Following the successful, 10th ICGS3, we have much pleasure in announcing the 11th International conference on Global Security, Safety and Sustainability. In an era of unprecedented volatile, political and economic environment across the world, computer based systems face ever more increasing challenges, disputes and responsibilities and while the Internet has created a global platform for the exchange of ideas, goods and services, however, it has also created boundless opportunities for cyber-crime.
Therefore, the role of Information systems in facilitating secure economic transactions and maintaining steady and reliable sources of information that support politically stable and sustainable socio-economic systems is becoming increasingly critical.
As increasing number of large organizations and individuals use the Internet and its satellite mobile technologies, they are increasingly vulnerable to cyber-crime threats. It is therefore paramount that the security industry raises its game to combat these threats. This is an issue of global importance as law enforcement agencies all over the world are struggling to cope.
This Annual International Conference is an established platform in which security, safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe.
The three day conference will focus on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with the 21st century living style, systems and infrastructures.
Systems Security, Safety and Sustainability Cyber Infrastructure protection
Internet of Things
Security and Systems assurance Frameworks
Safety & Security in System of Systems
Intelligent sensors for identity management
Trusted Systems and Devices
Geo-information and Geo-spatial Intelligence security systems (GIS)
Data and Telecommunication Networks security
Biometric Recognition systems and Biometry information exchange security
Networks Privacy Security
Memory Management and digital rights management units
Safety and Security Evaluation, Assessment and Certification
Modelling Approaches and Frameworks
Natural and physical resources security, protection of forest areas and management of large scale fire and events
The future of digital forensics
Cloud forensics
Computer forensics and anti-forensics
Mobile and handheld devices forensics
Chain of Custody, recovery, storage and preservation
Tools and applications
Incident response and investigation
Standards and procedures
Steganography
E-discovery and data analysis
Network traffic analysis
Case studies and best practices
Information Systems security management
Information systems
Information security management systems
Risk Management
Cyber risk management
Cyber resilience
Safety, reliability and risk analysis
Strategic approaches to security
Fraud management
IT Audit, Governance and Security
Compliance and certification
Risk assessment, methodologies and tools
Social media control, risk and governance
Cyber law and cyber arbitration
Legal and ethical aspects of digital forensics
Privacy (e.g. mail monitoring, location and mobility management, Web 2.0)
Data Protection
Confidentiality
e-Identification (e.g. Evolving EU legal framework, identity related rights)
Legal issues related to cloud computing
Jurisdiction (e.g. Cyberspace)
Electronic Commerce and virtual entities
Intellectual Property rights (e.g. copyright, trademarks)
Cyber crime
Secure Software Engineering
Security and Privacy design in traditional and cloud-based systems
Security and Privacy architecture and design for software and systems
Methods and models for Security and Privacy
Support tools for modelling Security and Privacy
Methods and tools for modelling Trust
Security and Privacy methods and tools for cloud forensics
Methods for security reengineering
Case studies in modelling secure and privacy-oriented Information Systems in cloud environments
Privacy Enhancing Technologies for the realization of trustworthy Information Systems
Human aspects in Security and Privacy
Security and Privacy Adaptation
Cyber Intelligence and operation
Cyber-crime detection and prevention
Cyber-criminology, Criminal data mining and threat Analysis and prediction
Crime information intelligence network
Cyber threat intelligence
Cyber War
Open source intelligence
Law Enforcement Agencies
Social media
Attack pattern recognition
Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) support systems
Cloud Computing Security
Enterprise Architecture Security
Security in Mobile Operating Environments
Enterprise Architecture Security
Mass interception communication solutions
Content Digitisation security and Mass Data Storage Banks protection
Counterintelligence Management
Remote system intelligence and counter measures
Access controls
Detection and remediation of security breaches
Business continuity planning
Disaster recovery planning
Black hat, White hat and grey hat hacking
Honeypots
Rootkits
Vulnerability assessments – lessons learned, Current operating system vulnerabilities and loopholes.
War driving
Wi-Fi vulnerabilities
The past, present and future of computer hacking
Technical measures for self-protection
Investigative/ mitigate methods and techniques to apprehend an offender
Computer forensic tools (types) used in investigating a crime scene, Data analysis and root cause
Forensics and assistance of hacked environment, tools (types) used in investigating a crime scene, Data analysis and root cause
Technical methods in collecting volatile and non- volatile information.
Legislation and evidence for prosecution
Cyber security education, training and awareness development
Skills to participate in a 21st century economy
Cybersecurity education and training development
Digital forensics Training and education
Certification
Cybersecurity Workforce Framework and implementations
Partnership function between academia, private sector training organisations and the governments
Cybersecrity awareness
Cyber security, resources programme and resources for schools
Improving cyberspace security through International partnership
01月18日
2017
01月20日
2017
初稿截稿日期
终稿截稿日期
注册截止日期
2009年09月01日 英国
第5次全球保密性,安全性,和可持续性国际会议2009年09月01日 英国
5th International Conference on Global Security, Safety and Sustainability
留言