Invited Speakers

The invited and guest speakers refer to those speakers who have been invited as keynote and industry speakers respectively.  Keynote speakers are reputable speakers since they are experts in their filed of practice. Industry speakers talk about the local and international trends in information security products, methodologies and management issues. ISSA aims to balance talks from industry and academia, and therefore, keynote and invited speakers fulfill a key role in order to strike such a balance between industry and academia. These keynote and invited speakers are listed below in no particular order:

Speaker
             Topic

Guest Speaker: Hettie Booysen - Head Operational Risk Enabling Functions, Standard Bank of South Africa
 
Risk Management – myth, black swan or value add?

Guest Speaker: Andrew Hutchinson - International Programme Executive CyberSecurity T-Systems International
 
A misuse-case based approach for providing CyberSecurity

Keynote address: Christian Damsgaard Jensen
 
Trust is the Foundations for Computer Security

Abstract: The security community traditionally regards security as a ``hard'' property that can be modelled and formally proven under certain simplifying assumptions. Traditional security technologies assume that computer users are either malicious, e.g. hackers or spies, or benevolent, competent and well informed about the security policies. Over the past two decades, however, computing has proliferated into all aspects of modern society and the spread of malicious software (malware) like worms, viruses and botnets have become an increasing threat. This development indicates a failure in some of the fundamental assumptions that underpin existing computer security technologies and that a new view of computer security is long overdue. This talk examines traditional models, policies and mechanisms of computer security in order to identify areas where the fundamental assumptions may fail. In particular, we identify areas where the ``hard'' security properties are based on trust in the different agents in the system and certain external agents who enforce the legislative and contractual frameworks. Trust and Trust Management are generally considered ``soft'' security properties, so building a ``hard'' security mechanism on trust will at most give a spongy result, unless the underlying trust assumptions are made first class citizens of the security model. In most of the work in computer security, trust assumptions are implicit and they will surely fail when the environment of the systems change, e.g. when systems are used on a global scale on the Internet. We argue that making such assumptions about trust explicit is an essential requirement for the future of system security and argue why the formalisation of computational trust is necessary when we wish to reason about system security.


Guest Speaker: Azhad Desai – Researcher: Thinkst
 
Theory, Practice and HoneyPots

Guest Speaker: Maeson Maherry , Solutions Director, LAWTrust 
 
Digital identities on the national ID card

Guest Speaker: Maiendra Moodley, Divisional Head (GM) for Financial Systems and Processes, SITA
 
The privacy paradox: implications for security practitioners

Keynote address: Christian Damsgaard Jensen
 
Computer Security in 3D

Abstract: Computer Security has traditionally presumed the physical security of key components, i.e. that these components are protected from tampering and that they can only be accessed through well-known channels using pre-defined protocols (whether these protocols are also secure or simply well-defined is a separate issue). We traditionally solve this requirement by locking up servers, gateways and routers in server rooms and provide individual offices for access to sensitive material to reduce the risks of shoulder surfing. With the emergence of laptops, tablets and smart phones, we have come to expect ubiquitous access to corporate resources, which breaks down the standard barriers of physical security. This is exacerbated by the increasing reliance on open plan offices which effectively reduces the confidentiality of that anything displayed on a monitor, either in the office or from any of the many locations from where we work. This talk examines the application of smart technologies to achieve situational awareness, through the use of sensors, and enforce the security policies defined for the computer system in a physical environment. This allows the security model to incorporate information about the physical environment and to explicitly define and enforce physical access control policies for logical objects that have physical representations, e.g. confidential information displayed on a monitor. An example of a context aware access control model, called Sensor Enhanced Access Control, is presented along with new mechanisms, such as persistent authentication and device comfort, to support situational awareness in a physical environment.