Heather Mahalik Barnhart Headshot
Report a problem with this profile
[email protected]

Heather Mahalik Barnhart      

Cybersecurity Expert; Sr. Director at Cellebrite; SANS Institute Faculty Fellow Instructor; Co-author of "Practical Mobile Forensics"

To say that digital forensics is central to Heather Mahalik Barnhart's life is quite the understatement. Barnhart has worked on high-stress and high-profile cases, investigating everything from child exploitation, homicides to Osama Bin Laden's media. She has helped law enforcement, consulting firms, and the federal government extract and manually decode artifacts used in solving investigations around the world. Heather began working in digital forensics in 2002 and has been primarily focused on mobile forensics since 2010 - there's hardly a device or platform she hasn't researched or examined or a commercial tool she hasn't used, which is why she is a sought after expert.

Barnhart is the Senior Director of Community Engagement at Cellebrite. At the SANS Institute, Heather the DFIR Curriculum Lead, faculty fellow instructor, and course author. Barnhart maintains (smarterforensics) where she blogs and hosts work from the digital forensics community. She is the co-author of Practical Mobile Forensics (1st -4th editions), currently a best seller from Pack't Publishing. Barnhart is featured in Women Know Cyber as one of the 100 fascination females fighting cybercrime. She was named a Top 10 influential Women Leader of 2023 by Mirror Review Magazine and has been featured as an expert on the CUMO show.

Speech Topics


Sextortion Prevention: AI or Real

Sextortion is the edgy risk nobody wants to face. The problem is that nobody is safe and everyone can be a target: you, your family, your kids, and your co-workers. In today's environment, it is important to understand the threat and how attacks happen. This talk will walk through scenarios on attack methods, ways to prevent sextortion, and methods to recover should it happen to you or someone you know.

The Report Act was recently signed and put into action by President Biden, forcing social media providers to report CSAM and child trafficking posts. This is a huge stride forward, but we need to do more to stop the problem before it occurs. Remember, one image can ruin someone's life, whether it's real or not.

Mahalik Barnhart's keynote on the threat of Sextortion receives rave reviews, as it's one of today's scariest, growing threats.

Securing Parents and Children

Today, we are more digitally connected than ever before, as are our parents. That generation isn't as technically educated as we may be and are at risk daily for attacks, including AI attacks. Our children are at risk every time they log into an electronic device. Our children are super savvy about the latest model of mobile phone, while our aging parents need help with theirs. All of this connectivity brings plenty of benefits and convenience, but each connected device also brings increased risk.

"Every personal device used is a potential entry for system threats", says Heather Mahalik Barnhart, Digital Forensics Expert, SANS Faculty Fellow, Cellebrite Senior Director of Community Engagement, and mother of two. "Cyber attackers can target anyone’s home – no one is invulnerable", she says. "Risks to our digital safety are everywhere, but there are steps you can take to protect yourself and your family".

Mahalik Barnhart developed the SANS Security Awareness #SecureTheFamily global initiative to help keep your kids, family, and home safe from cyber harm. Leverage these tools to learn practical advice on how to keep your family safe online with a focus on proper device usage and limits for all ages.

Securing the Family

Today, we are more digitally connected than ever before, as more people work from home, remote e-learning has grown exponentially, and Wi-Fi-enabled "smart" devices increasingly occupy different aspects of our daily lives. Our children are super savvy about the latest model of mobile phone, while our aging parents need help with theirs. All of this connectivity brings plenty of benefits and convenience, but each connected device also brings increased risk.

"Every personal device used is a potential entry for system threats", says Heather Mahalik, Digital Forensics Expert, SANS Faculty Fellow, Cellebrite Senior Director of Community Engagement, and mother of two. "Cyber attackers can target anyone’s home – no one is invulnerable", she says. "Risks to our digital safety are everywhere, but there are steps you can take to protect yourself and your family".

Barnhart developed the SANS Security Awareness #SecureTheFamily global initiative to help keep your kids, family, and home safe from cyber harm. Leverage these tools to learn practical advice on how to keep your family safe online with a focus on proper device usage and limits for all ages.

Navigating the Cybersecurity Field as a Female

How easy is it to function in a field that is predominantly male when you don't fit that description? This is a question that I am often asked and love to share feedback on. As a self-made expert in this field, I have dodged some land mines, learned to form a team of people who support me, and learned how to push the boundaries needed to get ahead.

Certain skills will ensure your path can be paved as smoothly as possible.

  • Learning to say "Yes" to the right opportunities and "No" to those you don't want.
  • Learning to ask for more.
  • Finding good mentors and mentoring others.

All of these skillsets can help you gain footing in this field. Sharing the background on how Heather gained respect of those in the field and became a recognized expert may inspire you to chase your dreams even if you don't fit the profile.

The Five Most Dangerous New Attack Techniques

Which are the most dangerous new attack techniques? How do they work? How can you stop them? What’s coming next and how can you prepare? This fast-paced briefing features the three people best positioned to provide answers and best able to communicate them: the nation’s top expert/teacher on mobile forensics, the director of the Internet Storm Center and the top hacker exploits expert-teacher in the US. They also answer audience questions.

Under Pressure - How to Make Sure You Don't Burn Yourself in DFIR

Whoever said we must be perfect is greatly mistaken. We are human and we all make mistakes, and we must learn how to handle the pressure we put on ourselves and what other push upon us. This keynote is going to discuss several things to include mistakes Heather has made during her 20+ years in DFIR and how she overcame them. Why were these mistakes made and how can you potentially avoid them from happening to you? In addition, how can we learn to deal with the pressure of not being able to solve a case or "find a smoking gun" that is being asked of us?

Sometimes we grow when the evidence doesn’t speak to us. This talk will help you learn to manage expectations, accept that mistakes will be made, and see the growth in what happens when the evidence isn’t what someone told us it should be.

Related Speakers View all


More like Heather