Conference Overview

      The 13th China Computer Forensic Conference, sponsored by The Third Research Institute of Ministry of Public Security, will be held at Hetian Hotel, on 2017, May 23rd through 25th. We sincerely invite you to attend this conference on that day.

       China Computer Forensic Conference, or CCFC, is a high-level international annual event of technical communications, which represents the overall development of International Cyber Space Security, Data Security and Digital Forensics Technology across globe, and also which leads the trend of future development. The theme of the conference this year is “Cyber Space Security and Digital Forensics”, basing the direction of what is going to be discussed and studied under the modern age background labeled as “Mobile Internet Age”, “Big Data Era” and “IoT Age”. The topics touch on many aspects such as Internet Attack and Defense, Network Forensics, Mobile Intelligent Terminal Forensics, Malicious Code Forensics, Data Recovery, Depth Analysis, Password Cracking, etc. Attending this conference will bring you the most recently updated information of the latest technology in the field of International Digital Forensics and Information Security.



Conference Agenda

Theme Speech on Tuesday, May 23rd
Time Topic Speaker
8:00-9:00 Registration
Hubei Branch National Procurators College, Wuhan City
Opening Speech

Jin Bo

The Third Research Institute of Ministry of Public Security
The Study and Training on Computer Forensics - Past, Present, Future
Information Security and Forensics Society
Modern Audit Theory From the Perspectives of Internet Security and Digital Forensics


Wuhan Branch of Grant Thornton International Co., Ltd.

Forensics Analysis of Internet Attack and Defense & Tracking


Shen Zhou Wang Yun Information Technology Co., Ltd.

Theoretical Practice and Coping Strategies for Surveyors in Court


The Third Research Institute of Ministry of Public Security

10:30-10:50 Tea Break
LoT Security
Product Internet Security Center of Panasonic Co., Ltd.
A visualized Method of Analysis on Pyramid Selling Cases

Hubei University of Police

The Similarity Comparison on Binary Executable Files Applied to Forensics
Shanghai Public Security College
Application scenarios of Data Analysis Tools in Public Security and the Inspiration
International Business Machine Corporation (IBM)
The Law Enforcement of Internet Attack and Defense and its Future Development
Da Lian Public Security Bureau of Hubei Province
12:30-13:30 Lunch
Analysis of Electronic Data Identification
Nanjing University of Posts and Telecommunications
The Deletion and Recovery of Data on Solid State Drive
Institute of Information Engineering, CAS
The Forensics Research and Analysis on APT Attack
Tai Wan Police College
14:30-14:50 Tea Break
Deep Web Information Analysis
Shandong Police College
Active Forensics Research on Clients Collaborated with Clouds
Computer School of Wuhan University
The Application Situation and Coping Strategies Analysis of Content Security and Identity Authentication
Naval University of Engineering, PLA
The Research on the Framework of Digital Forensics Based on Hadoop Wang Yuanzheng
Digital Evidence Identification Center of Hubei Public Security Department
Cracking Techniques Against CERBER Ransomware Qi Jun
The Development and Exploration of Visual Analysis on Big Data Zhu Huayu
18:30 Dinner

Speakers

http://xforensic.com/wp-content/uploads/3.jpg

Zhang Xuan

Topic

Secretary, Cyber Space Security and Law Enforcement Innovation Center, Shangdong Police College

Member of Computer Forensics Expert Committee of Chinese Institute of Electronics

Deputy Director, Information Security and Cryptography Research Center of Hongkong University


Deep Web Information Analysis

http://xforensic.com/wp-content/uploads/3.jpg

Zhang Zhipin

Topic

Lecturer at Tai Wan Police College


The Forensics Research and Analysis on APT Attack

http://xforensic.com/wp-content/uploads/3.jpg

Liu Haoyang

Topic

Chief of the 7th Battalion, Dalian Public Security Bureau

Expert in Internet Investigation in Liaoning Province

Director Adjudicator, China National Accreditation Service for Conformity of Assessment

Member of Computer Forensics Expert Committee of Chinese Institute of Electronics


The Law Enforcement of Internet Attack and Defense and its Future Development

http://xforensic.com/wp-content/uploads/3.jpg

Cai Yimo

Topic

Visualization Analyst, IBM


Application scenarios of Data Analysis Tools in Public Security and the Inspiration

http://xforensic.com/wp-content/uploads/3.jpg

Song Chao

Topic

Expert at Advanced Malicious Attack Detection


Forensics Analysis of Internet Attack and Defense & Tracking

http://xforensic.com/wp-content/uploads/3.jpg

Lin Yongxi

Topic

Head of the Asia Pacific Region, PANASONIC Product Internet Security Center of Panasonic Co., Ltd.



LoT Security

http://xforensic.com/wp-content/uploads/3.jpg

Sun Guozi

Topic

Deputy Director, Computer Technology Research Institute, Najing Universities of Posts and Telecommunications

Senior Member of China Computer Federation & Chinese Institute of Electronics

Director, China Network Security Association

Member of IEEE CS SSA & ISFS


Analysis of Electronic Data Identification

Guo Hong

Topic

Associate Researcher, The Third Research Institute of Ministry of Public Security

Judicator of Accreditation on Laboratory, CNAS

Judicator of Proficiency Testing, CNAS


Theoretical Practice and Coping Strategies for Surveyors in Court

Cui Xiaochen

Topic

Engineer of Shanghai Police College

Master of Software Engineering


The Similarity Comparison on Binary Executable Files Applied to Forensics

Du Dan

Topic

Researcher, Institute of Information Engineering, CAS


The Deletion and Recovery of Data on Solid State Drive

Wang Yuanzheng

Topic

Technical Director, Digital Forensics Center of Hubei Public Security Ministry

Adjudicator on probation, CNAS


The Research on the Framework of Digital Forensics Based on Hadoop

Zhang Jun
Mai Yonghao

Topic

Associate Professor, Information and Technology Department of Hubei University of Police

Lead Researcher, Digital Forensics Joint Laboratory for Hubei University of Police and theUniversity of Hong Kong


Professor & Director, Digital Forensics Key Laboratory of Hubei University of Police

Director, Digital Forensics Joint Laboratory for Hubei University of Police and theUniversity of Hong Kong


A Visualized Method of Analysis on Pyramid Selling Cases

Jin Xin

Topic

Senior Fellow of the Chinese Institute of Certified Public Accountants Charted Accountant of ACCA


Modern Audit Theory From the Perspectives of Internet Security and Digital Forensics

Organizer

Tian Yu Ning Da is a professional technology service company, which provides various technical products of computer forensics,data recovery, password cracking, and data destruction, and which offers services in computer forensics training, digital evidence identification, etc. Tian Yu Ning Da is one of the few companies with qualification of business confidential protection consultancy service.
Tian Yu Ning Da has developed close cooperative relationships with many International computer forensics experts and well-known products development corporations in this field, and has earned trusts from them across globe. At the present, Tian Yu Ning Da is an authorized reseller and distributor in China of many international computer forensics products development companies such as Finaldata Company (South Korea), X-Ways Company (Germany), ForensicsMatter Company (Australia), ASRdata Company (USA), SubRosasoft Company (USA), Elcomsoft Company (Russia), Company (Australia), F-Response Company (USA), Forensicsoft Company (USA), Belkasoft Company (Russia), etc. Tian Yu Ning Da is not only responsible for the agent products but also provides with technical support by the principle of integrity.

Besides, Tian Yu Ning Da is possessed of training qualifications authorized by international forensics products development corporations. And this company has designed a practical training course based on the latest computer forensics technology, which consists of 12 modules, lasting for 5 days.