ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ISSA 2012 - 2012 Information Security for South Africa (ISSA)

Date2012-08-15

Deadline2012-04-18

VenueJohannesbu, South Africa South Africa

Keywords

Websitehttps://www.infosecsa.co.za

Topics/Call fo Papers

The ISSA2012 Conference will provide an opportunity for key players to review sustainable practices that have been developed by South Africans in order to meet the challenges delivered by globalisation. Topics to be addressed by the conference include: research papers, case studies, lessons learned, current research, short tutorials and research in progress (student papers).
The field of information security is diverse, including technical, managerial, legal, social and even philosophical issues. Individuals alone cannot address these issues. Only the combined efforts of academia and industry can provide answers and solutions that will benefit all of society.
Topics include but are not limited to:
Access Control
Architectures and infrastructures
Audit
Authentication
Anti-Virus
Awareness and training in Security
Backup, Storage, Recovery Biometrics
Business Continuity Planning and Management
Challenges and solutions of managing security
Communications / network security
Content Security
Corporate governance / Enterprise security
Digital forensics
Digital Identification and Authentication
Economy and philosophy of information security
Evaluation of Information Security in companies
Information security surveys
Future visions for Information Security Management
Hacking / cracking
Information rights management Information security project management
Legal, ethical and social issues related to Information Security
Managing Information Security
Mobile Computing Security
Mobile phone security
Phishing
Practical industry presentations on managing information security
Privacy
Information Security Risk Analysis
Security Policy and Procedures
Small distribution applications
Smart Cards Standards - Local & International
Strategic Information Security
Trust
Usability issues in information security
Vulnerability Assessments

Last modified: 2012-02-05 17:58:56