Difference between pages "Upcoming events" and "User:Johny Ryder"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(Conferences)
 
m
 
Line 1: Line 1:
<b>PLEASE READ BEFORE YOU EDIT THE LISTS BELOW</b><br>
+
Data expert, tech lover, privacy protector. I started using computers and the internet early 1994. And I can not imagine how I would ever be able to communicate with my friends and family without these products.
Events should be posted in the correct section, and in date order.  An event should NEVER be listed in more than one section (i.e. Ongoing/Continuous events should not be listed in Scheduled Training).  When events begin the same day, events of a longer length should be listed first. New postings of events with the same date(s) as other events should be added after events already in the list. If a provider offers the same event at several locations simultaneously, the listing should have a single (ONE) entry in the list with the date(s) and ALL locations for the event. Please use three-letter month abbreviations (i.e. Sep, NOT Sept. or September), use two digit dates (i.e. Jan 01 NOT Jan 1), and use date ranges rather than listing every date during an event(i.e. Jan 02-05, NOT Jan 02, 03, 04, 05).<br>
+
<i>Some events may be <u>limited</u> to <b>Law Enforcement Only</b> or to a specific audience.  Such restrictions should be noted when known.</i>
+
  
This is a BY DATE listing of upcoming events relevant to [[digital forensics]]. It is not an all inclusive list, but includes most well-known activities. Some events may duplicate events on the generic [[conferences]] page, but entries in this list have specific dates and locations for the upcoming event.
+
It is great to be able to share through the internet. But (semi) public sharing has its downsides too. I like to read about and work on keeping the protection of private information something individuals can control themselves.
  
This listing is divided into four sections (described as follows):<br>
+
But sometimes it is good that there are forensic tools available. Just as long these tools are used properly. I hope people are aware of the possibilities to protect their privacy, and protectors of the public domain are aware of the forensic tools available, and use them properly.
<ol><li><b><u>Calls For Papers</u></b> - Calls for papers for either Journals or for Conferences, relevant to Digital Forensics (Name, Closing Date, URL)</li><br>
+
<li><b><u>Conferences</u></b> - Conferences relevant for Digital Forensics (Name, Date, Location, URL)</li><br>
+
<li><b><u>On-Going / Continuous Training</u></b> - Training opportunities that are either always available online/distance learning format (start anytime) or that are offered the same time every month (Name, date-if applicable, URL)</li><br>
+
<li><b><u>[[Scheduled Training Courses]]</u></b> - Training Classes/Courses that are scheduled for specific dates/locations.  This would include online (or distance learning format) courses which begin on specific dates, instead of the "start anytime" courses listed in the previous section. (Provider, URL) (''note: this has been moved to its own page.'')<br></li></ol>
+
  
The Conference and Training List is provided by the American Academy of Forensic Sciences (AAFS) Digital and Multimedia Sciences Section Listserv. 
+
I hereby license all my contributions to this wiki under the Creative Commons Attribution-ShareAlike 2.5 license.
<i> (Subscribe by sending an email to listserv@lists.mitre.org with message body containing SUBSCRIBE AAFS-DIGITAL-MULTIMEDIA-LIST)</i>
+
Requests for additions, deletions or corrections to this list may be sent by email to David Baker <i>(bakerd AT mitre.org)</i>.
+
 
+
== Calls For Papers ==
+
Please help us keep this up-to-date with deadlines for upcoming conferences that would be appropriate for forensic research.
+
 
+
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
|- style="background:#bfbfbf; font-weight: bold"
+
! width="30%|Title
+
! width="15%"|Due Date
+
! width="15%"|Notification Date
+
! width="40%"|Website
+
|-
+
|7th International Symposium on Risk Management and Cyber-Informatics
+
|Oct 14, 2009
+
|Nov 30, 2009
+
|http://www.iiis2010.org/wmsci/Contents/CallForPapers-RMCI-2010.pdf
+
|-
+
|Third International Workshop on Digital Forensics (WSDF 2010)
+
|Oct 15, 2009
+
|Nov 01, 2009
+
|http://www.ares-conference.eu/conf/index.php/workshops/wsdf
+
|-
+
|IEEE Symposium on Security and Privacy 2010
+
|Nov 18, 2009
+
|Feb 01, 2010
+
|http://oakland31.cs.virginia.edu/cfp.html
+
|-
+
|ShmooCon 2010
+
|Nov 20, 2009
+
|Dec 15, 2010
+
|http://www.shmoocon.org/cfp.html
+
|-
+
|AusCERT Conference 2010
+
|Dec 01, 2009
+
|Jan 29, 2010
+
|http://conference.auscert.org.au/conf2010/cfp2010.html
+
|-
+
|2010 IEEE International Conference on Technologies for Homeland Security
+
|Apr 24, 2010
+
|
+
|http://ieee-hst.org/
+
|-
+
|}
+
 
+
== Conferences ==
+
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
|- style="background:#bfbfbf; font-weight: bold"
+
! width="40%"|Title
+
! width="20%"|Date/Location
+
! width="40%"|Website
+
|-
+
|6th International Workshop on Visualization for Cyber Security
+
|Oct 11<br>Atlantic City, NJ
+
|http://vizsec.org/vizsec2009/
+
|-
+
|Evidence in the Information Age
+
|Oct 23-24<br>Duquesne University, Pittsburgh, PA
+
|http://www.forensics.duq.edu/conference/conferencefront.html
+
|-
+
|Techno Forensics & Digital Investigations Conference
+
|Oct 26-28<br>Gaithersburg, MD
+
|http://www.techsec.com/html/TechnoForensics2009.html
+
|-
+
|USENIX Large Installation System Administration Conference (LISA)
+
|Nov 01-06<br>Baltimore, MD
+
|http://www.usenix.org/events/lisa09/
+
|-
+
|Paraben Forensic Innovation Conference
+
|Nov 08-11<br>Park City, UT
+
|http://www.pfic2009.com
+
|-
+
|16th ACM Conference on Computer and Communications Security
+
|Nov 09-13<br>Chicago, IL
+
|http://www.sigsac.org/ccs/CCS2009/index.shtml
+
|-
+
|ACM Cloud Computing Security Workshop
+
|Nov 13<br>Chicago, IL
+
|http://crypto.cs.stonybrook.edu/ccsw09/
+
|-
+
|DeepSec In-Depth Security Conference
+
|Nov 17-20<br>Vienna, Austria
+
|https://deepsec.net/
+
|-
+
|First IEEE Workshop on Information Forensics and Security
+
|Dec 06-09<br>London, England
+
|http://www.wifs09.org/
+
|-
+
|International Organization on Computer Evidence (IOCE) Annual Conference 2009
+
|Dec 09-11<br>Tokyo, Japan
+
|http://www.ioce.org/core.php?ID=21
+
|-
+
|2009 International Workshop on Security in Cloud Computing
+
|Dec 12-14<br>Sichuan, China
+
|http://bingweb.binghamton.edu/~ychen/SCC09.htm
+
|-
+
|2nd Workshop on Information and Data Assurance
+
|Dec 14-16<br>Phoenix, AZ
+
|http://ipccc.org/ipccc2009/main.php?page=6#workshop3
+
|-
+
|DoD Cyber Crime Conference
+
|Jan 22-29<br>St. Louis, MO
+
|http://www.dodcybercrime.com/10CC/
+
|-
+
|ShmooCon VI
+
|Feb 05-07<br>Washington, DC
+
|http://www.shmoocon.org
+
|-
+
|International Conference on Technical and Legal Aspects of the e-Society
+
|Feb 10-15<br>St. Maarten, Netherlands Antilles
+
|http://www.iaria.org/conferences2010/CYBERLAWS10.html
+
|-
+
|Third International Workshop on Digital Forensics
+
|Feb 15-18<br>Krakow, Poland
+
|http://www.ares-conference.eu/conf/index.php/workshops/wsdf
+
|-
+
|American Academy of Forensic Sciences Annual Meeting
+
|Feb. 22-27<br>Seattle, WA
+
|http://www.aafs.org/default.asp?section_id=meetings&page_id=aafs_annual_meeting
+
|-
+
|RSA Conference 2010
+
|Mar 01-05<br>San Francisco, CA
+
|http://www.rsaconference.com/2010/usa/index.htm
+
|-
+
|31st IEEE Symposium on Security and Privacy
+
|May 16-19<br>Oakland, CA
+
|http://oakland31.cs.virginia.edu/
+
|-
+
|AusCERT Asia Pacific Information Security Conference
+
|May 16-21<br>Kenmore Hills, Queensland, Australia
+
|http://conference.auscert.org.au/conf2010/index.html
+
|-
+
|7th International Symposium on Risk Management and Cyber-Informatics
+
|Jun 29-Jul 02<br>Orlando, FL
+
|http://www.2010iiisconferences.org/RMCI
+
|-
+
|VB2010 Fighting malware and spam
+
|Sep 29 - Oct 01<br>Vancouver, BC, Canada
+
|http://www.virusbtn.com/conference/vb2010/
+
|-
+
|2010 IEEE International Conference on Technologies for Homeland Security
+
|Nov 08-10<br>Waltham, MA
+
|http://ieee-hst.org/
+
|-
+
|}
+
 
+
== On-going / Continuous Training ==
+
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
|- style="background:#bfbfbf; font-weight: bold"
+
! width="40%"|Title
+
! width="20%"|Date/Location
+
! width="40%"|Website
+
|-
+
|- style="background:pink;align:left"
+
! DISTANCE LEARNING
+
|-
+
|Basic Computer Examiner Course - Computer Forensic Training Online
+
|Distance Learning Format
+
|http://www.cftco.com
+
|-
+
|Linux Data Forensics Training
+
|Distance Learning Format
+
|http://www.crazytrain.com/training.html
+
|-
+
|SANS On-Demand Training
+
|Distance Learning Format
+
|http://www.sans.org/ondemand/?portal=69456f95660ade45be29c00b0c14aea1
+
|-
+
|Champlain College - CCE Course
+
|Online / Distance Learning Format
+
|http://extra.champlain.edu/cps/wdc/alliances/cce/landing/
+
|-
+
|Las Positas College
+
|Online Computer Forensics Courses
+
|http://www.laspositascollege.edu
+
|-
+
|- style="background:pink;align:left"
+
!RECURRING TRAINING
+
|-
+
|MaresWare Suite Training
+
|First full week every month<br>Atlanta, GA
+
|http://www.maresware.com/maresware/training/maresware.htm
+
|-
+
|Evidence Recovery for Windows Vista&trade;
+
|First full week every month<br>Brunswick, GA
+
|http://www.internetcrimes.net
+
|-
+
|Evidence Recovery for Windows Server&reg; 2003 R2
+
|Second full week every month<br>Brunswick, GA
+
|http://www.internetcrimes.net
+
|-
+
|Evidence Recovery for the Windows XP&trade; operating system
+
|Third full week every month<br>Brunswick, GA
+
|http://www.internetcrimes.net
+
|-
+
|Computer Forensics Training and CCE&trade; Testing for Litigation Support Professionals
+
|Third weekend of every month(Fri-Mon)<br>Dallas, TX
+
|http://www.md5group.com
+
|-
+
|}
+
 
+
==See Also==
+
* [[Scheduled Training Courses]]
+
==References==
+
* [http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm Computer Security Conference Ranking and Statistic]
+
* [http://www.kdnuggets.com/meetings/ Meetings and Conferences in Data Mining and Discovery]
+
* http://www.conferencealerts.com/data.htm Data Mining Conferences World-Wide]
+

Revision as of 04:04, 23 December 2011

Data expert, tech lover, privacy protector. I started using computers and the internet early 1994. And I can not imagine how I would ever be able to communicate with my friends and family without these products.

It is great to be able to share through the internet. But (semi) public sharing has its downsides too. I like to read about and work on keeping the protection of private information something individuals can control themselves.

But sometimes it is good that there are forensic tools available. Just as long these tools are used properly. I hope people are aware of the possibilities to protect their privacy, and protectors of the public domain are aware of the forensic tools available, and use them properly.

I hereby license all my contributions to this wiki under the Creative Commons Attribution-ShareAlike 2.5 license.