sumuri.com
SUMMARY:2025 IACIS Digital Forensics Conference
DESCRIPTION:Join SUMURI at the 2025 IACIS Digital Forensics Conference!\nSUMURI is thrilled to be part of the IACIS (International Association of Computer Investigative Specialists) Digital Forensics Conference — a key event bringing together professionals in the digital forensics field from around the world.\nThe IACIS conference is a vital gathering for those in law enforcement\, cybersecurity\, and digital forensics\, offering cutting-edge training\, collaboration\, and the latest industry insights. This conference plays a crucial role in shaping the future of digital forensics through education\, research\, and industry partnerships.\n		\n				\n					\n				\n				\n									Event Details:								\n				\n				\n				\n							\n							\n											\n													\n										Dates: May 1\, 2 & 5\, 2025\n									\n								\n											\n													\n										Time: 9:00 AM to 5:00 PM EDT\n									\n								\n											\n													\n										Location: Caribe Royale Orlando\, Florida\n									\n						\n						\n				\n				\n				\n									What to Expect:								\n				\n				\n				\n							\n							\n											\n													\n										In-depth training and workshops led by industry experts\n									\n								\n											\n													\n										Networking with top digital forensics specialists\n									\n								\n											\n													\n										Hands-on demonstrations of innovative forensic tools and technologies\n									\n						\n						\n				\n				\n				\n									Visit SUMURI at our booth to discover the latest in digital forensics solutions designed to enhance your investigative capabilities.								\n				\n				\n				\n									We’re looking forward to seeing you at the IACIS 2025 conference\, where we’ll continue to innovate and push the boundaries of digital forensics together!
URL:https://sumuri.com/event/iacis-digital-forensics-conference-2025/
LOCATION:Caribe Royale Hotel\, 8101 World Center Drive\, Orlando \, FL
CATEGORIES:Conferences
ATTACH;FMTTYPE=image/webp:https://sumuri.com/wp-content/uploads/2025/01/IACIS-Event-Featured-Image-v3.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250505
DTEND;VALUE=DATE:20250510
DTSTAMP:20260406T021647
CREATED:20241004T191021Z
LAST-MODIFIED:20241122T142213Z
UID:248879-1746403200-1746835199@sumuri.com
SUMMARY:MFSC-201: Orlando\, Florida
DESCRIPTION:Advanced Practices in Mac Forensics will be presented by SUMURI from May 5 – May 9\, 2025. \nAdvanced Practices in Mac Forensics (MFSC-201) builds upon the Best Practices in Mac Forensics (MFSC-101) course. MFSC-201 focuses on in-depth analysis techniques\, which provide the students the ability to apply what they have learned in real-world cases. \nParticipants will engage in teamwork-based learning\, guided by instructors dedicated to ensuring no one is left behind.  \nPre-requisite\nCompletion of MFSC-101 (or a comparable Mac Forensics course) is strongly recommended before taking MFSC-201. \n \n  \nMFSC-201 is the second of the two prerequisite courses required for the Certified Forensic Mac Examiner (CFME). Learn more about our training courses and how to become a CFME: https://sumuri.com/mac-training/ \nStart your journey to certification and elevate your expertise today! \n		\n			\n					\n		\n				\n				\n							\n\n						Note:\n			\n						Students will need access to a Mac computer running the current version of macOS for the course.\n			\n			\n		\n						\n				\n				\n					\n				\n				\n		\n		\n				\n					\n				\n				\n									\n					\n						\n									Register Here\n					\n					\n				\n								\n				\n				\n				\n									Topics to include but are not limited to:								\n				\n				\n				\n									\n				\n				\n				\n							\n							\n					\n												Advanced File System Analysis\n					\n					Introduction to the concept of domains within the macOS environment and locations of evidentiary artifacts and their contents. \n				\n							\n					\n												Advanced File System Analysis\n					\n					Introduction to the concept of domains within the macOS environment and locations of evidentiary artifacts and their contents. \n				\n							\n					\n												Advanced Command Line\n					\n					Work with macOS’ powerful and highly useful command-line interface to assist in forensic examinations of a Mac. \n				\n							\n					\n												macOS Log Analysis\n					\n					Learn how to identify artifacts from persistent and volatile logs\, including Apple Unified Logs. \n				\n							\n					\n												File System Event Monitoring and Analysis\n					\n					Work with live and logged File System Events to identify artifacts and determine file usage history on a volume or disk. \n				\n							\n					\n												Identifying and Analyzing Virtual Machines\n					\n					Identify the use of a VM within macOS and the procedures necessary to analyze artifacts. \n				\n							\n					\n												AppleScript and Automator\n					\n					Learn to develop custom programs and workflows to automate almost any task to simplify and enhance forensic examinations. \n				\n							\n					\n												macOS Server & Software RAIDs\n					\n					Discussion on macOS server technology and Apple software RAIDs. Learn the best practices on handling servers and Apple RAIDs. \n				\n							\n					\n												Macintosh Timeline Analysis\n					\n					Understand and identify unique macOS metadata timestamps for use in building a timeline of a file system that can retrace the suspect’s history minute by minute or second by second. \n				\n							\n					\n												iCloud Forensics\n					\n					Find and analyze iCloud artifacts and data\, such as documents\, synced with an Apple iCloud account. \n				\n							\n					\n												Time Machine Analysis\n					\n					Understand the Time Machine backup process and structure in order to find data. \n				\n							\n					\n												Unique Apple Technology\n					\n					Lean the best practices and resources available to deal with unique Apple technology such as Air Tags and Continuity. \n				\n							\n					\n												Advanced Search Techniques\n					\n					Use advanced search techniques\, both macOS native and 3rd party tools\, to find evidentiary artifacts within the macOS. \n				\n							\n					\n												Application Deconstruction\n					\n					Learn how to find any and all artifacts left behind by installed\, and in some cases uninstalled\, applications. \n				\n										\n					\n						\n				\n				\n				\n					Secure Your Spot – Limited Seats Available!				\n				\n		\n				\n				\n									Don’t miss out on this opportunity to enhance your capabilities as a Mac forensic expert. Book your accommodation at the Caribe Royale Hotel here. Prefer other accommodations? Just be aware that conference center parking fees may apply.
URL:https://sumuri.com/event/iacis-mfsc-201-advanced-practices-in-mac-forensics/
CATEGORIES:Advanced Practices in Mac Forensics,Macintosh Forensics Training
ATTACH;FMTTYPE=image/webp:https://sumuri.com/wp-content/uploads/2024/10/MFSC-201-Orlando-Florida.webp
END:VEVENT
END:VCALENDAR