The 7th annual Techno Forensics Conference
The 7th annual Techno Forensics Conference will debut a track specifically devoted to Forensics industry professionals with highlighted focus on photo/video forensics and crime scene investigation and evidence collection. Joining together the Digital Forensic and Forensic communities reflects the crossover apparent today within a wide range of forensic and digital disciplines. This annual event brings together key stakeholders from industry, academia and government in an effort to strengthen this important technology, research, and communication bridge.
For 2011, we will be moving Techno Forensics to the beautiful Myrtle Beach, SC Convention center. This will give us a lot more room to grow, as well as allowing for much easier access and parking availability. We had 6 great years at the NIST complex in Maryland, but it is time to move and grow.
We are happy to announce that we have partnered with DFI News to co-produce this exciting conference. Registration details are now available on the new Techno Forensics Conference website.
Thanks again to all of our sponsors and attendees who have helped us become the leading Digital Forensics conference in the world.
Much more to come…………..
TakeDownCon 2011
About TakeDownCon
- Focused – All presentations for each event focuses on the chosen subject domains. Nothing else.
- Highly Technical – TakeDown Con insists that all presenters do live demonstrations or showcases.
- Speaks Binary Only – Ability to understand English is NOT enough here. You need to speak the Zeros and Ones.
- Knowledge Acquisition – By participating in the event, you will definitely learn something that is of value (unlike some others)
- Conducive Environment – You will not be squashed like ducks. Though we cannot guarantee everyone a seat, you will get to stand comfortably, at least.
ShmooCon 2011 – Security Conference
SHMOOCON 2011 – JANUARY 28-30
Different – ShmooCon is an annual east coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software and hardware solutions, and open discussions of critical infosec issues. The first day is a single track of speed talks called One Track Mind. The next two days bring three tracks: Build It, Break It and Bring It On.
Affordable – ShmooCon is about high quality without the high price. Keep in mind that space is limited and we’ve sold out quickly every year.
Accessible – ShmooCon is held in Washington, DC at the Washington Hilton Hotel, just a few short blocks from the DC metro. Fly into DCA, IAD or BWI or take a train to Union Station and you’re just a short cab ride away from the con.
Entertaining – Brain melting from all the cool tech you’re learning? Be sure to check out the other events running during ShmooCon, including the Hacker Arcade, ShmooCon Labs, Hack-or-Halo and more. Saturday night is party night, where typically we throw an off site bash just to shake things up a bit.
The Techno Forensics Conference 2011 – Call for Papers
Conference Dates: October 31st – November 1st, 2011
Conference Location: Myrtle Beach Convention Center, Myrtle Beach, South Carolina
Call for Papers Deadline: March 25, 2011
The Techno Forensics Conference is all about digital forensics, evidence collection, crime scene documentation, and e-Discovery. Sessions are for industry professionals with some previous experience in these disciplines. Advanced level content and depth are a must. We are looking for speakers in the following areas:
* Case studies of actual criminal cyber crime involving unique digital investigation
* Innovative approaches to investigations
* Information on the effective establishment or operation of a digital forensic lab
* Demonstrable data of future technologies or cyber threats that will challenge traditional digital investigation methods
* Technological innovations necessary to combat and prepare for future cyber threats. No product pitches considered.
* Investigations requiring network forensics (especially those involving cloud computing)
* Cell phone, handheld device, and smartphone forensics
* Forensic analysis of images and video
* Government or private sector research and development funding programs related to cyber crime, digital investigation, or e-Discovery
* Evidence collection and crime scene documentation
* Information/tips for staying current in the rapidly evolving industry of digital forensics and e-Discovery
* Latest rulings affecting ESI and e-Discovery
Speakers are expected to include the latest trends, technology, and ideas. Their presentations should be non-commercial and not promote a particular product or company.
To submit a paper, please complete the PDF Submission Form that appears on this page and include the following:
Abstract should be approximately 100 words. It should include a title, clearly state the proposed topic, and outline the content. If your paper is accepted, this abstract will be used to describe and promote your session, so please write it with this in mind.
Biography should be an approximately 50-word summary of your professional background and any other relevant industry qualifications. If there is more than one presenter, please provide a biography for both. (Number of presenters is limited to two. Additional speakers are subject to approval.) If your paper is accepted, this biography will be used in the conference materials, so please write it with this in mind. Please submit a headshot with your biography to be used in the conference materials.
Sessions are 45 minutes long, with five minutes allowed for questions. If you feel that additional time is needed for your presentation, please indicate how long and offer strong justification. (Time allotments are subject to approval.) Company logos or other commercial content are not allowed on your graphics and slides and you will be asked to remove them if they appear.
Previously Presented Material: If this paper has been presented elsewhere, please indicate where and when. Prior presentation of the material will not eliminate it from consideration, but we are looking primarily for material that this audience has not seen before.
Your Contact Information: Please include complete contact information for all presenters. (Communication will be mainly via e-mail.)
Specify whether or not you are speaking on behalf of a company or yourself and identify the company you work for.
Identify Audio Video required for your presentation. We will provide one LCD projector and a wireless lapel or hand held microphone unless otherwise instructed. Please bring your presentation on a laptop along with a spare copy on CD in the event of machine failure.
Please Note: The Techno Forensics Conference does not pay for airfare, hotel accommodations, or other expenses for speakers. You do receive free registration to the conference as well as promotion in conference materials and marketing pieces.
Acceptance: Submission of an abstract does not guarantee placement. Notification of acceptance will be emailed in April.
Accepted speakers are required to adhere to a 100% NO COMMERCIALISM Policy. Sessions are to be strictly educational in nature.
No Substitutions
Substitution of speakers or panelists is not allowed except in the case of an emergency. In the event of an emergency where the original selected speaker is not available a written request for substitution may be considered, but strictly at the sole discretion of the organizer.
If you are interested in speaking opportunities at the 2011 Techno Forensics Conference in Myrtle Beach, please send your completed PDF Submission Form to:
Rebecca Waters
Chief Editor
DFI News®
4 Limbo Lane, Amherst, NH 03031
rwaters@DFInews.com
——————————————————————————–
In an interview at the 2006 Techno Forensics Conference, James Wingate talks about the current threat of steganography.
Facebook to Collaborate with Amber Alert
Facebook has received some negative press as of late when pertaining to the security and privacy of its users, but finally here is some possible good news we all can use in the fight to keep children safe both on and off-line.
Facebook has decided to collaborate with the AMBER Alert system, The National Center for Missing and Exploited Children and The U.S. Department of Justice to create 53 individual pages, one for each state including the District of Columbia, Puerto Rico and the U.S. Virgin Islands. Users will start receiving updates via their news feeds.
The goal is to use the more than 500 million users that access Facebook through multiple means to aid in the information dissemination when a child goes missing.
Below is the announcement:
Introducing SAINT for MAC OS X
Vulnerability Scanning –
Assess any target with an IPv4, IPv6, or URL with pre-defined policies for PCI, HIPAA, FISMA, and more. Identify CVE, OSVDB, IAVA, OVAL, and more.
Penetration Testing –
Exploit vulnerabilities to gain remote access. Run social engineering, phishing assessments, and more with the exploit tools suite.
Checklist Compliance –
Show compliance with FDCC & USGCB security configuration policies defined by NIST SP 800-70.
For more information visit www.saintcorporation.com/mac or phone 1-800-596-2006
SAINT is SCAP validated by NIST and is a PCI approved scanning vendor (ASV)
