CFET 2008 Conference Schedule



Similar documents
RUSI Cyber Security Conference 2011 Cyber Challenges for National Security

Australian Academy of Forensic Sciences EFFICIENT FORENSIC SCIENCE: ARE WE USING OUR EXPERTS EFFECTIVELY?

Professional Managers Annual Conference Adding value to business schools Programme

Forensics Europe Expo 2015 Conference Programme

Day 3-24 April Day 2-23 April 2013

GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS

Cybercrime Law (and the Problems of Police Enforcement)

Conference on. Modernization of the Criminal Justice System in China. Center for Chinese Legal Studies. Opening Ceremony

Public-Private Partnerships against cybercrime. Jean-Christophe Le Toquin Director Internet Safety Microsoft EMEA

Scientific Programme Wednesday, 19 March 2008 Last Updated Tuesday, 22 April 2008

ICSS2015: International Cyber Security Strategy Congress: Cyber Security and Forensic Readiness

CORPORATE GOVERNANCE

Analyzing Huge Data Sets in Forensic Investigations

Executive Cyber Security Training. One Day Training Course

ICT Barriers, High Tech Crime, and Police

Tackling fraud in the charity sector Making your money count

Forensic Pathology and the Investigation of Suspicious Deaths: Recent History, Current Conditions and Future Prospects

Workshop on Big Data for International Scientific Programmes: Challenges and Opportunities

REGISTER AT IIF.COM/TRAINING

Asia Pacific the Future of Cloud Computing

Certified Cyber Security Analyst VS-1160

Ethical Hacking & Cyber Security Workshop

Short courses presented by the NWU Programme in Forensic Accountancy

Alabama Community College Leadership Academy July 15 - July 18, Bryant Conference Center, Birmingham Room

Delegate Invitation & Information Pack 26 th 28 th July 2011, Speke Resort & Conference Centre Munyonyo, Kampala, Uganda

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016

Programme. The Hague Academy of International Law

JOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile

August Emory University, Atlanta, GA Double major: Sociology and Political Science December 2005

Professional Certificate in Ethics and Anti-Corruption Compliance

TRANSATLANTIC CYBER SECURITY SUMMIT

FORENSIC MEDICINE & DEATH INVESTIGATION

40 Years of NZ-China Relations

This innovative project (FIIP) will provide invaluable tools for investigators to prioritise targets in the area of child sexual exploitation.

IDENTITY THEFT AND DATA BREACH CONFERENCE 2016

Greater China Forum AGENDA. 09:00-09:10 Welcome speech by Alexander Justham, CEO of London Stock Exchange plc

The World Alliance for Arts Education Global Summit 2014: Transform: From Inception to Innovation in Arts Education November 2014

Computer Security (EDA263 / DIT 641)

3 rd International Workshop on Innovation and Performance Management

Digital War in e-business

Geoff Coyle: legacy and prospects for system dynamics

SYMPOSIUM PROGRAM DAY ONE

The FBI and the Internet

Certified Cyber Security Analyst VS-1160

DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES

Cybercrime in Canadian Criminal Law

Computer Security (EDA263 / DIT 641)

Inaugural Ms Leneen Forde Public Address

Cyber-Physical System Security of the Power Grid

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley

STUDENT CONFERENCE AND EXHIBITION. From Student to Registered Career Development Professional

PREPARE YOUR INCIDENT RESPONSE TEAM

Workshop Designed & Powered by TCIL IT, Chandigarh

Cyber Security in the University of Oxford: Collaborating without Conforming?

How To Learn About The Law Of Alcohol

29th General Assembly Montréal, Canada 9-12 October Draft Agenda. Meeting venue: WEDNESDAY, 9 OCTOBER 2013

UNIVERSITY OF HONG KONG

Short courses presented by the NWU Programme in Forensic Accountancy

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

Workshop The 2nd Sino-German Symposium on the Development of the Chinese Company Law

Home Office Science Advisory Council 11 November Minute 1. Welcome, Introductions, and apologies 1.1 The Chair welcomed attendees to the Home

Ministry of Defence Bosnia and Herzegovina

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

AORTA MASTERCLASS 2015 Preliminary Programme

An enabling volunteering infrastructure in Europe: Situation Trends Outlook

WIPO-USA Summer School on Designs and the Interface with Other Intellectual Property Rights (IPRs) (Patents, Trademarks, and Copyright)

20th Council of Europe Conference of Directors of Prison and Probation Services June 2015 Bucharest, Romania

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

THE USE OF SIMULATION IN DIGITAL FORENSICS TEACHING

Healthcare Management

The International Human Resources Management Academy (IHRMA) International HRM and the Global Corporation Programme March September 2011

Chairman. Deputy Chairs

DATA PROTECTION OFFICER PROGRAMME

AN BORD ATHBHREITHNITHE MEABHAIR-SHLÁINTE (AN DLÍ COIRIÚIL)

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September Co-Chair s Summary Report

Cyber Security in the Financial Industry

The UK s European university. MSc FORENSIC SCIENCE. Canterbury. Graduate study

Transcription:

CFET 2008 Conference Schedule Day 1 1 st September 2008 10.00-10.30 Registration & Coffee foyer Powell Building 10.30-10.45 Welcome to the Conference Professor Michael Wright, Vice Chancellor Denis Edgar-Nevill, Chair CFET 2008 10.45-11.30 Invited Keynote Presentation Professor Nigel Jones MBE Adjunct Professor University College Dublin, Republic of Ireland Director, Technology Risk Limited, UK 11.30 13.00 Parallel Presentation Sessions Cybercrime Awareness is Protection Margaret Ross Southampton Solent University, UK Extending the Multidisciplinary Learning Experience in Digital Forensics Using Mock Trials Gary C. Kessler Champlain College, USA An Investigation into the Social, Legal and Ethical Issues Associated with Biometrics in the UK Lynne Norris-Jones University of Wales Institute, UK

13.00-14.00 Lunch An Investigation into the Vulnerabilities of Computer Forensic Processes as shown through an Anti Forensics Tool Paula Thomas & Christy Petersen University of Glamorgan, UK New methodology in facial composite construction and the associated implications for facial ID training Dr. Stuart Gibson Dr. Christopher Solomon and Mr. Clifford Clark University of Kent and New Zealand Police, UK & New Zealand An analysis of the accuracy and usefulness of Vinetto, Pasco and Mork.pl Dave Childs & Paul Stephens Digital Evidence Recovery & Internet Crime Lab, Trading Standards & Regulatory Services and 14.00 14.45 Invited Keynote Presentation Stephen Mason Visiting Research Fellow at the British Institute of International and Comparative Law 14.45-15.30 Coffee & Exhibitors - Powel Foyer and Pg05 15.30 17.00 Parallel Presentation Sessions A Swedish IT Forensics Course - Expert Opinions Rein Oja & Alan Davidson Stockholm University and the Royal Institute of Technology, Sweden Development of a Masters module in Computer Forensics and Cybercrime Richard E Overill King s College London, UK Virtual Reality Police Training: How much visual information is too much? Iwan Kartiko and Manolya Kavakli Macquarie University, Australia Cyber Fraud in Ghana locally known in the Hausa language as SAKAWA An ethnographic Study of a Popular Slum community in Ghana- Nima Koranteng, Kweku Oduro University of Ghana, Ghana Developing a Digital Forensic Framework for a Third World Country Kasun De Zoysa, Keerthi Goonathillake, Ravith Botejue University of Colombo, Sri Lanka What can a computer forensics examiner learn from an ethical hacker? Paul Stephens & Gerald Stock

Powell Pf07 Lecture Theatre Building the Infrastructure to Support HE Computer Forensics Denis Edgar-Nevill The importance of funding and training to manage and investigate computer crime Hamid Jahankhani, Amie Taal, Ian Mitchell Middlesex University, UK Cybercrime Legislation in China Man Qi, Yongquan Wang, Rongsheng Xu Canterbury Christ Church University, East China University of Political Science and Law, Chinese Academy of Sciences, China 18.30 19.00 Drinks Reception Blue Room and the Senior Common Room of the North Holmes Rd Campus of Canterbury Christ Church University. 19.00-21.00 Conference Dinner Blue Room and the Senior Common Room of the North Holmes Rd Campus of Canterbury Christ Church University.

Day 2 2 nd September 2008 09.00 09.45 Invited Keynote Presentation Computing Environment : It s more than Binary Code It s About Criminals!! Edward P. Gibson Chief Security Advisor Microsoft Ltd, UK 09.45 10.45 Parallel Presentation Sessions Mobile Phone Forensic Investigation Technical and Legal Challenges Abhaya Induruwa XFT A Forensic Toolkit for the Original Xbox Game Console David Collins Sam Houston State University, USA Digital Evidence Analysis in China Zhijun Liu, Ning Wang, Yonghao Mai, Huanguo Zhang Hubei University of Police; Wuhan University Computer School; Key Laboratory of Computer Forensics, China Is Property Theft in Crime Investigation? Using OSS in Cybercrime Education David Bennett and Paul Stephens Powell Pf07 Lecture Theatre Understanding digital certificates George Weir University of Strathclyde, UK The Social Effects of Spam Reza Mousoli, Dr Man Qi, Denis Edgar-Nevill 10.45 11.15 Coffee & Exhibitors - Powel Foyer and Powell Pg05

11.15 12.45 Parallel Presentation Sessions 12.45-14.00 Lunch Virtual environments have a prominent role in securing your organization: Case Study on a DDoS attack Righard Zwienenberg Norman Data Defence Systems Ltd, UK Egregious use of Tor Servers? Data retention, anonymity, and privacy on-line F.W.J. van Geelkerken Tilburg University, The Netherlands Comparison of Drupal and Joomla security functions for designing secure Content Management System Reza Mousoli Case-oriented evidence mining in forensic computing: A case study Jun Zhang & Lina Wang Wuhan University, China College of Police, Hubei, China A Case-Based Reasoning Model for Digital Intrusion Forensics Zeming Yang, Rongsheng Xu, Man Qi Chinese Academy of Sciences, Canterbury Christ Church University China & UK 14.00-14.45 Invited Keynote Presentation Digital Forensics Research in China Professor Rongsheng Xu Network Security Group Institute of High Energy Physics Chinese Academy of Sciences, China 14.45-15.30 Plenary Panel Session - 15.30 16.00 Coffee & Exhibitors 1600 Conference Close