Johannesburg, South Africa
Loading map...
{"minzoom":false,"maxzoom":false,"mappingservice":"leaflet","width":"auto","height":"350px","centre":false,"title":"","label":"","icon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"zoom":false,"defzoom":14,"layers":["OpenStreetMap"],"image layers":[],"overlays":[],"resizable":false,"fullscreen":false,"scrollwheelzoom":true,"cluster":false,"clustermaxzoom":20,"clusterzoomonclick":true,"clustermaxradius":80,"clusterspiderfy":true,"geojson":"","clicktarget":"","imageLayers":[],"locations":[{"text":"","title":"","link":"","lat":-26.205,"lon":28.049722,"icon":""}],"imageoverlays":null}
Warning: Venue is missing. The map might not show the exact location.
7th Annual ISSA Conference
The premier information security conference
Gauteng Region (Johannesburg), South Africa
2 - 4 July 2008
http://www.infosecsa.co.za
The 7th Annual ISSA Conference will be held from 2 to 4 July 2008 (Venue to be announced). As with the previous ISSA conferences, the forthcoming �??ISSA2008�?? will again attract a variety of national and international information security practitioners, managers, executives and academics. This event is not to be missed by any Information Security enthusiast!
First call for papers
Details of the First Call for Papers have been posted on the ISSA Website �?? please visit http://www.infosecsa.co.za for more details on the topics, guidelines and other information.
Due dates: Abstract submission: 7 March 2008 (1 page)
Notification of abstract acceptance: 21 March 2008
Full papers submission for review: 18 April 2008
Notification of acceptance: 26 May 2008
Submission of final camera-ready papers: 6 June 2008 (±10-12 pages)
Conference 2 - 4 July 2008
Instructions for Authors
Abstracts and papers must be submitted electronically via the ISSA Website: http://www.infosecsa.co.za. On receipt of your abstract or paper an acknowledgement will be sent to you. If you do not receive an acknowledgement within 7 days, please contact the organising committee.
Topics include but are not limited to:
Access Control
Architectures and infrastructures
Audit
Authentication
Anti-Virus
Awareness and training in Security
Backup, Storage, Recovery
Biometrics
Business Continuity Planning and Management
Challenges and solutions of managing security
Communications / network security
Content Security
Corporate governance / Enterprise security Digital forensics
Digital Identification and Authentication
Economy and philosophy of information security
Evaluation of Information Security in companies and information security surveys
Future visions for Information Security Management
Hacking / cracking
Information right management
Information security project management
Legal, ethical and social issues related to Information Security
Managing Information Security
Mobile Computing Security
Mobile phone security Phishing
Practical industry presentations on managing information security
Privacy
Information Security Risk Analysis
Security Policy and Procedures
Small distribution applications
Smart Cards
Standards - Local & International
Strategic Information Security
Trust
Usability issues in information security
Vulnerability Assessments
The following types of contributions are requested:
Research papers Case studies
Lessons learned Current research
Short tutorial Research in progress (student or short papers)
Programme / organising committee
Jan Eloff (eloff@cs.up.ac.za)
HOD: Department Computer Science, University of Pretoria / IFIP TC11 Member / Co-leader of ICSA Research Team, UP
Les Labuschagne (lesl@uj.ac.za)
HOD: Department Business IT, University of Johannesburg / PMSA Board Member
Mariki Eloff (eloffmm@unisa.ac.za)
Professor in School of Computing, UNISA
This CfP was obtained from WikiCFP
Cookies help us deliver our services. By using our services, you agree to our use of cookies.