9.00 REGISTRATION
9.30 WELCOME - Professor James Fraser, Director, Centre for Forensic Science (University of Strathclyde).
9.35 Keynote: Scott Ainslie (Global Technology Services, IBM Australia): Security Intelligence - Forensics and Big Data; can we be intelligently proactive?
10.20 SESSION 1
1.1 Lynsay A. Shepherd, Jacqueline Archibald and R. Ian Ferguson (University of Abertay): Reducing Risky Security Behaviours: Utilising Affective Feedback To Educate Users
1.2 Fathiya Al Izki and George Weir (University of Strathclyde): Information Security and Digital Divide in the Arab World
11.40 COFFEE
12.00 SESSION 2
2.1 Sarah Holmes (Security & Resilience, RBS): Open Source Forensic Management Software
2.2 Richard Connor, Stewart MacKenzie-Leigh and George Weir (University of Strathclyde): The Forensic Detection of Very Similar Images
13.20 LUNCH
14.45 SESSION 3
3.1 Eamonn Keane (Specialist Crime Division, Cybercrime, Police Scotland): The current cybercrime threat landscape
3.2 Alex McLaren (Association of Certified Fraud Examiners, UK): Technology, a tool for the fraudster
16.05 COFFEE
16.20 SESSION 4
Invited talk: David Cannings (Executive Principal for Cyber Threat Defence, NCC Group): The role of forensics in modern incident response
17.00 CLOSE
19.00 CONFERENCE DINNER
Tuesday 24th June 2014 (Day 2)
9.30 Keynote: Barry Cartwright (School of Criminology and International CyberCrime Research Centre, Simon Fraser University, Vancouver, Canada): The Battle-Line between 'Cyber Libertarians' and 'Cyber Cops': The Changing Face of Canadian Cyber Law.
10.15 SESSION 5
5.1 Michelle Govan and Kenneth Ovens (Glasgow Caledonian University): Temporal Analysis Anomalies with iOS iMessage Communication Exchange
5.2 Ethan Bayne, Ian Ferguson and John Isaacs (University of Abertay): OpenCL Acceleration of Digital Forensic Methods
11.15 COFFEE
11.35 SESSION 6
Invited talk: James Fraser (University of Strathclyde): Digital Forensics: Lessons from Other Areas of Forensic Practice
12.15 SESSION 7
7.1 James Sutherland, Natalie Coull and Allan MacLeod (University of Abertay): CPU covert channel accessible from Javascript
7.2 Diane Gan and Gary Kelly (University of Greenwich): Analysis of Attacks Using a Honeypot
13.15 LUNCH
14.30 SESSION 8
8.1 Najla Etaher and George Weir (University of Strathclyde): Understanding the Threat of Banking Malware
8.2 Kyriakos Sergiou and Ameer-Al-Nemrat (University of East London): Investigations in Black-box Penetration Techniques on Wireless Networks - Gathering Digital Evidence against Cyber-Intrusions
8.3 Katherine Darroch and George R S Weir (University of Strathclyde): Measuring Sexually Explicit Content
16.00 COFFEE
16.20 PANEL SESSION
16.45 CLOSE