lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 16 Apr 2007 11:01:13 +0200
From: Oliver Goebel <goebel@...t.uni-stuttgart.de>
To: full-disclosure@...ts.grok.org.uk
Subject: IMF 2007 - 2nd Call for Papers

Dear all,

for your information.

Please note the submission deadline at 2007-05-14.


----------------------------------------------------------------------------
                           2nd CALL FOR PAPERS

                                IMF 2007

                      3rd International Conference on
                   IT-Incident Management & IT-Forensics

                           Stuttgart, Germany
                         September 11 - 12, 2007

                      http://www.imf-conference.org/
                      mailto:2007@...-conference.org

---------------------------------------------------------------------------

Information technology has become crucial to almost every part of
society.  IT infrastructures have become critical in the world-wide
economy, the financial sector, the health sector, the government's
administration, the military, and the educational sector.

Due to its importance the disruption or loss of IT capabilities results
in a massive reduction of operability.  Hence, IT security is
continously gaining importance.

Although security usually gets integrated into the design process of IT
systems nowadays, the process of maintaining security in the operation
of IT infrastructures still lacks the appropriate attendance in most
cases.  Especially the capability to manage and respond to IT security
incidents and their forensic analysis is established in the rarest
cases. The quickly rising number of security incidents worldwide makes
the implementation of incident management capabilities essential.

In order to advance the fields of IT-Incident Management and Forensics
the special interest-group Security - Intrusion Detection and Response
(SIDAR) of the German Informatics Society (GI) organises an annual
conference, bringing together experts from throughout the world, to
discuss state of the art in the areas of Incident Management and
IT-Forensics (IMF). IMF promotes collaboration and exchange of ideas
between industry, academia, law-enforcement and other government bodies.

IMF invites to submit:
----------------------

 - Full papers of up to 20 pages, presenting novel and mature research
   results. 

 - Practice papers of up to 20 pages, describing best practices, case
   studies, lessons learned, or latest developments in technology. 

All submissions must be in English, and in either postscript or PDF
format.  Authors of accepted papers must ensure that their papers will
be presented at the conference.  Presentations should be held in
English.

Submitted full papers must not substantially overlap papers that have
been published or that are simultaneously submitted to a journal or a
conference with proceedings.

All submissions will be reviewed by the program committee and papers
accepted to be presented at the conference will be included in the
conference proceedings.

Details on the electronic submission procedure are provided on the
conference Web site at:
        
	  http://www.imf-conference.org/imf2007/submit.html


The scope of IMF 2007 is broad and includes, but is not restricted to,
the following areas:

 IT-Incident Management:

- Purposes of IT-Incident Management
- Trends, Processes and Methods of IT-Incident Management
- Formats and Standardization for IT-Incident Management
- Tools for the IT-Incident Management:
- Education and Training in the field of IT-Incident Management Awareness
- Determination, Detection and Evaluation of Incidents
- Procedures for Handling Incidents
- Problems and Challenges while establishing CERTs/ CSIRTs
- Sources of Information/ Information Exchange/ Communities
- Dealing with Vulnerabilities (vulnerability response)
- Current Threats
- Early Warning Systems
- Organizations (Nat. CERT-Associations, FIRST, TERENA/ TI, TF-CSIRT)

 IT-Forensics:

- Trends and Challenges of IT-Forensics
- Methods, Processes and Applications for IT-Forensics
  (Networks, Operating Systems, Storage Media, ICT Systems etc.)
- Evidence Protection in IT-Environments
- Standardization of Evidence Protection Processes
- Data Protection- and other legal implications for IT-Forensics
- Investigations
- Legal Relevance of IT-Forensics Investigations
- Tools for IT-Forensics
- Forensics readiness

Important Dates:
----------------
- May 14, 2007: Deadline for Submissions
- June 26, 2007: Notification of acceptance or rejection
- July 17, 2007: Final paper camera ready copy due
- September 11-12, 2007: IMF 2007 Conference


General Chair:
--------------
  Oliver Goebel, RUS-CERT, Universitaet Stuttgart
  goebel@...t.uni-stuttgart.de

Program Chair:
--------------
  Sandra Frings, Fraunhofer IAO
  Sandra.Frings@....fraunhofer.de

Sponsor Chair:
--------------
  Dirk Schadt, SPOT Consulting
  dirk.schadt@...t.net


Program Committee
-----------------
  Susan Brenner, University of Dayton - School of Law, USA
  Klaus Brunnstein, University of Hamburg, Germany
  Brian Carrier, Basis Technology, USA
  Jack Cole, US Army Research Laboratory, USA
  Andrew Cormack, UKERNA, UK
  Ralf Doerrie, Telekom-CERT, Germany
  Sandra Frings, Fraunhofer IAO, Germany
  Oliver Goebel, RUS-CERT, Germany
  Dieter Gollmann, TU Hamburg-Harburg, Germany
  Detlef Guenther, CERT-VW, Volkswagen AG, Germany
  Bernhard Haemmerli, ACRIS GmbH, Switzerland
  Hardo G. Hase, IT-Security Expert, Germany
  Alexander Herrigel, Schweizerische Nationalbank, Switzerland
  Thorsten Lieb, Avocado Rechtsanwälte, Germany
  Klaus Peter Kossakowski, DFN-CERT, Germany
  Jim Lyle, NIST CFTT, USA
  Robert A. Martin, MITRE Corporation, USA
  Neil Mitchison, European Commission
  Jens Nedon, Consecur, Germany
  Bernhard Otupal, Interpol
  Jason Rafail, CERT/CC, USA
  Dirk Schadt, SPOT Consulting, Germany
  Carlos Solari, Bell Laboratories, USA
  Marco Thorbruegge, ENISA, EU
  Stephen Wolthusen, Gjovik University College, Norway
  Steven Wood, Alste-Tech GmbH, Germany

Organizing Committee:
---------------------
  Sandra Frings, Fraunhofer IAO
  Oliver Goebel, RUS-CERT, Universitaet Stuttgart
  Detlef Guenther, CERT-VW, Volkswagen AG
  Hardo G. Hase, IT-Consulting Hardo G. Hase
  Jens Nedon, Consecur GmbH
  Dirk Schadt, SPOT Consulting


IMF 2007 is presented by
 
 Gesellschaft für Informatik e.V. (GI)
 Fachgruppe SIDAR
 http://www.gi-ev.de/fachbereiche/sicherheit/fg/sidar/ 

In Cooperation with

  Universität Stuttgart - Stabsstelle DV-Sicherheit (RUS-CERT)
  www.cert.uni-stuttgart.de

  Fraunhofer-Institut für Arbeitswirtschaft und Organisation (IAO)
  www.iao.fraunhofer.de

----------------------------------------------------------------------------

Regards,
	Ollie
-- 
Oliver Goebel                        mailto:Goebel@...T.Uni-Stuttgart.DE
Stabsstelle DV-Sicherheit (RUS-CERT) Tel:+49 711 685 1 CERT
Universitaet Stuttgart               Tel:+49 711 685 8-3678 / Fax:-3688
Breitscheidstr. 2, 70174 Stuttgart   http://CERT.Uni-Stuttgart.DE/


Download attachment "signature.asc" of type "application/pgp-signature" (482 bytes)

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ