As a seasoned examiner with over two decades of experience, it's easy to say I have perfected the art of digital forensics. But guess what - I still make mistakes and I openly speak about them. In a career that is driven by high demands and ever changing technology, it's impossible to not mess up along the way. What matters is that we talk about what went wrong to help others avoid mistakes. Digital forensics is an integral part of investigations and is constantly on the news as being used to solve crimes worldwide. Criminals are getting smarter and our cases are getting harder. We need to slow down, look back at history, and learn from the veterans of DFIR on what can be done differently, where we can improve, and most importantly - how can can we use digital forensics to prove the truth in the investigation.
Sextortion is the edgy risk nobody wants to face. The problem is that nobody is safe and everyone can be a target: you, your family, your kids, and your co-workers. In today's environment, it is important to understand the threat and how attacks happen. This talk will walk through scenarios on attack methods, ways to prevent sextortion, and methods to recover should it happen to you or someone you know.
The Report Act was recently signed and put into action by President Biden, forcing social media providers to report CSAM and child trafficking posts. This is a huge stride forward, but we need to do more to stop the problem before it occurs. Remember, one image can ruin someone's life, whether it's real or not.
Mahalik Barnhart's keynote on the threat of Sextortion receives rave reviews, as it's one of today's scariest, growing threats.
Today, we are more digitally connected than ever before, as are our parents. That generation isn't as technically educated as we may be and are at risk daily for attacks, including AI attacks. Our children are at risk every time they log into an electronic device. Our children are super savvy about the latest model of mobile phone, while our aging parents need help with theirs. All of this connectivity brings plenty of benefits and convenience, but each connected device also brings increased risk.
"Every personal device used is a potential entry for system threats", says Heather Mahalik Barnhart, Digital Forensics Expert, SANS Faculty Fellow, Cellebrite Senior Director of Community Engagement, and mother of two. "Cyber attackers can target anyone’s home – no one is invulnerable", she says. "Risks to our digital safety are everywhere, but there are steps you can take to protect yourself and your family".
Mahalik Barnhart developed the SANS Security Awareness #SecureTheFamily global initiative to help keep your kids, family, and home safe from cyber harm. Leverage these tools to learn practical advice on how to keep your family safe online with a focus on proper device usage and limits for all ages.
Today, we are more digitally connected than ever before, as more people work from home, remote e-learning has grown exponentially, and Wi-Fi-enabled "smart" devices increasingly occupy different aspects of our daily lives. Our children are super savvy about the latest model of mobile phone, while our aging parents need help with theirs. All of this connectivity brings plenty of benefits and convenience, but each connected device also brings increased risk.
"Every personal device used is a potential entry for system threats", says Heather Mahalik, Digital Forensics Expert, SANS Faculty Fellow, Cellebrite Senior Director of Community Engagement, and mother of two. "Cyber attackers can target anyone’s home – no one is invulnerable", she says. "Risks to our digital safety are everywhere, but there are steps you can take to protect yourself and your family".
Barnhart developed the SANS Security Awareness #SecureTheFamily global initiative to help keep your kids, family, and home safe from cyber harm. Leverage these tools to learn practical advice on how to keep your family safe online with a focus on proper device usage and limits for all ages.
How easy is it to function in a field that is predominantly male when you don't fit that description? This is a question that I am often asked and love to share feedback on. As a self-made expert in this field, I have dodged some land mines, learned to form a team of people who support me, and learned how to push the boundaries needed to get ahead.
Certain skills will ensure your path can be paved as smoothly as possible.
All of these skillsets can help you gain footing in this field. Sharing the background on how Heather gained respect of those in the field and became a recognized expert may inspire you to chase your dreams even if you don't fit the profile.
Interactions were professional, clear, and the speaker was very well received.
Information Systems Security Association Rochester Chapter
- Oct 25 2025
We are happy to assist you with your interest in booking a speaker or celebrity for your event, your organization, and the type of talent you would like to secure, and an agent will be in touch shortly.
Fill out the form below to or call us at 1-800-698-2536 if need immediate assistance.
We respond to most inquiries within 4 hours. Under special circumstances, it may take up to 24 hours.
This website is a resource for event professionals and strives to provide the most comprehensive catalog of thought leaders and industry experts to consider for speaking engagements. A listing or profile on this website does not imply an agency affiliation or endorsement by the talent.
All American Entertainment (AAE) exclusively represents the interests of talent buyers, and does not claim to be the agency or management for any speaker or artist on this site. AAE is a talent booking agency for paid events only. We do not handle requests for donation of time or media requests for interviews, and cannot provide celebrity contact information.