Organised by:

European Information Security Multi-Conference (EISMC 2013)



Workshop Programme

Please be aware, this is only a draft programme and is subject to minor changes.

DAY 1:  Wednesday 8th May

 

Room 1

9:15-:9:30

Workshop Welcome

 

 

9:30-10:30

Keynote Talk

Ram Herkanaidu - Kaspersky Lab

Cyber-[.......] Hype or Trend? The Drivers behind Malware Development

Are we experiencing a change in the nature of threats facing us or is it all just hype? Do security companies and governments promote the notions of cyber-weapons and cyber-wars just for their own interest? Are there some fundamental changes in our digital lives both at home and work that means we are more vulnerable to cyber threats? Lastly, is the problem just one of technology or should more emphasis be placed on education and raising security awareness? This presentation outlines the major trends in malware development, the purposes for which malware is used, the ways in which malware spreads and the things we can do to secure our systems.

 

 

 

10:30-11:00

Coffee

 

 

11:00-12:30

HAISA Session 1

 

Shrinking the Authentication Footprint
K. Renaud and J. Maguire

 

Contextualized Security Interventions in Password Transmission Scenarios
M. Volkamer, S. Bartsch and M. Kauer

 

National Password Security Survey: Results
K. Helkala and T.H. Bakås

 

 

12:30-14:00

Lunch

 

 

14:00-15:00

WDFIA Session 1

 

Visual Triage of Email Network Narratives for Digital Investigations
J. Haggerty, S. Haggerty and M.J. Taylor

  An Ontological Framework for a Cloud Forensic Environment
N.M. Karie and H.S. Venter
   

15:00-15:30

Coffee

   

15:30-17:00

HAISA Session 2

  An Analysis of Information Security Vulnerabilities at Three Australian Government Organisations
K. Parsons, A. McCormac, M. Pattinson, M. Butavicius and C. Jerram
  Establishment of Security Knowledge Sharing in Organisations: An Empirical Study
W.R. Flores
  Privacy Challenges in the Interconnected World.
T. Oliveira.
   
18:30 Depart for Conference Dinner

 

DAY 2:  Thursday 9th May

 

9:00-10:00

WDFIA Session 2

 

MetaFor: Metadata Signatures for Automated Remote File Identification in Forensic Investigations
M.P. Roberts and J. Haggerty

 

Visualisation of allocated and unallocated data blocks in digital forensics
C. Hargreaves

 

 

10:00-11:00

Panel Discussion

 

Topic TBA

 

 

11:00-11:30

Coffee

 

 

11:30-13:00

HAISA Session 3

 

Using Theories and Best Practices to Bridge the Phishing Gap
E.D Frauenstein and R. von Solms

 

Using Phishing Experiments and Scenario-based Surveys to Understand Security Behaviours in Practice
W.R. Flores, H. Holm, G. Svensson, G. Ericsson

 

Developing and Testing a Visual Hash Scheme
M. M. Olembo, T. Kilian, S. Stockhardt, A. Hülsing and M. Volkamer

 

 

13:00-14:00

Lunch

 

 

14:00-15:30

IFIP TC 11.1 Session 1

 

A Revised Framework of Information Security Principles
A. Teixeira and F. de Sá-Soares

 

Principles for PCI Compliance to Ensure Information Security: The Case for Mid-Size Companies
J. DeSantio

  Punishment or Reward: Evaluating Efficacy of Security Controls
Y. Talib and G. Dhillon

 

 

15:30-16:00

Coffee

 

 

16:00-17:30

IFIP TC 11.1 Session 2

 

Interpreting Security Metaphors
A. Macedo

 

Towards a Brain-Compatible Approach for Web-Based, Information Security Education
R. Reid and J.F. Van Niekerk

 

Narrative Networks and Global Sourcing: Iimplications for Security and Privacy
G. Dhillon and D. Harnesk

   
17:30 Conference Close