Introduction
Purpose
Focus
Downloads
Sponsors
Committee
Contact
 

 PROGRAMME - DAY 1 DAY 2  DAY 3

DAY 1 - WEDNESDAY, 9 JULY 2003

07:30 – 08:30 Registration
09:00 – 09:10 Conference day opening and welcome
09:10 – 09:50 Key note speaker - Information Security Management - State-of-the-Art and Future Trends, Prof. Dr. Stephanie Teufel: Director of the International Institute of Management in Telecommunications (iimt). Fribourg University, Switzerland
09:50 – 10:30  Eight key steps of business continuity, Rich Schiesser, Senior Technical Planner at Option One Mortgage, USA
10:30 – 11:00 

Tea 

11:00 – 11:30  Business Continuity Management, Rikus Matthyser: Executive, Telkom Business Integration Services, Telkom
11:30 – 12:10  IT Governance, Graham Blain, Partner in Information Risk Management, KPMG 
12:10 - 12:50  IT Risk Management, Les Stevens, Risk and Security Practice Leader, META Group South Africa
12:50 – 13:50 

Lunch 

Stream 1 – IS Policies
 (reviewed papers)
Session Chairperson: 
Stream 2 –  Corporate Security (reviewed papers)
Session Chairperson:
13:50 – 14:20  Information Security Policies, Karen Hφne, Head of Governance and Information Security, Gensec Bank  Information Security Governance - A practical Approach, Sanjay Ramjee, Manager: Technical Information Security, Transnet
14:20 – 14:50 Policy Compliance Indicators, Kobus Burger, Partner, Security Services Group, Deloitte & Touche Why Do Security Awareness Programmes Fail?, Geoffrey Tumber, Infosecure
14:50 – 15:20 Corporate Information Technology Security Policies, Gavin Bromfield, Kentron Implementing a Nationwide Information Security Awareness Approach, Paul Straus, Head of Information Security, ABSA
15:20 – 15:50 

Tea 

Stream 3 – Access Control
(reviewed papers)
Session Chairperson 
Stream 4 – Security Attacks
(reviewed papers)
Session Chairperson
15:50 – 16:20  Access Control in a Distributed Object Environment Using XML and Roles, Jason Crampton and Hemath Khambhammettu, Information Security Group, Royal Holloway, University of London, United Kingdom  Vulnerability Detection, HS Venter, JHP Eloff, Department of Computer Science, University of Pretoria, Pretoria 
16:20 – 16:50 Access Control for E-Commerce using Mobile Agents, Christos K Georgiadis, Dimitris Baltatzis and George I Pangalos, Informatics Lab, Computers Division, Faculty of Technology, Aristotle University of Thessaloniki, Greece Attack Analysis of Cryptographic Protocols Using Strand Spaces, Simon Lukell and Andrew Hutchison, University of Cape Town, Rondebosch
16:50 – 17:20 Access Control Requirements for Content Management Systems, Andre Reyneke, Reinhardt Botha, Stephen Perelson, Faculty of Computer Studies, Port Elizabeth Technikon, Port Elizabeth  Training Misuse Intrusion Detection Systems in a Honeypot Environment, Richard Noble and Rossouw von Solms, Department of Information Technology, Port Elizabeth Technikon
17:20 - 17:35
(research papers)
Integrity for Form-Based Input: Towards an XML Schema-Based Approach, John van Zyl, Reinhardt Botha, Dalenca Pottas, Faculty of Computer Studies, Port Elizabeth Technikon, Port Elizabeth Information Security Auditing: The Missing Link?, Cheryl Vroom and Rossouw von Solms, Department of Information Technology, Port Elizabeth Technikon, Port Elizabeth