Difference between revisions of "ISSA 2009"

From Openresearch
Jump to: navigation, search
(Due dates)
(Topics)
Line 27: Line 27:
  
 
==Topics ==
 
==Topics ==
Access Control
+
* Access Control
Architectures and infrastructures
+
* Architectures and infrastructures
Audit
+
* Audit
Authentication
+
* Authentication
Anti-Virus
+
* Anti-Virus
Awareness and training in Security
+
* Awareness and training in Security
Backup, Storage, Recovery
+
* Backup, Storage, Recovery
Biometrics
+
* Biometrics
Business Continuity Planning and Management
+
* Business Continuity Planning and Management
Challenges and solutions of managing security
+
* Challenges and solutions of managing security
Communications / network security
+
* Communications / network security
Content Security
+
* Content Security
Corporate governance / Enterprise security
+
* Corporate governance / Enterprise security
Digital forensics
+
* Digital forensics
Digital Identification and Authentication
+
* Digital Identification and Authentication
Economy and philosophy of information security
+
* Economy and philosophy of information security
Evaluation of Information Security in companies and information security surveys
+
* Evaluation of Information Security in companies and information security surveys
Future visions for Information Security Management
+
* Future visions for Information Security Management
Hacking / cracking
+
* Hacking / cracking
Information right management
+
* Information right management
Information security project management
+
* Information security project management
Legal, ethical and social issues related to Information Security
+
* Legal, ethical and social issues related to Information Security
Managing Information Security
+
* Managing Information Security
Mobile Computing Security
+
* Mobile Computing Security
Mobile phone security
+
* Mobile phone security
Phishing
+
* Phishing
Practical industry presentations on managing information security
+
* Practical industry presentations on managing information security
Privacy
+
* Privacy
Information Security Risk Analysis
+
* Information Security Risk Analysis
Security Policy and Procedures
+
* Security Policy and Procedures
Small distribution applications
+
* Small distribution applications
Smart Cards
+
* Smart Cards
Standards - Local & International
+
* Standards - Local & International
Strategic Information Security
+
* Strategic Information Security
Trust
+
* Trust
Usability issues in information security
+
* Usability issues in information security
Vulnerability Assessments
+
* Vulnerability Assessments
 
 
  
 
==Organising committee==
 
==Organising committee==

Revision as of 15:12, 21 March 2009

ISSA 2009
The 8th Annual Information Security for South Africa Conference
Event in series ISSA
Dates 2009/07/06 (iCal) - 2009/07/08
Homepage: www.infosecsa.co.za
Location
Location: Johannesburg, Gauteng, South Africa
Loading map...

Important dates
Abstracts: 2009/03/23
Papers: 2009/04/18
Submissions: 2009/04/18
Table of Contents


The 8th Annual ISSA Conference invites participation across the Information Security spectrum including but not being limited to functional, business, managerial, theoretical and technological issues. As with the previous ISSA conferences, the forthcoming ISSA2009 will again attract a variety of national and international information security academics and practitionars.


Due dates

  • 23 March 2009: Abstract submission
  • 31 March 2009: Notification of abstract acceptance
  • 18 April 2009: Full papers submission for review
  • 26 May 2009: Notification of acceptance
  • 6 June 2009: Submission of final camera-ready papers
  • 6-8 July 2009: Conference

Topics

  • Access Control
  • Architectures and infrastructures
  • Audit
  • Authentication
  • Anti-Virus
  • Awareness and training in Security
  • Backup, Storage, Recovery
  • Biometrics
  • Business Continuity Planning and Management
  • Challenges and solutions of managing security
  • Communications / network security
  • Content Security
  • Corporate governance / Enterprise security
  • Digital forensics
  • Digital Identification and Authentication
  • Economy and philosophy of information security
  • Evaluation of Information Security in companies and information security surveys
  • Future visions for Information Security Management
  • Hacking / cracking
  • Information right management
  • Information security project management
  • Legal, ethical and social issues related to Information Security
  • Managing Information Security
  • Mobile Computing Security
  • Mobile phone security
  • Phishing
  • Practical industry presentations on managing information security
  • Privacy
  • Information Security Risk Analysis
  • Security Policy and Procedures
  • Small distribution applications
  • Smart Cards
  • Standards - Local & International
  • Strategic Information Security
  • Trust
  • Usability issues in information security
  • Vulnerability Assessments

Organising committee

Hein Venter (hventer@cs.up.ac.za) Department of Computer Science, University of Pretoria
Les Labuschagne (lesl@uj.ac.za) Department Business IT, University of Johannesburg
Marijke Coetzee (marijkec@uj.ac.za) Academy for Information Technology, University of Johannesburg
Facts about "ISSA 2009"
Abstract deadlineMarch 23, 2009 +
AcronymISSA 2009 +
End dateJuly 8, 2009 +
Event in seriesISSA +
Event typeConference +
Has coordinates-26° 12' 18", 28° 2' 59"Latitude: -26.205
Longitude: 28.049722222222
+
Has location cityJohannesburg +
Has location countryCategory:South Africa +
Has location stateGauteng +
Homepagehttp://www.infosecsa.co.za +
IsAEvent +
Paper deadlineApril 18, 2009 +
Start dateJuly 6, 2009 +
Submission deadlineApril 18, 2009 +
TitleThe 8th Annual Information Security for South Africa Conference +