ISSA 2014 Aug. 13, 2014 to Aug. 14, 2014, Johannesburg,South africa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Plenary Session Rossouw Von Solms , Johan Van Niekerk N/A
Welcome address Marijke Coetzee , Hein Venter N/A
Keynote address: Cyber Security and its impact upon Information Security Matt Warren N/A
DST Cybersecurity Research, Development and Innovation Agenda Jeanette Morwane , Barend Taute N/A
The top cyber security challenges facing Africa and valuable guidance to better prepare your organisation for the next wave of threats Craig Rosewarne N/A
Identity and Authentication on the Internet – Can Biometrics help to tell if you are not a Dog? Basia Nasiorowska N/A
Car hacking research Gary Van Blerk N/A
Information Security Culture: A General Living Systems Theory Perspective Karen Renaud , Johan Van Niekerk , Rayne Reid N/A
Towards a Sandbox for the Deobfuscation and Dissection of PHP-based Malware Peter Wrench N/A
Social Media Security Awareness Aubrey Labuschagne N/A
From Information Security Cultures to Cyber security Cultures: Organizations to Societies Johan Van Niekerk , Rayne Reid N/A
An Exploration of Geolocation and Traffic Visualisation Using Network Flows Barry Irwin , Sean Pennefather N/A
An Investigation into Reducing Third Party Privacy Breaches During the Investigation of Cybercrime Wynand Van Staden N/A
Security Foundation for a Distributed Cabin Core Architecture Carsten Rudolph , Nicolai Kuntze , Oliver Hanka N/A
Information Security Assurance Model (ISAM) for a Higher Education Examination Paper Preparation Process Rossouw Von Solms , Miemie Mogale , Mariana Gerber , Mariana Carroll N/A
Considering the influence of human trust in practical social engineering exercises Wayne Kearney , Hennie Kruger N/A
The Murky Waters of IT Governance Rossouw Von Solms , Jacques Coertze N/A
Social Engineering Attack Framework Hein Venter , Francois Mouton , Mercia Malan , Louise Leenen N/A
Concerns Regarding Service Authorization by IP Address using Eduroam Reinhardt a Botha , Luzuko Tekeni , Kerry-lynn Thomson N/A
Combatting Phishing: A Holistic Human Approach Rossouw Von Solms , Edwin Donald Frauenstein N/A
Keynote address:Information Security and SMEs: the missing link Matt Warren N/A
How you got owned Reino Mostert N/A
Panel discussion: Ethical Concerns Regarding Social Engineering Barry Irwin , Francois Mouton , Martin Olivier , Pria Chetty N/A
Keynote address: Privacy: A burning jurisprudence Mark Heyink N/A
Facebook: The Risk-Taking Attitude amongst Emerging Adults Sayed Ally , Craig Blewett , Brett Van Niekerk N/A
The case for Tactical DDA: Why soldiers of the future will look very much like soldiers of the present. Charl van der Walt N/A
The role of triggers in database forensics Werner Hauger , Martin S Olivier N/A
Testing antivirus engines to determine their effectiveness as a security layer Jameel Haffejee N/A
Software-Defined Radio (SDR) as a Mechanism for Exploring Cyber-Electronic Warfare (EW) Convergence Warren Du Plessis N/A
Privacy: A Review of Publication Trends Charlie Hinde , Jacques Ophoff N/A
On a Domain Block Based Mechanism to Mitigate DoS Attacks on Shared Caches in Asymmetric Multiprocessing Multi Operating Systems Pierre Schnarz , Joachim Wietzke , Ingo Stengel , Clemens Fischer N/A
The Mexican Cartels application of Inform and Influence Activities (IIA) as tools of Asymmetrical Warfare Juan Castillo N/A
Mobile Forensics using the Harmonised Digital Forensic Investigation Process Emilio Raymond Mumba , Hein Venter N/A
a survey of trust issues constraining the growth of identity management-as-a-service Wynand Van Staden , Nkosinathi Mpofu N/A
Exploring End-User Smartphone Security Awareness Mark Robinson , Jacques Ophoff N/A
Towards a Prototype for Guidance and Implementation of a Standardized Digital Forensic Investigation Process Hein Venter , Aleksandar Valjarevic , Melissa Ingles N/A
Integrity of a Common Operating Picture in Military Situational Awareness Jaco Robertson N/A
Security Objectives, Controls and Metrics Development for an Android Smartphone Application Reijo Savola , Markku Kylänpää N/A
A digital forensic model for providing better data provenance in the cloud Hein Venter , Philip Trenwith N/A
Suitability of Quantum Cryptography for National Facilities Brett Van Niekerk , Abdul Mirza , Makhamisa Senekane , Francesco Petruccione N/A
Is BYOD an institutional information security risk for small-scale business organisations? Kudakwashe Madzima , Moses Moyo , Hanifa Abdullah N/A
Online safety in South Africa – a growing concern Elmarie Kritzinger N/A