The list of topics includes (but are not limited to):
Cyber Defence
- Systems Security, Safety and Sustainability
- Cyber Infrastructure Protection
- The advancement of Artificial Intelligence in cyber defence
- Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) Support Systems
- Augmented Humanity and cyborgs
- Internet of everything things
- Security of Medical Data for Smart Healthcare
- SCADA and Ransomware
- Cyber Warfare
- Larger Scale Systems Protection and Resilience
- Biohacking and bio-computing Threat/ Attack Vectors
- Tactics, Techniques and Procedures
- Predictive Control and Analysis of Cyber Attacks
- Attack Vectors & APTS (Advanced Persistent Threats)
- Red-teaming, Blue-teaming and Purple-teaming Strategies
- Digital Twins
- Intelligence Led penetration testing
- Blockchain and smart contracts
- Biometric Recognition Systems and Biometry Information Exchange Security
- Big data – from criminals angle and law enforcers angle
- 5G and Smart cities
- Black, White and Grey Hat Hacking
- Vulnerability Assessments – Lessons Learned on Current Operating system Vulnerabilities and Loopholes
- War Driving
- The Past, Present and Future of Computer Hacking
Cyber Intelligence and Operation
- Digital leadership and Governance
- Cyber-Crime Detection and Prevention
- Crime Information Intelligence Network
- Cyber Threat Intelligence
- Cyber War
- Open Source Intelligence
- Law Enforcement Agencies
- Social Media
- Attack Pattern Recognition
- Enterprise Architecture Security
- Counterintelligence Management
- Digital footprint
- Deepfake
- Impact of technology on crime investigation (policing)
Cyber Criminology
- Domestic Abuse in smart societies
- Cyber Criminology, Theories and Models
- Psychology of the Cyber Criminals
- Criminal Data Mining, Threat Analysis and Prediction
- Crime and Social Media
- Victimisation
- Radicalisation, social media, Terrorist Threats
- Cybercrime Justice Models
- The role of Big data
- Dark Web/ Darknet
- Cyber Bullying, Stoking
- Cybercrime Punishment
- Virtual courtrooms and judges
- The rule of law in digital era
- Identity forgery, digital twins and digital data leakage
Ethics in Smart and AI driven societies
- Smart Societies and Data Exploitation
- Human-Centric Society
- Age of Artificial Intelligence (AI)
- Moral and Ethical implications of Digital Societies
- Privacy of Medical Data for Smart Healthcare
- Data Ownership, GDPR, Digital foot print, privacy and transparency
- Internet of Things (IOT) Interactions
- Growth of Smart Wearables & Wearable Body Area Networks (WBAN)
- Situational Awareness
- Insider Threat – The Human Element
Information Systems Security Management
- Risk Management
- Cyber Risk Management
- Modelling Approaches, Security and Systems Assurance Frameworks
- Cyber Resilience
- Safety, Reliability and Risk Analysis
- Safety and Security Evaluation, Assessment and Certification
- Strategic Approaches to Security
- Fraud Management
- IT Audit, Governance and Security
- Compliance and Certification
- Risk Assessment, Methodologies and Tools
- Social Media Control, Risk and Governance
- Security and Privacy Architecture and Design For Software and Systems
- Methods and Models for Security and Privacy
- Support Tools for Modelling Security and Privacy
- Methods and Tools for Modelling Trust
- Human Aspects in Security and Privacy
- Security in Connected world
The Future of Digital Forensics
- Biohacking and bio-computing attacks
- Deepfake investigations
- Online open source investigations (OSINT)
- Device Forensics investigation including, mobile, IoT, IoMT, etc
- Cyber Threat Intelligence
- Cybersecurity Kill Chain
- Data Encryption Algorithms
- Biometrics and Cybersecurity
- Wearables and Implantable
- Socio-Technical Security: User Behaviour, Profiling and Modelling and Privacy by Design
- Decoding Encrypted Data Using Cryptography
- Hiding and Storing IoT Data in the Cloud
- IoT Forensics Toolbox
- Securing and Collecting IoT Devices at the Crime Scene
- Forensic Acquisition and Analysis of Drone Data
- Forensic Acquisition and Analysis of Wearables Data
- Forensic Acquisition and Analysis of Home Assistant Data
- Presenting Digital Evidence as an IoT Forensic Expert
- Case Studies and Best Practices
- Legal and Ethical aspects of Digital Forensics
|