IMF 2014

8th International Conference on
IT Security Incident Management & IT Forensics

May 12th - 14th, 2014
Münster, Germany

http://www.imf-conference.org/
mailto:2014@imf-conference.org

Conference of SIG SIDAR
of the German Informatics Society (GI).

About IMF Conference

IT security is an integral aspect in operating IT systems today. Yet, as even high-end precautionary measures cannot prevent every attack or security mishap, forensic capabilities in investigating such incidents in both technical and legal aspects are paramount. Capable incident response and forensic procedures have thus gained essential relevance in IT infrastructure operations and in law-enforcement, and there is ample need for research and standardization in this area.

Since 2003, the IMF conference has established itself as one of the premier European venues for presenting research on IT security incident response and management and IT forensics. The conference provides a platform for experts from throughout the world to present and discuss recent technical and methodical advances in the field. It shall enable collaboration and exchange of ideas between industry (both as users and solution providers), academia, law-enforcement and other government bodies.

Conference Goals

IMF's intent is to gather experts from throughout the world in order to present and discuss recent technical and methodical advances in the fields of IT security incident response and management and IT forensics. The conference provides a platform for collaboration and exchange of ideas between industry, academia, law-enforcement and other government bodies.

Conference Topics

The scope of IMF 2014 is broad and includes, but is not limited to the following areas:

IT Security Incident Management

  • Incident Management and Response Procedures and Methods
  • Incident Management and Response Formats and Standardization
  • Tools Supporting Incident Management and Response
  • Incident Analysis
  • CERTs/CSIRTs
  • Information Sources, Information Exchange, Communities
  • Dealing with Vulnerabilities (Vulnerability Response)
  • Monitoring and Early Warning
  • Incident Response in Non-Standard Environments (e.g. Embedded Systems)
  • Education and Training
  • Organizations
  • Legal and Enterprise Aspects (Jurisdiction, Applicable Laws and Regulations)

IT Forensics

  • Trends and Challenges in IT Forensics
  • Application of Forensic Techniques in New Areas
  • Tools and Technology in Procedures for IT Forensics
  • Methods for the Gathering, Handling, Processing and Analysis of Digital Evidence
  • Evidence Protection in IT Environments
  • IT Forensics in Non-Standard Environments (e.g. Embedded Systems)
  • Source-Determination and Manipulation Detection (e.g. Multimedia Forensics)
  • Standardization in IT Forensics
  • Education and Training
  • Organizations
  • Legal and Enterprise Aspects (Jurisdiction, Applicable Laws and Regulations)

The conference would qualify for CPE hours for ISACA certifications (CISA, CISM and CGEIT) and (ISC)² certification CISSP. Participants can earn up to 18 CPE for continuing their professional education.

We are looking forward to see you, again.

Sincerely yours,
IMF Steering Committee

Sandra Frings, Fraunhofer IAO
Oliver Göbel, RUS-CERT, Universität Stuttgart
Detlef Günther, Corporate Internal Audit, Volkswagen AG
Holger Morgenstern, EDV-Sachverständiger / IT-expert witness
Jens Nedon, IABG
Dirk Schadt, SPOT Consulting