Events
4th International Conference on IT Incident Management & IT Forensics (IMF 2008)

Date: 23 September-25 September 2008
Location: Mannheim, Germany
Organizer: SIG SIDAR
Homepage: http://www.imf-conference.org/

The IMF conference will be held for the fourth time now. The concept matured from a pure academic event to an academic track section complemented by practical workshops. In addition IMF has become an important community event.

This time IMF starts to travel. Berufsakademie Mannheim - University of Cooperative Education - is proud to host IMF 2008. We plan to continue hosting IMF at different locations as this is a chance to widen the community and to learn from different perspectives.

The scope of IMF 2008 is broad and includes, but is not limited to the following areas:

IT-Incident Management

Purposes of IT-Incident Management
Trends, Processes and Methods of IT-Incident Management
Formats and Standardization for IT-Incident Management
Tools for the IT-Incident Management
Education and Training, IT-Incident Management Awareness
Determination, Detection and Evaluation of Incidents
Procedures for Handling Incidents
Problems and Challenges when establishing CERTs/ CSIRTs
Sources of Information/ Information Exchange/ Communities
Dealing with Vulnerabilities (Vulnerability Response)
Current Threats
Early Warning Systems
Organizations (National CERT-Associations, FIRST, TF-CSIRT, TERENA / TI, etc.)

IT-Forensics

Trends and Challenges in IT-Forensics
Methods, Processes and Applications for IT-Forensics .(e.g. Networks, Operating Systems, Storage Media, ICT Systems)
Evidence Protection in IT-Environments
Standardization of Evidence Protection Processes
Data Protection and other legal implications for IT-Forensics
Methods in Investigation
Legal Relevance of IT-Forensics Investigations
Tools for IT-Forensics
IT-Forensics Readiness

Other Events
Add Event
Archive



Spotlight

eBook: Cybersecurity for Dummies

Posted on 16 December 2014.  |  APTs have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cybercriminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Thu, Dec 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //