Deadline: June 20, 2009
The International Conference on Digital Forensics and Cyber Crime (ICDF2C) is a unique conference encompassing not only technical, but also the social, legal, and business aspects of forensics. The forensics field is set to explode and the Capital Region is in a prime position to take advantage of it. The Capital Region serves as a hub for state government, and is home to the NYSP Forensics Investigation Center, DCJS, and several academic research institutions including UAlbany. By bringing together both practitioners and researchers, we hope to benefit from understandings of current practice and the innovations that research has to offer.
ICDF2C is organized by the School of Business at the University at Albany, State University of New York (UAlbany) in collaboration with the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST) and Create-Net. We are also working closely the New York State Police (NYSP) and the New York State Division of Criminal Justice Services (DCJS) who are co-sponsoring the event.
Submission Guidelines
This call for presenters is in addition to the call for papers. As opposed to research papers, the presentations will be focused on more applied topics. Presentation length should be from 1/2 to 1-hour. Presentations must be vendor neutral.
All presenter proposals should be submitted by filling out the Submit Presentation Proposal Form or the following information should be emailed to goel AT albany DOT edu before June 20, 2009.
Personal Information: 1) Name, 2) Email Address, 3) Title, 4) Institution
Presentation Information: 1) Title, 2) Description (250 - 500 words), 4) Format (presentation, interactive session, demonstration, etc.), 3) Resources Needed (if any) and 4) Intended Audience (choose from attendees above)
Presentation proposals will be reviewed, and based on the content and suitability, the decision to accept presentations will be made and speakers informed by July 22, 2009. Actual presentations should be submitted by July 31, 2009 for additional review.
Potential Topics
|
Who Should Attend?
|
Computer Forensics
Electronic Money Laundering
Forensic Accounting
Watermarking & Intellectual Property Theft
Incident Response & Evidence Handling
Network Data Analysis
Data Analytics, Mining & Visualization
Identity Theft & Online Fraud
Mobile Device Forensics
Digital Forensics and the Law
Data Log Analysis
Forensics Training & Education
Natural Language Processing
Cyber Crime Investigations
Continuous Assurance
Internet Crimes Against Children
Data Recovery & Business Continuity
Standardization & Accreditation
Multimedia Forensics
Digital Signatures and Certificate
|
Academic Researchers / Instructors
Accountants
Anti-Money Laundering Compliance Officers
Auditors / Internal Auditors
Banking Agents
Compliance Officers
Consultants
Disaster Recovery Professionals
Financial Intelligence Officers
Fraud Examiners
Information Technology Specialists
Information Security Officers
Insurance Company Personnel and Agents
Security / Intelligence Agents
Investment Advisors
Law Enforcement
Lawyers / Prosecutors / District Attorneys
Money Laundering Reporting Officers
Financial Regulators
Risk Management Officers
Computer Security Practitioners
|
|