Difference between pages "Microsoft PocketPC" and "Upcoming events"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(Windows Mobile 5.0)
 
(Calls For Papers)
 
Line 1: Line 1:
__TOC__
+
<b>PLEASE READ BEFORE YOU EDIT THE LISTS BELOW</b><br>
 +
Events should be posted in the correct section, and in date order.  An event should NEVER be listed in more than one section (i.e. Ongoing/Continuous events should not be listed in Scheduled Training).  When events begin the same day, events of a longer length should be listed first.  New postings of events with the same date(s) as other events should be added after events already in the list. If a provider offers the same event at several locations simultaneously, the listing should have a single (ONE) entry in the list with the date(s) and ALL locations for the event. Please use three-letter month abbreviations (i.e. Sep, NOT Sept. or September), use two digit dates (i.e. Jan 01 NOT Jan 1), and use date ranges rather than listing every date during an event(i.e. Jan 02-05, NOT Jan 02, 03, 04, 05).<br>
 +
<i>Some events may be <u>limited</u> to <b>Law Enforcement Only</b> or to a specific audience.  Such restrictions should be noted when known.</i>
  
=Overview=
+
This is a BY DATE listing of upcoming events relevant to [[digital forensics]].  It is not an all inclusive list, but includes most well-known activities.  Some events may duplicate events on the generic [[conferences]] page, but entries in this list have specific dates and locations for the upcoming event.
A Pocket PC is commonly referred to as a handheld computer that runs a version of Microsoft’s proprietary mobile operating systems.
+
  
[[Image:Pocketpc.jpg|thumb|Acer Pocket PC]]
+
This listing is divided into four sections (described as follows):<br>
 +
<ol><li><b><u>Calls For Papers</u></b> - Calls for papers for either Journals or for Conferences, relevant to Digital Forensics (Name, Closing Date, URL)</li><br>
 +
<li><b><u>Conferences</u></b> - Conferences relevant for Digital Forensics (Name, Date, Location, URL)</li><br>
 +
<li><b><u>On-Going / Continuous Training</u></b> - Training opportunities that are either always available online/distance learning format (start anytime) or that are offered the same time every month (Name, date-if applicable, URL)</li><br>
 +
<li><b><u>[[Scheduled Training Courses]]</u></b> - Training Classes/Courses that are scheduled for specific dates/locations.  This would include online (or distance learning format) courses which begin on specific dates, instead of the "start anytime" courses listed in the previous section. (Provider, URL) (''note: this has been moved to its own page.'')<br></li></ol>
  
Microsoft Pocket PC, sometimes referred to as P/PC or PPC, is based upon the Windows CE framework.  Variants of this operating system include versions such as Pocket PC 2000, Pocket PC 2002, Windows Mobile 2003/2003 SE, and Windows Mobile 5.0. Variants also exist for [[SmartPhones]], such as Windows Mobile 2003 Smartphone edition.
+
The Conference and Training List is provided by the American Academy of Forensic Sciences (AAFS) Digital and Multimedia Sciences Section Listserv.
 +
<i> (Subscribe by sending an email to listserv@lists.mitre.org with message body containing SUBSCRIBE AAFS-DIGITAL-MULTIMEDIA-LIST)</i>
 +
Requests for additions, deletions or corrections to this list may be sent by email to David Baker <i>(bakerd AT mitre.org)</i>.
  
One of the key benefits of Microsoft's Windows Mobile platform is file format compatibility with the desktop versions of the company's productivity software.  Mobile versions of Microsoft software, such as Pocket Word, Pocket Excel, and Pocket PowerPoint, allow individuals to view and edit these files outside of the home and office.  
+
== Calls For Papers ==
 +
Please help us keep this up-to-date with deadlines for upcoming conferences that would be appropriate for forensic research.
  
Another benefit is integration with Microsoft's cross-platform solution, the .NET Framework. The .NET Framework and its associated class libraries handle things such as memory management, file I/O, and many other functions. The .NET Framework allows programmers to develop code in one of several .NET languages, such as C# and VB.NET. Pocket PCs run a simplified version of the framework called the .NET Compact Framework.
+
{| border="0" cellpadding="2" cellspacing="2" align="top"
 +
|- style="background:#bfbfbf; font-weight: bold"
 +
! width="30%|Title
 +
! width="15%"|Due Date
 +
! width="15%"|Notification Date
 +
! width="40%"|Website
 +
|-
 +
|1st International Workshop on Managing Insider Security Threats
 +
|Mar 22, 2009
 +
|Apr 20, 2009
 +
|http://isyou.hosting.paran.com/mist09/data/MIST09-CFP.pdf
 +
|-
 +
|Systematic Approaches to Digital Forensic Engineering International Workshop
 +
|Mar 25, 2009
 +
|Apr 15, 2009
 +
|http://conf.ncku.edu.tw/sadfe/sadfe09/cfp.html
 +
|-
 +
|Layer One - 2009
 +
|Apr 01, 2009
 +
|Apr 15, 2009
 +
|http://layerone.info/
 +
|-
 +
|Recent Advances in Intrusion Detection (RAID) International Symposium
 +
|Apr 05, 2009
 +
|Jun 08, 2009
 +
|http://www.rennes.supelec.fr/RAID2009/cfp.html
 +
|-
 +
|ACM CCS 2009
 +
|Apr 2009
 +
|
 +
|http://www.sigsac.org/ccs
 +
|-
 +
|3rd International Workshop on Computational Forensics
 +
|Apr 24, 2009
 +
|May 22, 2009
 +
|http://iwcf09.arsforensica.org/
 +
|-
 +
|ICDF2C 2009
 +
|Apr 30, 2009
 +
|Jun 30, 2009
 +
|http://www.d-forensics.org/
 +
|-
 +
|Usenix Lisa 2009
 +
|Apr 30, 2009
 +
|Jul 07, 2009
 +
|http://www.usenix.org/events/lisa09/cfp/
 +
|-
 +
|New Security Paradigms Conference 2009
 +
|Apr 2009
 +
|
 +
|http://www.nspw.org/current/
 +
|-
 +
|International Workshop on Information Forensics and Security (WIFS)
 +
|May 22, 2009
 +
|Aug 21, 2009
 +
|http://www.wifs09.org/index.php?option=com_content&view=article&id=15&Itemid=42
 +
|-
 +
|ACSAC 25
 +
|Jun 01, 2009
 +
|Aug 17, 2009
 +
|http://www.acsac.org
 +
|-
 +
|IMF 2009
 +
|Jun 01, 2009
 +
|Jul 22, 2009
 +
|http://www.imf-conference.org/
 +
|-
 +
|American Academy of Forensic Sciences 2010 Annual Meeting
 +
|Aug 01, 2009
 +
|Nov, 2009
 +
|http://www.aafs.org/default.asp?section_id=meetings&page_id=aafs_annual_meeting
 +
|-
 +
|IEEE Symposium on Security and Privacy 2010
 +
|Nov 2009
 +
|
 +
|-
 +
|ShmooCon 2010
 +
|Dec 2009
 +
|Jan 2010
 +
|http://www.shmoocon.org/cfp.html
 +
|-
 +
|AusCERT Conference 2010
 +
|Dec 2009
 +
|Jan 2010
 +
|http://conference.auscert.org.au/conf2010/cfp2010.html
 +
|-
  
In order to maintain synchronization and connectivity with desktop computers, Microsft developed the ActiveSync program.  The user merely has to connect the Pocket PC to the desktop computer in order to synchronize items such as appointments, contact lists, and even multimedia files. 
+
|}
  
In 2001, [[PDAs]] running Palm OS variants held a market share of about 72%, while Pocket PC held a meager 15% of the market. However, by the fourth quarter of 2004, Microsoft Pocket PC and Palm OS were practically tied with regards to market share -- Pocket PC-based devices had a market share of 40.2% while Palm OS claimed 40.7% of the market. This upward trend clearly illustrates the growing popularity of Pocket PC-based devices, and thus the increased likelihood that one will encounter such a device in the field.
+
== Conferences ==
 +
{| border="0" cellpadding="2" cellspacing="2" align="top"
 +
|- style="background:#bfbfbf; font-weight: bold"
 +
! width="40%"|Title
 +
! width="20%"|Date/Location
 +
! width="40%"|Website
 +
|-
 +
|5th Cyber Security and Information Intelligence Research Workshop
 +
|Apr 13-15<br>Oak Ridge National Laboratory, TN
 +
|http://www.csiir.ornl.gov/csiirw/
 +
|-
 +
|Blackhat Europe
 +
|Apr 14-17<br>Amsterdam, The Netherlands
 +
|https://www.blackhat.com/html/bh-europe-09/bh-eu-09-main.html
 +
|-
 +
|IEEE Canadian Conference on Electrical and Computer Engineering(CCECE 2009)
 +
|May 03-06<br>St. John's, Newfoundland & Labrador, Canada
 +
|http://www.ieee.ca/ccece09/index_en.php
 +
|-
 +
|Ohio HTCIA Spring Training Conference
 +
|May 12-14<br>Kirtland, OH
 +
|http://ohiohtcia.org/conference.html
 +
|-
 +
|AusCERT2009
 +
|May 17-22<br>Gold Coast, Australia
 +
|http://conference.auscert.org.au/conf2009/
 +
|-
 +
|Computer Security Institute: Security Exchange
 +
|May 17-22<br>Las Vegas, NV
 +
|http://www.csisx.com/
 +
|-
 +
|ADFSL 2009 Conference on Digital Forensics, Security and Law
 +
|May 20-22<br>Burlington, VT
 +
|http://www.digitalforensics-conference.org
 +
|-
 +
|Fourth International Workshop on Systematic Approaches to Digital Forensic Engineering (co-located with IEEE Security & Privacy)
 +
|May 21<br>Oakland, CA
 +
|http://conf.ncku.edu.tw/sadfe/sadfe09/
 +
|-
 +
|LayerOne 2009 Security Conference
 +
|May 23-24<br>Anaheim, CA
 +
|http://layerone.info/
 +
|-
 +
|Mobile Forensics World 2009
 +
|May 26-30<br>Chicago, IL
 +
|http://www.mobileforensicsworld.com
 +
|-
 +
|2009 Techno Security Conference
 +
|May 31-Jun 03<br>Myrtle Beach, SC
 +
|http://www.techsec.com/index.html
 +
|-
 +
|USENIX 2009
 +
|Jun 14-19<br>San Diego, CA
 +
|http://www.usenix.org/events/usenix09/
 +
|-
 +
|IEEE ICC Communication and Information Systems Security (CISS) Symposium
 +
|Jun 14-18<br>Dresden, Germany
 +
|http://www.ieee-icc.org/2009/
 +
|-
 +
|1st International Workshop on Managing Insider Security Threats
 +
|Jun 15-19<br>Purdue University, IN
 +
|http://isyou.hosting.paran.com/mist09/
 +
|-
 +
|SANS SANSFIRE 2009
 +
|Jun 13-22<br>Baltimore, MD
 +
|http://www.sans.org/sansfire09/
 +
|-
 +
|1st Workshop on Internet Multimedia Search and Mining (IMSM'09)
 +
|Jul 03<br>Cancun, Mexico
 +
|http://research.microsoft.com/en-us/um/people/xshua/imsm/index.html
 +
|-
 +
|Blackhat USA 2009
 +
|Jul 25-30<br>Las Vegas, NV
 +
|https://www.blackhat.com/
 +
|-
 +
|DefCon 17
 +
|Jul 31-Aug 02<br>Las Vegas, NV
 +
|http://www.defcon.org/
 +
|-
 +
|Usenix Security Sypmosium
 +
|Aug 10-14<br>Montreal, Quebec, Canada
 +
|http://www.usenix.org/events/sec09/
 +
|-
 +
|3rd International Workshop on Computational Forensics
 +
|Aug 13-14<br>The Hague, The Netherlands
 +
|http://iwcf09.arsforensica.org/
 +
|-
 +
|Digital Forensic Research Workshop
 +
|Aug 17-19<br>Montreal, Quebec, Canada
 +
|http://www.dfrws.org
 +
|-
 +
|Triennial Meeting of the European Academy of Forensic Science
 +
|Sep 08-11<br>Glasgow, Scotland, UK
 +
|http://www.eafs2009.com/
 +
|-
 +
|IMF 2009
 +
|Sep 15-17<br>Stuttgart, Germany
 +
|http://imf-conference.org/
 +
|-
 +
|Hacker Halted USA 2009
 +
|Sep 20-24<br>Miami, FL
 +
|http://www.hackerhalted.com
 +
|-
 +
|Recent Advances in Intrusion Detection (RAID) International Symposium
 +
|Sep 23-25<br>Saint-Malo, Brittany, France
 +
|http://www.rennes.supelec.fr/RAID2009/index.html
 +
|-
 +
|The 1st International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C)
 +
|Sep 30 - October 02<br>Albany, NY
 +
|http://www.d-forensics.org/
 +
|-
 +
|First IEEE Workshop on Information Forensics and Security
 +
|Dec 06-09<br>London, England
 +
|http://www.wifs09.org/
 +
|-
 +
|AAFS Annual Meeting
 +
|Feb. 22-27<br>Seattle, WA
 +
|http://www.aafs.org/default.asp?section_id=meetings&page_id=aafs_annual_meeting
 +
|-
 +
|}
  
 +
== On-going / Continuous Training ==
 +
{| border="0" cellpadding="2" cellspacing="2" align="top"
 +
|- style="background:#bfbfbf; font-weight: bold"
 +
! width="40%"|Title
 +
! width="20%"|Date/Location
 +
! width="40%"|Website
 +
|-
 +
|- style="background:pink;align:left"
 +
! DISTANCE LEARNING
 +
|-
 +
|Basic Computer Examiner Course - Computer Forensic Training Online
 +
|Distance Learning Format
 +
|http://www.cftco.com
 +
|-
 +
|Linux Data Forensics Training
 +
|Distance Learning Format
 +
|http://www.crazytrain.com/training.html
 +
|-
 +
|SANS On-Demand Training
 +
|Distance Learning Format
 +
|http://www.sans.org/ondemand/?portal=69456f95660ade45be29c00b0c14aea1
 +
|-
 +
|Champlain College - CCE Course
 +
|Online / Distance Learning Format
 +
|http://extra.champlain.edu/cps/wdc/alliances/cce/landing/
 +
|-
 +
|Las Positas College
 +
|Online Computer Forensics Courses
 +
|http://www.laspositascollege.edu
 +
|-
 +
|- style="background:pink;align:left"
 +
!RECURRING TRAINING
 +
|-
 +
|MaresWare Suite Training
 +
|First full week every month<br>Atlanta, GA
 +
|http://www.maresware.com/maresware/training/maresware.htm
 +
|-
 +
|Evidence Recovery for Windows Vista&trade;
 +
|First full week every month<br>Brunswick, GA
 +
|http://www.internetcrimes.net
 +
|-
 +
|Evidence Recovery for Windows Server&reg; 2003 R2
 +
|Second full week every month<br>Brunswick, GA
 +
|http://www.internetcrimes.net
 +
|-
 +
|Evidence Recovery for the Windows XP&trade; operating system
 +
|Third full week every month<br>Brunswick, GA
 +
|http://www.internetcrimes.net
 +
|-
 +
|Computer Forensics Training and CCE&trade; Testing for Litigation Support Professionals
 +
|Third weekend of every month(Fri-Mon)<br>Dallas, TX
 +
|http://www.md5group.com
 +
|-
 +
|}
  
== History ==
+
==See Also==
 
+
* [[Scheduled Training Courses]]
Windows CE, which serves as the framework for the Pocket PC operating systems, began its life in November of 1996.  The NEC MobilePro 200 and the Casio A-10 were the first two PDA-type devices available with this early version of the operating system, which was dubbed Handheld PC 1.0.
+
==References==
 
+
* [http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm Computer Security Conference Ranking and Statistic]
Subsequently, Microsoft released iterations of its mobile operating systems with names such as Handheld PC 2.0 (1997), Palm-Size PC 2.0 (1998), Handheld PC Professional Edition (1998).
+
* [http://www.kdnuggets.com/meetings/ Meetings and Conferences in Data Mining and Discovery]
 
+
* http://www.conferencealerts.com/data.htm Data Mining Conferences World-Wide]
As development of Windows CE continued, manufacturers began to build more esoteric devices around it, such as internet TV set-top boxes and web-enabled telephones. 
+
 
+
Pocket PC officially began its public life when it was previewed at the Consumer Electronics Show in 2000.  Codenamed "Rapier", the first version of the Pocket PC operating system was simply named Pocket PC.
+
 
+
=Pocket PC Variants=
+
 
+
==Pocket PC 2000==
+
 
+
Pocket PC 2000, based on Micrsoft's Windows CE 3.0 platform, was a first step towards the familiar appearance and functionality that is offered by Windows Mobile 5.0.  Devices running Pocket PC 2000 ranged from the Askey PC010, which had a 16-color grayscale screen with no expansion slots, to the Casio EM-500, which had a 64k color screen and provisions for upgraded pheripherals such as cameras.  Pocket PC 2000 launched with versions of Pocket Word, Pocket Excel, and Microsoft Reader bundled.  ActiveSync 3.1, which provided an easier way to install applications onto the Pocket PC, was required to synchronize with host desktop machines.
+
 
+
==Pocket PC 2002==
+
Codenamed "Merlin," Pocket PC 2002 was Microsoft's Windows CE 3.0-based upgrade to Pocket PC 200.  Pocket PC 2002 offered many improvements over the previous operating system, including a Terminal Service Client, a new mail Inbox, Windows Media Player 8.0, improved versions of Pocket Word and MS Reader, and many other features. 
+
 
+
There were three service packs (EUUU1/2/3) released which addressed bugs and other issues in the original release.
+
 
+
==Windows Mobile 2003 & 2003 Second Edition==
+
Windows Mobile 2003, codenamed "Ozone", was officially released in June of 2003.  The operating system is based on Microsoft's Windows CE 4.2, which claimed to provide a more responsive system when compared with devices running Windows CE 3.0.  This version of the operating system added many useful features, including a picture viewer, built-in Bluetooth and WiFi support, Windows Media Player 9.0, as well as a host of Personal Information Management application improvements.  This version of Windows Mobile required ActiveSync 3.7 to communicate with a host computer.
+
 
+
Windows Mobile Second Edition, released in 2004, added support for 640x480 VGA resolution, portrait and landscape display modes, DPI settings, and many other improvements.
+
 
+
==Windows Mobile 5.0==
+
[[Microsoft Windows Mobile]] 5.0, based off of Windows CE 5.0, was released on May 10, 2005.  [[Microsoft Windows Mobile]] 5.0 brought many changes to the Pocket PC landscape.  For one, with this release, the phone and PDA versions of the OS have merged into one encompassing OS, instead of two separate versions of the same one.  Additionally, while past versions of Pocket PC software utilized the RAM of a PDA for program and data storage, [[Microsoft Windows Mobile]] 5.0 uses a PDA's hardware more like a traditional computer.  The operating system and user data is stored in the more persistent ROM of the device, and RAM is used in a way more similar to that of a desktop PC.  This has implications for forensics, as data stored on these devices is now less volatile.
+
 
+
=Pocket PC Devices=
+
 
+
[[Image:Treo.jpg|thumb|Treo 700w]]
+
 
+
In recent years, a number of manufacturers have elected to produce Pocket PC devices.  Some of these makers include companies such as:
+
 
+
*  Acer
+
*  Asus
+
*  Audiovox
+
*  Dell
+
*  HP
+
*  Mitac
+
*  Motorola
+
*  Samsung
+
*  Siemens
+
*  Symbol
+
*  Treo
+
 
+
Because different manufacturers are targeted at different segments of the market, such as business and consumers, the features and functionality of these devices sometimes differ greatly.  For example, some devices have built-in capability for taking images and videos, while other devices have tools such as biometric fingerprint readers and barcode scanners.
+
 
+
=References=
+
 
+
[http://www.hpcfactor.com/support/windowsce/ The History of Microsoft Windows CE]
+
 
+
[http://palmtops.about.com/cs/pdafacts/a/Palm_Pocket_PC.htm Palm vs. Pocket PC-The Great Debate]
+
 
+
[http://www.windowsfordevices.com/news/NS8063885791.html Gartner: Windows CE ties Palm]
+
 
+
[http://en.wikipedia.org/wiki/Pocket_PC Wikipedia: Pocket PC]
+
 
+
[http://www.pocketpcfaq.com PocketPC FAQ]
+

Revision as of 16:40, 30 March 2009

PLEASE READ BEFORE YOU EDIT THE LISTS BELOW
Events should be posted in the correct section, and in date order. An event should NEVER be listed in more than one section (i.e. Ongoing/Continuous events should not be listed in Scheduled Training). When events begin the same day, events of a longer length should be listed first. New postings of events with the same date(s) as other events should be added after events already in the list. If a provider offers the same event at several locations simultaneously, the listing should have a single (ONE) entry in the list with the date(s) and ALL locations for the event. Please use three-letter month abbreviations (i.e. Sep, NOT Sept. or September), use two digit dates (i.e. Jan 01 NOT Jan 1), and use date ranges rather than listing every date during an event(i.e. Jan 02-05, NOT Jan 02, 03, 04, 05).
Some events may be limited to Law Enforcement Only or to a specific audience. Such restrictions should be noted when known.

This is a BY DATE listing of upcoming events relevant to digital forensics. It is not an all inclusive list, but includes most well-known activities. Some events may duplicate events on the generic conferences page, but entries in this list have specific dates and locations for the upcoming event.

This listing is divided into four sections (described as follows):

  1. Calls For Papers - Calls for papers for either Journals or for Conferences, relevant to Digital Forensics (Name, Closing Date, URL)

  2. Conferences - Conferences relevant for Digital Forensics (Name, Date, Location, URL)

  3. On-Going / Continuous Training - Training opportunities that are either always available online/distance learning format (start anytime) or that are offered the same time every month (Name, date-if applicable, URL)

  4. Scheduled Training Courses - Training Classes/Courses that are scheduled for specific dates/locations. This would include online (or distance learning format) courses which begin on specific dates, instead of the "start anytime" courses listed in the previous section. (Provider, URL) (note: this has been moved to its own page.)

The Conference and Training List is provided by the American Academy of Forensic Sciences (AAFS) Digital and Multimedia Sciences Section Listserv. (Subscribe by sending an email to listserv@lists.mitre.org with message body containing SUBSCRIBE AAFS-DIGITAL-MULTIMEDIA-LIST) Requests for additions, deletions or corrections to this list may be sent by email to David Baker (bakerd AT mitre.org).

Calls For Papers

Please help us keep this up-to-date with deadlines for upcoming conferences that would be appropriate for forensic research.

Title Due Date Notification Date Website
1st International Workshop on Managing Insider Security Threats Mar 22, 2009 Apr 20, 2009 http://isyou.hosting.paran.com/mist09/data/MIST09-CFP.pdf
Systematic Approaches to Digital Forensic Engineering International Workshop Mar 25, 2009 Apr 15, 2009 http://conf.ncku.edu.tw/sadfe/sadfe09/cfp.html
Layer One - 2009 Apr 01, 2009 Apr 15, 2009 http://layerone.info/
Recent Advances in Intrusion Detection (RAID) International Symposium Apr 05, 2009 Jun 08, 2009 http://www.rennes.supelec.fr/RAID2009/cfp.html
ACM CCS 2009 Apr 2009 http://www.sigsac.org/ccs
3rd International Workshop on Computational Forensics Apr 24, 2009 May 22, 2009 http://iwcf09.arsforensica.org/
ICDF2C 2009 Apr 30, 2009 Jun 30, 2009 http://www.d-forensics.org/
Usenix Lisa 2009 Apr 30, 2009 Jul 07, 2009 http://www.usenix.org/events/lisa09/cfp/
New Security Paradigms Conference 2009 Apr 2009 http://www.nspw.org/current/
International Workshop on Information Forensics and Security (WIFS) May 22, 2009 Aug 21, 2009 http://www.wifs09.org/index.php?option=com_content&view=article&id=15&Itemid=42
ACSAC 25 Jun 01, 2009 Aug 17, 2009 http://www.acsac.org
IMF 2009 Jun 01, 2009 Jul 22, 2009 http://www.imf-conference.org/
American Academy of Forensic Sciences 2010 Annual Meeting Aug 01, 2009 Nov, 2009 http://www.aafs.org/default.asp?section_id=meetings&page_id=aafs_annual_meeting
IEEE Symposium on Security and Privacy 2010 Nov 2009
ShmooCon 2010 Dec 2009 Jan 2010 http://www.shmoocon.org/cfp.html
AusCERT Conference 2010 Dec 2009 Jan 2010 http://conference.auscert.org.au/conf2010/cfp2010.html

Conferences

Title Date/Location Website
5th Cyber Security and Information Intelligence Research Workshop Apr 13-15
Oak Ridge National Laboratory, TN
http://www.csiir.ornl.gov/csiirw/
Blackhat Europe Apr 14-17
Amsterdam, The Netherlands
https://www.blackhat.com/html/bh-europe-09/bh-eu-09-main.html
IEEE Canadian Conference on Electrical and Computer Engineering(CCECE 2009) May 03-06
St. John's, Newfoundland & Labrador, Canada
http://www.ieee.ca/ccece09/index_en.php
Ohio HTCIA Spring Training Conference May 12-14
Kirtland, OH
http://ohiohtcia.org/conference.html
AusCERT2009 May 17-22
Gold Coast, Australia
http://conference.auscert.org.au/conf2009/
Computer Security Institute: Security Exchange May 17-22
Las Vegas, NV
http://www.csisx.com/
ADFSL 2009 Conference on Digital Forensics, Security and Law May 20-22
Burlington, VT
http://www.digitalforensics-conference.org
Fourth International Workshop on Systematic Approaches to Digital Forensic Engineering (co-located with IEEE Security & Privacy) May 21
Oakland, CA
http://conf.ncku.edu.tw/sadfe/sadfe09/
LayerOne 2009 Security Conference May 23-24
Anaheim, CA
http://layerone.info/
Mobile Forensics World 2009 May 26-30
Chicago, IL
http://www.mobileforensicsworld.com
2009 Techno Security Conference May 31-Jun 03
Myrtle Beach, SC
http://www.techsec.com/index.html
USENIX 2009 Jun 14-19
San Diego, CA
http://www.usenix.org/events/usenix09/
IEEE ICC Communication and Information Systems Security (CISS) Symposium Jun 14-18
Dresden, Germany
http://www.ieee-icc.org/2009/
1st International Workshop on Managing Insider Security Threats Jun 15-19
Purdue University, IN
http://isyou.hosting.paran.com/mist09/
SANS SANSFIRE 2009 Jun 13-22
Baltimore, MD
http://www.sans.org/sansfire09/
1st Workshop on Internet Multimedia Search and Mining (IMSM'09) Jul 03
Cancun, Mexico
http://research.microsoft.com/en-us/um/people/xshua/imsm/index.html
Blackhat USA 2009 Jul 25-30
Las Vegas, NV
https://www.blackhat.com/
DefCon 17 Jul 31-Aug 02
Las Vegas, NV
http://www.defcon.org/
Usenix Security Sypmosium Aug 10-14
Montreal, Quebec, Canada
http://www.usenix.org/events/sec09/
3rd International Workshop on Computational Forensics Aug 13-14
The Hague, The Netherlands
http://iwcf09.arsforensica.org/
Digital Forensic Research Workshop Aug 17-19
Montreal, Quebec, Canada
http://www.dfrws.org
Triennial Meeting of the European Academy of Forensic Science Sep 08-11
Glasgow, Scotland, UK
http://www.eafs2009.com/
IMF 2009 Sep 15-17
Stuttgart, Germany
http://imf-conference.org/
Hacker Halted USA 2009 Sep 20-24
Miami, FL
http://www.hackerhalted.com
Recent Advances in Intrusion Detection (RAID) International Symposium Sep 23-25
Saint-Malo, Brittany, France
http://www.rennes.supelec.fr/RAID2009/index.html
The 1st International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C) Sep 30 - October 02
Albany, NY
http://www.d-forensics.org/
First IEEE Workshop on Information Forensics and Security Dec 06-09
London, England
http://www.wifs09.org/
AAFS Annual Meeting Feb. 22-27
Seattle, WA
http://www.aafs.org/default.asp?section_id=meetings&page_id=aafs_annual_meeting

On-going / Continuous Training

Title Date/Location Website
DISTANCE LEARNING
Basic Computer Examiner Course - Computer Forensic Training Online Distance Learning Format http://www.cftco.com
Linux Data Forensics Training Distance Learning Format http://www.crazytrain.com/training.html
SANS On-Demand Training Distance Learning Format http://www.sans.org/ondemand/?portal=69456f95660ade45be29c00b0c14aea1
Champlain College - CCE Course Online / Distance Learning Format http://extra.champlain.edu/cps/wdc/alliances/cce/landing/
Las Positas College Online Computer Forensics Courses http://www.laspositascollege.edu
RECURRING TRAINING
MaresWare Suite Training First full week every month
Atlanta, GA
http://www.maresware.com/maresware/training/maresware.htm
Evidence Recovery for Windows Vista™ First full week every month
Brunswick, GA
http://www.internetcrimes.net
Evidence Recovery for Windows Server® 2003 R2 Second full week every month
Brunswick, GA
http://www.internetcrimes.net
Evidence Recovery for the Windows XP™ operating system Third full week every month
Brunswick, GA
http://www.internetcrimes.net
Computer Forensics Training and CCE™ Testing for Litigation Support Professionals Third weekend of every month(Fri-Mon)
Dallas, TX
http://www.md5group.com

See Also

References