<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=306561&amp;fmt=gif">
'30 March, 2019 00:00:00'
  • days,
  • Until the Early Bird Pricing Special Ends
  • Book Your Seat and Save 40%

CISO Africa Cape Town 2019

Mitigating Cyber Threats Through Effective Leadership
6 - 8 August 2019 | CTICC 2, Cape Town

Speak at CISO Africa Cape Town Sponsor CISO Africa Cape Town

CISO Africa Cape Town 2019 Agenda

For information on speaking opportunities, please contact ryan.matthews@coriniumgroup.com 

Agenda subject to change.

Pre-Conference Focus Day
6 August 2019
07:30

Registration Opens

Registration Opens

August 6 | 07:30 - 09:00

Speaking:

08:55

Welcome & Opening Remarks

Workshop Leader: Verine Etsebeth, Senior Lecturer: School of Law, WITS University

Verine Etsebeth is a senior lecturer at the Wits School of Law. Verine is an admitted attorney who did her articles in the IT law department of Edward Nathan Sonnenbergs Attorneys. She has a Masters degree in Law (LLM dissertation entitled “The Legal Implications of Information Security Governance”) and Higher Diplomas in Corporate Law, Tax Law and Labour Law, and is currently enrolled for a PhD at WITS. Verine specialises in Information Security and data protection law, and is the co-ordinator of and a lecturer on WITS’ LLM course in Cyber Law and Access to Information and Privacy Law. She has presented papers at numerous national and international conferences and has published articles in a range of local and international publications on the subject matter of IT law.

Speaking:

Welcome & Opening Remarks

August 6 | 08:55 - 09:00

Workshop Leader: Verine Etsebeth, Senior Lecturer: School of Law, WITS University

Verine Etsebeth is a senior lecturer at the Wits School of Law. Verine is an admitted attorney who did her articles in the IT law department of Edward Nathan Sonnenbergs Attorneys. She has a Masters degree in Law (LLM dissertation entitled “The Legal Implications of Information Security Governance”) and Higher Diplomas in Corporate Law, Tax Law and Labour Law, and is currently enrolled for a PhD at WITS. Verine specialises in Information Security and data protection law, and is the co-ordinator of and a lecturer on WITS’ LLM course in Cyber Law and Access to Information and Privacy Law. She has presented papers at numerous national and international conferences and has published articles in a range of local and international publications on the subject matter of IT law.

Speaking:

09:00

Workshop Topic 1: The Legal Considerations for Cyber & Information Security

Having worked in both the corporate environment and now in academia, Verine will discuss the legal position relating to operating internal and outsourced IT Security and Data Protection/Privacy roles. Outlining the history of data protection, this session will provide the foundation for the following sessions on POPIA, GDPR and US Privacy Shield, allowing you the opportunity to voice where you’re experiencing

Workshop Topic 1: The Legal Considerations for Cyber & Information Security

August 6 | 09:00 - 10:30

Having worked in both the corporate environment and now in academia, Verine will discuss the legal position relating to operating internal and outsourced IT Security and Data Protection/Privacy roles. Outlining the history of data protection, this session will provide the foundation for the following sessions on POPIA, GDPR and US Privacy Shield, allowing you the opportunity to voice where you’re experiencing

Speaking:

10:30

Morning Tea & Networking

Morning Tea & Networking

August 6 | 10:30 - 11:00

Speaking:

11:00

Workshop Topic 2: POPIA – the When and How?

Vagaries of regulator-speak have left most South African businesses confounded as to the implementation of POPIA. Several burning questions will be asked and answered during this session: are you compliant (should you be); when is the POPI commencement date or POPI effective date for the rest; what is the relationship to GDPR – surely the one covers the other, right? Drawing on several case studies, the session will also detail the Information Regulator’s final POPI Regulations, implementation strategies, and making use of an easy to interpret framework that the rest of the business can understand.

Workshop Topic 2: POPIA – the When and How?

August 6 | 11:00 - 12:30

Vagaries of regulator-speak have left most South African businesses confounded as to the implementation of POPIA. Several burning questions will be asked and answered during this session: are you compliant (should you be); when is the POPI commencement date or POPI effective date for the rest; what is the relationship to GDPR – surely the one covers the other, right? Drawing on several case studies, the session will also detail the Information Regulator’s final POPI Regulations, implementation strategies, and making use of an easy to interpret framework that the rest of the business can understand.

Speaking:

12:30

Lunch & Networking

Lunch & Networking

August 6 | 12:30 - 13:30

Speaking:

1:30

Workshop Topic 3: Lifting the Veil of GDPR

Since coming into effect, GDPR has brought up several misunderstandings and contradictions, particularly from a South African and indeed continent-wide perspective. This session will further go into detail on key GDPR definitions and principles; consent, contracting and legal obligations; individuals’ rights; the impact of data protection on business; GDPR in international, indeed African, context; data breaches and possible exemptions.

Workshop Topic 3: Lifting the Veil of GDPR

August 6 | 13:30 - 15:00

Since coming into effect, GDPR has brought up several misunderstandings and contradictions, particularly from a South African and indeed continent-wide perspective. This session will further go into detail on key GDPR definitions and principles; consent, contracting and legal obligations; individuals’ rights; the impact of data protection on business; GDPR in international, indeed African, context; data breaches and possible exemptions.

Speaking:

3:00

Afternoon Tea & Networking

Afternoon Tea & Networking

August 6 | 15:00 - 15:30

Speaking:

3:30

Workshop Topic 4: US Privacy Shield in Context

We’ve covered local regulation, GDPR, and now US data privacy frameworks. Again drawing on case material, how does the US Privacy Shield influence GDPR, what are its different components, is this a play to assert global data control, and what are the criticisms of the system? This session will also provide a summary of the previous sessions in context.

Workshop Topic 4: US Privacy Shield in Context

August 6 | 15:30 - 17:00

We’ve covered local regulation, GDPR, and now US data privacy frameworks. Again drawing on case material, how does the US Privacy Shield influence GDPR, what are its different components, is this a play to assert global data control, and what are the criticisms of the system? This session will also provide a summary of the previous sessions in context.

Speaking:

5:00

Close of Focus Day

Close of Focus Day

August 8 | 17:00

Speaking:

Main Conference Day 1
7 August 2019
07:30

Main Conference Registration Opens

Main Conference Registration Opens

August 7 | 07:30 - 09:00

Speaking:

08:45

Welcome & Opening Remarks

Welcome & Opening Remarks

August 7 | 08:45 - 0900

Speaking:

09:00

Keynote: Reserved for Lead Partner

Want to showcase your products and services to an elite audience? Contact michelle.meldau@coriniumgroup.com for more detials.

Keynote: Reserved for Lead Partner

August 7 | 09:00 - 9:30

Want to showcase your products and services to an elite audience? Contact michelle.meldau@coriniumgroup.com for more detials.

Speaking:

09:30

Keynote: Why IT Security Needs to be Prioritised at Board Level

  • Why understanding threats and vulnerabilities is critical to modern leadership
  • Cyber-crime is local – why phishing and hacks are closer to home
  • Where should South African and African companies be prioritising IT Security – is it one size fits all?
  • Why we should collaborate more, across industries and jurisdictions

Speaking:

Keynote: Why IT Security Needs to be Prioritised at Board Level

August 7 | 09:30 - 10:00

  • Why understanding threats and vulnerabilities is critical to modern leadership
  • Cyber-crime is local – why phishing and hacks are closer to home
  • Where should South African and African companies be prioritising IT Security – is it one size fits all?
  • Why we should collaborate more, across industries and jurisdictions

Speaking:

10:00

International Keynote: Managing Cyber Security at East Africa’s Largest MNO

  • Overview the Kenyan market, corporate culture and the impact of mobile
  • Typical domestic and international threats
  • Regulatory concerns, data protection and security
  • Threats to infrastructure, threats to customers, threats to corporates

Speaking:

International Keynote: Managing Cyber Security at East Africa’s Largest MNO

August 7 | 10:00 - 10:30

  • Overview the Kenyan market, corporate culture and the impact of mobile
  • Typical domestic and international threats
  • Regulatory concerns, data protection and security
  • Threats to infrastructure, threats to customers, threats to corporates

Speaking:

10:30

International Keynote: IT Risk & Compliance Environment for East African Financial Services

  • Overview of the regulatory environment in Tanzania and East Africa
  • What are the risks to non-compliance
  • Technical and talent problems and pitfalls – where are the opportunities to make improvements, and how?
  • Seeking domestic and internal collaboration to improve the status quo

Speaking:

International Keynote: IT Risk & Compliance Environment for East African Financial Services

August 7 | 10:30 - 11:00

  • Overview of the regulatory environment in Tanzania and East Africa
  • What are the risks to non-compliance
  • Technical and talent problems and pitfalls – where are the opportunities to make improvements, and how?
  • Seeking domestic and internal collaboration to improve the status quo

Speaking:

11:00

Morning Tea & Networking

Morning Tea & Networking

August 7 | 11:00 - 11:30

Speaking:

11:30

Keynote: Reserved for Associate Partner

Want to showcase your products and services to an elite audience? Contact michelle.meldau@coriniumgroup.com for more detials.

Keynote: Reserved for Associate Partner

August 7 | 11:30 - 12:00

Want to showcase your products and services to an elite audience? Contact michelle.meldau@coriniumgroup.com for more detials.

Speaking:

12:00

Keynote: Information Security & Data Governance in the Medical Sector

  • Protecting clients most sensitive data and the need to comply with international legislation
  • Driving organisational change to improve governance, and readily available information
  • What would the consequences be of a data breach within the group
  • Safeguarding compliance across multiple territories

Speaking:

Keynote: Information Security & Data Governance in the Medical Sector

August 7 | 12:00 - 12:30

  • Protecting clients most sensitive data and the need to comply with international legislation
  • Driving organisational change to improve governance, and readily available information
  • What would the consequences be of a data breach within the group
  • Safeguarding compliance across multiple territories

Speaking:

12:30

Keynote: Protecting your Customers Money, Data & Time

  • How do you build an effective and proactive strategy in the complex world of cyber risk?
  • Are your security investments fixing the right problems?
  • Learning from building a strategy across 18 different territories.

Speaking:

Keynote: Protecting your Customers Money, Data & Time

August 7 | 12:30 - 13:00

  • How do you build an effective and proactive strategy in the complex world of cyber risk?
  • Are your security investments fixing the right problems?
  • Learning from building a strategy across 18 different territories.

Speaking:

1:00

Keynote: Reserved for Associate Partner

Want to showcase your products and services to an elite audience? Contact michelle.meldau@coriniumgroup.com for more detials.

Keynote: Reserved for Associate Partner

August 7 | 13:00 - 13:30

Want to showcase your products and services to an elite audience? Contact michelle.meldau@coriniumgroup.com for more detials.

Speaking:

1:30

Lunch & Networking

Lunch & Networking

August 7 | 13:30 - 14:30

Speaking:

2:30

Stream B1: Discussion Group: GRC & Corporate Culture

The way in which we do business is changing rapidly. Are internal audit and GRC teams keeping up with these emerging trends (digital transformation)? How can you make compliance ‘attractive’ to the rest of the business? Do you agree that organizational governance needs to be integrated into company culture – how so?

Speaking:

Stream B1: Discussion Group: GRC & Corporate Culture

August 7 | 14:30 - 15:10

The way in which we do business is changing rapidly. Are internal audit and GRC teams keeping up with these emerging trends (digital transformation)? How can you make compliance ‘attractive’ to the rest of the business? Do you agree that organizational governance needs to be integrated into company culture – how so?

Speaking:

2:30

Stream A1: Discussion Group: Can you Prioritise Business Strategy Over Operational Security?

The relationship between business and operations is not always harmonious. How does one prioritise the availability of assets to the confidentiality of data? Discussions will focus on corporate culture, access control case studies and high-level learning education programmes.

Speaking:

Stream A1: Discussion Group: Can you Prioritise Business Strategy Over Operational Security?

August 7 | 14:30 - 15:10

The relationship between business and operations is not always harmonious. How does one prioritise the availability of assets to the confidentiality of data? Discussions will focus on corporate culture, access control case studies and high-level learning education programmes.

Speaking:

3:05

Afternoon Tea & Networking

Afternoon Tea & Networking

August 8 | 15:05 - 15:35

Speaking:

3:10

Stream A1: Discussion Group: Cyber Risk Culture & Psychology

In light of increased scrutiny on data protection, security and access, how do you engage with multi-national, multi-cultural, geographically diverse offices?

Speaking:

Stream A1: Discussion Group: Cyber Risk Culture & Psychology

August 7 | 15:10 - 15:50

In light of increased scrutiny on data protection, security and access, how do you engage with multi-national, multi-cultural, geographically diverse offices?

Speaking:

3:10

Stream B1: Discussion Group: Determining Corruption Risks

What is the current state of Anti-Corruption laws in South Africa, Africa and the rest of the world? How does corruption risk fit into the governance framework and enterprise risk management?

Speaking:

Stream B1: Discussion Group: Determining Corruption Risks

August 7 | 15:10 - 15:50

What is the current state of Anti-Corruption laws in South Africa, Africa and the rest of the world? How does corruption risk fit into the governance framework and enterprise risk management?

Speaking:

3:50

Afternoon Tea & Networking

Afternoon Tea & Networking

August 7 | 15:50 - 16:20

Speaking:

4:20

Stream A2: Discussion Group: Does Outsourcing IT Security Make Sense

Making security a top priority costs time, money and requires a lot more highly-qualified people. Is there an alternative? What do you think are the pros and cons to outsourcing?

Speaking:

Stream A2: Discussion Group: Does Outsourcing IT Security Make Sense

August 7 | 16:20 - 17:00

Making security a top priority costs time, money and requires a lot more highly-qualified people. Is there an alternative? What do you think are the pros and cons to outsourcing?

Speaking:

4:20

Stream B2: Discussion Group: Cloud-Ready Data Governance & GRC

More businesses are looking at a cloud or a hybrid approach to managing data. This session will look at some of the data risks associated with the cloud, how is data sovereignty impacted, and what is the role of third party providers.

Speaking:

Stream B2: Discussion Group: Cloud-Ready Data Governance & GRC

August 7 | 16:20 - 17:00

More businesses are looking at a cloud or a hybrid approach to managing data. This session will look at some of the data risks associated with the cloud, how is data sovereignty impacted, and what is the role of third party providers.

Speaking:

5:00

Stream B2: Discussion Group: Risk Based Due Diligence Challenges & Solutions

Due diligence and risk management go hand in hand, but for now how far should your organisation go to shield it from the risk of non-compliance? Is there a moment to pause to see how far down the road you have gone in comparison to others?

Speaking:

Stream B2: Discussion Group: Risk Based Due Diligence Challenges & Solutions

August 7 | 17:00 - 17:40

Due diligence and risk management go hand in hand, but for now how far should your organisation go to shield it from the risk of non-compliance? Is there a moment to pause to see how far down the road you have gone in comparison to others?

Speaking:

5:00

Stream A2: Discussion Group: In-depth Look at Cyber Security & Resilience in East Africa

Since the promulgation of the Kenyan Government Cyber Security Strategy, has anything actually happened? This interactive discussion will look into the on-the-ground reality of East Africa’s cyber security programmes.

Speaking:

Stream A2: Discussion Group: In-depth Look at Cyber Security & Resilience in East Africa

August 7 | 17:00 - 17:40

Since the promulgation of the Kenyan Government Cyber Security Strategy, has anything actually happened? This interactive discussion will look into the on-the-ground reality of East Africa’s cyber security programmes.

Speaking:

5:40

Cocktail Function & Networking

Join us for well-earned libations at the end of a busy first day.

Cocktail Function & Networking

August 7 | 17:40 - 18:40

Join us for well-earned libations at the end of a busy first day.

Speaking:

Main Conference Day 2
8 August 2019
07:15

Corinium Connected CISO Africa Breakfast Masterclass (separately bookable)

Join George Eapen as he unpacks the evolving role of the CISO and Heads of IT Security. Drawing from his international experience working at GE and now with Petrofac (a leader in global oilfield services), George will go into detail on his path to success, the impact of regulatory change on data protection and security in general, driving security aware corporate culture, and the convergence of IOT and IT Security. George will also share lessons learned working across multiple territories, and give practical takeaways that you can implement within your own organisations.

Speaking:

Corinium Connected CISO Africa Breakfast Masterclass (separately bookable)

August 8 | 07:15 - 8:55

Join George Eapen as he unpacks the evolving role of the CISO and Heads of IT Security. Drawing from his international experience working at GE and now with Petrofac (a leader in global oilfield services), George will go into detail on his path to success, the impact of regulatory change on data protection and security in general, driving security aware corporate culture, and the convergence of IOT and IT Security. George will also share lessons learned working across multiple territories, and give practical takeaways that you can implement within your own organisations.

Speaking:

09:00

Welcome & Opening Remarks

Welcome & Opening Remarks

August 8 | 09:00 - 09:15

Speaking:

09:15

Keynote: Reserved for Associate Partner

Want to showcase your products and services to an elite audience? Contact michelle.meldau@coriniumgroup.com for more detials.

Keynote: Reserved for Associate Partner

August 8 | 09:15 - 09:45

Want to showcase your products and services to an elite audience? Contact michelle.meldau@coriniumgroup.com for more detials.

Speaking:

09:45

International Keynote: How Information Security, Data Protection & Secure IOT Drives Petrofac’s Business

  • Introduction to Petrofac, its business, clients, territories and complex security concerns
  • Turning security, data privacy and global governance into a business asset
  • Why will security become even more integral to overall business strategy
  • An overview of the technology being used currently and what lies ahead in future

Speaking:

International Keynote: How Information Security, Data Protection & Secure IOT Drives Petrofac’s Business

August 8 | 09:45 - 10:15

  • Introduction to Petrofac, its business, clients, territories and complex security concerns
  • Turning security, data privacy and global governance into a business asset
  • Why will security become even more integral to overall business strategy
  • An overview of the technology being used currently and what lies ahead in future

Speaking:

10:15

Keynote: Why Machines Need Humans – Culture is Not Measured in Terabytes

  • Continuous education can become tedious, but what can tech do to make it “fun”
  • The most sophisticated bit of kit won’t save you from human error, but AI might make it worse
  • All of us are on the cloud, why not the business too?
  • Multiple access points can lead to disaster, but can you use a carrot and stick method to avoid catastrophe?

Speaking:

Keynote: Why Machines Need Humans – Culture is Not Measured in Terabytes

August 8 | 10:15 - 10:45

  • Continuous education can become tedious, but what can tech do to make it “fun”
  • The most sophisticated bit of kit won’t save you from human error, but AI might make it worse
  • All of us are on the cloud, why not the business too?
  • Multiple access points can lead to disaster, but can you use a carrot and stick method to avoid catastrophe?

Speaking:

10:45

Morning Tea & Networking

Morning Tea & Networking

August 8 | 10:45 - 11:15

Speaking:

11:15

Keynote: Reserved for Associate Partner

Want to showcase your products and services to an elite audience? Contact michelle.meldau@coriniumgroup.com for more detials.

Keynote: Reserved for Associate Partner

August 8 | 11:15 - 11:45

Want to showcase your products and services to an elite audience? Contact michelle.meldau@coriniumgroup.com for more detials.

Speaking:

11:45

Keynote: IT Security & Data Risks within National Government

  • The government’s approach to IT security and security education across departments
  • Data governance, risks and the delicacy of dealing with sensitive information
  • Key differences between outcomes of corporate vs government IT security
  • Reputational damage vs national security risk

Speaking:

Keynote: IT Security & Data Risks within National Government

August 8 | 11:45 - 12:15

  • The government’s approach to IT security and security education across departments
  • Data governance, risks and the delicacy of dealing with sensitive information
  • Key differences between outcomes of corporate vs government IT security
  • Reputational damage vs national security risk

Speaking:

12:15

Keynote: The Influence of National Culture on Information Security Culture

  • The dimensions of information security awareness: organisational, public, socio-political, ethical and institutionally educational
  • National culture has an impact on organisational culture which has an impact on information security culture; but how can this be managed in a multi-cultural, multi-national organisation?
  • What other factors could be at play: generational, economic and over human dynamics

Speaking:

Keynote: The Influence of National Culture on Information Security Culture

August 8 | 12:15 - 12:45

  • The dimensions of information security awareness: organisational, public, socio-political, ethical and institutionally educational
  • National culture has an impact on organisational culture which has an impact on information security culture; but how can this be managed in a multi-cultural, multi-national organisation?
  • What other factors could be at play: generational, economic and over human dynamics

Speaking:

12:45

Lunch & Netwokring

Lunch & Netwokring

August 8 | 12:45 - 13:45

Speaking:

1:45

Stream A1: Discussion Group: DevSecOps – An Introduction

The purpose of DevSecOps is to create the mindset that everyone is responsible for security, embedding security into the early DevOps workflow. Are your security and dev teams working together?

Speaking:

Stream A1: Discussion Group: DevSecOps – An Introduction

August 8 | 13:45 - 14:25

The purpose of DevSecOps is to create the mindset that everyone is responsible for security, embedding security into the early DevOps workflow. Are your security and dev teams working together?

Speaking:

1:45

Stream B1: Discussion Group: Integrating AI into IT Security

This discussion will first look into what the current status of AI, what is reality and what is moonshot thinking. How are the bad guys using bots, and how to hunt them? Are there any data risks to deception tactics? Will AI better orchestrate human intervention, or will machines do more than the grunt work?

Speaking:

Stream B1: Discussion Group: Integrating AI into IT Security

August 8 | 13:45 - 14:25

This discussion will first look into what the current status of AI, what is reality and what is moonshot thinking. How are the bad guys using bots, and how to hunt them? Are there any data risks to deception tactics? Will AI better orchestrate human intervention, or will machines do more than the grunt work?

Speaking:

2:25

Stream A1: Discussion Group: Taking DevSecOps to the Next Level

Are you putting your users, or even customers, at the heart of your DevSecOps agenda? What if you’re still working in partitioned silos – can design thinking still apply to security?

Speaking:

Stream A1: Discussion Group: Taking DevSecOps to the Next Level

August 8 | 14:25 - 15:05

Are you putting your users, or even customers, at the heart of your DevSecOps agenda? What if you’re still working in partitioned silos – can design thinking still apply to security?

Speaking:

2:25

Stream B1: Discussion Group: Cloud vs On-Premise vs Hybrid

Cloud has its benefits, on-premise storage has its own advantages (perhaps more psychological), but what is the best solution for your business to protect data and sensitive information. Does your ideal scenario not match your corporate status quo?

Speaking:

Stream B1: Discussion Group: Cloud vs On-Premise vs Hybrid

August 8 | 14:25 - 15:05

Cloud has its benefits, on-premise storage has its own advantages (perhaps more psychological), but what is the best solution for your business to protect data and sensitive information. Does your ideal scenario not match your corporate status quo?

Speaking:

3:35

Stream A2: Discussion Group: Sharing the Burden of Governance, Risk & Compliance

This discussion will look in the roles and responsibilities of all those in the value-chain, including those who straddle the business, risk/compliance and IT security mantle. Is there a one-size-fits-all strategy here?

Speaking:

Stream A2: Discussion Group: Sharing the Burden of Governance, Risk & Compliance

August 8 | 15:35 - 16:15

This discussion will look in the roles and responsibilities of all those in the value-chain, including those who straddle the business, risk/compliance and IT security mantle. Is there a one-size-fits-all strategy here?

Speaking:

3:35

Stream B2: Discussion Group: New Age of Attacks – From Malware to Crypto-Mining

Hackers are getting smarter, cyber criminals are more organised, more ‘legitimised’, attacks are increasingly exponentially in scale and substance. Share in your experiences, and consider this: are smarter machines the best line of defense against other smart machines, or is there an unlearnable nuance to human intervention?

Speaking:

Stream B2: Discussion Group: New Age of Attacks – From Malware to Crypto-Mining

August 8 | 15:35 - 16:15

Hackers are getting smarter, cyber criminals are more organised, more ‘legitimised’, attacks are increasingly exponentially in scale and substance. Share in your experiences, and consider this: are smarter machines the best line of defense against other smart machines, or is there an unlearnable nuance to human intervention?

Speaking:

4:15

Stream B2: Discussion Group: Are you Aware you are Under Attack?

This discussion will look at the relationship between tech, talent, awareness and wearing a target on your back. Cities, local government and other state entities are seen as soft targets or a rite of passage for young hackers; often under prepared and under resourced to respond. What solutions could mitigate this increasing problem?

Speaking:

Stream B2: Discussion Group: Are you Aware you are Under Attack?

August 8 | 16:15 - 16:55

This discussion will look at the relationship between tech, talent, awareness and wearing a target on your back. Cities, local government and other state entities are seen as soft targets or a rite of passage for young hackers; often under prepared and under resourced to respond. What solutions could mitigate this increasing problem?

Speaking:

4:15

Stream A2: Discussion Group: Getting the Most from your IT Security Investment

The big question when every asking for funding is “when can I expect ROI?”. Is there an exact figure for how much of your IT budget should go towards security? Should it be budgeted for separately? If it’s not your physical assets or data at risk, what about your brand reputation?

Speaking:

Stream A2: Discussion Group: Getting the Most from your IT Security Investment

August 8 | 16:15 - 16:55

The big question when every asking for funding is “when can I expect ROI?”. Is there an exact figure for how much of your IT budget should go towards security? Should it be budgeted for separately? If it’s not your physical assets or data at risk, what about your brand reputation?

Speaking:

4:55

Close of Conference

Close of Conference

August 8 | 16:55

Speaking:

7:30

Registration Opens

Registration Opens

August 8 | 7:30 - 9:00

Speaking: