|
Table of
Contents - Day 2 of Conference Programme
DAY 2 -
Thursday, 30 June 2005 |
07:30–09:00 |
Registration |
|
Session Chairperson: |
09:00-09:10 |
Welcome address |
09:10-09:50 |
TBA |
09:50-10:20 |
An overview of Information Security in the South African Government,
Gareth Warner, Office of Home Affairs and Treasury, South African
 |
10:20-10:50 |
Tea |
|
Session Chairperson:
|
10:50-11:20 |
Information Security: What has NOT changed, Dr Karin Badenhorst,
Ernest & Young, Risk and Advisory Services, South Africa
 |
11:20-11:50 |
Cyber Griping: Freedom of expression or abusive domain name registration?,
Prof Tana Pistorius, Department of Commercial Law, UNISA, South Africa
 |
11:50-12:20 |
Business Continuity Management - Practical Considerations, Craig
Grieve, KPMG, South Africa
 |
12:20-13:00 |
Plenary session: An
Identity Management Architecture for the Government of Canada, Alice
Sturgeon, Senior Director, Architecture Domains, Chief Information
Officer Branch, Treasury Board of Canada, Secretariat, Government of Canada.

Alice Sturgeon manages the area that is accountable for identifying and
architecting horizontal requirements across the Government of Canada, in the
value domains of privacy, security, accessibility, official languages,
resiliency, accountability and transparency, leveraging the power and
applicability of technologies such as biometrics, smart tokens, public key
encryption, and emphasising common and shared systems. She is accountable
for the architecture models and principles of both the value domains and the
strategic architecture domains of business, information, technology, and
application/solution. |
13:00-14:00 |
Lunch |
|
Stream 10:
Encryption (Reviewed Papers)
Session Chairperson: |
Stream 11:
Culture (Reviewed Papers)
Session Chairperson: |
Stream 12:
Legal and Regulatory (Reviewed Papers)
Session Chairperson: |
14:00-14:30 |
Cryptographic
Key Management principles applied in South African Internet Banking, Emile
Parkin, NamITech, South Africa
 |
Information
Security Culture – Status Quo in Switzerland, Thomas Schlienger, Stephanie
Teufel & Raphael Rues, University of Fribourg, Switzerland
 |
An approach to
enhance the security of ICT infrastructure through legal, regulatory
influences, Charles N.Tarimo, Louise Yngström & Stewart Kowalski, Royal
Institute of Technology / Stockholm, University, Sweden
 |
14:30-15:00 |
Attacking
Signed Binaries, Marco Slaviero, Jaco Kroon,, Martin Olivier, University of
Pretoria, South Africa
|
A holistic
framework for the fostering of an information security sub-culture in
organizations., Johan van Niekerk, Rossouw von Solms, Nelson Mandela
Metropolitan University, South Africa
 |
Information
Security Management and Regulatory Compliance in the South African Health
Sector, T. Tuyikeze, D. Pottas, Nelson Mandela Metropolitan University,
South Africa
 |
15:00-15:30 |
Unlocking the
armour : enabling intrusion detection and analysis of encrypted traffic
streams, Barry Irwin, Rhodes University, South Africa
|
A new Access
Control model based on the Chinese Wall Security Policy Model, M Loock, Jan
Eloff, University of Pretoria, South Africa
 |
Access to
copyrighted work: right or privilege?, M. Jansen, University of South
Africa, South Africa
 |
15:30-16:00 |
|
|
???,
T. Pistorius, University of South
Africa, South Africa
 |
15:30–16:00 |
Tea |
|
Stream 13:
Technical (Reviewed Papers)
Session Chairperson: |
Stream 14:
Trust (Reviewed Papers)
Session Chairperson: |
Stream
15:
ERP Security (Reviewed Papers)
Session Chairperson: |
16:00-16:30 |
An overview of
image steganography, T. Morkel, Jan Eloff, Martin Olivier, Hein Venter,
University of Pretoria, South Africa
 |
Trust on the
Web, Russell Cloran, Barry Irwin, Rhodes University, South Africa
 |
A security
framework for an ERP system, Carl Marnewick, L Labuschagne, University of
Johannesburg, South Africa
 |
16:30-17:00 |
IT Forensics:
the collection of and presentation of digital evidence, Johann Hershensohn,
Atos Origin, South Africa
 |
Metadata for
trust in service-oriented architectures, M. Coetzee, J. H. P. Eloff,
University of Pretoria, South Africa
 |
ERPSEC – A reference framework to enhance security in ERP
systems, Manfred P. Hertenberger, Basie von Solms, Siemens Business
Services, South Africa
 |
|
Stream 16:
(Research-in-progress Papers)
Session Chairperson: |
Stream 17:
Digital forensics (Research-in-progress
Papers)
Session Chairperson: |
Stream 18:
(Research-in-progress Papers)
Session Chairperson: |
17:00-17:15 |
Infosec Risk
Mitigation Process - Reliance on Demonstrated Diligence, Joss Bernstein, Investec, Group Operational Risk, South Africa
 |
Using
Self-Organising Maps for Anomalous Behaviour Detection in a Computer
Forensic Investigation, B.K.L. Fei, J.H.P. Eloff, H.S. Venter, M.S. Olivier,
University of Pretoria, South Africa
 |
Educating for
Security: An Academic’s Contribution, Ludmilla Simeonov, Massey University @
Wellington, New Zealand
 |
17:15-17:30 |
The blinding
side effects of vulnerability assessments, Nithen Naidoo, Deloitte & Touche`,
South Africa
 |
Should Digital
Forensics be part of an information security architecture?, T Grobler,
University of Johannesburg, South Africa
 |
Information
Security Awareness and Training - The Legal Cost of Untrained Personnel, V. Etsebeth, University of Johannesburg, South Africa
 |
17:30-17:45 |
Identity and
Access Management – Old processes new processing, Karel Rode, Computer
Associates Africa, South Africa
 |
Computer
forensics for a computer-based assessment: the preparation phase, R. Laubscher, D.J Rabe , M.S Olivier , J.H.P Eloff , H.S Venter, Stellenbosch
University, South Africa
 |
Neural Network
Based Camouflaging in still image, J.Selvaraj R.Balasubramaniam,
Manonmaniam Sundaranar University, Tirunelveli, India
 |
17:45-18:00 |
Securing IBM
mainframe based Web Services using Kerberos, Gustav Mauer, IONA
Technologies, South Africa
 |
Using the IPDR
standard for NGN billing and fraud detection, Madeleine Bihina, Jan Eloff,
Martin Olivier, University of Pretoria, South Africa
 |
Windows Server
Update Services Review, Dominic White, Barry Irwin, Rhodes University, South
Africa
 |
|
19:00-23:00 |
Gala dinner & Entertainment |

|