SensePost is proud to announce a competition to identify the best information security research published by a resident of South Africa in 2011 (Jan 1st to Dec 3rd). Much security research is unfunded and private but, when published, enters the toolsets and minds of security companies worldwide. South Africa's security industry is best-described as "fledgling", and we want to support researchers who produce quality research.
Heads up: even if you're not a researcher, you can still win by nominating work, so continue reading.
SensePost employees and members of the judging panel are obviously excluded.
We're seeking interesting / groundbreaking / game-changing information security research, either industry-focused or academically-inclined.
You're welcome to make multiple nominations for different work, and even nominate your own work.
In addition, we'll award a R500 finder's fee to the person who nominated the winner. Should the winner have been nominated multiple times, then all verified nominator names will be placed into a hat and a single winner drawn.
This week, Charl van der Walt and I (Saurabh) spoke at Mobile Security Summit organized by IIR (http://www.iir.co.za/detail.php?e=2389).
Charl was the keynote speaker and presented his insight on the impact of the adoption of mobile devices throughout Africa and the subsequent rise of security related risks. During his talk, he addressed the following:
I spoke on iPhone and Android security, demonstrating the ease with which mobile security can be breached and presented some live demos. Below is the agenda of my talk:
The original presentation can be downloaded from link below: