Difference between revisions of "ISSA 2009"

From Openresearch
Jump to: navigation, search
(KemnlodDDlWqBxeWZi)
 
(6 intermediate revisions by 3 users not shown)
Line 1: Line 1:
{{Event
+
Thanks for making the trrwtsouthy try to clarify this. I feel very sturdy approximately it and want to be told more. If it's OK, as you attain extra in depth wisdom, would you thoughts count more posts very similar to this one with additional info? It could be extremely useful and useful for me and my colleagues.
|Acronym=ISSA 2009
 
|Title=The 8th Annual Information Security for South Africa Conference
 
|Series=ISSA
 
|Type=Conference
 
|Field=Information Security
 
|Start date=2009/07/06
 
|End date=2009/07/08
 
|Homepage=http://www.infosecsa.co.za
 
|City=Johannesburg
 
|State=Gauteng
 
|Country=South Africa
 
|Submission deadline=2009/04/18
 
|Abstract deadline=2009/03/23
 
|Paper deadline=2009/04/18
 
}}
 
The 8th Annual ISSA Conference invites participation across the Information Security spectrum including but not being limited to functional, business, managerial, theoretical and technological issues. As with the previous ISSA conferences, the forthcoming ISSA2009 will again attract a variety of national and international information security academics and practitionars.  
 
 
 
 
 
Due dates:
 
** 23 March 2009: Abstract submission
 
** 31 March 2009: Notification of abstract acceptance
 
** 18 April 2009: Full papers submission for review
 
** 26 May 2009:  Notification of acceptance
 
**  6 June 2009:  Submission of final camera-ready papers
 
** 6-8 July 2009: Conference
 
 
 
Topics include, but are not limited to:
 
• Access Control
 
• Architectures and infrastructures
 
• Audit
 
• Authentication
 
• Anti-Virus
 
• Awareness and training in Security
 
• Backup, Storage, Recovery
 
• Biometrics
 
• Business Continuity Planning and Management
 
• Challenges and solutions of managing security
 
• Communications / network security
 
• Content Security
 
• Corporate governance / Enterprise security
 
• Digital forensics
 
• Digital Identification and Authentication
 
• Economy and philosophy of information security
 
• Evaluation of Information Security in companies and information security surveys
 
• Future visions for Information Security Management
 
• Hacking / cracking
 
• Information right management
 
• Information security project management
 
• Legal, ethical and social issues related to Information Security
 
• Managing Information Security
 
• Mobile Computing Security
 
• Mobile phone security
 
• Phishing
 
• Practical industry presentations on managing information security
 
• Privacy
 
• Information Security Risk Analysis
 
• Security Policy and Procedures
 
• Small distribution applications
 
• Smart Cards
 
• Standards - Local & International
 
• Strategic Information Security
 
• Trust
 
• Usability issues in information security
 
• Vulnerability Assessments
 
 
 
 
 
Organising committee:
 
** Hein Venter (hventer@cs.up.ac.za) Department of Computer Science, University of Pretoria
 
** Les Labuschagne (lesl@uj.ac.za) Department Business IT, University of Johannesburg
 
** Marijke Coetzee (marijkec@uj.ac.za) Academy for Information Technology, University of Johannesburg
 

Latest revision as of 11:26, 1 August 2012

Thanks for making the trrwtsouthy try to clarify this. I feel very sturdy approximately it and want to be told more. If it's OK, as you attain extra in depth wisdom, would you thoughts count more posts very similar to this one with additional info? It could be extremely useful and useful for me and my colleagues.