<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=306561&amp;fmt=gif">

CISO Africa Cape Town 2019

Mitigating Cyber Threats Through Effective Leadership
6 - 8 August 2019 | CTICC 2, Cape Town

Download the Agenda Sponsor CISO Africa Cape Town

CISO Africa Cape Town 2019 Agenda

For information on speaking opportunities, please contact ryan.matthews@coriniumgroup.com ; Agenda subject to change.

Pre-Conference Focus Day
6 August 2019
07:30

Registration Opens

Registration Opens

August 6 | 07:30 - 09:00

Speaking:

08:55

Welcome & Opening Remarks

Workshop Leader: Verine Etsebeth, Senior Lecturer: School of Law, WITS University

Verine Etsebeth is a senior lecturer at the Wits School of Law. Verine is an admitted attorney who did her articles in the IT law department of Edward Nathan Sonnenbergs Attorneys. She has a Masters degree in Law (LLM dissertation entitled “The Legal Implications of Information Security Governance”) and Higher Diplomas in Corporate Law, Tax Law and Labour Law, and is currently enrolled for a PhD at WITS. Verine specialises in Information Security and data protection law, and is the co-ordinator of and a lecturer on WITS’ LLM course in Cyber Law and Access to Information and Privacy Law. She has presented papers at numerous national and international conferences and has published articles in a range of local and international publications on the subject matter of IT law.

Speaking:

Verine Etsebeth - WITS

Verine Etsebeth

Senior Lecturer, WITS University

Welcome & Opening Remarks

August 6 | 08:55 - 09:00

Workshop Leader: Verine Etsebeth, Senior Lecturer: School of Law, WITS University

Verine Etsebeth is a senior lecturer at the Wits School of Law. Verine is an admitted attorney who did her articles in the IT law department of Edward Nathan Sonnenbergs Attorneys. She has a Masters degree in Law (LLM dissertation entitled “The Legal Implications of Information Security Governance”) and Higher Diplomas in Corporate Law, Tax Law and Labour Law, and is currently enrolled for a PhD at WITS. Verine specialises in Information Security and data protection law, and is the co-ordinator of and a lecturer on WITS’ LLM course in Cyber Law and Access to Information and Privacy Law. She has presented papers at numerous national and international conferences and has published articles in a range of local and international publications on the subject matter of IT law.

Speaking:

Verine Etsebeth - WITS

Verine Etsebeth

WITS University

09:00

Workshop Topic 1: The Legal Considerations for Cyber & Information Security

Having worked in both the corporate environment and now in academia, Verine will discuss the legal position relating to operating internal and outsourced IT Security and Data Protection/Privacy roles. Outlining the history of data protection, this session will provide the foundation for the following sessions on POPIA, GDPR and US Privacy Shield, allowing you the opportunity to voice where you’re experiencing

Workshop Topic 1: The Legal Considerations for Cyber & Information Security

August 6 | 09:00 - 10:30

Having worked in both the corporate environment and now in academia, Verine will discuss the legal position relating to operating internal and outsourced IT Security and Data Protection/Privacy roles. Outlining the history of data protection, this session will provide the foundation for the following sessions on POPIA, GDPR and US Privacy Shield, allowing you the opportunity to voice where you’re experiencing

Speaking:

10:30

Morning Tea & Networking

Morning Tea & Networking

August 6 | 10:30 - 11:00

Speaking:

11:00

Workshop Topic 2: POPIA – the When and How?

Vagaries of regulator-speak have left most South African businesses confounded as to the implementation of POPIA. Several burning questions will be asked and answered during this session: are you compliant (should you be); when is the POPI commencement date or POPI effective date for the rest; what is the relationship to GDPR – surely the one covers the other, right? Drawing on several case studies, the session will also detail the Information Regulator’s final POPI Regulations, implementation strategies, and making use of an easy to interpret framework that the rest of the business can understand.

Workshop Topic 2: POPIA – the When and How?

August 6 | 11:00 - 12:30

Vagaries of regulator-speak have left most South African businesses confounded as to the implementation of POPIA. Several burning questions will be asked and answered during this session: are you compliant (should you be); when is the POPI commencement date or POPI effective date for the rest; what is the relationship to GDPR – surely the one covers the other, right? Drawing on several case studies, the session will also detail the Information Regulator’s final POPI Regulations, implementation strategies, and making use of an easy to interpret framework that the rest of the business can understand.

Speaking:

12:30

Lunch & Networking

Lunch & Networking

August 6 | 12:30 - 13:30

Speaking:

1:30

Workshop Topic 3: Lifting the Veil of GDPR

Since coming into effect, GDPR has brought up several misunderstandings and contradictions, particularly from a South African and indeed continent-wide perspective. This session will further go into detail on key GDPR definitions and principles; consent, contracting and legal obligations; individuals’ rights; the impact of data protection on business; GDPR in international, indeed African, context; data breaches and possible exemptions.

Workshop Topic 3: Lifting the Veil of GDPR

August 6 | 13:30 - 15:00

Since coming into effect, GDPR has brought up several misunderstandings and contradictions, particularly from a South African and indeed continent-wide perspective. This session will further go into detail on key GDPR definitions and principles; consent, contracting and legal obligations; individuals’ rights; the impact of data protection on business; GDPR in international, indeed African, context; data breaches and possible exemptions.

Speaking:

3:00

Afternoon Tea & Networking

Afternoon Tea & Networking

August 6 | 15:00 - 15:30

Speaking:

3:30

Workshop Topic 4: US Privacy Shield in Context

We’ve covered local regulation, GDPR, and now US data privacy frameworks. Again drawing on case material, how does the US Privacy Shield influence GDPR, what are its different components, is this a play to assert global data control, and what are the criticisms of the system? This session will also provide a summary of the previous sessions in context.

Workshop Topic 4: US Privacy Shield in Context

August 6 | 15:30 - 17:00

We’ve covered local regulation, GDPR, and now US data privacy frameworks. Again drawing on case material, how does the US Privacy Shield influence GDPR, what are its different components, is this a play to assert global data control, and what are the criticisms of the system? This session will also provide a summary of the previous sessions in context.

Speaking:

5:00

Close of Focus Day

Close of Focus Day

August 6 | 17:00

Speaking:

Main Conference Day 1
7 August 2019
07:30

Main Conference Registration Opens

Main Conference Registration Opens

August 7 | 07:30 - 09:00

Speaking:

08:45

Welcome & Opening Remarks

Welcome & Opening Remarks

August 7 | 08:45 - 0900

Speaking:

09:00

Keynote: Reserved for Lead Partner

Want to showcase your products and services to an elite audience? Contact michelle.meldau@coriniumgroup.com for more detials.

Keynote: Reserved for Lead Partner

August 7 | 09:00 - 9:30

Want to showcase your products and services to an elite audience? Contact michelle.meldau@coriniumgroup.com for more detials.

Speaking:

09:30

Keynote: Why IT Security Needs to be Prioritised at Board Level

  • Why understanding threats and vulnerabilities is critical to modern leadership
  • Cyber-crime is local – why phishing and hacks are closer to home
  • Where should South African and African companies be prioritising IT Security – is it one size fits all?
  • Why we should collaborate more, across industries and jurisdictions

Speaking:

Julian Ramiah - Liberty

Julian Ramiah

Group Chief Information Security Officer, Liberty Holdings

Keynote: Why IT Security Needs to be Prioritised at Board Level

August 7 | 09:30 - 10:00

  • Why understanding threats and vulnerabilities is critical to modern leadership
  • Cyber-crime is local – why phishing and hacks are closer to home
  • Where should South African and African companies be prioritising IT Security – is it one size fits all?
  • Why we should collaborate more, across industries and jurisdictions

Speaking:

Julian Ramiah - Liberty

Julian Ramiah

Liberty Holdings

10:00

International Keynote: Managing Cyber Security at East Africa’s Largest MNO

  • Overview the Kenyan market, corporate culture and the impact of mobile
  • Typical domestic and international threats
  • Regulatory concerns, data protection and security
  • Threats to infrastructure, threats to customers, threats to corporates

Speaking:

Anthony Gacanja - Safaricom

Anthony Gacanja

Head of Technology Security, Safaricom (Kenya)

International Keynote: Managing Cyber Security at East Africa’s Largest MNO

August 7 | 10:00 - 10:30

  • Overview the Kenyan market, corporate culture and the impact of mobile
  • Typical domestic and international threats
  • Regulatory concerns, data protection and security
  • Threats to infrastructure, threats to customers, threats to corporates

Speaking:

Anthony Gacanja - Safaricom

Anthony Gacanja

Safaricom (Kenya)

10:30

International Keynote: IT Risk & Compliance Environment for East African Financial Services

  • Overview of the regulatory environment in Tanzania and East Africa
  • What are the risks to non-compliance
  • Technical and talent problems and pitfalls – where are the opportunities to make improvements, and how?
  • Seeking domestic and internal collaboration to improve the status quo

Speaking:

Lusekelo Thompson - NBC Tanzania

Lusekelo Thompson

Head of IT Risk & Compliance, NBC Bank (Tanzania)

International Keynote: IT Risk & Compliance Environment for East African Financial Services

August 7 | 10:30 - 11:00

  • Overview of the regulatory environment in Tanzania and East Africa
  • What are the risks to non-compliance
  • Technical and talent problems and pitfalls – where are the opportunities to make improvements, and how?
  • Seeking domestic and internal collaboration to improve the status quo

Speaking:

Lusekelo Thompson - NBC Tanzania

Lusekelo Thompson

NBC Bank (Tanzania)

11:00

Morning Tea & Networking

Morning Tea & Networking

August 7 | 11:00 - 11:30

Speaking:

11:30

Keynote: Reserved for Associate Partner

Want to showcase your products and services to an elite audience? Contact michelle.meldau@coriniumgroup.com for more detials.

Keynote: Reserved for Associate Partner

August 7 | 11:30 - 12:00

Want to showcase your products and services to an elite audience? Contact michelle.meldau@coriniumgroup.com for more detials.

Speaking:

12:00

Keynote: Information Security & Data Governance in the Medical Sector

  • Protecting clients most sensitive data and the need to comply with international legislation
  • Driving organisational change to improve governance, and readily available information
  • What would the consequences be of a data breach within the group
  • Safeguarding compliance across multiple territories

Speaking:

Nhlanhla Xaba - Mediclinic

Nhlanhla Xaba

IT GRC & Security Director, Mediclinic

Keynote: Information Security & Data Governance in the Medical Sector

August 7 | 12:00 - 12:30

  • Protecting clients most sensitive data and the need to comply with international legislation
  • Driving organisational change to improve governance, and readily available information
  • What would the consequences be of a data breach within the group
  • Safeguarding compliance across multiple territories

Speaking:

Nhlanhla Xaba - Mediclinic

Nhlanhla Xaba

Mediclinic

12:30

Keynote: Protecting your Customers Money, Data & Time

  • How do you build an effective and proactive strategy in the complex world of cyber risk?
  • Are your security investments fixing the right problems?
  • Learning from building a strategy across 18 different territories.

Speaking:

Robin Barnwell - Standard Bank

Robin Barnwell

Head: Security Strategy Enablement, Standard Bank

Keynote: Protecting your Customers Money, Data & Time

August 7 | 12:30 - 13:00

  • How do you build an effective and proactive strategy in the complex world of cyber risk?
  • Are your security investments fixing the right problems?
  • Learning from building a strategy across 18 different territories.

Speaking:

Robin Barnwell - Standard Bank

Robin Barnwell

Standard Bank

1:00

Keynote: Reserved for Associate Partner

Want to showcase your products and services to an elite audience? Contact michelle.meldau@coriniumgroup.com for more detials.

Keynote: Reserved for Associate Partner

August 7 | 13:00 - 13:30

Want to showcase your products and services to an elite audience? Contact michelle.meldau@coriniumgroup.com for more detials.

Speaking:

1:30

Lunch & Networking

Lunch & Networking

August 7 | 13:30 - 14:30

Speaking:

2:30

Stream B1: Discussion Group: GRC & Corporate Culture

The way in which we do business is changing rapidly. Are internal audit and GRC teams keeping up with these emerging trends (digital transformation)? How can you make compliance ‘attractive’ to the rest of the business? Do you agree that organizational governance needs to be integrated into company culture – how so?

Speaking:

Percy Ramokone - SARB

Percy Ramokone

Head: GRC, Reporting & Strategy Management, South African Reserve Bank

Stream B1: Discussion Group: GRC & Corporate Culture

August 7 | 14:30 - 15:10

The way in which we do business is changing rapidly. Are internal audit and GRC teams keeping up with these emerging trends (digital transformation)? How can you make compliance ‘attractive’ to the rest of the business? Do you agree that organizational governance needs to be integrated into company culture – how so?

Speaking:

Percy Ramokone - SARB

Percy Ramokone

South African Reserve Bank

2:30

Stream A1: Topic TBC

Stream Sponsored by ITR Technology. Topic and speaker details to follow shortly.

Stream A1: Topic TBC

August 7 | 14:30 - 15:10

Stream Sponsored by ITR Technology. Topic and speaker details to follow shortly.

Speaking:

3:10

Stream A1: Discussion Group: Can you Prioritise Business Strategy Over Operational Security?

The relationship between business and operations is not always harmonious. How does one prioritise the availability of assets to the confidentiality of data? Discussions will focus on corporate culture, access control case studies and high-level learning education programmes.

Speaking:

Darryl Potgieter - SAPPI

Darryl Potgieter

Head of Architecture & Security, Sappi

Stream A1: Discussion Group: Can you Prioritise Business Strategy Over Operational Security?

August 7 | 15:10 - 15:50

The relationship between business and operations is not always harmonious. How does one prioritise the availability of assets to the confidentiality of data? Discussions will focus on corporate culture, access control case studies and high-level learning education programmes.

Speaking:

Darryl Potgieter - SAPPI

Darryl Potgieter

Sappi

3:10

Stream B1: Discussion Group: Determining Corruption Risks

What is the current state of Anti-Corruption laws in South Africa, Africa and the rest of the world? How does corruption risk fit into the governance framework and enterprise risk management?

Speaking:

Prasantha Maistry - Discovery

Prasantha Maistry

Head of Financial Crime Compliance, Discovery Bank

Stream B1: Discussion Group: Determining Corruption Risks

August 7 | 15:10 - 15:50

What is the current state of Anti-Corruption laws in South Africa, Africa and the rest of the world? How does corruption risk fit into the governance framework and enterprise risk management?

Speaking:

Prasantha Maistry - Discovery

Prasantha Maistry

Discovery Bank

3:50

Afternoon Tea & Networking

Afternoon Tea & Networking

August 7 | 15:50 - 16:20

Speaking:

4:20

Stream A2: Discussion Group: Cyber Risk Culture & Psychology

In light of increased scrutiny on data protection, security and access, how do you engage with multi-national, multi-cultural, geographically diverse offices?

Speaking:

Siegfried Moyo - FMCG

Siegfried Moyo

Regional Head of Cyber Security - EMEA, A Leading FMCG Company

Stream A2: Discussion Group: Cyber Risk Culture & Psychology

August 7 | 16:20 - 17:00

In light of increased scrutiny on data protection, security and access, how do you engage with multi-national, multi-cultural, geographically diverse offices?

Speaking:

Siegfried Moyo - FMCG

Siegfried Moyo

A Leading FMCG Company

4:20

Stream B2: Discussion Group: Cloud-Ready Data Governance & GRC

More businesses are looking at a cloud or a hybrid approach to managing data. This session will look at some of the data risks associated with the cloud, how is data sovereignty impacted, and what is the role of third party providers.

Speaking:

Ken Chikwanha - Standard Bank

Ken Chikwanha

Executive Head of Data Governance: Personal & Business Banking, Standard Bank

Stream B2: Discussion Group: Cloud-Ready Data Governance & GRC

August 7 | 16:20 - 17:00

More businesses are looking at a cloud or a hybrid approach to managing data. This session will look at some of the data risks associated with the cloud, how is data sovereignty impacted, and what is the role of third party providers.

Speaking:

Ken Chikwanha - Standard Bank

Ken Chikwanha

Standard Bank

5:00

Stream B2: Discussion Group: Risk Based Due Diligence Challenges & Solutions

Due diligence and risk management go hand in hand, but for now how far should your organisation go to shield it from the risk of non-compliance? Is there a moment to pause to see how far down the road you have gone in comparison to others?

Speaking:

Martins Ogbolu - Vodacom

Martins Ogbolu

Group Executive Head Anti-Corruption Risk Compliance, Vodacom

Stream B2: Discussion Group: Risk Based Due Diligence Challenges & Solutions

August 7 | 17:00 - 17:40

Due diligence and risk management go hand in hand, but for now how far should your organisation go to shield it from the risk of non-compliance? Is there a moment to pause to see how far down the road you have gone in comparison to others?

Speaking:

Martins Ogbolu - Vodacom

Martins Ogbolu

Vodacom

5:00

Stream A2: Discussion Group: Does Outsourcing IT Security Make Sense

Making security a top priority costs time, money and requires a lot more highly-qualified people. Is there an alternative? What do you think are the pros and cons to outsourcing?

Speaking:

Alex Bowdler - Aspen Pharmacare

Alex Bowdler

IT Operations & Security Manager, Aspen Pharmacare

Stream A2: Discussion Group: Does Outsourcing IT Security Make Sense

August 7 | 17:00 - 17:40

Making security a top priority costs time, money and requires a lot more highly-qualified people. Is there an alternative? What do you think are the pros and cons to outsourcing?

Speaking:

Alex Bowdler - Aspen Pharmacare

Alex Bowdler

Aspen Pharmacare

5:40

Cocktail Function & Networking

Join us for well-earned libations at the end of a busy first day.

Cocktail Function & Networking

August 7 | 17:40 - 18:40

Join us for well-earned libations at the end of a busy first day.

Speaking:

Main Conference Day 2
8 August 2019
07:15

Corinium Connected CISO Africa Breakfast Masterclass (separately bookable)

Join th econversation on evolving role of the CISO and Heads of IT Security. Consider the impact of regulatory change on data protection and security in general, driving security aware corporate culture, and the convergence of IOT and IT Security. Share lessons learned working across multiple territories, and give practical takeaways that you can implement within your own organisations.

Corinium Connected CISO Africa Breakfast Masterclass (separately bookable)

August 8 | 07:15 - 8:55

Join th econversation on evolving role of the CISO and Heads of IT Security. Consider the impact of regulatory change on data protection and security in general, driving security aware corporate culture, and the convergence of IOT and IT Security. Share lessons learned working across multiple territories, and give practical takeaways that you can implement within your own organisations.

Speaking:

07:30

Registration Opens

Registration Opens

August 8 | 07:30 - 09:00

Speaking:

09:00

Welcome & Opening Remarks

Welcome & Opening Remarks

August 8 | 09:00 - 09:15

Speaking:

09:15

Keynote: Reserved for Associate Partner

Want to showcase your products and services to an elite audience? Contact michelle.meldau@coriniumgroup.com for more detials.

Keynote: Reserved for Associate Partner

August 8 | 09:15 - 09:45

Want to showcase your products and services to an elite audience? Contact michelle.meldau@coriniumgroup.com for more detials.

Speaking:

09:45

Keynote: How Information Security, Data Protection & Secure IOT Drives Petrofac’s Business

  • Turning security, data privacy and global governance into a business asset
  • Why will security become even more integral to overall business strategy
  • An overview of the technology being used currently and what lies ahead in future

Keynote: How Information Security, Data Protection & Secure IOT Drives Petrofac’s Business

August 8 | 09:45 - 10:15

  • Turning security, data privacy and global governance into a business asset
  • Why will security become even more integral to overall business strategy
  • An overview of the technology being used currently and what lies ahead in future

Speaking:

10:15

Keynote: Why Machines Need Humans – Culture is Not Measured in Terabytes

  • Continuous education can become tedious, but what can tech do to make it “fun”
  • The most sophisticated bit of kit won’t save you from human error, but AI might make it worse
  • All of us are on the cloud, why not the business too?
  • Multiple access points can lead to disaster, but can you use a carrot and stick method to avoid catastrophe?

Speaking:

Steve Jump - Telkom

Steve Jump

Head: Corporate Information Security Governance, Telkom

Keynote: Why Machines Need Humans – Culture is Not Measured in Terabytes

August 8 | 10:15 - 10:45

  • Continuous education can become tedious, but what can tech do to make it “fun”
  • The most sophisticated bit of kit won’t save you from human error, but AI might make it worse
  • All of us are on the cloud, why not the business too?
  • Multiple access points can lead to disaster, but can you use a carrot and stick method to avoid catastrophe?

Speaking:

Steve Jump - Telkom

Steve Jump

Telkom

10:45

Keynote: Cloud Security

  • What are the risks and benefits to migrating to the cloud?
  • Are you open to using third parties?
  • Do you have a risk management strategy in place?

Speaking:

Suren Naidoo - TFG

Suren Naidoo

Head of Enterprise Architecture, Information Security & GRC, The Foschini Group

Keynote: Cloud Security

August 8 | 10:45 - 11:15

  • What are the risks and benefits to migrating to the cloud?
  • Are you open to using third parties?
  • Do you have a risk management strategy in place?

Speaking:

Suren Naidoo - TFG

Suren Naidoo

The Foschini Group

11:15

Morning Tea & Networking

Morning Tea & Networking

August 8 | 11:15 - 11:45

Speaking:

11:45

Keynote: Data Privacy in the Digital Age

  • Does compliance equal security
  • Don’t be overwhelmed – what are the basics around privacy
  • Finding new meaning: Cloud, digitalization & privacy
  • Taking a new approach to privacy that is not overtly defensive

Speaking:

Zaheera Ahmed - absa logo

Zaheera Ahmed

Group Head of Privacy, absa

Keynote: Data Privacy in the Digital Age

August 8 | 11:45 - 12:15

  • Does compliance equal security
  • Don’t be overwhelmed – what are the basics around privacy
  • Finding new meaning: Cloud, digitalization & privacy
  • Taking a new approach to privacy that is not overtly defensive

Speaking:

Zaheera Ahmed - absa logo

Zaheera Ahmed

absa

12:15

Keynote: IT Security & Data Risks within National Government

  • The government’s approach to IT security and security education across departments
  • Data governance, risks and the delicacy of dealing with sensitive information
  • Key differences between outcomes of corporate vs government IT security
  • Reputational damage vs national security risk

Speaking:

Rapule Kgalaki - SA Government

Rapule Kgalaki

Deputy Director: Specialised Audit, DIRCO

Keynote: IT Security & Data Risks within National Government

August 8 | 12:15 - 12:45

  • The government’s approach to IT security and security education across departments
  • Data governance, risks and the delicacy of dealing with sensitive information
  • Key differences between outcomes of corporate vs government IT security
  • Reputational damage vs national security risk

Speaking:

Rapule Kgalaki - SA Government

Rapule Kgalaki

DIRCO

12:45

Keynote: The Influence of National Culture on Information Security Culture

  • The dimensions of information security awareness: organisational, public, socio-political, ethical and institutionally educational
  • National culture has an impact on organisational culture which has an impact on information security culture; but how can this be managed in a multi-cultural, multi-national organisation?
  • What other factors could be at play: generational, economic and over human dynamics

Speaking:

Sunthoshan Govender - AB InBev

Sunthoshan Govender

Enterprise Architect: IT Security & Compliance, AB InBev

Keynote: The Influence of National Culture on Information Security Culture

August 8 | 12:45 - 13:15

  • The dimensions of information security awareness: organisational, public, socio-political, ethical and institutionally educational
  • National culture has an impact on organisational culture which has an impact on information security culture; but how can this be managed in a multi-cultural, multi-national organisation?
  • What other factors could be at play: generational, economic and over human dynamics

Speaking:

Sunthoshan Govender - AB InBev

Sunthoshan Govender

AB InBev

1:15

Lunch & Netwokring

Lunch & Netwokring

August 8 | 13:15 - 14:15

Speaking:

2:15

Stream A1: Discussion Group: DevSecOps – An Introduction

The purpose of DevSecOps is to create the mindset that everyone is responsible for security, embedding security into the early DevOps workflow. Are your security and dev teams working together?

Speaking:

Tania Paulse - Sanlam (new)

Tania Paulse

Group Enterprise Architect, Sanlam

Stream A1: Discussion Group: DevSecOps – An Introduction

August 8 | 14:15 - 14:50

The purpose of DevSecOps is to create the mindset that everyone is responsible for security, embedding security into the early DevOps workflow. Are your security and dev teams working together?

Speaking:

Tania Paulse - Sanlam (new)

Tania Paulse

Sanlam

2:15

Stream B1: Discussion Group: Integrating AI into IT Security

This discussion will first look into what the current status of AI, what is reality and what is moonshot thinking. How are the bad guys using bots, and how to hunt them? Are there any data risks to deception tactics? Will AI better orchestrate human intervention, or will machines do more than the grunt work?

Speaking:

Asterico Adams - Direct Axis

Asterico Adams

Head of Information Security, DirectAxis

Stream B1: Discussion Group: Integrating AI into IT Security

August 8 | 14:15 - 14:50

This discussion will first look into what the current status of AI, what is reality and what is moonshot thinking. How are the bad guys using bots, and how to hunt them? Are there any data risks to deception tactics? Will AI better orchestrate human intervention, or will machines do more than the grunt work?

Speaking:

Asterico Adams - Direct Axis

Asterico Adams

DirectAxis

2:50

Stream A1: Discussion Group: Taking DevSecOps to the Next Level

Are you putting your users, or even customers, at the heart of your DevSecOps agenda? What if you’re still working in partitioned silos – can design thinking still apply to security?

Speaking:

Quintin Laljit - Old Mutual

Quintin Laljit

Programme Manager: IT Security Design Thinking, A Leading Financial Services Firm

Stream A1: Discussion Group: Taking DevSecOps to the Next Level

August 8 | 14:50 - 15:25

Are you putting your users, or even customers, at the heart of your DevSecOps agenda? What if you’re still working in partitioned silos – can design thinking still apply to security?

Speaking:

Quintin Laljit - Old Mutual

Quintin Laljit

A Leading Financial Services Firm

2:50

Stream B1: Discussion Group: Cloud vs On-Premise vs Hybrid

Cloud has its benefits, on-premise storage has its own advantages (perhaps more psychological), but what is the best solution for your business to protect data and sensitive information. Does your ideal scenario not match your corporate status quo?

Speaking:

Lonette Genis - Nacelle

Lonette Genis

Data Protection & Information Officer, Nacelle

Stream B1: Discussion Group: Cloud vs On-Premise vs Hybrid

August 8 | 14:50 - 15:25

Cloud has its benefits, on-premise storage has its own advantages (perhaps more psychological), but what is the best solution for your business to protect data and sensitive information. Does your ideal scenario not match your corporate status quo?

Speaking:

Lonette Genis - Nacelle

Lonette Genis

Nacelle

3:25

Afternoon Tea & Networking

Afternoon Tea & Networking

August 8 | 15:25 - 15:55

Speaking:

3:55

Stream A2: Discussion Group: In-depth Look at Cyber Security & Resilience in East Africa

Since the promulgation of the Kenyan Government Cyber Security Strategy, has anything actually happened? This interactive discussion will look into the on-the-ground reality of East Africa’s cyber security programmes.

Speaking:

Lusekelo Thompson - NBC Tanzania

Lusekelo Thompson

Head of IT Risk & Compliance, NBC Bank (Tanzania)

Anthony Gacanja - Safaricom

Anthony Gacanja

Head of Technology Security, Safaricom (Kenya)

Stream A2: Discussion Group: In-depth Look at Cyber Security & Resilience in East Africa

August 8 | 15:55 - 16:30

Since the promulgation of the Kenyan Government Cyber Security Strategy, has anything actually happened? This interactive discussion will look into the on-the-ground reality of East Africa’s cyber security programmes.

Speaking:

Anthony Gacanja - Safaricom

Anthony Gacanja

Safaricom (Kenya)

Lusekelo Thompson - NBC Tanzania

Lusekelo Thompson

NBC Bank (Tanzania)

3:55

Stream B2: Discussion Group: New Age of Attacks – From Malware to Crypto-Mining

Hackers are getting smarter, cyber criminals are more organised, more ‘legitimised’, attacks are increasingly exponentially in scale and substance. Share in your experiences, and consider this: are smarter machines the best line of defense against other smart machines, or is there an unlearnable nuance to human intervention?

Speaking:

Stream B2: Discussion Group: New Age of Attacks – From Malware to Crypto-Mining

August 8 | 15:55 - 16:30

Hackers are getting smarter, cyber criminals are more organised, more ‘legitimised’, attacks are increasingly exponentially in scale and substance. Share in your experiences, and consider this: are smarter machines the best line of defense against other smart machines, or is there an unlearnable nuance to human intervention?

Speaking:

4:30

Stream B2: Discussion Group: Are you Aware you are Under Attack?

This discussion will look at the relationship between tech, talent, awareness and wearing a target on your back. Cities, local government and other state entities are seen as soft targets or a rite of passage for young hackers; often under prepared and under resourced to respond. What solutions could mitigate this increasing problem?

Speaking:

Silas Mhembere - City of Cape Town

Silas Mhembere

IT Security Consultant, City of Cape Town

Stream B2: Discussion Group: Are you Aware you are Under Attack?

August 8 | 16:30 - 17:05

This discussion will look at the relationship between tech, talent, awareness and wearing a target on your back. Cities, local government and other state entities are seen as soft targets or a rite of passage for young hackers; often under prepared and under resourced to respond. What solutions could mitigate this increasing problem?

Speaking:

Silas Mhembere - City of Cape Town

Silas Mhembere

City of Cape Town

4:30

Stream A2: Discussion Group: Sharing the Burden of Governance, Risk & Compliance

This discussion will look in the roles and responsibilities of all those in the value-chain, including those who straddle the business, risk/compliance and IT security mantle. Is there a one-size-fits-all strategy here?

Speaking:

Karin Kleynhans - Capitec

Karin Kleynhans

Manager: Risk & Compliance Systems, Capitec

Stream A2: Discussion Group: Sharing the Burden of Governance, Risk & Compliance

August 8 | 16:30 - 17:05

This discussion will look in the roles and responsibilities of all those in the value-chain, including those who straddle the business, risk/compliance and IT security mantle. Is there a one-size-fits-all strategy here?

Speaking:

Karin Kleynhans - Capitec

Karin Kleynhans

Capitec

5:05

Close of Conference

Close of Conference

August 8 | 17:05

Speaking: