ISSA 2012 - 2012 Information Security for South Africa (ISSA)
Date2012-08-15
Deadline2012-04-18
VenueJohannesbu, South Africa
Keywords
Websitehttps://www.infosecsa.co.za
Topics/Call fo Papers
The ISSA2012 Conference will provide an opportunity for key players to review sustainable practices that have been developed by South Africans in order to meet the challenges delivered by globalisation. Topics to be addressed by the conference include: research papers, case studies, lessons learned, current research, short tutorials and research in progress (student papers).
The field of information security is diverse, including technical, managerial, legal, social and even philosophical issues. Individuals alone cannot address these issues. Only the combined efforts of academia and industry can provide answers and solutions that will benefit all of society.
Topics include but are not limited to:
Access Control
Architectures and infrastructures
Audit
Authentication
Anti-Virus
Awareness and training in Security
Backup, Storage, Recovery Biometrics
Business Continuity Planning and Management
Challenges and solutions of managing security
Communications / network security
Content Security
Corporate governance / Enterprise security
Digital forensics
Digital Identification and Authentication
Economy and philosophy of information security
Evaluation of Information Security in companies
Information security surveys
Future visions for Information Security Management
Hacking / cracking
Information rights management Information security project management
Legal, ethical and social issues related to Information Security
Managing Information Security
Mobile Computing Security
Mobile phone security
Phishing
Practical industry presentations on managing information security
Privacy
Information Security Risk Analysis
Security Policy and Procedures
Small distribution applications
Smart Cards Standards - Local & International
Strategic Information Security
Trust
Usability issues in information security
Vulnerability Assessments
The field of information security is diverse, including technical, managerial, legal, social and even philosophical issues. Individuals alone cannot address these issues. Only the combined efforts of academia and industry can provide answers and solutions that will benefit all of society.
Topics include but are not limited to:
Access Control
Architectures and infrastructures
Audit
Authentication
Anti-Virus
Awareness and training in Security
Backup, Storage, Recovery Biometrics
Business Continuity Planning and Management
Challenges and solutions of managing security
Communications / network security
Content Security
Corporate governance / Enterprise security
Digital forensics
Digital Identification and Authentication
Economy and philosophy of information security
Evaluation of Information Security in companies
Information security surveys
Future visions for Information Security Management
Hacking / cracking
Information rights management Information security project management
Legal, ethical and social issues related to Information Security
Managing Information Security
Mobile Computing Security
Mobile phone security
Phishing
Practical industry presentations on managing information security
Privacy
Information Security Risk Analysis
Security Policy and Procedures
Small distribution applications
Smart Cards Standards - Local & International
Strategic Information Security
Trust
Usability issues in information security
Vulnerability Assessments
Other CFPs
- 2010 Second Pacific-Asia Conference on Circuits,Communications and System
- 2010 ISEC International Conference on Manufacture Engineering, Quality and Production System (ICMEQP 2010)
- 23 Centuries of Influence on Mathematics, Science, and Engineering
- 25th IFIP International Information Security Conference Security & Privacy − Silver Linings in the Cloud SEC 2010
- 5th International ICST Conference on Communications and Networking in China CHINACOM 2010
Last modified: 2012-02-05 17:58:56