Information security has evolved and in the last few years there has been renewed interest in the subject worldwide. This is evident from the many standards and certifications now available to guide security strategy. This has led to a more clear career path for security professionals.
The convergence of technologies together with advances in wireless communications, has meant new security challenges for the information security fraternity. As hotspots become more available, and more organisations attempt to rid their offices of "spaghetti" so the protection of data in these environments becomes a more important consideration.
It is this fraternity that organisations, governments and communities in general look to for guidance on best practice in this converging world.
Identity theft and phishing are ongoing concerns. What we are now finding is that security mechanisms have become so good and are generally implemented by companies wanting to adhere to good corporate governance, so attackers are now looking to the weak link in the chain, namely the individual user. It is far easier to attack them than attempt to penetrate sophisticated corporate systems. A spate of spyware is also doing the rounds, with waves of viruses still striking periodically. Software suppliers have started stepping up to protect their users and take some responsibility for security in general and not just for their own products.
The conference focuses on all aspects of information security and invites participation across the Information Security spectrum including but not being limited to functional, business, managerial, theoretical and technological issues.
Invited speakers will talk about the international trends in information security products, methodologies and management issues.
In the past ISSA has secured many highly acclaimed international speakers, including:
Alice Sturgeon manages the area that is accountable for identifying and architecting horizontal requirements across the Government of Canada. Her topic made reference to An Identity Management Architecture for the Government of Canada
Dr Alf Zugenmaier, DoCoMo Lab, Germany. His topic was based on Security and Privacy .
William List, WM List and Co., UK. His topic was: Beyond the Seventh Layer live the users
Prof. Dennis Longley, Queensland University of Technology, Australia. His topic was: IS Governance: Will it be effective?
Prof. TC Ting: University of Connecticut, and fellow of the Computing Research Association, United States
Prof. Dr. Stephanie Teufel: Director of the International Institute of Management in Telecommunications (iimt). Fribourg University, Switzerland
Rich Schiesser, Senior Technical Planner at Option One Mortgage, USA
Rick Cudworth, Partner, KPMG LLP, International Service Leader, Security and Business Continuity - Europe, Middle East and Africa
Dario Forte - CISM, CFE, Founder, DFLabs Italy and Adj. Faculty University of Milano
Reijo Savola - Network and information security research coordinator, VTT Technical Research Centre of Finland
Mark Pollitt - Ex Special Agent of the Federal Bureau of Investigation (FBI) and professor at the Daytona State College, Daytona Beach, Florida, USA.
Prof Joachim Biskup - Professor of Computer Science, Technische Universität Dortmund, Germany
Dr Andreas Schaad - Research Program Manager, SAP Research Security & Trust Group, Germany.
St even Furnell - Head of School, School of Computing and Mathematics (Faculty of Science and Technology), University of Plymouth, UK.
The purpose of the conference is to provide information security practitioners and researchers worldwide with the opportunity to share their knowledge and research results with their peers.
The objectives of the conference are defined as follows:
• Sharing of knowledge, experience and best practice
• Promoting networking and business opportunities
• Encouraging the research and study of information security
• Supporting the development of a professional information security community
• Assisting self development
• Providing a forum for education, knowledge transfer, professional development, and development of new skills
• Promoting best practice in information security and its application in Southern Africa
• Facilitating the meeting of diverse cultures to share and learn from each other in the quest for safer information systems