ICDF2C 2015 in Seoul, South Korea Final Program Now Available
The final program is now available at http://d-forensics.org/2015/show/program-final
Be sure to register so you don't miss the exiting talks and tutorials!
Keynote speakers include Max Goncharov from Trend Micro, Inc, and Dr. Dave Dampier from Mississippi State University:
Max Goncharov is a senior security Virus Analyst with Trend Micro Inc., and is responsible for cybercrime investigations, security consulting to business partners (internal, external), creation of security frameworks, designing technical security architecture, overseeing the build out of an enterprise incident response process, and creation of the enterprise risk management program. During his 15 years with Trend Micro Inc, he has participated as a speaker in various conferences and training seminars on the topic of cybercrime and related issues. He has especially focues on cyberterrorism, cybersecurity, underground economy; such as DeepSec, VB, APWG, etc.
Dr. Dave Dampier is a Professor of Computer Science & Engineering at Mississippi State University specializing in Digital Forensics and Information Security. He currently serves as Director of the Distributed Analytics and Security Institute, the university level research center charged with Cyber Security Research. In his current capacity, Dr. Dampier is the university lead for education and research in cyber security. Prior to joining MSU, Dr. Dampier spent 20 years active duty as an Army Automation Officer. He has a B.S. Degree in Mathematics from the University of Texas at El Paso, and M.S. and Ph.D. degrees in Computer Science from the Naval Postgraduate School. His research interests are in Cyber Security, Digital Forensics and Software Engineering.
There will also be three tutorials on investigation, open source hardware for digital investigations and setting up a research environment for mobile malware research:
- Tutorial 1: DUZON – Desktop Exercise: Crafting Information from Data
- Tutorial 2: Pavel Gladyshev – FIREBrick; an open forensic device
- Tutorial 3: Nikolay Akatyev – Researching mobile malware