Accessing the Inaccessible: Overcoming the Challenge of Encryption - Cellebrite
blue background
Webinar  |  On Demand

Accessing the Inaccessible: Overcoming the Challenge of Encryption

Ask the Expert - UFED Physical Analyzer
We hope you enjoy the webinar!

The evolution of Android encryption over the past 5 years has presented examiners with major challenges in evidence extraction.  In many cases you get only one shot at an encrypted Android device!  So it is vital to make the most informed decision possible on how to access the device.

To educate you on the best process for your device there is no one better than Heather Mahalik and Shahar Tal from Cellebrite. With decades of evidence extraction experience they can guide you through the approach right for you approach to overcome Android device encryption.

Join us for this exciting webinar where we will discuss:

  • The core differences between Android encryption modes
  • Clarify misunderstood technology such as Secure Startup and File-Based Encryption
  • How to inspect and identify the different modes and best practices for these devices
  • The world of passcode bruteforce techniques

This webinar will empower you to make educated decisions on accessing what were previously inaccessible devices.

Speakers

  • Heather Mahalik Senior Director of Digital Intelligence at Cellebrite
  • Shahar Tal VP, Security Research Labs at Cellebrite