Former Springbok coach Jake White will share his views on what it took for South Africa to win the 2007 Rugby World Cup at ITWeb's third annual Security Summit in May.
Keynote speakers White and Gary Chalmers, CEO of iPulse Biometrics, will bring to a close the information-packed two-and-half day information security conference, which features 28 top international security experts.
Headline speakers include the likes of former White House Cyber Security advisor, Howard Schmidt, authors and ex-hackers like Johnny Long (Google hacking), David Litchfield (database hacking exposed) and Johnny Cache (network hacking), and Roberto Preatoni, director of the world's first exploit auction site - WabiSabiLabi.
White, in his closing keynote, will take attendees through the planning, experiences and leadership issues, as well as the roles that luck and innovation played in the country's world cup glory in 2007.
He will touch on the much spoken about captain vs. coach relationship and share some out of the box thinking.
In the preceding keynote, iPulse's Gary Chalmers will take a closer look at biometrics, highlight benefits and shortcomings of the various technologies currently available, and provide a glimpse of what the future holds.
Says Chalmers: "I see the immediate future of biometrics as a way to verify a person's identity, being used in conjunction with another form of identification, such as cards, RFID, keys and passwords."
He continues: "Within 10 years, we can expect to arrive at work, be identified by an RFID token in our cars at the gate, verify we are who we say we are by transmitting an authenticated fingerprint on a key-chain like device, and then gain access to the campus. Once inside, unobtrusive facial recognition will be used to identify us, and grant us access to automated doors based on our security clearance. Finally, we would log on to our PC's with fingerprint verification."
Jake White and Gary Chalmers are the closing keynote speakers on day 3 of the ITWeb Security Summit 2008, which takes place from 6-8 May. For more information on the summit click here.
Related stories:
Security Summit 2008 excites
Complex malware needs stricter security
Cyber-crime on the increase everywhere
Web 2.0 brings security risks
Simple identity management is not enough
Share