COSAC 2014 & SABSA World Congress Programme

SUNDAY 28 SEPTEMBER 2014

TIME DETAILS
1930 - 2000 Delegate Registration
1930 - 2000 Drinks Reception - sponsored by Killashee House Hotel
2000 onward COSAC 2014 Welcome Dinner


MONDAY 29 September 2014
COSAC MASTERCLASSES

TIME CODE SESSION DETAILS SPEAKER COMPANY
0900 - 0930     Registration and Coffee
0930 - 1730 M1 14th International Roundtable Security Forum John O'Leary O'Leary Management Education
M2 COSAC Master Class: Blowing the Whistle on Security in the Age of Surveillance
Part 1: How the Surveillance State has Changed IT Security Forever
Part 2: Is There a Commercial Impact from Snowden?
Part 3: Take Back the Net: Practical Counter-surveillance
Part 4: Why Do We Get This Security Stuff So Wrong?
Richard Stiennon
Vince Gallo
Lisa Lorenzin
Andy Clark
IT Harvest
Residual Data
Juniper Networks
Primary Key
M3 SABSA Master Class: Security Service Catalogue Workshop Pascal de Koning Ideas-to-Interconnect
1100 - 1120     Morning Coffee
1300 - 1400     Lunch
1530 - 1550     Afternoon Tea
1900 - 1930 Drinks Reception
1930 onward Dinner


TUESDAY 30 SEPTEMBER 2014

Stream A - Future-state Security
Stream B - Topical Issues
Stream S - SABSA World Congress
Stream P - Plenary Sessions

TIME CODE SESSION DETAILS SPEAKER COMPANY
0900 - 0930     Registration and Coffee
0930 - 1030 1A Weaponising Cybercurrencies G. Mark Hardy National Security Corporation
1B The Sky is Falling! The Sky is Falling! Gary Sheehan ASMGi
1S SABSA-Extended Security-in-Depth Allen Baranov Elucidate Solutions
1030 - 1050     Morning Coffee
1050 - 1150 2A Piano Thieving for Experts: That Bathroom Window IS Big Enough Ian Latter Midnight Code
2B Information Security Insanities & Albert Einstein Bevan Lane Independent Consultant
2S Security Architecture for Big Data Patrick Joyce Accenture
1200 - 1300 3A Take Down John Walker Integral Security Xssurance
3B Using Confidentiality, Integrity & Availability is not Helping Vicente Aceituno Canal Inovement
3S An Introduction to Visual Security John Arnold CapGemini
1300 - 1400     Lunch
1400 - 1500 4A Emergent Security Efrain Gonzalez Marengo Systems
4B Guerrillas in our Midst Dave Barnett Zscaler
4S Practical Stakeholder Engagement John Sherwood SABSA Institute
1510 - 1610 5A Evolution of the OWASP Top 10 John Hetherton Espion
5B Minor Infractions John O'Leary O'Leary Management Education
5S The ESA Roadshow – A Case Study: Selling the Strategic Vision Andrew Hutchinson
Jason Kobes
William Schultz
Vanderbilt University
Northrop Grumman
Vanderbilt University
1610 - 1630     Afternoon Tea
1630 - 1730 6A Triggers, Outcomes & Social Impact – A Framework for Assessing Technological Evolution Sian John Symantec
6B Help! The Senior Executives are Ignoring Risk Glen Bruce Deloitte
6S SABSA as a Problem-Solving Framework….for Anything!
Become the FIFA World Champion 2018
Maurice Smit IRSC
1745 - 1845 7P The More Things Change, The More They Stay The Same Vince Gallo
Char Sample
Residual Data
Carnegie Mellon University
2000 - 2030      Drinks Reception
2030 onwards      COSAC Gala Dinner & Networking


WEDNESDAY 1 OCTOBER 2014

Stream A - Future-state Security
Stream B - Topical Issues
Stream S - SABSA World Congress
Stream P - Plenary Sessions

TIME CODE SESSION DETAILS SPEAKER COMPANY
0900 - 0930     Registration and Coffee
0930 - 1030 8A Complexity & the Role of Cryptographic Security Roy Follendore III ---
8B What Can the Data Be Used For? Jason Kobes
Mary Dunphy
Northrop Grumman
Google
8S Reducing the Unknown Unknowns:
Using SABSA to Improve Threat Modelling & Risk Assessment
Chris Blunt Axenic
1030 - 1050     Morning Coffee
1050 - 1150 9A Chaos, Cybernetics, Cynefin & SCAN in Enterprise Systems Engineering David Hafele Whitney, Bradley & Brown
9B Getting the Most Out of SIEM Data in Big Data Char Sample Carnegie Mellon University
9S No Risk, No Glory Pascal de Koning Ideas-to-Interconnect
1200 - 1300 10A Increasing Resilience & Reliability of Software-Based Systems Andrew Lea Primary Key
10B Data Classification & Information Identification in the Age of Big Data & Linked Open Data Andrew S. Townley Archistry
10S An IAM Journey – Enterprise Management of Identities & Access Lunga Newman Eskom
1300 - 1400     Lunch
1400 - 1500 11A Slaying the Hydra: Evolution & Mitigation of Denial-of-Service Attacks Lisa Lorenzin Juniper Networks
11B Cloud Assurance: Trust but Verify Ross Spelman Espion
11S Battle Royal: Functional Comparison of EA Frameworks Jason Kobes
William Schultz
Northrop Grumman
Vanderbilt University
1510 - 1610 12A Kaizen for Bank Owned Accounts G. Mark Hardy National Security Corporation
12B Certified Security – Assurance or Trust? Helvi Salminen ---
12S Enterprise Data Protection - the lifecycle Ajit Gaddam VISA
1610 - 1630     Afternoon Tea
1630 - 1730 13P Tony Sale Memorial Session
Spread Spectrum, Wireless Security & the World’s Most Beautiful Geek
John O’Leary Banking Security
O’Leary Management Education
1730 - 1830 14P COSAC Rump Session Various Facilitated by David Lynas,
COSAC Chairman
1830 - 1845 Conference close


THURSDAY 2 OCTOBER 2014
Post-Conference Workshops (optional)

TIME CODE SESSION DETAILS SPEAKER COMPANY
0900 - 0930     Registration and Coffee
0930 - 1300 W1 Security, We Have a Situation! John O'Leary O’Leary Management Education
W2 Complex Challenges in Security G. Mark Hardy
Char Sample
National Security Corporation
Carnegie Mellon University
W3 Theory and Practice are not the Same
Part 1: The Theory & Practice of Using SABSA
Part 2: The Problem Set: Hard-Earned Architectural Lessons
Chris Blunt
Nima Khamooshi
Axenic
Booz Allen Hamilton
1300 - 1400     Lunch
1400 - 1600 --- SABSA Open Forum Meeting John Sherwood
David Lynas
SABSA Institute


The above timetable is preliminary, some details may be subject to change.


Copyright © 2014 COSAC - All Rights Reserved -