Table of Contents - Day 2 of Conference Programme

DAY 2 - Thursday, 30 June 2005
07:30–09:00 Registration
  Session Chairperson:
09:00-09:10 Welcome address
09:10-09:50 TBA
09:50-10:20 An overview of Information Security in the South African Government, Gareth Warner, Office of Home Affairs and Treasury, South African
10:20-10:50 

Tea 

  Session Chairperson:
10:50-11:20 Information Security: What has NOT changed, Dr Karin Badenhorst, Ernest & Young, Risk and Advisory Services, South Africa
11:20-11:50 Cyber Griping: Freedom of expression or abusive domain name registration?, Prof Tana Pistorius, Department of Commercial Law, UNISA, South Africa
11:50-12:20 Business Continuity Management - Practical Considerations, Craig Grieve, KPMG, South Africa
12:20-13:00 Plenary session: An Identity Management Architecture for the Government of Canada, Alice Sturgeon,  Senior Director, Architecture Domains, Chief Information Officer Branch, Treasury Board of Canada, Secretariat, Government of Canada.


Alice Sturgeon
manages the area that is accountable for identifying and architecting horizontal requirements across the Government of Canada, in the value domains of privacy, security, accessibility, official languages, resiliency, accountability and transparency, leveraging the power and applicability of technologies such as biometrics, smart tokens, public key encryption, and emphasising common and shared systems. She is accountable for the architecture models and principles of both the value domains and the strategic architecture domains of business, information, technology, and application/solution.
13:00-14:00 

Lunch 

  Stream 10:
Encryption (Reviewed Papers)

Session Chairperson:
Stream 11:
Culture (Reviewed Papers)

Session Chairperson:
Stream 12:
Legal and Regulatory (Reviewed Papers)

Session Chairperson:
14:00-14:30 Cryptographic Key Management principles applied in South African Internet Banking, Emile Parkin, NamITech, South Africa
Information Security Culture – Status Quo in Switzerland, Thomas Schlienger, Stephanie Teufel & Raphael Rues, University of Fribourg, Switzerland
An approach to enhance the security of ICT infrastructure through legal, regulatory influences, Charles N.Tarimo, Louise Yngström & Stewart Kowalski, Royal Institute of Technology / Stockholm, University, Sweden
14:30-15:00 Attacking Signed Binaries, Marco Slaviero, Jaco Kroon,, Martin Olivier, University of Pretoria, South Africa
A holistic framework for the fostering of an information security sub-culture in organizations., Johan van Niekerk, Rossouw von Solms, Nelson Mandela Metropolitan University, South Africa
Information Security Management and Regulatory Compliance in the South African Health Sector, T. Tuyikeze, D. Pottas, Nelson Mandela Metropolitan University, South Africa
15:00-15:30 Unlocking the armour : enabling intrusion detection and analysis of encrypted traffic streams, Barry Irwin, Rhodes University, South Africa
A new Access Control model based on the Chinese Wall Security Policy Model, M Loock, Jan Eloff, University of Pretoria, South Africa
Access to copyrighted work: right or privilege?, M. Jansen, University of South Africa, South Africa
15:30-16:00 ???, T. Pistorius, University of South Africa, South Africa
15:30–16:00 

Tea 

  Stream 13:
Technical (Reviewed Papers)

Session Chairperson: 
Stream 14:
Trust  (Reviewed Papers)

Session Chairperson:

 Stream 15:
ERP Security (Reviewed Papers)

Session Chairperson:

16:00-16:30 An overview of image steganography, T. Morkel, Jan Eloff, Martin Olivier, Hein Venter, University of Pretoria, South Africa
Trust on the Web, Russell Cloran, Barry Irwin, Rhodes University, South Africa
A security framework for an ERP system, Carl Marnewick, L Labuschagne, University of Johannesburg, South Africa
16:30-17:00 IT Forensics: the collection of and presentation of digital evidence, Johann Hershensohn, Atos Origin, South Africa
Metadata for trust in service-oriented architectures, M. Coetzee, J. H. P. Eloff, University of Pretoria, South Africa

ERPSEC – A reference framework to enhance security in ERP systems, Manfred P. Hertenberger, Basie von Solms, Siemens Business Services, South Africa

  Stream 16:
(Research-in-progress Papers)

 Session Chairperson: 
Stream 17:
Digital forensics (Research-in-progress Papers)

 Session Chairperson: 

Stream 18:
(Research-in-progress Papers)

 Session Chairperson:

17:00-17:15 Infosec Risk Mitigation Process - Reliance on Demonstrated Diligence, Joss Bernstein, Investec, Group Operational Risk, South Africa
Using Self-Organising Maps for Anomalous Behaviour Detection in a Computer Forensic Investigation, B.K.L. Fei, J.H.P. Eloff, H.S. Venter, M.S. Olivier, University of Pretoria, South Africa
Educating for Security: An Academic’s Contribution, Ludmilla Simeonov, Massey University @ Wellington, New Zealand
17:15-17:30 The blinding side effects of vulnerability assessments, Nithen Naidoo, Deloitte & Touche`, South Africa
Should Digital Forensics be part of an information security architecture?, T Grobler, University of Johannesburg, South Africa
Information Security Awareness and Training - The Legal Cost of Untrained Personnel, V. Etsebeth, University of Johannesburg, South Africa
17:30-17:45 Identity and Access Management – Old processes new processing, Karel Rode, Computer Associates Africa, South Africa
Computer forensics for a computer-based assessment: the preparation phase, R. Laubscher, D.J Rabe , M.S Olivier , J.H.P Eloff , H.S Venter, Stellenbosch University, South Africa
Neural Network Based Camouflaging in still image, J.Selvaraj           R.Balasubramaniam, Manonmaniam Sundaranar University, Tirunelveli, India
17:45-18:00 Securing IBM mainframe based Web Services using Kerberos, Gustav Mauer, IONA Technologies, South Africa
Using the IPDR standard for NGN billing and fraud detection, Madeleine Bihina, Jan Eloff, Martin Olivier, University of Pretoria, South Africa
Windows Server Update Services Review, Dominic White, Barry Irwin, Rhodes University, South Africa
 
19:00-23:00 Gala dinner & Entertainment