Subscribe to RSS Feed (Opens in New Window)

Wednesday, May 28, 2014
2014
Wednesday, May 28th
8:00 AM

Continental Breakfast

Digital Forensics, Security and Law

Richmond, Virginia

8:00 AM

8:00 AM

On-site Registration

Digital Forensics, Security and Law

Richmond, Virginia

8:00 AM

8:50 AM

Introductions

Glenn S. Dardick, Director of the ADFSL

Richmond, Virginia

8:50 AM

9:10 AM

Keynote Speech

Mark Pollitt, Digital Forensics at the Crossroads

Richmond, Virginia

9:10 AM

9:40 AM

Awareness of Scam E-mails: An Exploratory Research Study

Tejashree D. Datar, Computer and Information Technology Department, Purdue University
Kelly A. Cole, Computer and Information Technology Department, Purdue University
Marcus K. Rogers, Computer and Information Technology Department, Purdue University

Richmond, Virginia

9:40 AM

10:20 AM

Morning Break

Digital Forensics, Security and Law

Richmond, Virginia

10:20 AM

10:40 AM

Why Penetration Testing is a Limited Use Choice for Sound Cyber Security Practice

Craig Valli, Security Research Institute, Edith Cowan University
Andrew Woodward, Security Research Institute, Edith Cowan University
Peter Hannay, Security Research Institute, Edith Cowan University
Mike Johnstone, Security Research Institute, Edith Cowan University

Richmond, Virginia

10:40 AM

11:20 AM

LiFE (Logical iOSForensics Examiner): An Open Source iOSBackup Forensics Examination Tool

Ibrahim Baggili, ECECS Department, UNHcFREG, Tagliatela College of Engineering
Shadi Al Awawdeh, ECECS Department, UNHcFREG, Tagliatela College of Engineering
Jason Moore, ECECS Department, UNHcFREG, Tagliatela College of Engineering

Richmond, Virginia

11:20 AM

12:00 PM

Lunch

Digital Forensics, Security and Law

Richmond, Virginia

12:00 PM

1:00 PM

Using Internet Artifacts to Profile a Child Pornography Suspect

Marcus K. Rogers, Department of Computer Information & Technology, Purdue University
Kathryn C. Seigfried-Spellar, Department of Criminal Justice, The University of Alabama

Richmond, Virginia

1:00 PM

1:40 PM

Internet Addiction to Child Pornography

Rachel Sitarz, Knoy Hall of Technology, Purdue University
Marcus Rogers, Computer Information & Technology, Purdue University
Lonnie Bentley, Computer Information & Technology, Purdue University
Eugene Jackson, Associate Professor of Sociology, Purdue University

Richmond, Virginia

1:40 PM

2:20 PM

Afternoon Break

Digital Forensics, Security and Law

Richmond, Virginia

2:20 PM

2:40 PM

Generation and Handling of Hard Drive Duplicates as Piece of Evidence

T. Kemmerich, University College Gjøvik
F. Junge, University of Bremen
N. Kuntze, Fraunhofer SIT
C. Rudolph, Fraunhofer SIT
B. Endicott-Popovsky, University of Washington
L. Großkopf, Kanzlei Prof. Dr. Lambert Grosskopf LL.M.Eur

Richmond, Virginia

2:40 PM

3:20 PM

Testing and Evaluating The Harmonised Digital Forensic Investigation Process in Post Mortem Digital Investigation

Emilio R. Mumba, Department of Computer Science, University of Pretoria
H. S. Venter, Department of Computer Science, University of Pretoria

Richmond, Virginia

3:20 PM

4:00 PM

The Federal Rules Of Civil Procedure: Politics In The 2013-2014 Revision

John W. Bagby, Professor of Information Sciences & Technology, The Pennsylvania State University
Byron Granda, College of Information Sciences & Technology, The Pennsylvania State University
Emily Benoit, College of Information Sciences & Technology, The Pennsylvania State University
Alexander Logan, College of Information Sciences & Technology, The Pennsylvania State University
Ryan Snell, College of Information Sciences & Technology, The Pennsylvania State University
Joseph J. Schwerha, Associate Professor of Business Law & Technology, California University of Pennsylvania

Richmond, Virginia

4:00 PM

4:40 PM

Applying Memory Forensics to Rootkit Detection

Igor Korkin, National Research Nuclear University, Moscow Engineering Physics Institute
Ivan Nesterov, Moscow Institute of Physics and Technology

Richmond, Virginia

4:40 PM