15

19

June 2020

Cyber Incident 2020

In response to the ongoing COVID-19 situation, Cyber Science 2020 will now take place virtually from June 15th-19th.

Tactics, Techniques and Procedures (TTPs) for Cyber Incident Response in a fast paced Digital World.

Registered attendees will have access to all virtual events & workshops over the course of the conference.

Starting in:

00 d
00 h
00 m
00 s

Details

Cyber Incident 2020 will take place virtually alongside Cyber Situational Awareness 2020Social Media 2020 and Cyber Security 2020 as part of Cyber Science 2020.

Posters

Posters will be presented virtually at the conference.

Industry

Industry track is available for discussing and publishing pilot and proof of concepts.

Work in Progress

Work in Progress track is available for preliminary work.

Research Ideas

Research Ideas track is available for ideas in early stages assessment.

PhD Seminar

PhD Seminar track is available for discussing and publishing early PhD thesis research.

Topics of Interest

  • Cyber Incident Analysis
  • Cyber Incident Triage
  • Cyber Incident Correlation and Assessment
  • Coordination
  • Containment
  • Root Cause Analysis (RCA)
  • Timeliness
  • Handling and Handling Process
  • Reporting
  • Escalation
  • Cyber Incident Management
  • Decision Control
  • Emergence Services
  • Preparedness
  • Readiness
  • Analysis
  • Risk Management
  • Conditionality
  • Proportionality
  • Prioritisation
  • Decision Making
  • Risk-Based Decision
  • Human in the Loop
  • Training
  • Processes and Procedures
  • Policy and Standards
  • Emergency  Services
  • Chain of Custody
  • Forensic Readiness and Investigations
  • Cyber Incident Notification and Announcements
  • Cyber Incident Management Tool
  • Standardisation
  • Framework and Methodology
  • Expertise, Skills, Knowledge and Resource
  • Maturity Model and Goal Setting
  • Certification and Accreditation
  • Memberships to Cyber Incident Responders, Incident Response Organisation
  • Rule-Based Systems
  • Expert Systems
  • Adaptive Learning Systems
  • Predictive Systems
  • The use of Biometrics to aid Forensic Investigations
  • Speak, audio and voice Recognition for forensics
  • Correlation and cross-correlation for Incident Analysis
  • Cross-Domain Analysis
  • Cross-Channel Incident Analysis
  • Multi-domain Analysis
  • Digital Forensics Principles, Rules and Standards
  • Digital Forensic Investigations
  • Speak, audio and voice Recognition for forensics
  • Chain of Custody
  • Mobile Forensics
  • Live data and live stream forensics
  • Live Imagery Forensics
  • Memory Forensics
  • Browser and Cache Memory Forensics
  • Cyber Incident Playbook
  • Cyber Incident Management
  • War-room exercises
  • Attack Scenarios and Exercise
  • Cyber Incident Response
  • Command Controls – Bronze, Silver & Gold Command
  • Cause of Action (CoA)
  • Root Cause Analysis
  • Data-Centric System Threat Modelling
  • Attack Tree
  • Exploits and Attack Modelling
  • Attack Vector and Attack Surface
  • Risk, Control and Control Objectives
  • Analysing Threat Modelling
  • Cyber Incident Management
  • Business Continuity Plan and Measures
  • Root Cause Analysis
  • Security Metrics
  • Threat Intelligence

Programme Committee

  • Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
  • Frank Wang – Computer Society, IEEE, United Kingdom and Ireland
  • Theo Lynn – Dublin City University, Dublin, Ireland
  • Janne Merete Hagen – Norwegian Defence Research Establishment, Norway
  • Nick Savage – University of Portsmouth, UK
  • Eckhard Pfluegel  –  Faculty of Science, Engineering and Computing, Kingston University, UK
  • Theo Lynn – Dublin City University, Dublin, Ireland
  • Pierangelo Rosati – Dublin City University, Dublin, Ireland
  • Grace Fox – Dublin City University, Dublin, Ireland
  • Patricia Endo – Dublin City University, Dublin, Ireland
  • Uwe Glässer – School of Computing Science, Simon Fraser University, Canada
  • Arnau Erola – Department of Computer Science, University of Oxford, UK
  • Tim D Williams – Cyber Security, London, UK
  • Theo Lynn – Dublin City University, Dublin, Ireland
  • Pierangelo Rosati – Dublin City University, Dublin, Ireland
  • Xavier Bellekens – University of Strathclyde, Scotland, UK
  • Theo Lynn – Dublin City University, Dublin, Ireland
  • Arnau Erola – Department of Computer Science, University of Oxford, UK
  • Michal Chorasm – Telecommunications and Computer Science, University of Science and Technology (UTP), Bydgoszcz, Poland
  • Hayretdin Bahsi – Center for Digital Forensics and Cyber Security, Tallin University of Technology, Estonia
  • Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA
  • Jens Myrup Pedersen – University of Aalborg, Denmark
  • Uwe Glässer – School of Computing Science, Simon Fraser University, Canada
  • Marios Anagnostopoulos – University of the Aegean, Greece
  • Ciza Thomas – College of Engineering, India
  • Stefanos Gritzalis – University of the Aegean, Greece
  • Janne Merete Hagen – Norwegian Defence Research Establishment, Norway
  • Varun Dutt – Indian Institute of Technology Mandi, India
  • Georgios Kambourakis – University of the Aegean, Greece
  • Eliana Stavrou – Computing Department, UCLan Cyprus, Larnaca, Cyprus
  • Tim D Williams – Cyber Security, London, UK
  • Palvi Aggarwal – Carnegie Mellon University (CMU), USA
  • Sean Mckeown – Edinburgh Napier University, Scotland, UK
  • Arghir-Nicolae Moldovan – National College of Ireland (NCIRL), Ireland
  • Domhnall Carlin – Queen’s University (QUB), Belfast, Northern Ireland, UK
  • Kim Tam – Plymouth University, UK
  • Felix Heine – Hannover University of Applied Sciences, Germany

Previous Conferences

Cyber Incident 2019
Location: Oxford, UK

Cyber Incident 2018
Location: Glasgow, UK

Cyber Incident 2017
Location: London, UK

Cyber Incident 2016
Location: London, UK

Cyber Incident 2015
Location: London, UK