Programme

PROGRAMME* - 15 and 16 August 2018

 

Updated 20 July @ 11h50

Please note that the programme is subject to change without notification

Day 1 – Wednesday, 15 August 2018

08:30 - 09:15

Registration

09:15 – 09:30

Welcome address and Session chair:

09:30 – 09:50

Distributed Ledger Technology to Support Digital Evidence Integrity Verification Processes

William Thomas Weilbach and Yusuf Moosa Motara

09:50 – 10:10

Real-Time Face Antispoofing Using Shearlets

Dustin van der Haar  

10:10 – 10:30

Password Policies Adopted by South African Organizations: Influential Factors and Weaknesses

Pardon Blessings Maoneke and Stephen Flowerday 

10:30 – 11:00 

Tea

 

Session chair:

11:00 – 11:30

Guest Speaker: TBC

11:30 – 12:30

Paranoid 101:  


12:30 – 13:30

Lunch 

 

Stream 1 – XX  Session Chair:

13:30 – 15:00

Paranoid 101:  

15:00 – 15 :30

Tea 

 

Stream 2 – XXX  Session Chair:  

15:30 – 15:50

An Investigation Into Students Responses to Various Phishing Emails and Other Phishing-Related Behaviours

Edwin Frauenstein 

15:50 – 16:10

Information Availability and Security in Foreign Corrupt Practices Act Investigations

Mcguigan Frank Lakay, Jacques Ophoff and Zainab Ruhwanya

16:10 – 17:00

The Current State of Electronic Consent Systems in e-Health for Privacy Preservation

Lelethu Zazaza, Hein Venter and George Sibiya

17:00 – 17:20

Detecting Manipulated Smartphone Data on Android and iOS Devices

Heloise Pieterse, Martin Olivier and Renier van Heerden

18:00 – 20:00

Gala Dinner: TBC

Day 2 – Thursday, 16 August 2018

08:30 - 09:15

Registration

09:15 – 09:30

Welcome address and Session chair:

09:30 – 09:50

An Evaluation of the Password Practices on Leading E-Commerce Websites in South Africa

Silas Formunyuy Verkijika

09:50 – 10:10

SA-EF Cube: An evaluation framework for assessing intelligent context-aware Critical Information Infrastructure Protection solutions

Jan van Niekerk and Elizabeth Ehlers

10:10 – 10:30

Small and medium sized enterprises’ understanding of security evaluation of cloud-based business intelligence systems and its challenges

Moses Moyo and Marianne Loock

10:30 – 11:00 

Tea

 

Session chair:

11:00 – 11:30

Guest Speaker: TBC

11:30 – 12:30

Paranoid 101:  


12:30 – 13:30

Lunch 

 

Stream 3 – XX  Session Chair:

13:30 – 15:00

Paranoid 101:  

15:00 – 15 :30

Tea 

 

Stream 4 – XXX  Session Chair:  

15:30 – 15:50

Preventing And Mitigating Ransomware A Systematic Literature Review

Zandile Manjezi and Reinhardt Botha

15:50 – 16:10

Mitigating the Ransomware Threat: A Protection Motivation Theory Approach

Tetyana Loskutova

16:10 – 16:30

Skills Requirements for Cyber Security Professionals: A Content Analysis of Job Descriptions in South Africa

Aman Parker and Irwin Brown

16:30 –

Best Paper Award and closing