Organised by:

European Information Security Multi-Conference (EISMC 2013)

Workshop Programme

Please be aware, this is only a draft programme and is subject to minor changes.

DAY 1:  Wednesday 8th May


Room 1


Workshop Welcome




Keynote Talk

Ram Herkanaidu - Kaspersky Lab

Cyber-[.......] Hype or Trend? The Drivers behind Malware Development

Are we experiencing a change in the nature of threats facing us or is it all just hype? Do security companies and governments promote the notions of cyber-weapons and cyber-wars just for their own interest? Are there some fundamental changes in our digital lives both at home and work that means we are more vulnerable to cyber threats? Lastly, is the problem just one of technology or should more emphasis be placed on education and raising security awareness? This presentation outlines the major trends in malware development, the purposes for which malware is used, the ways in which malware spreads and the things we can do to secure our systems.









HAISA Session 1


Shrinking the Authentication Footprint
K. Renaud and J. Maguire


Contextualized Security Interventions in Password Transmission Scenarios
M. Volkamer, S. Bartsch and M. Kauer


National Password Security Survey: Results
K. Helkala and T.H. Bakås








WDFIA Session 1


Visual Triage of Email Network Narratives for Digital Investigations
J. Haggerty, S. Haggerty and M.J. Taylor

  An Ontological Framework for a Cloud Forensic Environment
N.M. Karie and H.S. Venter





HAISA Session 2

  An Analysis of Information Security Vulnerabilities at Three Australian Government Organisations
K. Parsons, A. McCormac, M. Pattinson, M. Butavicius and C. Jerram
  Establishment of Security Knowledge Sharing in Organisations: An Empirical Study
W.R. Flores
  Privacy Challenges in the Interconnected World.
T. Oliveira.
18:30 Depart for Conference Dinner


DAY 2:  Thursday 9th May



WDFIA Session 2


MetaFor: Metadata Signatures for Automated Remote File Identification in Forensic Investigations
M.P. Roberts and J. Haggerty


Visualisation of allocated and unallocated data blocks in digital forensics
C. Hargreaves




Panel Discussion


Topic TBA








HAISA Session 3


Using Theories and Best Practices to Bridge the Phishing Gap
E.D Frauenstein and R. von Solms


Using Phishing Experiments and Scenario-based Surveys to Understand Security Behaviours in Practice
W.R. Flores, H. Holm, G. Svensson, G. Ericsson


Developing and Testing a Visual Hash Scheme
M. M. Olembo, T. Kilian, S. Stockhardt, A. Hülsing and M. Volkamer








IFIP TC 11.1 Session 1


A Revised Framework of Information Security Principles
A. Teixeira and F. de Sá-Soares


Principles for PCI Compliance to Ensure Information Security: The Case for Mid-Size Companies
J. DeSantio

  Punishment or Reward: Evaluating Efficacy of Security Controls
Y. Talib and G. Dhillon








IFIP TC 11.1 Session 2


Interpreting Security Metaphors
A. Macedo


Towards a Brain-Compatible Approach for Web-Based, Information Security Education
R. Reid and J.F. Van Niekerk


Narrative Networks and Global Sourcing: Iimplications for Security and Privacy
G. Dhillon and D. Harnesk

17:30 Conference Close