COSAC 2015 Sept. 28, 2015 to Sept. 30, 2015, NAAS,ireland

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
M1 COSAC International Roundtable Forum John O'leary One of the defining and truly unique characteristics of COSAC is the almost limitless degree ...
M3 The 1st COSAC Security ‘Design Off’ Jason Kobes , William Schultz You have heard of hack-a-thons and capture the flag events for Hackers? This is a ...
1A IPv6 Auto Configuration – Boon or Bane? Zbynek Houska This talk aims to shine a light on IPv6 security issues and will attempt to ...
2A Compliant and Connected: Building Herd Immunity Lisa Lorenzin The value of preventative compliance checking is well established; network security experts have for years ...
3A Unique Analogs for Validating Security and Performance Claims (A Case Study) Rob Hale This case study is focused on a test and evaluation model designed and used to ...
4A Back to Basics Lisa Lorenzin There's a huge disconnect between what's sexy in Infosec right now - threat intelligence, information ...
5A Heads of or Tails of Crypto Currencies Muhammed Z. Omarjee As the global economy toys between recession and constant financial system instabilities, the current monetary ...
6A The Need for Hardware-Enforced Security (A Case Study) Rob Hale While malicious cyber events have dramatically accelerated in frequency, complexity, and damage over the past ...
1B Coding as the New Literacy Mary Dunphy , Lynette Hornung In the past, only a few possessed the power of literacy and when the clergy ...
2B The Cybersecurity Skills Gap : Building A Cybersecurity Workforce from Scratch Esther Van Luit One of the most frequently-cited problems encountered by companies, is the lack of skilled cybersecurity ...
3B The Importance of Being Earnest Helvi Salminen "We should treat all trivial things in life very seriously, and all serious things of ...
4B More Complex Challenges in Security G. Char Sample , Mark Hardy This session builds on last year's well-attended program, "Complex Challenges in Security." The rate of ...
5B The Internet of Things – Privacy, Security & Property Mark d. Rasch The Internet of Things combines ubiquitous computing with ubiquitous sensing. Wearables, smart homes, smart cars ...
6B Every Step You Take: Geo Location Security & Privacy Issues Richard Hollis Every device we carry is now enabled with geo-location capability and reports our every move. ...
1S Practical Experiences of SABSA Domain Modelling at ING Pieter Siedsma , Marc Verboven ING is today still largely based on a classic, but outdated perimeter model. Outside of ...
2S Away with Applications Security! Jacoba Sieders ABN AMRO Bank is a multinational bank, operating in 20 countries, 22.500 employees, 7.5 million ...
3S SABSA in a Governmental Security Program – Experiences & Lessons Learned Silvia Knittl The case described in this talk is about the application of a requirements engineering based ...
4S Roadmapping for SABSA John Czaplewski Technology roadmapping is a tool used by to support analysis, decision-making, planning, and communications. The ...
5S SABSA-Enhanced NIST Cybersecurity Framework: SENC Makes Sense Efrain Gonzalez On February 12, 2014, the National Institute of Standards and Technology (NIST) published the much ...
6S I’ve got I’s everywhere but I still can’t see Richard Peasley , Fabio Rosa Business information is the logical representation of real heart of any business. The data running ...
7P Dance Band on the Titanic : The Data Loss Iceberg Principle Risk Factory What if everything we’re doing to secure our data is for naught? Have you stopped ...
8A Securing the Chaos G. Mark Hardy Cybersecurity is chaos. No, not random chaos where there are no rules, but deterministic chaos, ...
9A Penetration Testing, PCI, and the Race to the Bottom Conor O’neill Compliance, as opposed to security, driven requirements for annual penetration testing coupled with a desire ...
10A Hack Back – Legal Aspects of “Active Defence” Mark d. Rasch Too often, companies are playing defense while hackers, hacktivists and foreign governments are on the ...
11A The Next Cyber War : Geo-political Events & Cyber Attacks Werner Thalmeier The last few years we are facing a significant increase of geopolitical events and conflicts. ...
12A Government Surveillance: Citizen Privacy versus Protection of Society John Sherwood On November 4th 2014 the newly appointed Director of GCHQ, Robert Hannigan, published an opinion ...
8B Social Engineering, Misdirection, and Mind Hacking Jason Kobes , William Schultz A walk down memory lane of Brad Smith’s work and where we are today. These ...
9B Breaches and Screams: They Woulda, Coulda, Shoulda,….but Didn’t John O'leary In this full COSAC rules interactive session, we’ll analyze what happened in some notorious and ...
10B Capturing Cyber Value-at-Risk : Towards a Model for Quantifying Cyber Risk Maarten Van Wieren “Know thy self, know thy enemy. A thousand battles, a thousand victories.” (Sun Tzu) Due ...
11B Business Security Requirements (and How We Might Recover from Them) Matthew Pemble One of the critical aspects of information security development and, particularly, security architectures, has been ...
12B From I.T. Security To Business Security Vernon Poole Vernon has been involved in developing ISO standards, worked with many professional associations (ISACA, ISO ...
8S From Concept to Implementation Chris Blunt , Michael Price You’ve successfully delivered the Strategy and Planning phase of the Enterprise Security Architecture (ESA) lifecycle ...
9S Cloud Computing Enablement : To the Cloud or to the Ground Muhammed Z. Omarjee As IT Execs contemplate ways to adapt their IT to adopt cloud based models, the ...
10S Why Should I Trust You? SABSA and Zero Trust Richard Peasley , Fabio Rosa Forrester Research responded to a NIST, RFI on Critical Infrastructure security in April of 2013. ...
11S There and back again – An enterprise security architect’s tale of maintaining sanity while establishing traceability Jaco Jacobs When it comes to the reality of using SABSA for my projects there are a ...
12S Using Risk Management to Enable Organisational Achievement William Schultz Does your Risk Program have a positive impact on your organizations bottom line? Can you ...
13P Kim Philby and the Ultimate Insider Threat John O’leary The Tony Sale Memorial Session for 2015 will cover perhaps the most notorious spy of ...
14P The COSAC Rump Session Various The hugely popular COSAC "rump" is an informal rapid-fire session in which participants give very ...
W1 The SABSA International Peer Group John O’leary Please note: this session is conducted under full NDA and is not open to vendors ...
Part One – Artificial Intelligence : Rise of the Machines or Human Triumph? Char Sample Dave Barnett A debate is emerging in the scientific community regarding the impact of Artificial Intelligence (AI) ...
Part Two – What is Telemetrics and How Does it Impact You? Mary Dunphy Jason Kobes We all know our car, phone, house, online relationships, computers, tablets, applications, bank cards, watches, ...
Part One – Integration of Security & Risk in a TOGAF Enterprise Architecture Pascal De Koning A mainstream framework for enterprise architecture is TOGAF. Surprisingly, this successful framework does not consider ...