IMF 2013

7th International Conference on
IT Security Incident Management & IT Forensics

March 12th - 14th, 2013
Nuremberg (Nürnberg), Germany

Conference of SIG SIDAR
of the German Informatics Society (GI).

About IMF Conference

Information and communication technology is more and more becoming an integral and in most cases even a vital part of life. The worldwide ecomomy, the public adminsitration, health care, education and even the personal life depend on working IT. Constriction of the availability of its service, loss of confidentiality or alteration of data processed, or loss of integrity of the IT infrastructure usually lead to serious or desatrous consequences. Hence security plays an increasingly important role for operators and users of IT systems and infrastructures.

The establishment of static security measures like policies, standards, and gudelines slowly but steadily is getting more common amongst IT operators. Nevertheless in the vast majority of cases operators do not have the capability to detect and respond to security incidents or do a forensic analysis of its traces that can be used in a lawsuit. Jurisdiction in most countries is starting to change and applies regulations on legal duty to maintain safety on operators of IT. Hence incident response capabilities become indespensable to avoid successful assertion of claims for damages caused by comrpomised or misused systems.

Conference Goals

IMF's intent is to gather experts from throughout the world in order to present and discuss recent technical and methodical advances in the fields of IT security incident response and management and IT forensics. The conference provides a platform for collaboration and exchange of ideas between industry, academia, law-enforcement and other government bodies.

Conference Topics

The scope of IMF 2013 is broad and includes, but is not limited to the following areas:

IT Security Incident Response

  • Incident Response Procedures and Methods
  • Incident Response Formats and Standardization
  • Tools Supporting Incident Response
  • Incident Analysis
  • Information Sources, Information Exchange, Communities
  • Dealing with Vulnerabilities (Vulnerability Response)
  • Monitoring and Early Warning
  • Incident Response in Non-Standard Environments (e.g. Embedded Systems)
  • Education and Training
  • Organizations
  • Legal and Enterprise Aspects (Jurisdiction, Applicable Laws and Regulations)

IT Forensics

  • Trends and Challenges in IT Forensics
  • Application of forensic techniques in new areas
  • Techniques, Tools in Procedures IT Forensics
  • Methods for the Gathering, Handling, Processing and Analysis of Digital Evidence
  • Evidence Protection in IT Environments
  • IT Forensics in Non-Standard Environments (e.g. Embedded Systems)
  • Source-Determination and Manipulation Detection (e.g. Multimedia Forensics)
  • Standardization in IT Forensics
  • Education and Training
  • Organizations
  • Legal and Enterprise Aspects (Jurisdiction, Applicable Laws and Regulations)

The conference would qualify for CPE hours for ISACA certifications (CISA, CISM and CGEIT) and (ISC)≤ certification CISSP. Participants can earn up to 18 CPE for continuing their professional education.

We are looking forward to see you, again.

Sincerely yours,
IMF Steering Committee

Sandra Frings, Fraunhofer IAO
Oliver Göbel, RUS-CERT, Universität Stuttgart
Detlef Günther, Corporate Internal Audit, Volkswagen AG
Holger Morgenstern, EDV-Sachverstšndiger / IT-expert witness
Jens Nedon, IABG
Dirk Schadt, SPOT Consulting