If you like the website, feel free to: Buy Me a Coffee at ko-fi.com

Info! CFPTime is a non-profit organization, community-based. Using CFP Time data (through the site and/or API) is allowed but can't be used for commercial purposes.

11th International Conference on IT Security Incident Management & IT Forensics

City Hamburg
Province N/A
Country DE
Website http://www.imf-conference.org/
Code of Conduct Not populated yet
CFP Deadline

Jan. 30, 2018, 11:55 p.m.   

Conference Date

May 7, 2018, midnight   



11th International Conference on
IT Security Incident Management & IT Forensics
May 7th - 9th, 2018
Hamburg, Germany


Since 2003, IMF has established itself as one of the premier venues for
presenting research on IT security incident response and management and
IT forensics. While the first IMF conference was organized to establish
a research forum for German speaking researchers and practitioners from
the field, it soon became an international conference attracting many
experts across Europe. 2018 being the 11th Conference, it is also an
important mile stone in bringing the two worlds of IT security incident
response and management and forensics together.

IMF provides an informal collaborative environment each year that bring
together leading researchers, practitioners, industry, tool developers,
academics, law enforcement, and other government bodies from around the
globe to tackle current and emerging challenges in their fields.

Accepted papers will be published by Conference Publishing Services and
submitted to the IEEE Xplore Digital Library. Each participant of the
conference will receive a printed copy.

Possibilities to contribute:

In recent years, IMF conferences have added practitioner presentations
and hands-on tutorials/workshops taught by leading experts in the fields.
Presentations are opportunities for industry researchers and
practitioners who do not have the time to write a paper, but who have
information and experiences that would be of interest to attendees.

Presentation proposals undergo a reviewing process to filter out sales
pitches and ensure the topic is relevant to our audience.

We invite original contributions as research papers, non-research
practitioner presentations, tutorials/workshops, panels, demos, and
posters on the following topics in digital forensics and IT security
incident response and management:

IT Security Incident Management
* Incident management standardization, metrics and life cycle
* Incident management formats and protocols
* Incident response and/or Vulnerability response workflows, procedures
and tools
* Incident analysis including live analysis
* Research in incident management and related processes
* Development of tools supporting incident management processes
* Exchange of cyber threat intelligence
* Sharing of data/information about threats, attacks, incidents, etc.
* Setup of cyber defense entities including but not limited to: CSIRTs,
PSIRTs, ISACs, SOCs and any other organization specialising in (some)
IT security incident management processes
* Maturity of such cyber defense entities
* Warning of large scale communities about upcoming threats or detected
* Ensuring situational awareness and early warning
* Mandatory vs. discretionary attack / incident / vulnerability
* Non-traditional incident management scenarios and approaches
(e.g. vehicles, control systems, and SCADA)

Digital Forensics
* "Big data" approaches to forensics, including data collection, data
mining, and large scale visualization
* Research and development of tools supporting digital forensics
* Digital forensic laboratories and other organizations specialising in
digital forensic science
* Addressing forensic challenges of systems-on-a-chip
* Anti-forensics and anti-anti-forensics
* Bridging the gap between analog and digital
* Case studies and trend reports
* Data hiding and discovery
* Data recovery and reconstruction
* Database forensics
* Digital evidence and the law
* Digital evidence storage and preservation
* Event reconstruction methods and tools
* Impact of digital forensics on forensic science
* Interpersonal communications and social network analysis
* Malware and targeted attacks: analysis, attribution
* Memory analysis and snapshot acquisition
* Mobile and embedded device forensics
* Multimedia forensic analysis
* Network and distributed system forensics
* Non-traditional forensic scenarios and approaches (e.g. vehicles,
control systems, and SCADA)
* Storage forensics, including file system and Flash
* Tool testing and development
* Triage, prioritization, automation: efficiently processing large
amounts of data in digital forensics
* Typology of digital traces
* Virtualized environment forensics, with specific attention to the
cloud and virtual machine introspection

Speaker benefits

Not populated yet