Online Virtual Summits

DFIR - OSINT - CYBER

PFIC is embracing a new format in 2026 with the introduction of the PFIC Quarterly Summits, a high-impact virtual event held once every quarter! Each PFIC Summit Day is designed to deliver concentrated, cutting-edge content essential for DFIR, OSINT, and Cyber professionals.

Registration grants you access to the specific virtual sessions for that date, the exclusive PFIC Portal, and valuable networking opportunities. All Enrollment is Complimentary due to our sponsors!

Important Note:

To attend, you must register for each quarterly PFIC Summit Day date separately to gain access to that specific virtual event.

Registration is now open for Winter Session & Spring Sessions.

PFIC Winter Session Feb 19, 2026

9 AM to 1 PM (Eastern Time Zone)

9:00 AM to 10:00 AM

From Raw Feeds to Real OSINT: Python + AI

in Action

In an era overwhelmed by global digital content, the ability to automatically distill meaningful, trustworthy, and actionable intelligence from news feeds has never been more vital. This session demonstrates how Python and OpenAI can be combined to transform raw, multilingual Internet data into structured insights that support real-time analysis and decision-making. Through a detailed walkthrough of key Tactics, Techniques, and Procedures (TTPs), I will show how to build an automated pipeline that ingests, normalizes, evaluates, and summarizes global information—turning unstructured text into actionable situational awareness.

Chester Hosmer

Chet Hosmer is the founder of Python Forensics, a Non-Profit Organization that provides research and python scripts to help with advanced investigative challenges. Chet also serves as a Distinguished Campus Colleague at the University of Arizona. Chet has made numerous appearances to discuss emerging cyber threats including NPR, ABC News, Forbes, IEEE, The New York Times, The Washington Post, Government Computer News, Salon.com and Wired Magazine. He has 7 published books with Elsevier and Apress that focus on Python Forensics, data hiding, passive network defense strategies, PowerShell, and IoT.

10:00 AM to 11:00 AM

Analyzing WannaCry: A Forensic Method for Recovering Ransomware Data with Open-Source Software

Ransomware known as WannaCry crippled thousands of systems in 150+ countries in 2017, signaling a new era in the development of cyber threats worldwide. But behind all the hype is a goldmine of information for forensic science and real-world recovery tactics. This session takes a forensic investigator's view of WannaCry, covering the virus in detail and covering methods for recovering, analyzing, and interpreting artifacts—even after encryption and system compromise—that the malware left behind.

Smit Naik

Smit Naik is a seasoned Cybersecurity Analyst and published author with over five years of hands-on experience specializing in Digital Forensics and Threat Analysis.

His passion lies in uncovering hidden digital evidence, particularly in complex scenarios like ransomware recovery and the burgeoning field of UAS (Unmanned Aerial System) forensics. Smit has pioneered research into extracting forensic artifacts from consumer drones, even after factory resets, revealing critical insights from hidden telemetry and crash logs.

He is the author of "Eyes In The Sky: A Guide to Drone Forensics" and is currently documenting structured malware analysis in his second book. Smit is an invited speaker, contributing author to international research, and a mentor, committed to pushing the boundaries of cyber forensics.

11:00 AM to Noon

The Blind Spot in Cyber Defense: When Trust in People Fails Before Trust in Code

Most cyber programs focus on code quality, infrastructure hardening, and incident response—but overlook the root assumption: that the people writing and deploying the code are who they claim to be. This session explores the human layer of cyber defense and how developer identity integrity impacts every downstream security control. Milanie highlights the risks introduced by falsified profiles, offshore access masquerading as local talent, and inflated skill claims. She presents a pragmatic framework for integrating trust intelligence into SOC workflows and reducing breach potential at the earliest possible point: the moment of access creation.

Milanie Cleere

Milanie Cleere is a product executive and advisor with deep expertise in enterprise transformation, AI-enabled solutions, and regulatory technology. She holds a high level U.S. security clearance and has led billion-dollar product portfolios at Amazon Web Services. Her work spans cybersecurity, insider risk, identity integrity, and OSINT-driven decision frameworks. As Founder and CEO of Know Your Developer™, she focuses on the emerging intersection of technical hiring, developer identity signals, and access risk. Milanie’s current work examines how AI-generated resumes, manipulated online profiles, and falsified developer histories create new threat surfaces for enterprises. She brings a mission-driven approach to trust intelligence, helping organizations detect anomalies earlier, verify developer authenticity, and reduce fraud before it becomes a security incident. She speaks on the human layer of cyber defense, identity-driven risk, and the future of trust in technical ecosystems.

Noon to 1:00 PM

Navigating the Financial Aspect of Investigations

Every forensics investigation practice area has rules and guidelines, especially for forensic accounting and fraud investigations. This session will cover at a high level different financial areas and what to look for, how to request information and what to request, common mistakes to avoid, and resources available to investigators.

Austin Parris

Austin Parris has experience assisting clients with litigation support, corporate investigations, economic damage analyses, and eDiscovery. His industry experience includes manufacturing, hospitality, construction equipment rental, and condominium associations. In over 6 years of forensics experience, Austin has been a contributor on over 100 matters involving matrimonial dissolution, intellectual property disputes, trust & estate disputes, class action for both plaintiff and defense, and multi-district litigations (MDL). Austin has been a Certified Fraud Examiner since 2012 and has held additional certifications related to eDiscovery. Austin also volunteers with Atlanta Volunteer Lawyer Foundation by assisting attorneys with interviewing potential clients and consulting on potential areas of review for damages.

Our Sponsors

If you are interested in sponsoring any of the PFIC events please reach out to us a via email.

Paraben Corporation

Paraben Corporation provides digital forensic solutions, with their flagship product being the E3 Forensic Platform. This comprehensive suite empowers investigators to efficiently acquire and analyze data from diverse digital sources, including smartphones, computers, cloud storage, and IoT devices. E3 streamlines digital investigations with its robust features for data acquisition, parsing, analysis, and reporting, catering to law enforcement, government agencies, and private sector professionals.

OSMOSIS

Join the Osmosis Institute and become part of a community dedicated to exploring the frontiers of OSINT.

Connect with like-minded
individuals, researchers, and innovators. Explore the OSC certification for
OSINT investigators. Collaborate with a community of digital investigators.

Cyber Social Hub

Join for FREE & access articles, specialized groups of your interests, informative videos, and a community of other professionals.

ForensicMag

Forensic® (FOR) is the #1 leading source for daily breaking news in the forensic research community. While FOR has evolved over the years since its inception as a former magazine in 2005, FOR continues its unwavering commitment to its loyal readers of forensic and crime scene professionals. Currently, FOR is published daily online and covers a breadth of information vital to forensic professionals - from DNA to trace analysis, sample prep, toxicology, crime scene technologies, and technological advancements across the relatively dynamic and evolving forensic landscape.

Plessas Expert Network Inc.

Founded in 2008, Plessas Experts Network (PEN) is a Woman-Owned, Service-Disabled Veteran-Owned Small Business specializing in open-source intelligence (OSINT) for government, corporate, and legal clients. Through Plessas Academy, PEN has provided advanced OSINT training to over 25,000 law enforcement professionals and numerous corporate investigators, while also supporting research partnerships such as REMND, CYCLES, and collaborations with the University at Albany’s ILS and Boston Fusion. Today, PEN leads in responsible OSINT innovation by integrating AI into investigative workflows, offering human-in-the-loop training and red-teaming, and maintaining a growing Digital Knowledge Base, all guided by a commitment to ethical tradecraft.

PI Magazine

Are you a professional investigator seeking the edge in a constantly evolving field? PI Magazine is your indispensable resource, delivering unparalleled insights, expert analysis, and cutting-edge strategies directly to your doorstep (or inbox!). Each issue is packed with comprehensive and current advice, in-depth articles from seasoned experts, and vital information to help you navigate complex cases, master new technologies, and stay ahead of industry trends.

OSINT Cocktail

Dive into the world of online investigations with the OSINT Cocktail podcast! Join veteran investigators as they dissect films each week, revealing real-world open-source intelligence techniques hidden in plain sight. Learn practical skills in OSINT, digital forensics, fraud investigation, and more, and uncover how to apply these methods to your own inquiries. Tune in and become a more insightful digital investigator!

PFIC Spring Session April 9, 2026

9 AM to 1 PM (Eastern Time Zone)

9:00 AM to 10:00 AM

Leading DFIR in the Age of AI: Decisions, Trust, and Responsibility

Artificial Intelligence is increasingly embedded in Digital Forensics and Incident Response (DFIR), transforming how cyber incidents are detected, analyzed, and managed. While AI enhances speed and analytical capability, it also introduces new challenges related to decision transparency, evidentiary integrity, and accountability. In this evolving landscape, effective DFIR leadership extends beyond technical expertise to strategic judgment, trust-building, and responsible decision-making.

This session draws on advanced DFIR research, established leadership models, and practical incident response experience to examine how leaders must adapt when AI influences investigative and response outcomes. It highlights the importance of governing AI-assisted decisions, maintaining forensic defensibility, and communicating risk effectively to executive and regulatory stakeholders.

Attendees will gain insight into how DFIR leaders can integrate AI responsibly into response operations while preserving human oversight, organizational trust, and professional accountability. The session is intended for DFIR professionals, cybersecurity leaders, and executives seeking to lead with clarity and confidence in an AI-driven threat environment.

Talha Riaz

Talha Riaz is a DFIR innovator and keynote speaker with over a decade of experience in Digital Forensics and Incident Response. He specializes in investigations across Windows, Linux, mobile, and drone platforms, with expertise in SIEM, threat hunting, malware analysis, active defense, and DFIR automation. Talha is known for delivering practical, real-world insights that help organizations respond effectively to modern cyber threats.

10:00 AM to 11:00 AM

The Invisible Evidence Trail: Unpacking Scams That Evade Traditional DFIR Workflows

Fraud and scam operations have evolved far beyond the patterns most DFIR teams were trained to recognize. Today’s attackers blend AI-generated content, social-engineering psychology, ephemeral communication channels, and real-time payment mechanisms to create incidents that leave little—or unexpected—digital residue. While these schemes rarely resemble classic intrusions, they still produce artifacts, signals, and behavioral patterns that forensic investigators can surface… if they know where to look. This session exposes the newest fraud and scam techniques targeting consumers, enterprises, and frontline employees—including voice-cloning cons, deepfake-driven approval fraud, refund manipulation, policy-abuse rings, and real-time payment hijacks. Attendees will learn how these attacks unfold, the evidence paths they generate across mobile, IoT, and social platforms, and how investigative workflows must adapt to capture them. You’ll walk away with actionable guidance on identifying hidden trails, recognizing human-layer exploitation, and integrating fraud intelligence into modern DFIR investigations.

Tracy Kobeda Brown

Tracy Kobeda Brown is a global speaker and technology executive specializing in fraud, risk, and emerging threats. Known as The Fraud Futurist™, she lead the technology teams building American Eagle’s ae.com in the early days of eCommerce, has partnered with the FBI on global cybercrime takedowns, and has educated the world’s largest eCommerce companies on evolving fraud trends. Tracy shares real-world fraud and scam stories, paired with practical guidance, to help organizations and employees recognize and respond to today’s evolving fraud threats.

linkedin: www.linkedin.com/in/tracykobedabrown

website (launches this week): www.tracykbrown.com

11:00 AM to Noon

Beyond Streaming -Forensic Examination of Amazon Fire TV Devices: Practical Workflows & Artifact Insights

Amazon Fire TV devices are increasingly present in modern digital ecosystems, functioning not only as media-streaming platforms but also as network-connected endpoints tied to user accounts, third-party applications, and cloud services. Despite their widespread adoption, FireOS-based devices remain underrepresented in digital forensic literature and practitioner workflows. This gap presents both technical challenges and investigative opportunities for forensic analysts encountering Fire TV devices in criminal investigations, malware analysis, and incident response scenarios. This presentation provides a practical, forensic-driven examination of Amazon Fire TV and Fire TV Stick devices, focusing on non-root acquisition strategies, artifact discovery, and application-level analysis. The session begins with an overview of FireOS architecture and its Android-derived filesystem, highlighting partition layouts and directories of forensic relevance. It then demonstrates a structured acquisition workflow using Android Debug Bridge (ADB) to perform logical data extraction while preserving evidentiary integrity.

A key component of the presentation explores the extraction and reverse engineering of installed Fire TV applications. By pulling application packages (APKs) from the device and decompiling them using tools such as DEX2JAR and JD-GUI, the talk illustrates how investigators can analyze application resources, classes, and configuration logic to identify data storage behavior and artifacts material to an investigation. This approach is particularly valuable in cases involving suspected malicious applications, unauthorized monitoring, or application-based activity reconstruction.

Attendees will leave with a clear understanding of how Fire TV devices can be examined forensically without device modification, what types of artifacts are realistically obtainable, and how reverse engineering complements traditional forensic analysis. The presentation is designed for forensic practitioners, investigators, and advanced students seeking to expand their capabilities beyond mobile phones and into emerging consumer-device ecosystems.

Daniel Addai

Daniel Kwaku Ntiamoah Addai is a digital forensics and incident response professional specializing in mobile, embedded, and emerging device investigations. He has hands-on experience conducting forensic examinations across Android, iOS, macOS, Windows, and IoT-based platforms, with a strong focus on artifact extraction, application analysis, and evidence interpretation. Daniel’s work spans criminal investigations, malware analysis, and incident response engagements involving both consumer and enterprise environments.

He is actively involved in academic research and applied forensic methodology development, with interests in reverse engineering, memory forensics, and forensic automation. Daniel also contributes to forensic education through structured walkthroughs and technical writing aimed at advancing practitioner knowledge beyond traditional endpoints. His recent work explores the forensic examination of Amazon Fire TV devices, highlighting practical acquisition workflows, artifact discovery, and application reverse engineering techniques.

Daniel brings a practitioner-driven perspective that bridges real-world casework, research, and advanced forensic education.

Noon to 1:00 PM

From Posts to Places: Practical Geolocation

When seconds count, public digital information can help narrow a person's or a post's location fast without needing access to private data. This talk explains triangulation (bearings) and trilateration (distances) in plain language, then demonstrates how responders can leverage social posts, app signals, and environmental context to identify actionable search areas. We'll cover how to use GPS-enabled posts, how to estimate location when apps only provide distance ranges, how to utilize radius-based searches to confirm whether someone is within a zone, and how to convert context clues such as landmarks, transit, signage, weather, and time of day into real coordinates. The outcome is a simple, repeatable triage approach that helps teams transition from "somewhere out there" to a clear map area and a corresponding confidence level quickly and responsibly.

Kirby Plessas

Kirby is founder and CEO of Plessas Experts Network, Inc. Kirby established herself as one of the foremost tradecraft experts in OSINT through a career as a member of the U.S. Military and as a contractor.

Why should you attend PFIC...

Why should you attend PFIC...

“If you have not looked at attending the Paraben Forensic Innovation Conference you should. The DFIR event has great talks and lots of hands-on lab tracks. Even though the conference is called Paraben, there are a lot of other forensic companies there. And, you can talk to lots of real users. Unlike other conferences that cost thousands, this digital forensics conference is affordable for any budget.”

Ira Victor, Chief Forensic Analyst


“I was extremely pleased with the incredible professional level of speakers throughout this forum. The information they provided was extremely valuable. Throughout both my police career and digital forensics, I would rate this forum at the very top. PARABEN did an excellent job.”

James Bogers MJB group


“OMG. I learned so much in the first hour of PFIC my mind is blown. As you may or may not be aware, I have been in investigations for over 35 years. I speak internationally on Police Policy and Procedure INVESTIGATIONS. I have NEVER at least that I Can recall, learned so much in one hour! This is such an incredible journey.”

Frank DeAndrea DeAndrea Investigations

Copyright 2026 . All rights reserved