International Conference On Advancement In Cyber Security And Digital Forensics
(ICACSDF2025)
(Hybrid Mode)
11th - 12th April 2025
Venue: UPES Dehradun
Event Starts in
Loading...
School of Computer Science, UPES Dehradun, is organizing the International Conference on Advances in Cyber Security and Digital Forensics. This crucial event brings together cybersecurity experts, digital forensics researchers, and information security professionals. This conference is dedicated to tackle the ever-changing cybersecurity and digital forensics challenges, highlighting the need for advanced solutions in today's rapidly evolving technological landscape. Attendees will participate in discussions, share insights, and collaborate on the latest advancements in cybersecurity strategies, threat mitigation, and digital forensic techniques. The conference is a vibrant platform for exploring emerging trends, fostering interdisciplinary dialogue, and shaping the future of cybersecurity and digital forensics amidst evolving threats and digital crimes.
Important Dates
Conference Highlights
- Best Research Paper will be awarded with a Commendation Certificate.
- Certificates will be given to all authors who will present the papers and participate in the conference.
- All peer-reviewed, accepted, and presented papers of the conference will be sent to Springer for publication in their prestigious SCOPUS Indexed book series “Lecture Notes in Networks and Systems”
- (https://www.springer.com/series/15179).
Objectives
- Share knowledge, research findings, and innovative ideas, products, and services.
- Foster collaboration, partnerships, joint projects, and business opportunities.
- Discuss and address specific challenges or issues within the cybersecurity industry.
- Engage with regulatory bodies and policymakers to address regulatory challenges.
- Explore the impact of emerging technologies on cybersecurity.
- Provide opportunities for skills development and training.
- Raise awareness about the importance of cybersecurity.
- Encourage sharing of threat intelligence and information on latest cyber threats.
- Promote research and development in cybersecurity.
- Discuss and promote industry standards, frameworks, and best practices.
- Provide insights into effective incident response and crisis management strategies.
Conference Theme
Privacy and Information Security
Privacy and Information Security address the challenges of safeguarding sensitive data while ensuring secure interactions across communication systems.
Advancements in Cryptography
Cryptography remains at the heart of data security, where cryptographic protocols ensure secure data transmission and storage.
Cyber Threat Intelligence (CTI) and Mitigation
Cyber Threat Intelligence (CTI) is a proactive approach to identifying and mitigating potential cyber threats.
Quantum Cryptography
Quantum cryptography introduces revolutionary concepts like Quantum Key Distribution (QKD) and quantum hacking countermeasures.
AI&ML in Cybersecurity
AI and machine learning (ML) have transformed cybersecurity, enabling automated detection and response to cyber threats.
Security Testing & Auditing
Security testing and auditing involve assessing and improving the security posture of IT systems.
Digital Forensics
Digital forensics collects, analyses, and preserves digital evidence to investigate cyber crimes.
Internet of Things (IoT) Security
IoT security addresses the vulnerabilities associated with interconnected devices.
Software Security
Software security involves practices that protect applications throughout their lifecycle.
Web Security
Web security involves protecting websites and applications from threats through various measures.
Security Protocols
Security protocols are essential for protecting data and communications across various systems.
Incident Response and Management
Incident response ensures timely detection and mitigation of security incidents.
Blockchain Technology: Innovations and Applications
Blockchain, a decentralized and secure system, enables the development of distributed ledgers and smart contracts.
Security Policies, Auditing, and Assurance
Effective security policies form the foundation of organizational security. Security audits and risk management ensure compliance with established standards.