<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=306561&amp;fmt=gif">

CISO Africa 2020

18 February | Pre-Conference IAM Focus Day
19 - 20 February | Main Conference Days
Maslow Hotel, Sandton, Johannesburg

Book Your Seat Today Sponsor CISO Africa 2020 eBook Download: Navigating The Data Breach
Pre-Conference Focus Day
18 February 2020
07:30

Pre-Conference Focus Day Registration Opens

Identity & Access Management Focus Day registration opens.

Tea, coffee & morning refreshments served.

Pre-Conference Focus Day Registration Opens

February 18 | 07:30 - 09:00

Identity & Access Management Focus Day registration opens.

Tea, coffee & morning refreshments served.

Speaking:

08:55

Welcome & Opening Remarks

The Identity & Access Management Pre-Conference Focus Day provides an opportunity for you to supplement your knowledge at CISO Africa. The hands-on interactive pre-conference event consists of numerous case studies and group discussions specifically focused on IAM, PAM, customer and end-point security.

Speaking:

Muhammed Mayet

CEO, Puleng

Chantel Howes

Head of Service Delivery : Security & Infrastructure, Puleng

Welcome & Opening Remarks

February 18 | 08:55 - 09:00

The Identity & Access Management Pre-Conference Focus Day provides an opportunity for you to supplement your knowledge at CISO Africa. The hands-on interactive pre-conference event consists of numerous case studies and group discussions specifically focused on IAM, PAM, customer and end-point security.

Speaking:

Muhammed Mayet

Puleng

Chantel Howes

Puleng

09:00

El Captain with an Identity Harness and Privileged Safety Cord

How going Free Solo with an Identity based harness and Privileged safety cord can help organisations overcome their El Capitan mountain of Least Privilege. In today’s dynamic world with ever changing organisational demands, it is essential that Security teams can adapt and build flexible and dissolving security controls to manage their risk and support the business. Business that is constantly looking to go “Free Solo”. In this presentation SailPoint and BeyondTrust will share how their joint platform can help organisation climb their El Captain safely, securely and with the right harness in place to save them from a fall.

Speaking:

Ben Bulpett

Ben Bulpett

EMEA Marketing Director, SailPoint

Garith Peck

Garith Peck

Country & Regional Sales Manager, BeyondTrust

El Captain with an Identity Harness and Privileged Safety Cord

February 18 | 09:00 - 09:30

How going Free Solo with an Identity based harness and Privileged safety cord can help organisations overcome their El Capitan mountain of Least Privilege. In today’s dynamic world with ever changing organisational demands, it is essential that Security teams can adapt and build flexible and dissolving security controls to manage their risk and support the business. Business that is constantly looking to go “Free Solo”. In this presentation SailPoint and BeyondTrust will share how their joint platform can help organisation climb their El Captain safely, securely and with the right harness in place to save them from a fall.

Speaking:

Ben Bulpett

Ben Bulpett

SailPoint

Garith Peck

Garith Peck

BeyondTrust

09:30

Discussion Group: Developing an IAM Programme

IAM is inextricably tied to an organisations digital transformation journey & strategy. IAM practitioners, including IT security and risk divisions recognise the need for an independently managed IAM programme. Participants will discuss how to validate the need for an IAM programme, how to divide responsibilities across the organisation, and ensure that the programme aligns with internal audit and governance guidelines.

Speaking:

Marlany Naidoo Mercantile-2

Marlany Naidoo

Head: Information Security & IT GRC, Mercantile Bank

Discussion Group: Developing an IAM Programme

February 18 | 09:30 - 10:00

IAM is inextricably tied to an organisations digital transformation journey & strategy. IAM practitioners, including IT security and risk divisions recognise the need for an independently managed IAM programme. Participants will discuss how to validate the need for an IAM programme, how to divide responsibilities across the organisation, and ensure that the programme aligns with internal audit and governance guidelines.

Speaking:

Marlany Naidoo Mercantile-2

Marlany Naidoo

Mercantile Bank

10:00

Morning Tea & Networking

Morning Tea & Networking

February 18 | 10:00 - 10:30

Speaking:

10:30

Zero-Trust as the Foundation for your Organisational Cybersecurity Strategy

  • Developing a transformational road map to Zero-Trust
  • Zero-Trust networking
  • The Role of Multi-Factor Authentication (MFA) in advancing your Zero-Trust strategy
  • Effectively defining your policies and protecting critical assets

Speaking:

Zero-Trust as the Foundation for your Organisational Cybersecurity Strategy

February 18 | 10:30 - 11:00

  • Developing a transformational road map to Zero-Trust
  • Zero-Trust networking
  • The Role of Multi-Factor Authentication (MFA) in advancing your Zero-Trust strategy
  • Effectively defining your policies and protecting critical assets

Speaking:

11:00

Discussion Group: Preventing Fraud & Safeguarding Identities in a Connected World

As organisations continue to embrace the digital world, and devices become increasingly connected – online crime and fraud has never been more profitable. Attacks are becoming more complex and advanced. Effective identity solutions have the capacity to significantly decrease transaction fraud and identify malicious users before they put the enterprise at risk. Participants will get essentials insights into defining and enforcing policies to block users from assuming too many privileges whilst reviewing what scalable identity solutions are available to prevent identity theft, malware and ransomware.

Speaking:

Iaan Mills

Cyber Security Strategic projects, FNB

Discussion Group: Preventing Fraud & Safeguarding Identities in a Connected World

February 18 | 11:00 - 11:30

As organisations continue to embrace the digital world, and devices become increasingly connected – online crime and fraud has never been more profitable. Attacks are becoming more complex and advanced. Effective identity solutions have the capacity to significantly decrease transaction fraud and identify malicious users before they put the enterprise at risk. Participants will get essentials insights into defining and enforcing policies to block users from assuming too many privileges whilst reviewing what scalable identity solutions are available to prevent identity theft, malware and ransomware.

Speaking:

Iaan Mills

FNB

11:30

Discussion Group: Moving Beyond Security: How IAM Can Drive Value & Increase Revenue

Customer-centricity should be key to any comprehensive digital transformation strategy; but how can organisations balance user demands against security requirements. This discussion will address the question of customer identity sprawl. How to move beyond in-house legacy systems that fall short when it comes to mobile apps and customer facing apps. How to develop frictionless customer experiences, and evaluating single sign-on as a strategic security investment.

Speaking:

Simon Motaung

Simon Motaung

Specialist: Identity & Access Management, African Bank

Discussion Group: Moving Beyond Security: How IAM Can Drive Value & Increase Revenue

February 18 | 11:30 - 12:00

Customer-centricity should be key to any comprehensive digital transformation strategy; but how can organisations balance user demands against security requirements. This discussion will address the question of customer identity sprawl. How to move beyond in-house legacy systems that fall short when it comes to mobile apps and customer facing apps. How to develop frictionless customer experiences, and evaluating single sign-on as a strategic security investment.

Speaking:

Simon Motaung

Simon Motaung

African Bank

12:00

Lunch & Networking

Lunch & Networking

February 18 | 12:00 - 13:00

Speaking:

1:00

Transform your Organisation’s Approach to Data Privacy

Speaking:

Nick Maxwell

Regional Director (UK & Africa), Titus

Sebastian Roques

EMEA VP Sales, Titus

Transform your Organisation’s Approach to Data Privacy

February 18 | 13:00 - 13:30

Speaking:

Nick Maxwell

Titus

Sebastian Roques

Titus

1:30

Who is Accessing Your Sensitive Unstructured Data

  • Unstructured data defined
  • So much data where do we start
  • Practical example of data access governance in action

Speaking:

Vickus Meyer

Divisional Technology Officer: Enterprise Security Foundation, Nedbank

Who is Accessing Your Sensitive Unstructured Data

February 18 | 13:30 - 14:00

  • Unstructured data defined
  • So much data where do we start
  • Practical example of data access governance in action

Speaking:

Vickus Meyer

Nedbank

2:00

Discussion Group: Nurturing a Culture of Security

Employees can be your biggest risk when it comes to securing your organisation assets, data, and intellectual property. This discussion will offer practical guidelines on how to strengthen your human firewall, fostering a cyber-aware culture, outline a plan for ensuring that your security parameters focus on security weak/control points. Address the growing need to advance identity and data security, and delve into great cloud security debate.

Speaking:

Loritta Kudumbu

Loritta Kudumba

Head of IT Governance, Risk and Compliance, Barloworld Equipment

Anna Collard

Managing Director, KnowBe4Africa

Discussion Group: Nurturing a Culture of Security

February 18 | 14:00 - 14:30

Employees can be your biggest risk when it comes to securing your organisation assets, data, and intellectual property. This discussion will offer practical guidelines on how to strengthen your human firewall, fostering a cyber-aware culture, outline a plan for ensuring that your security parameters focus on security weak/control points. Address the growing need to advance identity and data security, and delve into great cloud security debate.

Speaking:

Loritta Kudumbu

Loritta Kudumba

Barloworld Equipment

Anna Collard

KnowBe4Africa

2:30

Afternoon Tea & Networking

Afternoon Tea & Networking

February 18 | 14:30 - 15:00

Speaking:

3:00

Identity & Access Management: from strategy to priority access

Speaking:

Identity & Access Management: from strategy to priority access

February 18 | 15:00 - 15:30

Speaking:

3:30

Next-Generation Identity Analytics & Intelligence

  • Moving towards data-driven risk based IAM
  • Automating critical identity-based controls with artificial intelligence (AI) and machine learning (ML)
  • Using advanced analytics to identify and monitor access risk while transforming compliance-driven processes with risk intelligence
  • Adding enhanced analytics to your IAM solution

Speaking:

Del Van Rooyen

Del van Rooyen

Head: Identity and Access Management, Investec

Next-Generation Identity Analytics & Intelligence

February 18 | 15:30 - 16:00

  • Moving towards data-driven risk based IAM
  • Automating critical identity-based controls with artificial intelligence (AI) and machine learning (ML)
  • Using advanced analytics to identify and monitor access risk while transforming compliance-driven processes with risk intelligence
  • Adding enhanced analytics to your IAM solution

Speaking:

Del Van Rooyen

Del van Rooyen

Investec

4:00

Close of Focus Day

Close of Focus Day

February 18 | 16:00

Speaking:

Main Conference Day 1
19 February 2020
07:30

Main Conference Registration Open

Main registration open.

Tea, coffee & morning refreshments served in exhibition area.

Main Conference Registration Open

February 19 | 07:30 - 09:00

Main registration open.

Tea, coffee & morning refreshments served in exhibition area.

Speaking:

08:50

Welcome & Opening Remarks

Speaking:

Welcome & Opening Remarks

February 19 | 08:50 - 09:00

Speaking:

09:00

LEAD PARTNER PRESENTATION: Reserved for Palo Alto Networks Rewriting the Future of Cybersecurity - The New Threat Landscape & The Cybersecurity Response

This session will showcase a strategic prescription for how organizations can take a holistic approach to cybersecurity to stay safe, and protect their digital way of life.

Speaking:

Trevor Coetzee

Regional Director of SADC Region, Palo Alto Networks

LEAD PARTNER PRESENTATION: Reserved for Palo Alto Networks Rewriting the Future of Cybersecurity - The New Threat Landscape & The Cybersecurity Response

February 19 | 09:00 - 09:30

This session will showcase a strategic prescription for how organizations can take a holistic approach to cybersecurity to stay safe, and protect their digital way of life.

Speaking:

Trevor Coetzee

Palo Alto Networks

09:30

Keynote: Alleviating Poverty through Cyberskills Training

Speaking:

Sandro Bucchianeri - absa

Sandro Bucchianeri

Group Chief Security Officer, Absa Group Limited

Keynote: Alleviating Poverty through Cyberskills Training

February 19 | 09:30 - 09:50

Speaking:

Sandro Bucchianeri - absa

Sandro Bucchianeri

Absa Group Limited

09:50

Panel Discussion: How to Articulate Business Value of Security to the Board and the Business

  • If cyber hygiene and awareness is a checkmark in a board meeting, what practical examples can you give to direct attention to more pressing concerns – and how best to articulate these concerns?
  • What are some of the other most common questions you get asked?
  • Does every proposal put forward come down to ROI? Or have you found other techniques to motivate the board?
  • As much as we want to teach business and the board in particular the value of security-speak, could more be done to educate the security teams in business-speak and flip the conversation around?

Speaking:

Zaid Parak - Discovery

Zaid Parak

Group CISO, Discovery

Itumelend Makgati - SASOL

Itumeleng Makgati

Group CISO, SASOL

Robin Barnwell - Standard Bank

Robin Barnwell

Head: Security Strategy Enablement, Standard Bank

Julian Ramiah - Liberty

Julian Ramiah

Group Chief Information Security Officer, Leading Financial Services Firm

Pragasen 2-1

Pragasen Pather

Group Manager: Security, Risk and Governance, Sun International

Panel Discussion: How to Articulate Business Value of Security to the Board and the Business

February 19 | 09:50 - 10:10

  • If cyber hygiene and awareness is a checkmark in a board meeting, what practical examples can you give to direct attention to more pressing concerns – and how best to articulate these concerns?
  • What are some of the other most common questions you get asked?
  • Does every proposal put forward come down to ROI? Or have you found other techniques to motivate the board?
  • As much as we want to teach business and the board in particular the value of security-speak, could more be done to educate the security teams in business-speak and flip the conversation around?

Speaking:

Itumelend Makgati - SASOL

Itumeleng Makgati

SASOL

Robin Barnwell - Standard Bank

Robin Barnwell

Standard Bank

Julian Ramiah - Liberty

Julian Ramiah

Leading Financial Services Firm

Zaid Parak - Discovery

Zaid Parak

Discovery

Pragasen 2-1

Pragasen Pather

Sun International

10:10

Keynote: Meeting the Skills Gap in Security

  • How trying to solve for new problems using old techniques doesn’t always work (people vs automation)
  • Why it is important to upskill and redeploy people from other parts of IT and the organisation into security functions
  • Using agile and feature teams to solve for a common problem
  • Filling in the “Sec” gap in DevSecOps

Speaking:

Julian Ramiah - Liberty

Julian Ramiah

Group Chief Information Security Officer, Leading Financial Services Firm

Keynote: Meeting the Skills Gap in Security

February 19 | 10:10 - 10:30

  • How trying to solve for new problems using old techniques doesn’t always work (people vs automation)
  • Why it is important to upskill and redeploy people from other parts of IT and the organisation into security functions
  • Using agile and feature teams to solve for a common problem
  • Filling in the “Sec” gap in DevSecOps

Speaking:

Julian Ramiah - Liberty

Julian Ramiah

Leading Financial Services Firm

10:30

Associate Partner: Darktrace A New Era of Cyber Threats: The Shift to Self-Learning, Self-Defending Networks - The Enterprise Immune System: The World’s Leading AI

  • Leveraging machine learning and AI algorithms to defend against advanced, never-seen-before, cyber-threats as seen Fish Tank installed into North American Casino, Darktrace identified anomalous data transfers to an external source and major case of data exfiltration avoided.
  • How new immune system technologies enable you to pre-empt emerging threats and reduce incident response time
  • How to achieve 100% visibility of your entire business including cloud, network and IoT environments
  • Why automation and autonomous response is enabling security teams to neutralize in-progress attacks, prioritise resources, and tangibly lower risk as seen when Employee logged into personal email and inadvertently downloaded stealthy, malicious ransomware which was identified and dealt with in just 33 seconds

Speaking:

Sean Raymond

Sean Raymond

Commercial Director - Africa, Darktrace

Sean Raymond

Cyber Security Account Director, Darktrace

Associate Partner: Darktrace A New Era of Cyber Threats: The Shift to Self-Learning, Self-Defending Networks - The Enterprise Immune System: The World’s Leading AI

February 19 | 10:30 - 11:00

  • Leveraging machine learning and AI algorithms to defend against advanced, never-seen-before, cyber-threats as seen Fish Tank installed into North American Casino, Darktrace identified anomalous data transfers to an external source and major case of data exfiltration avoided.
  • How new immune system technologies enable you to pre-empt emerging threats and reduce incident response time
  • How to achieve 100% visibility of your entire business including cloud, network and IoT environments
  • Why automation and autonomous response is enabling security teams to neutralize in-progress attacks, prioritise resources, and tangibly lower risk as seen when Employee logged into personal email and inadvertently downloaded stealthy, malicious ransomware which was identified and dealt with in just 33 seconds

Speaking:

Sean Raymond

Sean Raymond

Darktrace

Sean Raymond

Darktrace

11:00

Morning Tea & Networking

Morning Tea & Networking

February 19 | 11:00 - 11:30

Speaking:

11:30

Associate Partner: T-Systems From Perimeter Defence to Pervasive Cyber Security.

As we make headway into 2020 we must accept a few indisputable truths:

  • Cyber threats are increasing in sophistication and frequency of occurrence
  • The attack surface of our companies has expanded far beyond the traditional enterprise perimeter
  • Cyber criminals are resourceful, professional, persistent and well-funded · IT is digital and disruptive change is the norm ·
  • Cyber-attacks now regularly bring businesses to a standstill in South Africa and globally.

Against this backdrop, modern cyber security has to become integrated at every business level. It needs to evolve into a pervasive and active presence ensuring operations and data integrity are not disrupted. It is vital that IP remains confidential and customer privacy is protected in accordance with regulations.

Speaking:

Lukas van der Merwe

Specialist Sales Executive for Security, T-Systems South Africa

Associate Partner: T-Systems From Perimeter Defence to Pervasive Cyber Security.

February 19 | 11:30 - 12:00

As we make headway into 2020 we must accept a few indisputable truths:

  • Cyber threats are increasing in sophistication and frequency of occurrence
  • The attack surface of our companies has expanded far beyond the traditional enterprise perimeter
  • Cyber criminals are resourceful, professional, persistent and well-funded · IT is digital and disruptive change is the norm ·
  • Cyber-attacks now regularly bring businesses to a standstill in South Africa and globally.

Against this backdrop, modern cyber security has to become integrated at every business level. It needs to evolve into a pervasive and active presence ensuring operations and data integrity are not disrupted. It is vital that IP remains confidential and customer privacy is protected in accordance with regulations.

Speaking:

Lukas van der Merwe

T-Systems South Africa

12:00

Keynote: Structuring the Security Organisation Across Multiple Territories

  • An overview of the Standard Bank model
  • How skills development and automation will enable greater collaboration and better understanding between teams
  • Challenges in perfecting organisational design; compliance and regulatory issues, skills gap, cost implications etc
  • Enabling access and control within a cloud-centric IT strategy

Speaking:

Robin Barnwell - Standard Bank

Robin Barnwell

Head: Security Strategy Enablement, Standard Bank

Keynote: Structuring the Security Organisation Across Multiple Territories

February 19 | 12:00 - 12:20

  • An overview of the Standard Bank model
  • How skills development and automation will enable greater collaboration and better understanding between teams
  • Challenges in perfecting organisational design; compliance and regulatory issues, skills gap, cost implications etc
  • Enabling access and control within a cloud-centric IT strategy

Speaking:

Robin Barnwell - Standard Bank

Robin Barnwell

Standard Bank

12:30

Keynote: Build the Security Business Case in a Major Retailer

  • Breaking down security into business language
  • Thinking of security as a business asset rather than a grudge purchase
  • Strategies on building allies and bringing the board to an agreed level of understanding
  • A general overview of our IT security strategy and execution which goes beyond ROI

Speaking:

Gadija Ryklief - Edcon

Gadija Ryklief

GM: Information Security , Edcon

Keynote: Build the Security Business Case in a Major Retailer

February 19 | 12:30 - 13:00

  • Breaking down security into business language
  • Thinking of security as a business asset rather than a grudge purchase
  • Strategies on building allies and bringing the board to an agreed level of understanding
  • A general overview of our IT security strategy and execution which goes beyond ROI

Speaking:

Gadija Ryklief - Edcon

Gadija Ryklief

Edcon

1:00

Lunch & Networking

Lunch & Networking

February 19 | 13:00 - 14:00

Speaking:

2:00

STREAM PARTNER PRESENTATION IBM Cloud Security

  • Move confidently to hybrid multicloud
  • Integrate security into every phase of your journey
  • Cloud security is critical to business growth · Building security into every phase of your cloud journey

Speaking:

Tousif Syed

Cloud Security and Security Strategy Risk & Compliance (SSRC) Lead - Middle East & Africa, IBM

STREAM PARTNER PRESENTATION IBM Cloud Security

February 19 | 14:00 - 14:30

  • Move confidently to hybrid multicloud
  • Integrate security into every phase of your journey
  • Cloud security is critical to business growth · Building security into every phase of your cloud journey

Speaking:

Tousif Syed

IBM

2:00

STREAM PARTNER PRESENTATION KnowBe4 The state of Africa's user security awareness level - and how to improve it. A Telkom case study

  • Findings from KnowBe4's 2019 survey on cybersecurity awareness conducted across 9 African countries
  • Importance of security awareness and culture change in the African context
  • Best practices gained while running security awareness at Telkom

Speaking:

Anna Collard

Managing Director, KnowBe4Africa

Hlakane Eseu Choma

Senior Specialist Manager - Information Security Assurance, Telkom SA

STREAM PARTNER PRESENTATION KnowBe4 The state of Africa's user security awareness level - and how to improve it. A Telkom case study

February 19 | 14:00 - 14:30

  • Findings from KnowBe4's 2019 survey on cybersecurity awareness conducted across 9 African countries
  • Importance of security awareness and culture change in the African context
  • Best practices gained while running security awareness at Telkom

Speaking:

Hlakane Eseu Choma

Telkom SA

Anna Collard

KnowBe4Africa

2:00

STREAM PARTNER PRESENTATION Nclose: Building Incident Response Capability

  • Provide a layman’s overview of the IR lifecycle
  • Where does one start when building IR capability?
  • Does is make sense to outsource some IR capability?
  • IR is vast, provide some pointers to help organisations focus on the important topics

Speaking:

Martin Potgieter

Technical Director, NClose

STREAM PARTNER PRESENTATION Nclose: Building Incident Response Capability

February 19 | 14:00 - 14:30

  • Provide a layman’s overview of the IR lifecycle
  • Where does one start when building IR capability?
  • Does is make sense to outsource some IR capability?
  • IR is vast, provide some pointers to help organisations focus on the important topics

Speaking:

Martin Potgieter

NClose

2:30

Stream A - Case Study: Having the DevOps big picture and framework in building DevOps in an enterprise is key, but when to infuse security practices in the CI/CD, and how?

  • Embracing agile development and DevOps is huge step forward, but why has security been left behind?
  • How to test security controls outside of raw code; at what point can testing be done?
  • Do all traditional security practices need to rewritten, if so, how?
  • Is there a best practice model to introduce security into an agile project environment?

Speaking:

Stream A - Case Study: Having the DevOps big picture and framework in building DevOps in an enterprise is key, but when to infuse security practices in the CI/CD, and how?

February 20 | 14:30 - 15:00

  • Embracing agile development and DevOps is huge step forward, but why has security been left behind?
  • How to test security controls outside of raw code; at what point can testing be done?
  • Do all traditional security practices need to rewritten, if so, how?
  • Is there a best practice model to introduce security into an agile project environment?

Speaking:

2:30

Stream A - Case Study: Implementing GRC in the Digital Era

  • GRC is fundamental to doing business in a digital world
  • Putting technology (and people) at the heart of your GRC programme
  • Can you make compliance "attractive"?
  • How much of this is data governance, and how much is determined by user experience?

Speaking:

Sphiwe Mbatha

Sphiwe Mbatha

Head: IT Security & Governance, Bayport Financial Services

Stream A - Case Study: Implementing GRC in the Digital Era

February 19 | 14:30 - 15:00

  • GRC is fundamental to doing business in a digital world
  • Putting technology (and people) at the heart of your GRC programme
  • Can you make compliance "attractive"?
  • How much of this is data governance, and how much is determined by user experience?

Speaking:

Sphiwe Mbatha

Sphiwe Mbatha

Bayport Financial Services

2:30

Stream B - Case Study: Next Generation Network Security

  • You might not be there yet, but more a more mobile workforce is coming - are you prepared?
  • What are some of the most commonly used remote and cloud security policies?
  • What should be your security architecture, deployment and integration considerations?
  • Predicting what the threat landscape will look like in five years’ time

Speaking:

Ignus van Zyl

Lead Security Analyst - Attack Monitoring, Absa Group

Stream B - Case Study: Next Generation Network Security

February 19 | 14:30 - 15:00

  • You might not be there yet, but more a more mobile workforce is coming - are you prepared?
  • What are some of the most commonly used remote and cloud security policies?
  • What should be your security architecture, deployment and integration considerations?
  • Predicting what the threat landscape will look like in five years’ time

Speaking:

Ignus van Zyl

Absa Group

2:30

Stream C - Case Study: Most Common Internal & Customer Attacks

  • Looking at the numbers: how successful are phishing attacks
  • Detection, prevention and response strategies
  • From anti-fraud mechanisms to protecting sensitive data; how can the customer be protected from themselves?
  • How to best manage CX and fraud management that is seamless

Speaking:

Colin van Niekerk absa

Colin van Niekerk

Head: Cyber Response & Intelligence, absa

Stream C - Case Study: Most Common Internal & Customer Attacks

February 19 | 14:30 - 15:00

  • Looking at the numbers: how successful are phishing attacks
  • Detection, prevention and response strategies
  • From anti-fraud mechanisms to protecting sensitive data; how can the customer be protected from themselves?
  • How to best manage CX and fraud management that is seamless

Speaking:

Colin van Niekerk absa

Colin van Niekerk

absa

3:00

Afternoon Tea & Networking

Afternoon Tea & Networking

February 19 | 15:00 - 15:30

Speaking:

3:30

Stream A - Discussion Group: GRC & Cloud Security

This discussion will look at the impact of cloud migration on GRC and security. What will impact with regards governance and risk issues be on cloud implementation Moving to the cloud requires input from many different stakeholders and cannot be done retroactively, but is are all key stakeholders seated around the same table and on the same page?

Speaking:

Marlany Naidoo Mercantile-2

Marlany Naidoo

Head: Information Security & IT GRC, Mercantile Bank

Loritta Kudumbu

Loritta Kudumba

Head of IT Governance, Risk and Compliance, Barloworld Equipment

Gasbene

Gasbene Mahlangu

Portfolio Head: Business Resilience, Standard Bank

Stream A - Discussion Group: GRC & Cloud Security

February 19 | 15:30 - 16:00

This discussion will look at the impact of cloud migration on GRC and security. What will impact with regards governance and risk issues be on cloud implementation Moving to the cloud requires input from many different stakeholders and cannot be done retroactively, but is are all key stakeholders seated around the same table and on the same page?

Speaking:

Marlany Naidoo Mercantile-2

Marlany Naidoo

Mercantile Bank