Table of Contents - Day 1 of Conference Programme

PROGRAMME - Day 1 - Monday, 7 July 2008

07:30–09:00

Registration

09:00-09:10

Welcome address: Prof Jan Eloff, ISSA2008 Conference Co-chair

09:10-09:50

Plenary session:
Topic: Advances in Digital Investigations: Research, open source and commercial tools
Speaker: Dario Forte, CISM, CFE Adj. Faculty University of Milano

09:50-10:30

Topic: The Enemy Within (Pty) Ltd
Speaker: Frans Trieghaartd, Director KPMG Forensics

10:30-11:00 

Refreshments 

11:00-11:40

Topic: Cyberforensics: A Means to an End
Speaker: Dr Annamart Nieman, Director Forensic & Dispute Services, Deloitte & Touche

11:40-12:20

Topic: SIM/SEM
Speaker: Karin Höne, Senior Information Security Consultant, Exponent

12:20-13:00

Topic: Security Issues of Electronic Voting
Speaker: Ulrich Ultes-Nitsche, University of Fribourg

13:00-14:00 

Lunch 

 

Stream 1 - Access


Stream 2 -
Legal
 

Stream 3 - Forensics

14:00-14:30

Password Management: Empirical Results from a RSA and USA Study - Hennie Kruger, Tjaart Steyn, Lynette Drevin and Dawn Medlin

The IP protection of electronic databases: Copyright or copywrong? - Tana Pistorius

A Collaborative Distributed Virtual Platform for Forensic Analysis of Malicious Code - Leonard Shand and Theodore Tryfonas

14:30-15:00

A User Centric Model for Online Identity and Access Management - Matthew Deas and Stephen Flowerday

Towards Bridging the Knowledge Gap between Lawyers and Technologists: The Principle of Security Safeguards - Rasika Dayarathna

The use of insignificant evidence sources in digital forensics - Renico Koen and Martin Olivier

15:00-15:30

No Age Discrimination for Biometrics - Marthie Lessing and Lara Weissenberger

Computer Monitoring in the 21st Century Workplace - Sri Warna Mahanamahewa

UML Modeling of Digital Forensic Process Models (DFPMs) - MD Köhn, JHP Eloff and MS Olivier

15:30–16:00 

Refreshments

 


Stream
4 - Networking
 

Stream 5 - Data

 

16:00-16:30

Evaluating Measures and Countermeasures for SPAM over Internet Telephony - Rachid El Khayari, Nicolai Kuntze and Andreas Schmidt

A validation process for logical data - Pontjho Mokhonoana and Martin Olivier

 

16:30-17:00

Spam Construction Trends - Blake Friedman and Barry Irwin

A Proof-of-Concept Implementation of EAP-TLS with TPM support - Carolin Latze and Ulrich Ultes-Nitsche