Table of Contents - Day 3 of Conference Programme


PROGRAMME - Day 3 - Wednesday, 9 July 2008

 

07:30–09:00

Registration

09:00-09:10

Welcome address

09:10-09:50

Topic: Advances in Digital Investigations: Research, Open Source and Commercial Tools
Speaker:
Dario Forte, CISM, CFE Adj. Faculty University of Milano

09:50-10:30

Topic: Penetration Testing - What the Hack?
Speaker: Yvette du Toit, Manager Technology & Security Risk Services, Ernst & Young Advisory Services Ltd.

10:30-11:00 

Tea 

11:00-11:40

Invited Speaker

11:40-12:20

Topic: Conducting an Organisation Healthcheck on Information Security Legislative Compliance
Speaker: Pria Chetty, IT Lawyer, Chetty Law

12:30-13:30 

Lunch 

 

WORKSHOP:
Workshop: Software, Network & Operating System Security

 

Prof Hein Venter, University of Pretoria

13:30-17:00

In our current day and age, computer security forms an integral part of any computing environment. Broadly, computer security can be classified into three fields: software, network and operating system security. This workshop will focus on these three arias of computer security, following a hands-on approach. During the workshop, you will encounter practical scenarios that feature security tools. You will experience how such security tools are useful and how they contribute to the security areas above. It is often said "to catch a thief, you have to think like a thief". Therefore, you will also encounter many ethical hacking scenarios. More specifically, you will practically experience password authoring, user account control, password sniffing, steganography, user escalation, gaining unauthorised access, exploiting systems, and managing networked and personal firewalls. The workshop will take place in a computer laboratory using the Windows and Linux operating systems.

17:00

Conference closing