May 10th to 12th, 2011
Stuttgart, Germany
http://www.imf-conference.org/
mailto:2011@imf-conference.org
Conference of SIG SIDAR
of the German Informatics Society (GI).
Time | Presentation / Description | Speaker |
---|---|---|
10:00 | Registration | |
11:00 | Welcome | Detlef Günther (General Chair) Volkswagen AG, Germany |
11:15 |
Key Note: International challenges regarding Forensic IT Investigations and Forensic Readiness (PDF)
|
Mark Hoekstra Grant Thornton Forensic & Investigation Services B.V., Netherlands |
12:15 | Integrated Security Incident Management - Concepts and real-world Experiences
(PDF)
| Stefan Metzger, Wolfgang Hommel and Helmut Reiser | Leibniz-Rechenzentrum, Germany
13:00 | Lunch | |
14:00 |
Security Aspects of Piecewise Hashing in Computer Forensics
(PDF)
| Harald Baier and Frank Breitinger Hochschule Darmstadt, Germany |
14:45 |
Computational Documentation of IT Incidents as Support for Forensic Operations
(PDF)
| Sebastian Kurowski and Sandra Frings Fraunhofer IAO, Germany |
15:30 | Coffee Break | |
16:00 |
Forensics Investigations of Multimedia Data: A Review of the State-of-the-art
(PDF)
| Rainer Poisel and Simon Tjoa Fachhochschule St.Poelten, Austria |
16:45 | Design and Implementation of a Documentation Tool for Interactive Commandline Sessions
(PDF)
(Short Paper) |
Andreas Dewald, Felix C. Freiling and Tim Weber
Universitaet Mannheim, Germany |
17:05 | End of Day Wrap-Up | Moderated by Holger Morgenstern (Program Chair)
gutachten.info, Germany |
17:15 | End of Day One | |
19:00 | Social Event: Dinner at Goldfish (Schlossstr. 57, 70176 Stuttgart, Germany, www.goldfish-stuttgart.de) including Whisky Tasting moderated by Bernhard Weber (www.weberswhiskywelt.de). |
Time | Presentation / Description | Speaker |
---|---|---|
09:00 | Registration | |
09:25 | Greetings | |
09:30 |
Introduction of Sponsors: Cellebrite GmbH mh-Service GmbH |
|
10:15 |
Usability of Forensics Tools: A User Study
(PDF)
| Hanan Hibshi, Timothy Vidas and Lorrie Cranor Carnegie Mellon University, USA |
11:00 | Coffee Break | |
11:30 |
A Common Scheme for Evaluation of Forensic Software
(PDF)
| Mario Hildebrandt, Stefan Kiltz and Jana Dittmann Universitaet Magdeburg, Germany |
12:15 |
Towards Forensic Data Flow Analysis of Business Process Logs
(PDF)
| Rafael Accorsi, Claus Wonnemann and Thomas Stocker Albert-Ludwigs-Universitaet Freiburg, Germany |
13:00 | Lunch | |
14:00 |
Key Note: DIGITAL FORENSICS – Best Practice for the Future |
Bernhard Otupal, Security Solution Specialist EMEA
Dell SA, France |
14:45 |
Towards a Rapid-alert System for Security Incidents
(PDF)
| Stefan Rass Alpen-Adria-Universitaet Klagenfurt, Austria |
15:30 | Coffee Break | |
16:00 |
Automated Audit of Compliance and Security Controls
(PDF)
| Gerhard Koschorreck UPW ProjectServices GmbH, Germany |
16:45 |
Use of Machine Learning Classification Techniques to detect Atypical Behaviour in Medical Applications
(PDF)
(Short Paper) |
Terrence Ziemniak Resurrection Health Care, USA |
17:05 | End of Day Wrap-Up | Moderated by Oliver Göbel
RUS-CERT, Universitaet Stuttgart, Germany |
17:15 | End of Day Two |
Time | Presentation / Description | Organisation |
---|---|---|
09:00-12:00 | Workshop:
Mobile Device Forensics | Comprehensive – Concise - Forensically Sound
|
Peter Warnke, Sales Director Cellebrite GmbH, Germany |
12:00 | Lunch | |
13:00-16:00 | Workshop:
Computer Forensics: Preservation of Evidence
|
Dimitri Kusnezov, CTO mh Service GmbH, Germany Oliver Eichner, CTO DataLab GmbH, Germany |
16:00 | End of Day Three - Workshop Day |
The conference would qualify for CPE hours for ISACA
certifications (CISA, CISM, CRISC and CGEIT) and (ISC)² certification
CISSP. Participants can earn up to 18 CPE for continuing their
professional education.