COSAC 2015 & SABSA World Congress Programme

SUNDAY 27 SEPTEMBER 2015

TIME DETAILS
1930 - 2000 Delegate Registration
1930 - 2000 Drinks Reception - sponsored by Killashee
2000 onward COSAC 2015 Welcome Dinner


MONDAY 28 SEPTEMBER 2015
COSAC MASTERCLASSES

TIME CODE SESSION DETAILS SPEAKER COMPANY
0900 - 0930     Registration and Coffee
0930 - 1730 M1 15th International Roundtable Security Forum John O'Leary O'Leary Management Education
M2 A day with SABSA Architect Vince Gallo Residual Data
M3 The 1st COSAC ‘Design-Off’ Jason Kobes
William Schultz
Northrop Grumman
Vanderbilt University
1100 - 1120     Morning Coffee
1300 - 1400     Lunch
1530 - 1550     Afternoon Tea
1900 - 1930 Drinks Reception
1930 onward Dinner


>
TUESDAY 29 SEPTEMBER 2015

TIME CODE SESSION DETAILS SPEAKER COMPANY
0900 - 0930     Registration and Coffee
0930 - 1030 1A IPv6 Auto-configuration – Boon or Bane? Zbynek Houska Espion Group
1B Coding as the New Literacy Mary Dunphy
Lynette Hornung
Google
Turner Consulting Group
1S Segmenting ING Group with SABSA Domains (case study) Pieter Siedsma
Marc Verboven
ING Bank (Netherlands)
ING Bank (Belgium)
1030 - 1050     Morning Coffee
1050 - 1150 2A Compliant and Connected: Building Herd Immunity Lisa Lorenzin Pulse Secure
2B The Cybersecurity Skills Gap Esther van Luit Deloitte
2S Away with Applications Security! (case study) Jacoba Sieders ABN AMRO Bank
1200 - 1300 3A Unique Analogs for Validating Security & Performance Claims (case study) Rob Hale Lockheed Martin
3B The Importance of Being Earnest Helvi Salminen ---
3S SABSA in a Governmental Security Program (case study) Silvia Knittl Accessec
1300 - 1400     Lunch
1400 - 1500 4A Open Source Configurable Remote Authentication Keyboard Emulator (OSCRAKE) Vince Gallo Residual Data
4B More Complex Challenges in Security G. Mark Hardy
Char Sample
National Security Corporation
Carnegie Mellon University
4S SABSA Architectural Patterns for Industrial Control Systems Malcolm Shore BAE Systems
1510 - 1610 5A I’ve Got I’s Everywhere but I still Can’t See Richard Peasley
Fabio Rosa
Blue Coat Systems
Blue Coat Systems
5B The Internet of Things: Privacy, Security & Property Mark Rasch Former US Cybercrime
prosecutor
5S SABSA-Enhanced NIST Cybersecurity Framework: SENC Makes Sense Efrain Gonzalez Enterprise Security Architect
1610 - 1630     Afternoon Tea
1630 - 1730 6A The Need for Hardware-Enforced Security (case study) Rob Hale Lockheed Martin
6B Dance-band on the Titanic: the Data Loss Iceberg Principle Richard Hollis Risk Factory
6S Practical Process Decomposition Andrew S. Townley Archistry
1745 - 1845 7P How to Save the World Ancilla Tilia ---
2000 - 2030      Drinks Reception
2030 onwards      COSAC Gala Dinner & Networking


WEDNESDAY 30 SEPTEMBER 2015

TIME CODE SESSION DETAILS SPEAKER COMPANY
0900 - 0930     Registration and Coffee
0930 - 1030 8A Securing the Chaos G. Mark Hardy National Security Corporation
8B Social Engineering, Misdirection & Mind Hacking Jason Kobes
William Schultz
Northrop Grumman
Vanderbilt University
8S From Concept to Implementation (case study) Chris Blunt
Michael Price
Axenic
Axenic
1030 - 1050     Morning Coffee
1050 - 1150 9A Penetration Testing, PCI & The Race to the Bottom Conor O’Neill Espion
9B Breaches and Screams: They Woulda, Coulda, Shoulda…but Didn’t John O'Leary O’Leary Management Education
9S Cloud Security Enablement: To the Cloud or to the Ground Muhammed Z. Omarjee Standard Bank Group
1200 - 1300 10A Hack Back – Legal Aspects of “Active Defence” Mark Rasch Former US Cybercrime
prosecutor
10B Capturing Cyber Value: Towards a Model for Quantifying Cyber Risk Esther van Luit Deloitte
10S Why Should I Trust You? SABSA and Zero Trust Richard Peasley
Fabio Rosa
Blue Coat Systems
Blue Coat Systems
1300 - 1400     Lunch
1400 - 1500 11A The Next Cyber War: Geopolitical Events & Cyber Attacks Werner Thalmeier Radware
11B Business Security Requirements & How We Might Recover from Them Matthew Pemble Goucher Consulting
11S A Structured Treatment of Governance Vince Gallo Residual Data
1510 - 1610 12A Government Surveillance: Citizen Privacy versus Protection of Society John Sherwood SABSA Institute
12B From I.T. Security to Business Security Vernon Poole Sapphire
12S Using Risk Management to Enable Organisational Achievement William Schultz Vanderbilt University
1610 - 1630     Afternoon Tea
1630 - 1730 13P Tony Sale Memorial Session
Kim Philby & The Ultimate Insider Threat
John O’Leary Banking Security
O’Leary Management Education
1730 - 1830 14P COSAC Rump Session Various Facilitated by David Lynas,
COSAC Chairman
1830 - 1845 Conference close


THURSDAY 1 OCTOBER 2015
Post-Conference Workshops (optional)

TIME CODE SESSION DETAILS SPEAKER COMPANY
0900 - 0930     Registration and Coffee
0930 - 1300 W1 The SABSA International Peer Group
(n.b. this session is conducted under full NDA and consultants/vendors may not attend)
John O'Leary O’Leary Management Education
W2 Rise of the machines
Part 1: Artificial Intelligence: Rise of the Machines or Human Triumph? You Decide

Part 2: What is Telematics & How Does it Impact You?

Char Sample
Dave Barnett

Mary Dunphy
Jason Kobes
Carnegie Mellon University
Zscaler

Google
Northrop Grumman
W3 SABSA TOGAF Integration: Security & Risk in Enterprise Architecture
Part 1: Integration of Security & Risk in a TOGAF Enterprise Architecture

Part 2: Proceedings of Security Services Catalogue Project
Pascal de Koning Ideas-to-Interconnect
1300 - 1400     Lunch
1400 - 1600 SABSA Open Forum Meeting SABSA Institute SABSA Institute


The above timetable is preliminary, some details may be subject to change.


Copyright © 2015 COSAC - All Rights Reserved -