[WSIS CS-Plenary] The International Conference on Computer Security and Cybercrime
Duhamic
duhamic at rwanda1.com
Fri Jan 13 05:17:12 GMT 2006
Thank you Nnenna
Benineza Innocent
DUHAMIC ADRI
KIGALI RWANDA
----- Original Message -----
From: Nnenna
To: WSIS Plenary ; African Information Society Initiative - Discussion Forum
Sent: Thursday, January 12, 2006 7:54 PM
Subject: [WSIS CS-Plenary] The International Conference on Computer Security and Cybercrime
The International Conference on Computer Security and Cybercrime - Call for Papers/Participation
Background:
The emergent information society is predicated on a sound platform of information and communications technology, most especially anchored on the very critical role of the Internet both as a tool and as a platform for delivering various e-services such as e-commerce, e-banking, e-government amongst many others. It is therefore imperative that standards are set and enforced, rules are established and understood, laws are enacted and enforced with a view to protecting the various stakeholders in the information society.
Adams and Lloyd (2003) define information security as the sum of the processes and technologies used to protect information assets from unauthorized acquisition, disclosure, manipulation, modification or damage and loss. Information security underlines the importance of trust and trust-building in everyday economic and civic life...As e-business becomes part of everyday experience of a large number of firms, who will on average tend to be more risk-averse than early adopters of technology, security in all its dimensions becomes crucially important (UNCTAD, 2003,2005)
The US Treasury Department says that cyber crime has now outgrown illegal drug sales in annual proceeds, netting an estimated $105 billion in 2004. All the benefits of technology can be lost in an instant if systems are not secure. As the critical issue of information security takes on greater and greater importance nationally, in our business and in our personal lives, the responsibility of protecting these important assets becomes paramount.
In Africa, the challenge has always been how to map the way forward, especially at national level. In recent years scam letters have taken over the Internet, yet very little is being done to protect internet users. Recently some countries have proposed legislations, but some of these are against civil liberties. How can we then develop a framework for computer and Internet security that meets global standards? How can we gain the benefits of information and communications technologies while minimizing the associated risks? These amongst others are the reasons for convening this conference.
The International Conference on Computer Security and Cybercrime offers a great deal of information which African businesses and governments can use to address this urgent need. Security is everybody's business; it's more than an IT issue. It affects our ability to deliver results and gain real benefit from technology. That's why it's so important to have the right technology, policies and strategy to deal with the new threats emerging daily.
Development Information Network (DevNet); Jidaw Systems Limited, Infopoint Enterprises and Legal Defense Centre, all Nigerian based organizations are collaborating to bring this conference together for the very first time in Africa.
Objectives:
· To develop a framework for computer and internet security in Africa
· To establish guidelines for cyber-laws in Africa
· Promote civil liberties in internet use
· Highlight critical security threats, issues and technologies affecting information and computing infrastructure
· Learn how to protect your organization's computing environment and critical infrastructure.
· Gain the insight and practical knowledge to protect and defend technology and related infrastructures
Theme: Shaping the future of information security in Africa
Sub-Themes:
· Security Standards and Applications
· Security Management and Guidance
· Security Research and Emerging Technologies
· Security Technologies and Applications
· Computer and Internet Law
· Human Resource Development
· Identity management,
· Privacy and civil liberties
Programme and Agenda
The Conference will include a number of sessions that tackle critical, topical and challenging issues such as - e-Security culture, Computer Security fundamentals, Security Applications & Systems Development, Telecommunications & Network Security, Critical Issues on Internet Attacks and Countermeasures, Business Continuity Planning and Incident Management, Cryptography and Security, Internet and Cybercrime Laws, IT Security Audit and Security Education.
Sessions will include the following topics:
¨ Building a Culture of e-Security / Introduction to Computer Security
¨ Applications & Systems Development Security - Developing Secure Applications
¨ Telecommunications & Network Security -wired and wireless
¨ Critical Issues on Internet Attacks and Countermeasures
¨ Business Continuity Planning and Incident Management
¨ Cryptography and Security
¨ Laws, Investigations, Cybercrime & Ethics
¨ The Essentials & Role of IT Security Audit
¨ Security Education - Awareness, Training and Certification
Faculty
The conference is a unique event that brings together experts in the security sphere. Presenters are experienced professionals in security management, telecommunications, civil liberties, law and compliance, information technology and security plus much more. These experts have gathered together to highlight the critical security issues and technologies that affect Computer and Internet security in Africa, your corporate computing infrastructure, while providing practical insights and techniques that you can implement now. The focus is on the know-how and best practices to maintain the appropriate level of security.
The three-day forum provides excellent networking and discussion opportunities through presentations, panel meetings, exhibition displays and workshops. This enables you to connect with presenters, vendors and other attendees, like you, so that you can share ideas and network together.
Who Should Attend?
CIOs, CTOs, CISOs, CSOs, Directors of IT, Network Managers, IT and Internet Security Managers, Business Continuity Managers, Auditors, Senior business executives, Security Consultants, Senior business managers, Entrepreneurs, Investigators, Computer Specialists, InfoSec Specialists, Crime Prevention Specialist, Data Security Engineers, Network Analysts, Systems Analysts, Network Engineers, Technical Consultants, Network Security Analysts, Security Administrators, Security Architects
The conference is a must-attend event for anyone who requires critical insights into the latest technology, tools and strategies in Information Security. Though the event is for all those involved in the Information security industry, it isn't just for IT security professionals. Security is not an IT issue alone. Information security is your responsibility. Business managers, executives responsible for securing organization's assets and infrastructure will gain firsthand by attending this year's conference.
Exhibition and Sponsorship Opportunities
Through the exhibition, the conference provides Security vendors and solution providers with an opportunity to showcase products, services and technologies that focus on the specific IT security needs of the market.
Contact the organizers for details of exhibition and sponsorship opportunities.
Exhibitors increase awareness about their products and services to the security target audience, generate useful leads with new and existing customers and network with clients, vendors and other participants.
The exhibition is an opportunity to learn and find innovative solutions for your specific industry and job.
Unique Attendance Benefits
1. The event provides current, compelling and comprehensive content on Information security. Do you need information on the latest tools and technologies? Or do you require the right perspective and direction from experts? Are you trying to fashion out the Information Security strategy for your organization? Do you need to network with your peers and colleagues in industry? This is the ONLY event in Africa that brings Information security value, learning, networking and opportunity together in one place.
2. With the growing dependence on information and communications assets, placing security lower than price, performance and other features of ICT makes us more vulnerable. It isn't a secret - Information security will be a priority in 2006 and the years ahead. And this year's conference is just what you need to handle the opportunities and challenges.
3. The conference provides knowledge, insight and networking for a more secure and compliant infrastructure. Information security is about enhancing the confidentiality, availability, integrity, compliance and risk mitigation of your organization. You therefore need to participate in this high level conference to learn about innovative solutions that can keep you, your organization and your society secure.
4. It isn't just a learning opportunity. It's a great opportunity to develop new contacts and prospects during the event. As a networking forum it throws up opportunities to build strategic partnerships and relationships. Sharing information, learning and communicating.
5. It is a unique learning event. Get access to current techniques, technologies strategies for protecting your valuable data from the major security risks associated with information technology today. Do you want to be part of current and future Information security developments in Africa? You MUST learn how to tackle the key technology issues that will affect you, your business and your society. You MUST attend this event.
Conveners
· Development Information Network
· Jidaw Systems
· Legal Defense Center
· Computer and Internet Security Association of Nigeria (in Formation)
Organizers
· DevNet
· Infopoint
Date & Venue:
· Sheraton Hotel & Towers, Lagos Nigeria
· February 14th - 16th 2006.
REGISTRATION COSTS
Conference Participation fee is N25,000 / $200 / ?200 (covers Lunch & Resource Materials)
Registration is permitted at the venue, but reservation MUST be made with the organizers. Limited Exhibition space/cost is available form the organizers on a first come first served basis. Cheques should be made payable to Development Information Network.
Abstract Submission:
Intending Speakers/Demonstrators/Exhibitors should send an abstract of their presentation (100 Words) to the organizers. Presentation must be either in MSWord / Open-office / PowerPoint. A full copy of the presentation should be sent by email on or before 5th February 2006.
For further enquiries please contact:
Bankole Olubamise devnet at devnetnigeria.org; Tel: 234-1-7938327; 08062374707
Jide Awe md at jidaw.com Tel: 234-8033298318
www.devnetnigeria.org
------------------------------------------------------------------------------
Yahoo! Photos
Ring in the New Year with Photo Calendars. Add photos, events, holidays, whatever.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mailman-new.greennet.org.uk/pipermail/plenary/attachments/20060113/b0cbaa8a/attachment.htm
More information about the Plenary
mailing list