|
 |
|
 |
DAY 1 - WEDNESDAY,
9 JULY 2003 |
07:30 08:30 |
Registration |
09:00 09:10 |
Conference day opening
and welcome |
09:10 09:50 |
Key
note speaker - Information Security
Management - State-of-the-Art and Future Trends, Prof.
Dr. Stephanie Teufel: Director of the International Institute
of Management in Telecommunications (iimt). Fribourg University,
Switzerland |
09:50 10:30 |
Eight
key steps of business continuity,
Rich Schiesser, Senior Technical Planner at Option
One Mortgage, USA |
10:30 11:00 |
Tea |
11:00 11:30 |
Business
Continuity Management, Rikus
Matthyser: Executive, Telkom Business Integration
Services, Telkom |
11:30 12:10 |
IT
Governance, Graham
Blain, Partner in Information Risk Management, KPMG |
12:10 - 12:50 |
IT
Risk Management, Les
Stevens, Risk and Security Practice Leader, META Group
South Africa |
12:50 13:50 |
Lunch |
|
Stream
1 IS Policies
(reviewed papers)
Session Chairperson: |
Stream 2 Corporate Security (reviewed papers)
Session Chairperson: |
13:50 14:20 |
Information
Security Policies, Karen Hφne, Head of Governance
and Information Security, Gensec Bank |
Information Security Governance
- A practical Approach, Sanjay Ramjee, Manager: Technical
Information Security, Transnet |
14:20 14:50 |
Policy Compliance Indicators,
Kobus Burger, Partner, Security Services Group, Deloitte
& Touche |
Why
Do Security Awareness Programmes Fail?, Geoffrey
Tumber, Infosecure |
14:50 15:20 |
Corporate Information
Technology Security Policies, Gavin Bromfield, Kentron |
Implementing
a Nationwide Information Security Awareness Approach,
Paul
Straus, Head of Information Security, ABSA |
15:20 15:50 |
Tea |
|
Stream
3 Access Control
(reviewed papers)
Session Chairperson |
Stream 4 Security Attacks
(reviewed papers)
Session Chairperson |
15:50 16:20 |
Access
Control in a Distributed Object Environment Using XML
and Roles, Jason Crampton and Hemath Khambhammettu,
Information Security Group, Royal Holloway, University
of London, United Kingdom |
Vulnerability
Detection, HS Venter, JHP Eloff, Department of Computer
Science, University of Pretoria, Pretoria |
16:20 16:50 |
Access
Control for E-Commerce using Mobile Agents, Christos
K Georgiadis, Dimitris Baltatzis and George I Pangalos,
Informatics Lab, Computers Division, Faculty of Technology,
Aristotle University of Thessaloniki, Greece |
Attack
Analysis of Cryptographic Protocols Using Strand Spaces,
Simon Lukell and Andrew Hutchison, University of Cape
Town, Rondebosch |
16:50 17:20 |
Access
Control Requirements for Content Management Systems,
Andre Reyneke, Reinhardt Botha, Stephen Perelson, Faculty
of Computer Studies, Port Elizabeth Technikon, Port Elizabeth |
Training
Misuse Intrusion Detection Systems in a Honeypot Environment,
Richard Noble and Rossouw von Solms, Department of Information
Technology, Port Elizabeth Technikon |
17:20 - 17:35
(research papers) |
Integrity
for Form-Based Input: Towards an XML Schema-Based Approach,
John van Zyl, Reinhardt Botha, Dalenca Pottas, Faculty
of Computer Studies, Port Elizabeth Technikon, Port Elizabeth |
Information
Security Auditing: The Missing Link?, Cheryl Vroom
and Rossouw von Solms, Department of Information Technology,
Port Elizabeth Technikon, Port Elizabeth |
|
|
|
  
|
|
|
 |