We've been asked if there's a way to fund the project (hosting, etc), here are our wallets:
BTC: 14Rf7NRB3kearfffJPyDRuwQMDYZDcHUgJ
ETH: 0x56FB31E17881B37CB91aF41e6e7DFc855f64e284

11th International Conference on IT Security Incident Management & IT Forensics


City Hamburg
Province N/A
Country DE
Twitter DFNCERT
Website http://www.imf-conference.org/
CFP Deadline Jan. 30, 2018, 11:55 p.m.

Details

IMF 2018 CALL FOR PAPERS
========================

11th International Conference on
IT Security Incident Management & IT Forensics
May 7th - 9th, 2018
Hamburg, Germany

http://www.imf-conference.org/

Since 2003, IMF has established itself as one of the premier venues for
presenting research on IT security incident response and management and
IT forensics. While the first IMF conference was organized to establish
a research forum for German speaking researchers and practitioners from
the field, it soon became an international conference attracting many
experts across Europe. 2018 being the 11th Conference, it is also an
important mile stone in bringing the two worlds of IT security incident
response and management and forensics together.

IMF provides an informal collaborative environment each year that bring
together leading researchers, practitioners, industry, tool developers,
academics, law enforcement, and other government bodies from around the
globe to tackle current and emerging challenges in their fields.

Accepted papers will be published by Conference Publishing Services and
submitted to the IEEE Xplore Digital Library. Each participant of the
conference will receive a printed copy.

Possibilities to contribute:

In recent years, IMF conferences have added practitioner presentations
and hands-on tutorials/workshops taught by leading experts in the fields.
Presentations are opportunities for industry researchers and
practitioners who do not have the time to write a paper, but who have
information and experiences that would be of interest to attendees.

Presentation proposals undergo a reviewing process to filter out sales
pitches and ensure the topic is relevant to our audience.

We invite original contributions as research papers, non-research
practitioner presentations, tutorials/workshops, panels, demos, and
posters on the following topics in digital forensics and IT security
incident response and management:

IT Security Incident Management
-------------------------------
* Incident management standardization, metrics and life cycle
* Incident management formats and protocols
* Incident response and/or Vulnerability response workflows, procedures
and tools
* Incident analysis including live analysis
* Research in incident management and related processes
* Development of tools supporting incident management processes
* Exchange of cyber threat intelligence
* Sharing of data/information about threats, attacks, incidents, etc.
* Setup of cyber defense entities including but not limited to: CSIRTs,
PSIRTs, ISACs, SOCs and any other organization specialising in (some)
IT security incident management processes
* Maturity of such cyber defense entities
* Warning of large scale communities about upcoming threats or detected
vulnerabilities
* Ensuring situational awareness and early warning
* Mandatory vs. discretionary attack / incident / vulnerability
reporting
* Non-traditional incident management scenarios and approaches
(e.g. vehicles, control systems, and SCADA)

Digital Forensics
-----------------
* "Big data" approaches to forensics, including data collection, data
mining, and large scale visualization
* Research and development of tools supporting digital forensics
* Digital forensic laboratories and other organizations specialising in
digital forensic science
* Addressing forensic challenges of systems-on-a-chip
* Anti-forensics and anti-anti-forensics
* Bridging the gap between analog and digital
traces/evidence/investigators
* Case studies and trend reports
* Data hiding and discovery
* Data recovery and reconstruction
* Database forensics
* Digital evidence and the law
* Digital evidence storage and preservation
* Event reconstruction methods and tools
* Impact of digital forensics on forensic science
* Interpersonal communications and social network analysis
* Malware and targeted attacks: analysis, attribution
* Memory analysis and snapshot acquisition
* Mobile and embedded device forensics
* Multimedia forensic analysis
* Network and distributed system forensics
* Non-traditional forensic scenarios and approaches (e.g. vehicles,
control systems, and SCADA)
* Storage forensics, including file system and Flash
* Tool testing and development
* Triage, prioritization, automation: efficiently processing large
amounts of data in digital forensics
* Typology of digital traces
* Virtualized environment forensics, with specific attention to the
cloud and virtual machine introspection