Programme

PROGRAMME* - 15 and 16 August 2018

 

Updated 30 July @ 15h36

Please note that the programme is subject to change without notification

Day 1 – Wednesday, 15 August 2018

08:30 - 09:15

Registration

09:15 – 09:30

Welcome address and Session chair:

09:30 – 09:50

Distributed Ledger Technology to Support Digital Evidence Integrity Verification Processes

William Thomas Weilbach and Yusuf Moosa Motara

09:50 – 10:10

Real-Time Face Antispoofing Using Shearlets

Dustin van der Haar  

10:10 – 10:30

Password Policies Adopted by South African Organizations: Influential Factors and Weaknesses

Pardon Blessings Maoneke and Stephen Flowerday 

10:30 – 11:00 

Tea

 

Session chair:

11:00 – 11:30

Guest Speaker: Eric Mc Gee                              Affiliation: Business Connection 

Topic: “Emerging and disruptive technologies : A cybersecurity professional’s view on the world and cybersecurity”

11:30 – 12:30

Workshop: Paranoid 101                                     Presented by: Telspace Systems 

The purpose of the workshop is to expose attendees to the different ways in which cyber criminals target people / victims. Take attendees through the threats as well as how to address the threats i.e. lessons learnt.  Includes lots of practical demonstrations and the workshop was created to target a broad audience i.e. different areas, expertise, backgrounds etc. 


12:30 – 13:30

Lunch 

 

Stream 1 – Session Chair:

13:30 – 15:00

Workshop: Paranoid 101 (Continued) 

15:00 – 15 :30

Tea 

 

Stream 2 – Session Chair:  

15:30 – 15:50

An Investigation Into Students Responses to Various Phishing Emails and Other Phishing-Related Behaviours

Edwin Frauenstein 

15:50 – 16:10

Information Availability and Security in Foreign Corrupt Practices Act Investigations

Mcguigan Frank Lakay, Jacques Ophoff and Zainab Ruhwanya

16:10 – 17:00

The Current State of Electronic Consent Systems in e-Health for Privacy Preservation

Lelethu Zazaza, Hein Venter and George Sibiya

17:00 – 17:20

Detecting Manipulated Smartphone Data on Android and iOS Devices

Heloise Pieterse, Martin Olivier and Renier van Heerden

18:00 – 20:00

Gala Dinner: TBC

Day 2 – Thursday, 16 August 2018

08:30 - 09:15

Registration

09:15 – 09:30

Welcome address and Session chair:

09:30 – 09:50

An Evaluation of the Password Practices on Leading E-Commerce Websites in South Africa

Silas Formunyuy Verkijika

09:50 – 10:10

SA-EF Cube: An evaluation framework for assessing intelligent context-aware Critical Information Infrastructure Protection solutions

Jan van Niekerk and Elizabeth Ehlers

10:10 – 10:30

Small and medium sized enterprises’ understanding of security evaluation of cloud-based business intelligence systems and its challenges

Moses Moyo and Marianne Loock

10:30 – 11:00 

Tea

 

Session chair:

11:00 – 11:30

Guest Speaker: Caesar Tonkin                          Affiliation: PricewaterhouseCoopers 

Topic: “PwC 2018 Survey on Economic Crime – Cybercrime”  

11:30 – 12:30

Workshop: Paranoid 101 (Continued) 


12:30 – 13:30

Lunch 

 

Stream 3 – Session Chair:

13:30 – 15:00

Workshop: Paranoid 101 (Continued) 

15:00 – 15 :30

Tea 

 

Stream 4 – Session Chair:  

15:30 – 15:50

Preventing And Mitigating Ransomware A Systematic Literature Review

Zandile Manjezi and Reinhardt Botha

15:50 – 16:10

Mitigating the Ransomware Threat: A Protection Motivation Theory Approach

Tetyana Loskutova

16:10 – 16:30

Skills Requirements for Cyber Security Professionals: A Content Analysis of Job Descriptions in South Africa

Aman Parker and Irwin Brown

16:30 –

Best Paper Award and closing