|
Table of
Contents - Day 3 of Conference Programme
PROGRAMME - Day 3 - Wednesday, 9 July 2008
|
07:30–09:00 |
Registration |
09:00-09:10 |
Welcome address |
09:10-09:50 |
Topic:
Advances in Digital Investigations: Research, Open Source and Commercial
Tools
Speaker:
Dario Forte, CISM, CFE Adj. Faculty
University of Milano |
09:50-10:30 |
Topic:
Penetration Testing - What the Hack?
Speaker: Yvette du Toit, Manager Technology & Security
Risk Services, Ernst & Young Advisory Services Ltd. |
10:30-11:00 |
Tea |
11:00-11:40 |
Invited Speaker |
11:40-12:20 |
Topic:
Conducting an Organisation Healthcheck on Information Security
Legislative Compliance
Speaker: Pria Chetty, IT Lawyer, Chetty Law |
12:30-13:30 |
Lunch |
|
WORKSHOP:
Workshop: Software, Network & Operating System Security |
|
Prof Hein Venter, University of Pretoria |
13:30-17:00 |
In our current day and age, computer security forms an integral
part of any computing environment. Broadly, computer security can be
classified into three fields: software, network and operating system
security. This workshop will focus on these three arias of computer
security, following a hands-on approach. During the workshop, you will
encounter practical scenarios that feature security tools. You will
experience how such security tools are useful and how they contribute to
the security areas above. It is often said "to catch a thief, you have
to think like a thief". Therefore, you will also encounter many ethical
hacking scenarios. More specifically, you will practically experience
password authoring, user account control, password sniffing,
steganography, user escalation, gaining unauthorised access, exploiting
systems, and managing networked and personal firewalls. The workshop
will take place in a computer laboratory using the Windows and Linux
operating systems. |
17:00 |
Conference closing |
|