[AISWorld] 7th Annual ADFSL Conference on Digital Forensics, Security and Law

Glenn S. Dardick gdardick at dardick.net
Mon Apr 30 10:37:12 EDT 2012


ANNOUNCEMENT: Conference on Digital Forensics, Security and Law

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: adfslgraphic.jpg

Venue: Richmond, Virginia USA

Dates: 30-31 May 2012

Conference Website:
http://www.digitalforensics-conference.org



Dear colleagues:



The ADFSL 2012 Conference on Digital Forensics, Security and Law will be at the Hyatt House - Richmond West in Richmond, Virginia on 30-31 of May 2012.



The ADFSL Conference on Digital Forensics, Security and Law is a unique and innovative event.  It is managed by the Association of Digital Forensics, Security and Law (ADFSL). The conference focuses on the current and expanding role of digital forensics within investigations and the courts as well as its important role within cyber security - both national as well as corporate. Topics not only include technology and evidence, but also are very much focused on how to prepare students for careers in digital forensics. Conference papers are double blind refereed and provide a forum for high quality research, communication and debate on the subject of digital forensics and directly related fields.



2012 KEYNOTE SPEAKERS



WEDNESDAY KEYNOTE SPEAKER: Mohamed Chawki



Topic:  IT and Regime Change



Mohamed Chawki holds a (Ph.D.) in law from the University of Lyon III in France for a dissertation on French; British and American cybercrime legal systems. He is senior judge at the Council of State, Egypt; former advisor to the Chairman of the Capital Market Authority (CMA) ; the Chairman of the Egyptian Financial Supervisory Authority (EFSA) and the Egyptian Minister of Military Production. Dr. Chawki is also the Founder-Chairman of the International Association of Cybercrime Prevention (AILCC) in Paris. An association of international IT experts and legal scholars specializing in cyber law, privacy and security and the founder and co - director of the African Center for Cyberlaw, in Kampala (ACCP), founded in collaboration with the United Nations (UN).



Dr. Chawki has extensive knowledge of High Tec criminality, cybercrime, cyber terrorism and IT, including countermeasures and prevention. As a part of his research, he carried out an internship at Interpol's Financial and High Tec Crime Unit. Doctor Chawki is a Fellow of the Royal Society of Arts in the United Kingdom (FRSA), a member of the International Scientific and Professional Advisory Council of the United Nations Crime Prevention and Criminal Justice Program (ISPAC), a member of the European Society of Criminal Law, and a board member of Computer Crime Research Center (CCRC) in Ukraine. He teaches law at private and public universities in Egypt and holds a number of visiting posts abroad. His research interest covers national security, cybercrime and data protection.



He has delivered over 60 conference papers on cybercrime and information security and organized many national, regional and international conferences on the same topics



THURSDAY KEYNOTE SPEAKER: Nigel Wilson



Topic: Digital Experts - Why is Effective Communication So Important to Both the Admissibility and Persuasiveness of Expert Opinion?



Nigel Wilson is a Senior Lecturer at the University of Adelaide Law School where he is the course co-ordinator of the undergraduate Evidence subject and the postgraduate Technology, Law and Society and Insurance Law subjects. Nigel has Law (First Class Honours) and Economics degrees from the University of Adelaide and a Masters degree from the University of Oxford and has practised as Barrister for nearly twenty years at Bar Chambers, Adelaide. Nigel was the Chair of the International Workshop on e-Forensics Law in 2009 and he is Special Counsel (Legal and Regulatory) to the Convergent Communications Research Group at the University of Adelaide which recently co-authored a report for the Australian Government on the privacy, security and identity management implications of cloud computing.



Participants



The primary audience will include individuals who are interested in developing curriculum and teaching methods as well as conducting research related to the areas of digital forensics, security, and law. This conference will be of value to both academic and practitioner audiences.



Speakers and Presentations

The Schedule for the speakers and presentations for the 2012 ADFSL Conference on Digital Forensics, Security and Law is tentatively set as follows:

Wednesday, May 30

07:30am-8:30am Registration & Continental Breakfast

8:30am-8:50am Introduction and Welcoming remarks

*       Opening and Introduction: Glenn S. Dardick, Conference Chair, Director of the Longwood Center for Cyber Security

*       Welcoming Remarks: Paul Barrett, Dean of the College of Business and Economics at Longwood University

8:50am-10:10am session I

*       Presentation: The Consortium of Digital Forensic Specialists (CDFS)
Christopher Kelly, USA

*       Update on the State of the Science of Digital Evidence Examination
Fred Cohen, USA

10:10am-10:30pm Break

10:30am-12:30pm session II

*       A Proposal for Incorporating Programming Blunder as Important Evidence in
Abstraction-Filtration-Comparison Test
P. Vinod Bhattathiripad, India

*       The Xbox 360 and Steganography: How Criminals and Terrorists Could Be "Going Dark"
Ashley L. Podhradsky, USA

*       Double-Compressed JPEG Detection in a Steganalysis System
Jennifer Davidson, USA

12:30noon-1:15pm Lunch

1:15pm-1:45pm Keynote

*       Keynote: Mohamed Chawki, Senior Judge at the Council of State, Egypt and Founder-Chairman of the International Association of Cybercrime Prevention (AILCC) in Paris - "IT and Regime Change"

1:45pm-3:00pm session III

*       Toward Alignment Between Communities of Proactive and Knowledge-Based Decision Support
Jason Nichols, USA

*       A Fuzzy Hashing Approach based on Random Sequences and Hamming Distance
Frank Breitinger, Germany

3:00pm-3:20pm Break

3:20pm-5:20pm session IV

*       NIST Cloud Computing Reference Model and its Forensic Implications
Keyun Ruan, Ireland

*       Cloud Forensics Investigation: Tracing Infringing Sharing of Copyrighted Content in the Cloud
Yi-Jun He, China

*       iPad2 logical acquisition: Automated or Manual Examination?
Somaya Ali AlWejdani, Sumaya AbdulAziz AlHosani and Farah AbdulRahman AlZarooni,UAE

Thursday, May 31

07:30am-8:30am Registration & Continental Breakfast

8:30am-10:15am session I

*       Presentation: The Analysis of the 2011 Russian Cybercrime Scene
Paul Poroshin, US Branch Vice-President, Group-IB, Russia

*       Presentation: Nano Memory Technology Forensics
Gareth Davies, UK

10:15am-10:30pm Break

10:30am-12:30pm session II

*       Multi-Parameter Sensitivity Analysis of a Bayesian Network From a Digital Forensic Investigation
Ping Zhang, China

*       The Study of SSDT Hook through Comparative Analysis Between Live Response and Memory Image
Muteb Abdullah Alzaidi, Canada

*       Facilitating Forensics in the Mobile Millennium Through Proactive Enterprise Security
Andrew Scholnick, USA

12:30noon-1:15pm Lunch

1:15pm-1:45pm Keynote

*       Keynote: Nigel Wilson, Senior Lecturer at the University of Adelaide Law School in Australia - "Digital Experts - Why is Effective Communication So Important to Both the Admissibility and Persuasiveness of Expert Opinion?"

1:45pm-3:00pm session III

*       A Case Study of the Challenges of Cyber Forensics Analysis of Digital Evidence in a Child Pornography Trial
Richard Boddington, Australia

*       After Five Years of E-Discovery Missteps: Sanctions or Safe Harbor?
Milton Luoma and Vicki Luoma, USA

3:00pm-3:20pm Break

3:20pm-5:20pm session IV

*       Digital Evidence Education in Schools of Law
Aaron Alva, USA

*       Pathway into a Security Professional: A New Cyber Security and Forensic Computing Curriculum
Elena Sitnikova, Australia

*       Network Security Tips for Effective Incident Response
Joshua Lewis, USA

5:20pm Conference Closes



Submissions



All submissions are double blind peer reviewed.



Best Papers



Selected papers from the conference will be considered for inclusion in the following journal:

Journal of Digital Forensics, Security and Law

http://www.jdfsl.org



ADDITIONAL INFORMATION FOR THE CONFERENCE CAN BE FOUND AT:

http://www.digitalforensics-conference.org



REGISTRATION INFORMATION IS POSTED AT:

http://www.digitalforensics-conference.org/registration.htm



Association for Digital Forensics, Security and Law

Website: http://www.adfsl.org



Journal of Digital Forensics, Security and Law

Website: http://www.jdfsl.org











-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120430/d95468f6/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image001.jpg
Type: image/jpeg
Size: 2741 bytes
Desc: image001.jpg
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120430/d95468f6/attachment.jpg>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image002.gif
Type: image/gif
Size: 202 bytes
Desc: image002.gif
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120430/d95468f6/attachment.gif>


More information about the AISWorld mailing list