Presented by Exterro in Collaboration with AES Pakistan
As Pakistan’s banking sector accelerates toward total digital onboarding in 2026, a new threat has emerged: Multimodal AI Fraud. From deepfake voice clones authorizing high-value transfers to synthetic identities bypassing biometric KYC, the "digital paper trail" is being rewritten by algorithms.
For the modern Digital Forensic Investigator (DFI), transaction logs are no longer enough. Under the SBP “Cyber Shield” Strategy and PECA 2025 amendments, banks must now provide "forensic proof" of intent and origin.
What You Will Learn:
In this collaborative session, AES Pakistan and Exterro will demonstrate the end-to-end forensic workflow required to dismantle modern financial scams within the Pakistani landscape:
1. The SBP "Cyber Shield" Mandate: How to align your forensic lab with the 2025–2030 roadmap for "Measurable Resilience."
2. Local Expertise, Global Tech: How AES Pakistan provides the on-the-ground implementation and support to ensure your Exterro FTK Suite is optimized for local regulatory standards.
3. From Lab to Tribunal: Maintaining a defensible chain of custody that withstands the scrutiny of the NCCIA and Pakistan’s specialized cybercrime courts.
The Combined Advantage:
Learn how the power of the Exterro FTK Suite—the gold standard in forensic processing—is enhanced by AES Pakistan’s deep understanding of the local banking infrastructure. We will show you how to move from "Detection to Evidence" ensuring your bank stays ahead of both the fraudster and the auditor.
Key Learning Objectives:
1. Execute forensically sound remote collections across distributed branch networks.
2. Validate evidence to meet SBP reporting standards.
If you can’t attend live, don’t worry, register anyway, and we’ll share the recording so you can watch it at your convenience. We welcome you and your colleagues to join this interactive session and see how Exterro can help in solving cases faster
International Solutions Engineer
Christine is an International Solutions Engineer at Exterro. She has long experience in Computer and Mobile Investigations.
Before Exterro, Christine was employed as an Operations Manager, Technical Manager, Senior Digital Forensic Analyst, and a Project Coordinator for three UK forensics service providers. Christine has been conducting Forensic investigations of digital media since 2008. She holds a BSc (HONS) degree in Forensic Computing from Staffordshire University. She has further received training in the Guidance ‘EnCase’ forensic software, Micro Systemation 'XRY' forensic software and Exterro FTK Forensics software.
She has also attended expert witness training courses from Bond Solon in report writing and courtroom skills and received advanced forensic training from 4N6. Christine has experience in presenting evidence in court as an Expert Witness in addition to carrying out investigations for Law enforcement, Defence and Corporate customers.
Christine has obtained accreditation as an EnCase Certified Examiner (EnCE) and currently holds Exterro ACE certification.
Solution Engineer
Sindhu Dinesh is a Digital Forensics Professional currently working as a Solutions Engineer at Exterro, with prior experience as a Scientific Officer. She holds a Master’s degree in Cybersecurity and has hands-on experience in mobile forensics, malware analysis, email investigations, and OSINT techniques. Having worked on real-world cases involving spyware detection and system audits, she also brings experience in mentoring students on digital forensic projects, offering both practical insights and industry perspective.
Head of Cyber Defense & Offensive Security
Expertise in Demonstrating different areas of Cybersecurity including:
- Social Engineering Attack Simulations;
- Data Breaches;
- Compromising User Privacy;
Lead multiple security teams of around 100+ Cybersecurity Professionals including Infrastructure Security, PCI/DSS, Application Security, Digital Transformation, IS Governance, Red Teaming, SOC in information security Division, key expertise extracted from these areas are:
- SOC Maturity;
- SIEM and SOAR Integration;
- GDPR Global;
- Digital Forensic
- Cybersecurity Maturity Model;
- Cyber Drills;
- Compromise Assessment;
- Incident Response & Handling;
- Exploits & Malware Writing
Infrastructure Security:
Active Directory Security Assessment, Security of Exchange Server, Securing Office365 & cloud enabled environment.
Inter V-LAN Routing,
Secure Network Infrastructure Review,
Secure Network Deployment,
Networks customization and optimization