First International Workshop on Visualization and Information Security Management (VISM 2011)

Venue: Paul Sabatier University

Location: Toulouse, France

Event Date/Time: Aug 28, 2011 End Date/Time: Sep 02, 2011
Registration Date: May 20, 2011
Paper Submission Date: Mar 20, 2011
Report as Spam

Description

In today's global economy, where conditions change often and rapidly, the efficient, effective as well as continuous management of information security has become a central issue. Exercising for instance strong computer security is a company’s crucial task in order to strengthen the resilience of IT systems against arising threats. However, the most sophisticated technical security techniques will fail, if there is no adequate management attention enabling proper planning, design and implementation of these techniques. At this point, visualization plays a fundamental role in mining, aggregating and presenting relevant information.
The purpose of this conference is to act as an interdisciplinary platform for decision-makers, academics, and professionals interested in the development and application of concepts as well as technology in ensuring the sustainable use and management of information. Several orientations of research can be imagined, and we welcome submissions coming from various disciplinary or methodological horizons. We are keen to encourage practitioners to contribute as well as academics and we would like to encourage proposals dealing in particular with one of the following aspects.

Venue

Additional Information

Topics of interest include, but are not limited to: Auditing Business Continuity Cost/Benefit Analysis Data Hiding Techniques Data Recovery Digital Evidence Digital Evidence Extraction Techniques Digital Evidence Search Techniques Digital Forensic Information Visualization Digital Forensics Disaster Recovery Identity Management Information Assurance Information Security Management Information Security Metrics and Measurement Insider Threats IT Governance and Compliance IT Service Continuity Management and Virtualization Tools Risk Management Security Awareness and Education Security Culture Security Requirements Engineering Standards, Best Practices and Certification

Types