Accessing the Inaccessible: Overcoming the Challenge of Encryption
The evolution of Android encryption over the past 5 years has presented examiners with major challenges in evidence extraction. In many cases you get only one shot at an encrypted Android device! So it is vital to make the most informed decision possible on how to access the device.
To educate you on the best process for your device there is no one better than Heather Mahalik and Shahar Tal from Cellebrite. With decades of evidence extraction experience they can guide you through the approach right for you approach to overcome Android device encryption.
Join us for this exciting webinar where we will discuss:
- The core differences between Android encryption modes
- Clarify misunderstood technology such as Secure Startup and File-Based Encryption
- How to inspect and identify the different modes and best practices for these devices
- The world of passcode bruteforce techniques
This webinar will empower you to make educated decisions on accessing what were previously inaccessible devices.
Heather Mahalik Senior Director of Digital Intelligence at Cellebrite
Shahar Tal VP, Security Research Labs at Cellebrite