Cellebrite

Location
851 N Glebe Road, Unit 1309, Arlington, VA
More Events
Past EventsOn-Demand Events

Upcoming Cellebrite Events

Cellebrite C2C User Summit 2026 - Washington DC

Apr 13-17, 2026

Washington, DC

Cellebrite

Empower your professional journey at the Cellebrite C2C User Summit 2026 in Washington, DC! 

 

We are humbled that this has quickly become THE industry event of the year and you won't want to miss: 

  • Professional Development: Enhance your expertise with the latest digital forensics and digital investigative techniques, solutions and best practices delivered by industry-leading experts.
  • Networking Opportunities: This is perhaps the BEST piece of feedback we got from 2025. The networking is bar none. Connect with industry leaders, peers and mentors and broaden your professional network.
  • Strategic Insights: Gain valuable insights into industry trends, challenges and opportunities that can inform and influence your organization’s strategies.
  • Innovation Showcase: Discover new technologies and services that can benefit your organization -- keeping you at the forefront of digital investigations.
  • Company Representation:Represent your organization at a premier industry event, showcasing your team’s commitment to continuous improvement and industry engagement.

Need help in attending this event? No problem, download your Cellebrite C2C User Summit 2026 Justificatoin letter here:

Apr 28, 2026

Virtual / Online

Date: Tuesday, April 28th 

Time: 14:00 BST
Duration: 45 minutes (includes Q&A)

A declined credit card. A login from a device he doesn’t recognize. Password resets he never requested. Within hours, a bank’s fraud team discovers that whoever accessed his accounts had information that should only exist inside the bank’s own systems.

This was not a phishing attack. Someone walked in through the front door. And when investigators start looking for a pattern, they find one connecting four high-value clients to the same branch, the same timeframe, and the same employee.

What happens next changes the direction of the entire investigation.

You will walk away with:

  • How transaction timeline analysis identifies the exact moment an account is compromised
  • Techniques for cross-case pattern matching that turn isolated complaints into a connected investigation
  • The early warning signs that distinguish insider-enabled fraud from external attacks
Related Resources: 
  • Episode 2: The Insider
  • The Day Your Identity Disappeared
    • Start from the beginning or catch up on the episodes you missed. Click Here

Apr 28, 2026

Virtual / Online

The Day Your Identity Disappeared

Four Episodes. One Case. From a single complaint to the takedown of a criminal network operating across the financial system. 

Built for the teams that follow the money

A declined credit card. A phone lighting up with password resets no one requested. Within hours, investigators discover accounts the victim never opened, tax filings he never submitted, and money moving under his name.

The deeper they look, the worse it gets.

This series is designed for professionals who investigate, analyse, prosecute, or oversee responses to financial crime — whether in public sector agencies or private financial institutions.

May 27, 2026

Virtual / Online

Date: Wednesday, May 27th 

Time: 14:00 BST
Duration: 45 minutes (includes Q&A)

The investigation turns inward. The employee’s corporate devices are collected for forensic examination. They’re clean. No suspicious apps. No unusual transfers. The case nearly stalls.

Then someone remembers the security footage. The phone on the desk during those client meetings wasn’t the corporate phone. It was a personal device. And when forensic examiners get access to it, what they find is methodical, systematic, and far bigger than four victims.

The insider was not the mastermind. The insider was the supply chain. And what had already been done with the stolen identities changes everything.

You will walk away with:

  • Why limiting forensic analysis to corporate devices can derail an insider threat investigation
  • How mobile device extraction recovers recordings, images, and encrypted messaging data from personal devices
  • Techniques for determining the full scope of an insider compromise through device timeline reconstruction
Related Resources: 
  • Episode 3: The Digital Trail
  • The Day Your Identity Disappeared
    • Start from the beginning or catch up on the episodes you missed. Click Here

Jun 10, 2026

Virtual / Online

Date: Wednesday, June 10th 

Time: 14:00 BST
Duration: 45 minutes (includes Q&A)

Fourteen accounts at different banks. All opened with stolen identities. All designed to look completely unrelated. But when investigators analyse the digital fingerprints behind the applications, connections emerge with shared IP addresses, matching device identifiers, email patterns that were never meant to be found.

The money trail reveals something even more sophisticated. Fake companies. Fake payrolls. Tax refunds claimed on income that was never earned. The stolen identities weren’t used to steal money. They were used to create it.

Then the device fingerprints match activity in two other regions. This was never about one bank.

You will walk away with:

  • How entity resolution connects accounts and transactions deliberately designed to look unrelated
  • Techniques for detecting financial structuring — transactions calibrated to avoid reporting thresholds
  • How device fingerprint expansion uncovers connected criminal activity across jurisdictions
Related Resources: 
  • Episode 4: The Network
  • The Day Your Identity Disappeared
    • Start from the beginning or catch up on the episodes you missed. Click Here

Jun 24, 2026

Virtual / Online

Date: Wednesday, June 24th 

Time: 14:00 BST
Duration: 45 minutes (includes Q&A)

The final episode reveals the full picture. Three insiders at different institutions. A small group of operators building financial infrastructure from stolen identities. Money movers extracting funds across regions. Eighteen months of patient, methodical operation.

When investigators map the complete network for the first time, the structure of the criminal operation becomes visible in a way that no single case file could reveal. The question shifts from who did this to whether the evidence chain will hold up in court.

The series ends where every investigation ends: with the question of whether justice is served. And with a harder question for the audience — would your team have caught it?

You will walk away with:

  • How network visualization reveals the structure of criminal operations hidden across institutions and regions
  • The requirements for cross-jurisdictional evidence sharing that maintains chain of custody and legal admissibility
  • A framework for evaluating your own institution’s readiness to detect and investigate complex financial crime
Related Resources: 
  • See it in Action
    • Want to see how these investigation techniques work for your team? Click Here
  • The Day Your Identity Disappeared
    • Start from the beginning or catch up on the episodes you missed. Click Here
View all