COSAC 2015 Sept. 28, 2015 to Sept. 30, 2015, NAAS,ireland
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
M1 COSAC International Roundtable Forum | John O'leary | One of the defining and truly unique characteristics of COSAC is the almost limitless degree ... | |
M3 The 1st COSAC Security ‘Design Off’ | Jason Kobes , William Schultz | You have heard of hack-a-thons and capture the flag events for Hackers? This is a ... | |
1A IPv6 Auto Configuration – Boon or Bane? | Zbynek Houska | This talk aims to shine a light on IPv6 security issues and will attempt to ... | |
2A Compliant and Connected: Building Herd Immunity | Lisa Lorenzin | The value of preventative compliance checking is well established; network security experts have for years ... | |
3A Unique Analogs for Validating Security and Performance Claims (A Case Study) | Rob Hale | This case study is focused on a test and evaluation model designed and used to ... | |
4A Back to Basics | Lisa Lorenzin | There's a huge disconnect between what's sexy in Infosec right now - threat intelligence, information ... | |
5A Heads of or Tails of Crypto Currencies | Muhammed Z. Omarjee | As the global economy toys between recession and constant financial system instabilities, the current monetary ... | |
6A The Need for Hardware-Enforced Security (A Case Study) | Rob Hale | While malicious cyber events have dramatically accelerated in frequency, complexity, and damage over the past ... | |
1B Coding as the New Literacy | Mary Dunphy , Lynette Hornung | In the past, only a few possessed the power of literacy and when the clergy ... | |
2B The Cybersecurity Skills Gap : Building A Cybersecurity Workforce from Scratch | Esther Van Luit | One of the most frequently-cited problems encountered by companies, is the lack of skilled cybersecurity ... | |
3B The Importance of Being Earnest | Helvi Salminen | "We should treat all trivial things in life very seriously, and all serious things of ... | |
4B More Complex Challenges in Security G. | Char Sample , Mark Hardy | This session builds on last year's well-attended program, "Complex Challenges in Security." The rate of ... | |
5B The Internet of Things – Privacy, Security & Property | Mark d. Rasch | The Internet of Things combines ubiquitous computing with ubiquitous sensing. Wearables, smart homes, smart cars ... | |
6B Every Step You Take: Geo Location Security & Privacy Issues | Richard Hollis | Every device we carry is now enabled with geo-location capability and reports our every move. ... | |
1S Practical Experiences of SABSA Domain Modelling at ING | Pieter Siedsma , Marc Verboven | ING is today still largely based on a classic, but outdated perimeter model. Outside of ... | |
2S Away with Applications Security! | Jacoba Sieders | ABN AMRO Bank is a multinational bank, operating in 20 countries, 22.500 employees, 7.5 million ... | |
3S SABSA in a Governmental Security Program – Experiences & Lessons Learned | Silvia Knittl | The case described in this talk is about the application of a requirements engineering based ... | |
4S Roadmapping for SABSA | John Czaplewski | Technology roadmapping is a tool used by to support analysis, decision-making, planning, and communications. The ... | |
5S SABSA-Enhanced NIST Cybersecurity Framework: SENC Makes Sense | Efrain Gonzalez | On February 12, 2014, the National Institute of Standards and Technology (NIST) published the much ... | |
6S I’ve got I’s everywhere but I still can’t see | Richard Peasley , Fabio Rosa | Business information is the logical representation of real heart of any business. The data running ... | |
7P Dance Band on the Titanic : The Data Loss Iceberg Principle | Risk Factory | What if everything we’re doing to secure our data is for naught? Have you stopped ... | |
8A Securing the Chaos | G. Mark Hardy | Cybersecurity is chaos. No, not random chaos where there are no rules, but deterministic chaos, ... | |
9A Penetration Testing, PCI, and the Race to the Bottom | Conor O’neill | Compliance, as opposed to security, driven requirements for annual penetration testing coupled with a desire ... | |
10A Hack Back – Legal Aspects of “Active Defence” | Mark d. Rasch | Too often, companies are playing defense while hackers, hacktivists and foreign governments are on the ... | |
11A The Next Cyber War : Geo-political Events & Cyber Attacks | Werner Thalmeier | The last few years we are facing a significant increase of geopolitical events and conflicts. ... | |
12A Government Surveillance: Citizen Privacy versus Protection of Society | John Sherwood | On November 4th 2014 the newly appointed Director of GCHQ, Robert Hannigan, published an opinion ... | |
8B Social Engineering, Misdirection, and Mind Hacking | Jason Kobes , William Schultz | A walk down memory lane of Brad Smith’s work and where we are today. These ... | |
9B Breaches and Screams: They Woulda, Coulda, Shoulda,….but Didn’t | John O'leary | In this full COSAC rules interactive session, we’ll analyze what happened in some notorious and ... | |
10B Capturing Cyber Value-at-Risk : Towards a Model for Quantifying Cyber Risk | Maarten Van Wieren | “Know thy self, know thy enemy. A thousand battles, a thousand victories.” (Sun Tzu) Due ... | |
11B Business Security Requirements (and How We Might Recover from Them) | Matthew Pemble | One of the critical aspects of information security development and, particularly, security architectures, has been ... | |
12B From I.T. Security To Business Security | Vernon Poole | Vernon has been involved in developing ISO standards, worked with many professional associations (ISACA, ISO ... | |
8S From Concept to Implementation | Chris Blunt , Michael Price | You’ve successfully delivered the Strategy and Planning phase of the Enterprise Security Architecture (ESA) lifecycle ... | |
9S Cloud Computing Enablement : To the Cloud or to the Ground | Muhammed Z. Omarjee | As IT Execs contemplate ways to adapt their IT to adopt cloud based models, the ... | |
10S Why Should I Trust You? SABSA and Zero Trust | Richard Peasley , Fabio Rosa | Forrester Research responded to a NIST, RFI on Critical Infrastructure security in April of 2013. ... | |
11S There and back again – An enterprise security architect’s tale of maintaining sanity while establishing traceability | Jaco Jacobs | When it comes to the reality of using SABSA for my projects there are a ... | |
12S Using Risk Management to Enable Organisational Achievement | William Schultz | Does your Risk Program have a positive impact on your organizations bottom line? Can you ... | |
13P Kim Philby and the Ultimate Insider Threat | John O’leary | The Tony Sale Memorial Session for 2015 will cover perhaps the most notorious spy of ... | |
14P The COSAC Rump Session | Various | The hugely popular COSAC "rump" is an informal rapid-fire session in which participants give very ... | |
W1 The SABSA International Peer Group | John O’leary | Please note: this session is conducted under full NDA and is not open to vendors ... | |
Part One – Artificial Intelligence : Rise of the Machines or Human Triumph? Char Sample | Dave Barnett | A debate is emerging in the scientific community regarding the impact of Artificial Intelligence (AI) ... | |
Part Two – What is Telemetrics and How Does it Impact You? Mary Dunphy | Jason Kobes | We all know our car, phone, house, online relationships, computers, tablets, applications, bank cards, watches, ... | |
Part One – Integration of Security & Risk in a TOGAF Enterprise Architecture | Pascal De Koning | A mainstream framework for enterprise architecture is TOGAF. Surprisingly, this successful framework does not consider ... |