General Links
Sponsorship Opportunities at ICDF2C 2010
Sign up for ICDF2C Updates
Call for Papers
Call for Presentations
Organizing Committee
Technical Program Committee
Authors / Presenters
Author's Kit
Submit Papers
Presenter Information
Keynote Speakers
Technical Program
Social Event
Visa Information
Hotel Reservation
Media Partners
Past Editions
2009 - Albany, NY

Deadline: June 1, 2010

The International Conference on Digital Forensics and Cyber Crime (ICDF2C) is a unique conference encompassing not only technical, but also the social, legal, and business aspects of forensics. The forensics field is set to explode and the United Arab Emirates is in a prime position to take advantage of it. The United Arab Emirates has taken large governmental efforts in establishing UAE Cyber Laws, Digital Forensic Laboratories in Abu Dhabi and Dubai, governmental bodies specializing in security and has now introduced digital forensic research, development and education in the higher educational system. By bringing together both practitioners and researchers, we hope to benefit from understandings of current practice and the innovations that research has to offer.

ICDF2C is organized by the College of Information Technology at Zayed University in collaboration with the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST).

Submission Guidelines

This call for presenters is in addition to the call for papers. As opposed to research papers, the presentations will be focused on more applied topics. Presentation length should be from 1/2 to 1-hour. Presentations must be vendor neutral.

All presenter proposals should be submitted by filling out the Submit Presentation Proposal Form or the following information should be emailed to Ibrahim.Baggili AT before June 1, 2010.

Personal Information: 1) Name, 2) Email Address, 3) Title, 4) Institution

Presentation Information: 1) Title, 2) Description (250 - 500 words), 4) Format (presentation, interactive session, demonstration, etc.), 3) Resources Needed (if any) and 4) Intended Audience (choose from attendees above)

Presentation proposals will be reviewed, and based on the content and suitability, the decision to accept presentations will be made and speakers informed by June 15, 2010. Actual presentations should be submitted by August 1, 2010 for additional review.

Potential Topics Who Should Attend?
Computer Forensics
Electronic Money Laundering
Forensic Accounting
Watermarking & Intellectual Property Theft
Incident Response & Evidence Handling
Network Data Analysis
Data Analytics, Mining & Visualization
Identity Theft & Online Fraud
Mobile Device Forensics
Digital Forensics and the Law
Data Log Analysis
Forensics Training & Education
Natural Language Processing
Cyber Crime Investigations
Continuous Assurance
Internet Crimes Against Children
Data Recovery & Business Continuity
Standardization & Accreditation
Multimedia Forensics
Digital Signatures and Certificate
Academic Researchers / Instructors
Anti-Money Laundering Compliance Officers
Auditors / Internal Auditors
Banking Agents
Compliance Officers
Disaster Recovery Professionals
Financial Intelligence Officers
Fraud Examiners
Information Technology Specialists
Information Security Officers
Insurance Company Personnel and Agents
Security / Intelligence Agents
Investment Advisors
Law Enforcement
Lawyers / Prosecutors / District Attorneys
Money Laundering Reporting Officers
Financial Regulators
Risk Management Officers
Computer Security Practitioners

© Copyright 2010 ICST - All rights reserved.