COSAC 2013 & SABSA World Congress Programme

SUNDAY 29 SEPTEMBER 2013

TIME DETAILS
1930 - 2000 Registration
1930 - 2000 Drinks Reception - sponsored by Killashee House Hotel
2000 onward COSAC 2013 Welcome Dinner


MONDAY 30 September 2013
COSAC MASTERCLASSES

TIME CODE SESSION DETAILS SPEAKER COMPANY
0900 - 0930     Registration and Coffee
0930 - 1730 M1 13th International Roundtable Security Forum John O'Leary O'Leary Management Education
M2 COSAC Master Class: Security Analytics Char Sample
Michael Brunetto
Carnegie Mellon University
Turner Consulting Group
M3 SABSA Master Class: Practical Guides to Delivering Security Architecture
Part 1: Contextual – Building a Working Business Architecture
Part 2: Conceptual - A Practical Approach to Conceptual Assessment
Part 3: Logical – Design Patterns in SABSA Logical Architecture
Part 4: Physical - Design Patterns in SABSA Physical Architecture
Bill Schultz
Jason Kobes
Malcolm Shore
Robert Trapp
Perry Bryden
Vanderbilt University
Northrop Grumman
NBNCo
Booz Allen Hamilton
Booz Allen Hamilton
1100 - 1120     Morning Coffee
1300 - 1400     Lunch
1530 - 1550     Afternoon Tea
1900 - 1930 Drinks Reception
1930 onward Dinner


TUESDAY 1 OCTOBER 2013

Stream A - Technical & Topical
Stream B - Management & General Interest
Stream S - SABSA World Congress
Stream P - Plenary Sessions

TIME CODE SESSION DETAILS SPEAKER COMPANY
0900 - 0930     Registration and Coffee
0930 - 1030 1A The Wit, Wisdom & Policies of VapidBank Tom Trusty Banking Security Consultant
& Fraud Investigator
1B Legal Aspects of BYOD Larry Dietz TAL Global
1S SmartGrid Security from the Architecture Perspective Pascal de Koning KPN Trusted Services
1030 - 1050     Morning Coffee
1050 - 1150 2A Mapping Internet Usage & Behaviour Statistics to Threats Sian John Symantec
2B Outsourcing Security John O'Leary O'Leary Management Education
2S Delivering InfoSec Business Value at Scale Stirling Goetz Accenture
1200 - 1300 3A Cultural Markers in Attack Attribution: Results Char Sample Carnegie Mellon University
3B Getting the Most from Your Supplier: the Definitely “Do"s and the Mostly “Don't"s Dave Barnett Zscaler
3S Using SABSA to Improve the Security and Privacy of Government Information Services Chris Blunt Axenic
1300 - 1400     Lunch
1400 - 1500 4A The State of Cyber: DoD to DHS to OMG Mary Dunphy Dun & Taylor
4B Honing Your IT Jiu Jitsu Bill Schultz Vanderbilt University
4S Meta-SABSA: Exploring the Architecture of an Architecture Design Method Vince Gallo Residual Data
1510 - 1610 5A Cyber Threat Landscape for Nuclear Power Pascal de Koning KPN Trusted Services
5B Garbo, D-Day and Ultimate Social Engineering John O'Leary O'Leary Management Education
5S Re-Engineering Access Management with Attributes John Sherwood Head of SABSA Academy
1610 - 1630     Afternoon Tea
1630 - 1730 6A How the West Was Pwned G. Mark Hardy National Security Corporation
6B Security Redefined: Lessons from Burning Man Lisa Lorenzin Juniper Networks
6S Creating Integrated Multi-Dimensional Governance Architecture David Lynas COSAC Chairman &
CEO SABSA Institute
1745 - 1845 7P Big Daddy Digs Big Data Richard Hollis Risk Factory
2000 - 2030      Drinks Reception
2030 onwards      COSAC Gala Dinner & Networking


WEDNESDAY 2 OCTOBER 2013

Stream A - Technical & Topical
Stream B - Management & General Interest
Stream S - SABSA World Congress
Stream P - Plenary Sessions

TIME CODE SESSION DETAILS SPEAKER COMPANY
0900 - 0930     Registration and Coffee
0930 - 1030 8A Investigating the Risk of Visual Data Capture Wendy Goucher Idrach
8B Security as an Enabler: Let’s Talk Success Dave Barnett Zscaler
8S SABSA to the Cloud Jason Kobes Northrop Grumman
1030 - 1050     Morning Coffee
1050 - 1150 9A Considering Anonymous Larry Dietz TAL Global
9B Applying Social Policy Analysis & Economics to Information Security Sian John Symantec
9S Architecting to the Cloud: Where Have We Missed the Mark on Services & Security? Andy Rogers WWB Inc.
1200 - 1300 10A From Eyes to Teeth to Sleight of Hand Lisa Lorenzin Juniper Networks
10B Sensitive & Complex Security Issues John O'Leary O'Leary Management Education
10S Info-Centric Security: A Business-Driven Approach for Mobile Devices Simphiwe Mayisela Sun International
1300 - 1400     Lunch
1400 - 1500 11A Identity Management & Big Data Char Sample
Lynette Hornung
Carnegie Mellon University
Turner Consulting Group
11B At Last!! A New Version of 27001/27002 Mike Softley Ultima Risk Management
11S Moving Beyond SWIFT Payments: A Whole Bank SABSA Implementation Ed Blanchfield
Ross McKenzie
WestPac Bank
WestPac Bank
1510 - 1610 12A Govern Your Dark Data or Suffer Cataclysmic Event – Myth or Reality? Stephen O'Boyle Espion
12B Why Did My Information Security Strategy Fail? History Repeating Itself Glen Bruce Deloitte
12S Security Architecture at ING: How to Avoid Becoming a Blocking Factor Marc Verboven ING
1610 - 1630     Afternoon Tea
1630 - 1730 13P Tracking Clones with MindMaps Tom Trusty Banking Security
Consultant & Fraud Investigator
1730 - 1830 14P COSAC Rump Session Various Facilitated by David Lynas,
COSAC Chairman
1830 - 1845 Conference close


THURSDAY 3 OCTOBER 2013
Post-Conference Workshops (optional)

TIME CODE SESSION DETAILS SPEAKER COMPANY
0900 - 0930     Registration and Coffee
0930 - 1300 W1 Virtualisation & Cloud Security John O’Leary O’Leary Management Education
W2 CyberWar Goes Virtual Char Sample
G. Mark Hardy
Jason Kobes
Carnegie Mellon University
National Security Corporation
Northrop Grumman
W3 Architecting Mobility
Part 1: An Arresting Story: Mobilising New Zealand Police
Part 2: Mobile Banking Architecture (Including the Customer Living Under a Tree)
Paul Blowers
M.Z. Omarjee
New Zealand Police
Standard Bank
1300 - 1400     Lunch
1400 - 1600 --- SABSA Open Forum Meeting John Sherwood
David Lynas
SABSA Institute


The above timetable is preliminary, some details may be subject to change.


Copyright © 2013 COSAC - All Rights Reserved -