PROGRAMME - Day 1 - Monday, 7 July 2008 |
07:30–09:00 |
Registration |
09:00-09:10 |
Welcome address:
Prof Jan Eloff, ISSA2008 Conference Co-chair |
09:10-09:50 |
Plenary session:
Topic: Advances in Digital Investigations: Research, open
source and commercial tools
Speaker: Dario Forte, CISM, CFE Adj. Faculty University of
Milano |
09:50-10:30 |
Topic:
The Enemy Within (Pty) Ltd
Speaker: Frans Trieghaartd, Director KPMG Forensics |
10:30-11:00 |
Refreshments |
11:00-11:40 |
Topic:
Cyberforensics: A Means to an End
Speaker: Dr Annamart Nieman, Director Forensic & Dispute
Services, Deloitte & Touche |
11:40-12:20 |
Topic:
SIM/SEM
Speaker: Karin Höne, Senior Information Security
Consultant, Exponent |
12:20-13:00 |
Topic:
Security Issues of Electronic Voting
Speaker: Ulrich Ultes-Nitsche, University of Fribourg |
13:00-14:00 |
Lunch |
|
Stream 1 -
Access |
Stream 2 -
Legal
|
Stream
3
-
Forensics |
14:00-14:30 |
Password Management: Empirical Results
from a RSA and USA Study - Hennie Kruger, Tjaart Steyn, Lynette
Drevin and Dawn Medlin |
The IP protection of electronic
databases: Copyright or copywrong? - Tana Pistorius |
A Collaborative Distributed Virtual
Platform for Forensic Analysis of Malicious Code - Leonard Shand and
Theodore Tryfonas |
14:30-15:00 |
A User
Centric Model for Online Identity and Access Management - Matthew
Deas and Stephen Flowerday |
Towards
Bridging the Knowledge Gap between Lawyers and Technologists: The
Principle of Security Safeguards - Rasika Dayarathna |
The use of
insignificant evidence sources in digital forensics - Renico Koen
and Martin Olivier |
15:00-15:30 |
No Age
Discrimination for Biometrics - Marthie Lessing and Lara
Weissenberger |
Computer
Monitoring in the 21st Century Workplace - Sri Warna Mahanamahewa |
UML
Modeling of Digital Forensic Process Models (DFPMs) - MD Köhn, JHP
Eloff and MS Olivier |
15:30–16:00 |
Refreshments |
|
Stream
4
-
Networking
|
Stream
5
-
Data |
|
16:00-16:30 |
Evaluating Measures and
Countermeasures for SPAM over Internet Telephony - Rachid El Khayari,
Nicolai Kuntze and Andreas Schmidt |
A validation process for logical data
- Pontjho Mokhonoana and Martin Olivier |
|
16:30-17:00 |
Spam Construction Trends - Blake
Friedman and Barry Irwin |
A Proof-of-Concept Implementation of
EAP-TLS with TPM support - Carolin Latze and Ulrich Ultes-Nitsche |