Deadline: June 1, 2010
The International Conference on Digital Forensics and Cyber Crime (ICDF2C) is a unique conference encompassing not only technical, but also the social, legal, and business aspects of forensics. The forensics field is set to explode and the United Arab Emirates is in a prime position to take advantage of it. The United Arab Emirates has taken large governmental efforts in establishing UAE Cyber Laws, Digital Forensic Laboratories in Abu Dhabi and Dubai, governmental bodies specializing in security and has now introduced digital forensic research, development and education in the higher educational system. By bringing together both practitioners and researchers, we hope to benefit from understandings of current practice and the innovations that research has to offer.
ICDF2C is organized by the College of Information Technology at Zayed University in collaboration with the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST).
This call for presenters is in addition to the call for papers. As opposed to research papers, the presentations will be focused on more applied topics. Presentation length should be from 1/2 to 1-hour. Presentations must be vendor neutral.
All presenter proposals should be submitted by filling out the Submit Presentation Proposal Form or the following information should be emailed to Ibrahim.Baggili AT zu.ac.ae before June 1, 2010.
Personal Information: 1) Name, 2) Email Address, 3) Title, 4) Institution
Presentation Information: 1) Title, 2) Description (250 - 500 words), 4) Format (presentation, interactive session, demonstration, etc.), 3) Resources Needed (if any) and 4) Intended Audience (choose from attendees above)
Presentation proposals will be reviewed, and based on the content and suitability, the decision to accept presentations will be made and speakers informed by June 15, 2010. Actual presentations should be submitted by August 1, 2010 for additional review.
Who Should Attend?
Electronic Money Laundering
Watermarking & Intellectual Property Theft
Incident Response & Evidence Handling
Network Data Analysis
Data Analytics, Mining & Visualization
Identity Theft & Online Fraud
Mobile Device Forensics
Digital Forensics and the Law
Data Log Analysis
Forensics Training & Education
Natural Language Processing
Cyber Crime Investigations
Internet Crimes Against Children
Data Recovery & Business Continuity
Standardization & Accreditation
Digital Signatures and Certificate
Academic Researchers / Instructors |
Anti-Money Laundering Compliance Officers
Auditors / Internal Auditors
Disaster Recovery Professionals
Financial Intelligence Officers
Information Technology Specialists
Information Security Officers
Insurance Company Personnel and Agents
Security / Intelligence Agents
Lawyers / Prosecutors / District Attorneys
Money Laundering Reporting Officers
Risk Management Officers
Computer Security Practitioners