June 2020

Cyber Incident 2020

Tactics, Techniques and Procedures (TTPs) for Cyber Incident Response in a fast paced Digital World

  • Dublin City University, Ireland

Starting in:

00 d
00 h
00 m
00 s

Call for Papers

IEEE is the Technical Co-Sponsor (TCS) of the International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2020) is an international refereed conference dedicated to the advancement of Cyber Incident Response, Coordination, Containment and Control.

The aim of the Cyber Incident 2020 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures.

Cyber Incident 2020 invites researchers and industry practitioners to submit papers that encompass principles, analysis, design, methods and applications. All submitted papers are independently peer-reviewed.

The conference proceedings will be submitted for consideration for publishing and listing on the following bibliographic indexes: IEEE Computer Society Digital Library, IEEE Xplore Digital Library, DBLP Computer Science, Scopus, CiteSeerX, Computer Science Index, EI Compendex, Academic Search Complete, CiteULike, Google Scholar & Microsoft Academic Search.

The organisers will accept registration of up to 5 IEEE UK&I Student and YP Members at 75% discounted rate, and will offer up to 20% registration discounts for all IEEE, BCS, IET & IISP members.

Register Here To Stay Up To Date On Cyber Incident 2020

Enter your email address to receive latest updates about Cyber Incident 2020 by email.


Cyber Incident 2020 is co-located with other conferences as part of Cyber Science 2020


Posters will be presented at the conference.


Industry track is available for discussing and publishing pilot and proof of concepts.

Work in Progress

Work in Progress track is available for preliminary work.

Research Ideas

Research Ideas track is available for ideas in early stages assessment.

PhD Seminar

PhD Seminar track is available for discussing and publishing early PhD thesis research.

Topics of Interest

  • Cyber Incident Analysis
  • Cyber Incident Triage
  • Cyber Incident Correlation and Assessment
  • Coordination
  • Containment
  • Root Cause Analysis (RCA)
  • Timeliness
  • Handling and Handling Process
  • Reporting
  • Escalation
  • Cyber Incident Management
  • Decision Control
  • Emergence Services
  • Preparedness
  • Readiness
  • Analysis
  • Risk Management
  • Conditionality
  • Proportionality
  • Prioritisation
  • Decision Making
  • Risk-Based Decision
  • Human in the Loop
  • Training
  • Processes and Procedures
  • Policy and Standards
  • Emergency  Services
  • Chain of Custody
  • Forensic Readiness and Investigations
  • Cyber Incident Notification and Announcements
  • Cyber Incident Management Tool
  • Standardisation
  • Framework and Methodology
  • Expertise, Skills, Knowledge and Resource
  • Maturity Model and Goal Setting
  • Certification and Accreditation
  • Memberships to Cyber Incident Responders, Incident Response Organisation
  • Rule-Based Systems
  • Expert Systems
  • Adaptive Learning Systems
  • Predictive Systems
  • The use of Biometrics to aid Forensic Investigations
  • Speak, audio and voice Recognition for forensics
  • Correlation and cross-correlation for Incident Analysis
  • Cross-Domain Analysis
  • Cross-Channel Incident Analysis
  • Multi-domain Analysis
  • Digital Forensics Principles, Rules and Standards
  • Digital Forensic Investigations
  • Speak, audio and voice Recognition for forensics
  • Chain of Custody
  • Mobile Forensics
  • Live data and live stream forensics
  • Live Imagery Forensics
  • Memory Forensics
  • Browser and Cache Memory Forensics
  • Cyber Incident Playbook
  • Cyber Incident Management
  • War-room exercises
  • Attack Scenarios and Exercise
  • Cyber Incident Response
  • Command Controls – Bronze, Silver & Gold Command
  • Cause of Action (CoA)
  • Root Cause Analysis
  • Data-Centric System Threat Modelling
  • Attack Tree
  • Exploits and Attack Modelling
  • Attack Vector and Attack Surface
  • Risk, Control and Control Objectives
  • Analysing Threat Modelling
  • Cyber Incident Management
  • Business Continuity Plan and Measures
  • Root Cause Analysis
  • Security Metrics
  • Threat Intelligence