Cyber Incident 2022

Toward a Cyber Recovery Operational Framework

 

On-site / Hybrid

Cardiff School of Technologies (CST), Cardiff Metropolitan University, Wales, United Kingdom

June 20 – 21, 2022

Call for Paper submission is now open

Call for Papers

International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2022) is an international refereed conference dedicated to the advancement of Cyber Incident Response, Coordination, Containment and Control.

The aim of the Cyber Incident 2022 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures.

Cyber Incident 2022 invites researchers and industry practitioners to submit papers that encompass principles, analysis, design, methods and applications. All submitted papers are independently peer-reviewed. The conference is open to the public, so you can attend the event without presenting a paper. Registration for both authors and attendees (without presenting a paper) opens in March 2022. You are welcome!

The conference proceedings will be submitted for consideration for publishing and listing on the following bibliographic indexes:

  • DBLP Computer Science, and
  • Others – e.g. Scopus, CiteSeerX, Computer Science Index, EI Compendex, Academic Search Complete, CiteULike, Google Scholar & Microsoft Academic Search.

Details

Cyber Incident 2022 is co-located with other conferences as part of Cyber Science 2022

  • Posters will be presented during the conference.
  • Industry track is available for discussing and publishing pilot and proof of concepts.
  • Work in Progress track is available for preliminary work.
  • Research Ideas track is available for ideas in early stages assessment.
  • PhD Seminar track is available for discussing and publishing early PhD thesis research.

 

Paper Submission

The deadline for all paper submissions, that is, both full papers and extended abstracts for Poster, WIP, PoC, Research Idea and PhD Seminar presentations is 28 February 2022.

All Industry track, Work in Progress track, Research Ideas track and PhD Seminar track will be published in the conference proceedings. Interested participants, please submit your proposal using the online submission system hosted by Easychair Conference Portal.

Full paper submission should be via Easychair Conference Portal.

 

Online Submission

The online submission process is now open!

Please prepare your paper according to the formatting guidelines (Word document/PDF template/LaTeX). Use the A4 paper type.

Authors must use the online submission systems hosted by EasyChair Conference System to submit their papers. Please use/download theA4 paper template, and specify which conference your submission is to peer-reviewed against. If you don’t have an EasyChair account you will need to create one and then login in order to submit your papers. Please read the Submission Instructions before submitting your work in the system.

Submission Instructions

Both long (8 pages max., roughly 8,000 words) and short (4 pages max., roughly 4,000 words) paper submissions should be written in English and be submitted electronically via the EasyChair conference portal. Submission file formats are PDF and Microsoft Word using the A4 Paper template that can be found at the corresponding C-MRiC website. Authors wishing to present a Poster, Industry Proof of Concept (PoC), Work in Progress (WIP), Research Ideas, or PhD Seminar may submit a 2page extended abstract using the online submission systems hosted by EasyChair Conference System, which, if accepted, will appear in the conference proceedings.

Topics of Interest

    • Cyber Incident Analysis
    • Cyber Incident Triage
    • Cyber Incident Correlation and Assessment
    • Coordination
    • Containment
    • Root Cause Analysis (RCA)
    • Timeliness
    • Handling and Handling Process
    • Reporting
    • Escalation
    • Cyber Incident Management
    • Decision Control
    • Emergence Services
    • Preparedness
    • Readiness
    • Analysis
    • Risk Management
    • Conditionality
    • Proportionality
    • Prioritisation
    • Decision Making
    • Risk-Based Decision
    • Human in the Loop
    • Training
    • Processes and Procedures
    • Policy and Standards
    • Emergency  Services
    • Chain of Custody
    • Forensic Readiness and Investigations
    • Cyber Incident Notification and Announcements
    • Cyber Incident Management Tool
    • Standardisation
    • Framework and Methodology
    • Expertise, Skills, Knowledge and Resource
    • Maturity Model and Goal Setting
    • Certification and Accreditation
    • Memberships to Cyber Incident Responders, Incident Response Organisation
    • Rule-Based Systems
    • Expert Systems
    • Adaptive Learning Systems
    • Predictive Systems
    • The use of Biometrics to aid Forensic Investigations
    • Speak, audio and voice Recognition for forensics
    • Correlation and cross-correlation for Incident Analysis
    • Cross-Domain Analysis
    • Cross-Channel Incident Analysis
    • Multi-domain Analysis
    • Digital Forensics Principles, Rules and Standards
    • Digital Forensic Investigations
    • Speak, audio and voice Recognition for forensics
    • Chain of Custody
    • Mobile Forensics
    • Live data and live stream forensics
    • Live Imagery Forensics
    • Memory Forensics
    • Browser and Cache Memory Forensics
    • Cyber Incident Playbook
    • Cyber Incident Management
    • War-room exercises
    • Attack Scenarios and Exercise
    • Cyber Incident Response
    • Command Controls – Bronze, Silver & Gold Command
    • Cause of Action (CoA)
    • Root Cause Analysis
    • Data-Centric System Threat Modelling
    • Attack Tree
    • Exploits and Attack Modelling
    • Attack Vector and Attack Surface
    • Risk, Control and Control Objectives
    • Analysing Threat Modelling
    • Cyber Incident Management
    • Business Continuity Plan and Measures
    • Root Cause Analysis
    • Security Metrics
    • Threat Intelligence

Speakers


Important Dates


  • Industry (Proof of Concept / Pilot) Submission –  28 February 2022
  • Extended Abstract (Work in Progress) –  28 February 2022
  • PhD Seminar Submissions – 28 February 2022
  • Research Ideas – 28 February 2022
  • Poster/Demo Submissions – 28 February 2022
  • Special Track Submissions – 28 February 2022
  • Workshops and Tutorials Submissions – 28 February 2022
  • Full Paper Submissions – 28 February 2022
  • Notification of Full Paper/Abstract / Special Track Acceptance/Rejection –  April 26, 2022
  • Camera Ready Paper Due – May 14, 2022
  • Participants Registration – March 26 – May 31, 2022
  • Conference Date –  June 20 – 21, 2022


Location


On-site / Hybrid

Cardiff School of Technologies (CST)

Cardiff Metropolitan University, Wales, UK



Registration


BOOK NOW

Programme Committee


    • Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
    • Frank Wang – Computer Society, IEEE UK & Ireland
    • Arnau Erola – Cyber Security Centre, Department of Computer Science, University of Oxford, Oxford, UK
    • Aunshul Rege – Temple University, Pennsylvania, USA
    • Hanan Yousry Hindy – School of Design and Informatics, Abertay University, Dundee, Scotland
    • Xavier Bellekens – University of Strathclyde, Scotland, UK
    • Martin Gilje Jaatun – University of Stavanger, Norway
    • Pierangelo Rosati – Dublin City University, Dublin, Ireland
    • Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
    • Chaminda Hewage – Cardiff School of Technologies (CST), Cardiff Metropolitan University, Wales, UK
    • Elochukwu Ukwandu – Cardiff School of Technologies (CST), Cardiff Metropolitan University, Wales, UK
    • Liqaa Nawaf – Cardiff School of Technologies (CST), Cardiff Metropolitan University, Wales, UK
    • Fiona Carroll – Cardiff School of Technologies (CST), Cardiff Metropolitan University, Wales, UK
    • Abdelrahman Abuarqoub – Cardiff School of Technologies (CST), Cardiff Metropolitan University, Wales, UK
    • Mohammad Safar – Cardiff School of Technologies (CST), Cardiff Metropolitan University, Wales, UK
    • Tahir Sheikh Bakhsh – Cardiff School of Technologies (CST), Cardiff Metropolitan University, Wales, UK
    • Arslan Ahmad – Cardiff School of Technologies (CST), Cardiff Metropolitan University, Wales, UK
    • Thanuja Mallikarachchi – Cardiff School of Technologies (CST), Cardiff Metropolitan University, Wales, UK
    • Uwe Glässer – School of Computing Science, Simon Fraser University, Canada
    • Arnau Erola – Department of Computer Science, University of Oxford, UK
    • Tim D Williams – Cyber Security, London, UK
    • Michal Chorasm – Telecommunications and Computer Science, University of Science and Technology (UTP), Bydgoszcz, Poland
    • Hayretdin Bahsi – Center for Digital Forensics and Cyber Security, Tallin University of Technology, Estonia
    • Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA
    • Jens Myrup Pedersen – University of Aalborg, Denmark
    • Uwe Glässer – School of Computing Science, Simon Fraser University, Canada
    • Marios Anagnostopoulos – University of the Aegean, Greece
    • Ciza Thomas – College of Engineering, India
    • Stefanos Gritzalis – University of the Aegean, Greece
    • Janne Merete Hagen – Norwegian Defence Research Establishment, Norway
    • Varun Dutt – Indian Institute of Technology Mandi, India
    • Georgios Kambourakis – University of the Aegean, Greece
    • Eliana Stavrou – Computing Department, UCLan Cyprus, Larnaca, Cyprus
    • Tim D Williams – Cyber Security, London, UK
    • Palvi Aggarwal – Carnegie Mellon University (CMU), USA
    • Chaminda Hewage – Cardiff School of Technologies (CST), Cardiff Metropolitan University, Wales, UK
    • Elochukwu Ukwandu – Cardiff School of Technologies (CST), Cardiff Metropolitan University, Wales, UK
    • Liqaa Nawaf – Cardiff School of Technologies (CST), Cardiff Metropolitan University, Wales, UK
    • Sean Mckeown – Edinburgh Napier University, Scotland, UK
    • Arghir-Nicolae Moldovan – National College of Ireland (NCIRL), Ireland
    • Domhnall Carlin – Queen’s University (QUB), Belfast, Northern Ireland, UK
    • Kim Tam – Plymouth University, UK
    • Felix Heine – Hannover University of Applied Sciences, Germany

Related Conferences:

Cyber SA 2022

8th IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2022).

View More

Social Media 2022

8th International Conference on Social Media, Wearable and Web Analytics (Social Media 2022).

View More

Cyber Security 2022

8th IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2022).

View More


Previous Conferences


Cyber Incident 2021

Cyber Incident 2020

Cyber Incident 2019