Information Security South Africa 2005 Conference (ISSA 2005) (ISSA 2005)

Venue: TBA

Location: Johannesburg, Gauteng, South Africa

Event Date/Time: Jun 29, 2005 End Date/Time: Jul 01, 2005
Registration Date: Jun 15, 2005
Early Registration Date: Mar 01, 2005
Abstract Submission Date: Mar 15, 2005
Paper Submission Date: Apr 15, 2005
Report as Spam


ISSA2005 is the annual conference for the information security community that continues on the successful recipe established in 2000. This years' conference is once again held under the auspices of the RAU Standard Bank Academy for Information Technology, the University of Pretoria Department of Computer Science and the University of South Africa (Unisa) School of Computing.

The ISSA2005 Conference will run from 29 June to 1 July 2005 in Gauteng, South Africa.

The conference has grown each year in various ways. Not only have delegate and presenter numbers been on the rise, but interest from industry has also grown and been displayed through sponsorship of the conference or aspects thereof. We believe that the quality and relevance of the information presented by industry practitioners and academics has also evolved over the years, as have the opportunities for students to present their research to a critical and representative audience.

Conferences have become a major focus area - and often a money spinner - in many industries, so at any time you will see a number of conferences being advertised in fields such as information security. What sets the ISSA conference apart is that it is not intended to generate a profit for an organisation, and it does not encourage marketing of products and services through presentations. Instead, the proceeds from registration fees are reinvested to ensure that the conference grows each year. In exchange for their investment in the conference, sponsors are afforded an opportunity to present company-specific information that has a bearing on the conference themes, and presentations submitted by potential speakers are sent through a vigorous review process, managed by a team of respected international experts in information security.

The ISSA conference affords local players in information security the opportunity to attend an international conference in their own country, and encourages international practitioners to share their knowledge, at the same time receiving exposure to local thinking, and getting a chance to visit our beautiful country. We trust that the annual ISSA conference will continue to be recognised as an platform for professionals from industry as well as researchers to share their knowledge, experience and research results in the field of information security.

To ensure ongoing improvement, we again encourage input from all those interested in the field of Information Security, particularly those who are actively seeking to progress the field, to take part and share their knowledge and experience.


Information security has evolved and in the last few months there has been renewed interest in the subject worldwide. This is evident from the many standards and certifications now available to guide security strategy. This has led to a more clear career path for security professionals.

The convergence of technologies together with advances in wireless communications, has meant new security challenges for the information security fraternity. As hotspots become more available, and more organisations attempt to rid their offices of "spaghetti" so the protection of data in these environments becomes a more important consideration.

It is this fraternity that organisations, governments and communities in general look to for guidance on best practice in this converging world.

Identity theft and phishing are ongoing concerns. What we are now finding is that security mechanisms have become so good and are generally implemented by companies wanting to adhere to good corporate governance, so attackers are now looking to the weak link in the chain, namely the individual user. It is far easier to attack them than attempt to penetrate sophisticated corporate systems. A spate of spyware is also doing the rounds, with waves of viruses still striking periodically. Software suppliers have started stepping up to protect their users and take some responsibility for security in general and not just for their own products.

The conference focuses on all aspects of information security and invites participation across the Information Security spectrum including but not being limited to functional, business, managerial, theoretical and technological issues.

Invited speakers will talk about the international trends in information security products, methodologies and management issues.

In the past ISSA has secured many highly acclaimed international speakers, including:

Prof. TC Ting: University of Connecticut, and fellow of the Computing Research Association, United States

Prof. Dr. Stephanie Teufel: Director of the International Institute of Management in Telecommunications (iimt). Fribourg University, Switzerland

Rich Schiesser, Senior Technical Planner at Option One Mortgage, USA

Rick Cudworth - Partner, KPMG LLP, International Service Leader, Security and Business Continuity - Europe, Middle East and Africa

The purpose of the conference is to provide information security practitioners and researchers worldwide with the opportunity to share their knowledge and research results with their peers.

The objectives of the conference are defined as follows:

• Sharing of local and international knowledge, experience and best practice
• Promoting networking and business opportunities
• Encouraging the research and study of information security
• Supporting the development of a professional information security community
• Assisting self development
• Providing a forum for education, knowledge transfer, professional development, and development of new skills
• Promoting best practice in information security and its application in Southern Africa
• Facilitating the meeting of diverse cultures to share and learn from each other in the quest for safer information systems


South Africa

Additional Information

First Call for Papers Widely respected as the information security professional's get-together of the year, the forthcoming ISSA2005 Conference will attract a variety of national and international information security practitioners, managers, executives and academics. The ISSA2005 Conference will provide an opportunity for key players to review sustainable practices that have been developed by South Africans in order to meet the challenges delivered by globalisation. Topics to be addressed by the conference include: research papers, case studies, lessons learned, current research, short tutorials and research in progress (student papers). The field of information security is diverse, including technical, managerial, legal, social and even philosophical issues. Individuals alone cannot address these issues. Only the combined efforts of academia and industry can provide answers and solutions that will benefit all of society. Topics include but are not limited to: • Access Control • Agents • Architectures and infrastructures • Audit • Authentication • Anti-Virus • Awareness and training in Security • Backup, Storage, Recovery • Biometrics • Business Continuity Planning and Management • Certification • Challenges and solutions of managing security • Communications / network security • Content Security • Corporate governance / Enterprise security • CRM security • Digital Identification and Authentication • Disaster Recovery Planning and Management • E-Commerce and E-Business security • E-mail security • Encryption • Evaluation of Information Security in companies and information security surveys • Firewalls • Forensic Auditing • Future visions for Information Security Management • Hacking / cracking • Human Computer Interaction for Security • Identity theft • Intelligent tokens • Intruder Detection • IT Governance • Legal, ethical and social issues related to Information Security • Legislation • Managing Information Security • Methodologies for securing small to medium size enterprises • Methodologies and techniques for certification and accreditation • Mobile Computing Security • Networking Security • PKI • Practical industry presentations on managing information security • Practical industry presentations on applications such as PGP • Printers, Id Systems • IT Risk Management • Information Security Risk Analysis • Secure servers • Security Policy and Procedures • Small distribution applications • Smart Cards • Standards - Local & International • Strategic Information Security • VPNs • Vulnerability Assessments We are looking for the following kinds of contributions: 1. Research papers 2. Case studies 3. Lessons learned 4. Current research 5. Short tutorials 6. Research in progress (student or short papers) If you have any queries, worries or just need general advice on how to go about writing an article, please feel free to contact the programme committee. A template will be made available on the website. Due dates: Abstract submission: March 2005 Notification of abstract acceptance: March 2005 Full papers for review: April 2005 Notification of acceptance: May 2005 Final camera-ready papers: June 2005 (±10-12 pages) Conference: 29 June to 1 July 2005 Instructions for Authors Authors are requested to submit original work, not previously published, on any of the above or other related topics. Abstracts should not be more than 1 page with full papers not exceeding 10 A4 pages. Full papers must have an abstract, a list of keywords and a separate cover page. This cover page must include the title of the paper, full names of all authors, their contact addresses, telephone and fax numbers, e-mail addresses and point of contact if there is more than one author. Papers must be written and presented in English. The proceedings will be produced on CD-ROM. The paper, the abstract and the biography files should be supplied in MS Word or PDF. The author should supply two MS Word or PDF files as follows: 1. File 1 - Paper with the title, authors, affiliations, postal and e-mail addresses and text commencing with an introduction. This file will be put on the CD proceedings. 2. File 2 - A short c.v. / biography of the presenting author (less than one-page). The files should be sent as an attachment on e-mail, noting the author’s name, title of the paper and the file name. If a file is too large to be sent as an attachment via e-mail, it may be sent as several attachments on different e-mail messages. Papers must be submitted electronically to On receipt of your paper an acknowledgement will be sent to you. If you do not receive an acknowledgement within 7 days, please resubmit paper. Copyright Author(s)/Presenter(s) represent and warrant that he/she/they are sole author(s) of the contributed work Author(s)/Presenter(s) will obtain any permission or clearance required for the subject matter of the contributed work by their employer or any other organisation or individual prior to submitting the contributed work, and represent and warrant the contributed work is original and does not infringe the statutory copyright or common-law literary rights of others, or violate the rights of privacy nor libel other persons. Author(s)/Presenter(s) retain the right to use all or part of the paper submitted in future works of his/her own. Author(s)/Presenter(s) hereby grant the conference organisers the right to publish the contributed work in the ISSA2005 proceedings (print, CD- Rom and/or other electronic formats).