Following on from the highly regarded CISO Africa conference in Johannesburg earlier this year, we are bringing these in-depth discussions around IT security to Cape Town.
As we continue to embrace modern technology and inter-connectivity, the privacy and cyber security landscape has become increasingly complex. The C-suite are increasingly aware of the implications of this interconnected world, knowing full well that one security breach can derail the entire organisation. Threats are increasing in number and sophistication and points of entry are multiplying; this is where the CISO steps in.
The role of the CISO has evolved from managing security risk to becoming integrated business enabler. Not only should they possess the necessary technical cyber security capabilities, but also exhibit excellent leadership skills. The CISO, and their teams, has the unenviable task of protecting the organisation from external threats, yet should possess the ability to articulate IT security priorities from a business viewpoint.
Key topics to be discussed at CISO Africa Cape Town 2019:
The Role of the CISO: What does the modern CISO look like and what attributes do they possess? How should the role of the CISO relate to the CIO and the rest of the board? What will the role of the CISO look like in five or ten years’ time?
AI & Automated Security: In the age of automation, can AI not only identify threats, but also remediate and pre-empt them? Can we build self-learning systems that can ward off all threats? Can AI be used for authentication and access control?
Cloud Security: What are the risks and benefits to migrating to the cloud? Can the cloud improve IT security management?Are you open to using third parties, and do you have a risk management strategy in place?
Blockchain: Can the use of distributed ledgers mitigate threats? Are there limitations of blockchain, and what would be the reality if it were to be adopted globally?
Digital Transformation Security: Are we opening ourselves up to increased threats? How are we protecting ourselves against cyber-savvy criminals? If we all work online, store all our data in the cloud and use multiple devices on multiple networks, what new threats are we attracting?
Balancing Risk with Investment: How much of your IT budget should go towards security? If it’s not your physical assets at risk, what about your brand? Is there a ceiling to how much investment should be made?
Regulations & Compliance: In light of GDPR, POPIA and myriad compliance issues, are we keeping our cyber security features in check? What are the customer/business challenges for ensuring data security (the integrity of data) and data privacy (control of data)?
Additional discussions will be had around upskilling teams, security by design, relationships with data analytics teams, IoT security, DevSecOps, access control, remote working and many more probing topics.