<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=306561&amp;fmt=gif">

CISO Africa 2019

Mitigating Cyber Threats Through Effective Leadership
20 - 21 February 2019 | Maslow Hotel, Sandton, Johannesburg
19 February 2019 Pre-Conference Focus Day: Governance, Risk & Compliance

Download The Agenda Only 5 Seats Left. Book Your Seat Now

CISO Africa 2019 Agenda

CISO Africa 2019 Current Agenda (subject to change). 

Pre-Conference Focus Day
19 February 2019
08:55

CISO Africa: Governance, Risk & Compliance Focus Day General Overview

The Governance, Risk & Compliance Focus Day is a full day seminar dedicated to the convergence of risk management, audit and IT. Topics and discussions will include building a fluid IT compliance...

CISO Africa: Governance, Risk & Compliance Focus Day General Overview

February 19 | 08:55 - 9:00

The Governance, Risk & Compliance Focus Day is a full day seminar dedicated to the convergence of risk management, audit and IT. Topics and discussions will include building a fluid IT compliance programme, understanding what GRC is, identifying IT risk domains, GDPR, POPIA and future compliance laws, AI in GRC and the impact of GRC on corporate culture.

Early Bird Special: Register Today and Save

Speaking:

09:00

Identifying IT Risk Domains

  • How confidentiality, integrity & availability is impacted by people, processes & Technology
  • Identifying the common thread among myriad rules & regulations
  • Best practices for simplifying IT compliance...

Speaking:

Tammy Naicker - Vodacom-1

Tammy Naicker

Executive Head of Department: Group Technology Governance & Assurance, Vodacom

Identifying IT Risk Domains

February 19 | 09:00 - 09:30

  • How confidentiality, integrity & availability is impacted by people, processes & Technology
  • Identifying the common thread among myriad rules & regulations
  • Best practices for simplifying IT compliance & InfoSec regulations
Early Bird Special: Register Today and Save

Speaking:

Tammy Naicker - Vodacom-1

Tammy Naicker

Vodacom

09:30

GROUP DISCUSSION: What is GRC & What Should It Be?

How would you define GRC within your business? Is there a Head of GRC? What do you think the reporting lines should look like and what level of responsibility should there be? What assurance and...

Speaking:

Tammy Naicker - Vodacom-1

Tammy Naicker

Executive Head of Department: Group Technology Governance & Assurance, Vodacom

Ritasha Jethva - RMB

Ritasha Jethva

Head of Information Technology GRC & Resilience, Rand Merchant Bank

GROUP DISCUSSION: What is GRC & What Should It Be?

February 19 | 09:30 - 10:30

How would you define GRC within your business? Is there a Head of GRC? What do you think the reporting lines should look like and what level of responsibility should there be? What assurance and performance responsibilities are there? What lessons can be learned from some of the recent corporate scandals?

Early Bird Special: Register Today and Save

Speaking:

Tammy Naicker - Vodacom-1

Tammy Naicker

Vodacom

Ritasha Jethva - RMB

Ritasha Jethva

Rand Merchant Bank

10:30

Morning Tea & Networking

Morning Tea & Networking

February 19 | 10:30 - 11:00

Early Bird Special: Register Today and Save

Speaking:

11:00

Cloud-Ready Data Governance & GRC

  • What are some of the data risks associated with the cloud
  • How is data sovereignty impacted
  • What is the role of third party providers, and should they be used

Speaking:

Ken Chikwanha - Standard Bank

Ken Chikwanha

Executive Head of Data Governance: Personal & Business Banking, Standard Bank

Cloud-Ready Data Governance & GRC

February 19 | 11:00 - 11:30

  • What are some of the data risks associated with the cloud
  • How is data sovereignty impacted
  • What is the role of third party providers, and should they be used
Early Bird Special: Register Today and Save

Speaking:

Ken Chikwanha - Standard Bank

Ken Chikwanha

Standard Bank

11:30

GROUP DISCUSSION: GDPR, POPIA & Future Privacy Laws

This discussion will focus on the impact and implementation of GDPR and POPIAI. Does your business need to comply with both? What has its impact been on your business? Will customer data be rendered...

Speaking:

Lynette Smith - Harmony Gold

Lynnette Smith

Information & Compliance Officer, Harmony Gold

GROUP DISCUSSION: GDPR, POPIA & Future Privacy Laws

February 19 | 11:30 - 12:30

This discussion will focus on the impact and implementation of GDPR and POPIAI. Does your business need to comply with both? What has its impact been on your business? Will customer data be rendered worthless, or will customers soon take control of their data and be rewarded for sharing it?

Early Bird Special: Register Today and Save

Speaking:

Lynette Smith - Harmony Gold

Lynnette Smith

Harmony Gold

12:30

Lunch

Lunch

February 19 | 12:30 - 13:30

Early Bird Special: Register Today and Save

Speaking:

1:30

Implementing GRC in the Era of Digital Transformation

  • GRC as a foundation of digital transformation strategy
  • Placing technology at the heart of your GRC programme
  • There is no need to wait to implement GRC – the time is NOW!

Speaking:

Martins Ogbolu - Vodacom

Martins Ogbolu

Group Executive Head Anti-Corruption Risk Compliance, Vodacom

Implementing GRC in the Era of Digital Transformation

February 19 | 13:30 - 14:00

  • GRC as a foundation of digital transformation strategy
  • Placing technology at the heart of your GRC programme
  • There is no need to wait to implement GRC – the time is NOW!
Early Bird Special: Register Today and Save

Speaking:

Martins Ogbolu - Vodacom

Martins Ogbolu

Vodacom

2:00

GROUP DISCUSSION: Due Diligence within the GRC Space

Due diligence and risk management go hand in hand, but for now how far should your organisation go to shield it from the risk of non-compliance? Is there a moment to pause to see how far down the...

Speaking:

Martins Ogbolu - Vodacom

Martins Ogbolu

Group Executive Head Anti-Corruption Risk Compliance, Vodacom

GROUP DISCUSSION: Due Diligence within the GRC Space

February 19 | 14:00 - 15:00

Due diligence and risk management go hand in hand, but for now how far should your organisation go to shield it from the risk of non-compliance? Is there a moment to pause to see how far down the road you have gone in comparison to others?

Early Bird Special: Register Today and Save

Speaking:

Martins Ogbolu - Vodacom

Martins Ogbolu

Vodacom

3:00

Afternoon Tea & Networking

Afternoon Tea & Networking

February 19 | 15:00 - 15:30

Early Bird Special: Register Today and Save

Speaking:

3:30

GROUP DISCUSSION: GRC & Corporate Culture

The way in which we do business is changing rapidly. Are internal audit and GRC teams keeping up with these emerging trends (digital transformation)? How can you make compliance ‘attractive’ to the...

Speaking:

Ritasha Jethva - RMB

Ritasha Jethva

Head of Information Technology GRC & Resilience, Rand Merchant Bank

Ken Chikwanha - Standard Bank

Ken Chikwanha

Executive Head of Data Governance: Personal & Business Banking, Standard Bank

GROUP DISCUSSION: GRC & Corporate Culture

February 19 | 15:30 - 16:30

The way in which we do business is changing rapidly. Are internal audit and GRC teams keeping up with these emerging trends (digital transformation)? How can you make compliance ‘attractive’ to the rest of the business? Do you agree that organizational governance needs to be integrated into company culture – how so?

Early Bird Special: Register Today and Save

Speaking:

Ken Chikwanha - Standard Bank

Ken Chikwanha

Standard Bank

Ritasha Jethva - RMB

Ritasha Jethva

Rand Merchant Bank

4:30

End of Focus Day

End of Focus Day

February 19 | 16:30

Early Bird Special: Register Today and Save

Speaking:

Main Conference Day 1
20 February 2019
07:30

Main Conference Registration Opens

Main Conference Registration Opens

February 20 | 07:30 - 09:00

Early Bird Special: Register Today and Save

Speaking:

09:00

Welcome & Opening Remarks

Welcome & Opening Remarks

February 20 | 09:00 - 09:15

Early Bird Special: Register Today and Save

Speaking:

09:15

Keynote: Transforming Security —Telkom’s Approach to Cloud Adoption

Join Netskope's keynote to learn about the cloud adoption strategy Telkom is following, and the safeguards it is implementing to protect its data in the cloud. Jacques Fouche, Telkom’s Senior...

Speaking:

Jacque Fouche - Telkom

Jacques Fouche

Senior Information Security Specialist, Telkom

Keynote: Transforming Security —Telkom’s Approach to Cloud Adoption

February 20 | 09:15 - 10:00

Join Netskope's keynote to learn about the cloud adoption strategy Telkom is following, and the safeguards it is implementing to protect its data in the cloud. Jacques Fouche, Telkom’s Senior Information Security Specialist, will explore the thought processes behind Telkom’s approach to cloud security and their design considerations. In addition, Jacques will discuss how CASB as a technology, and as a function, forms a fundamental component of their cloud adoption strategy.

Early Bird Special: Register Today and Save

Speaking:

Jacque Fouche - Telkom

Jacques Fouche

Telkom

10:00

Panel Discussion: Cybersecurity Leadership in a Digital World

  • Is IT security getting the attention it deserves
  • How to motivate sufficient budget allocation from the board
  • Are teams equipped to handle the barrage of cyber attacks
  • Why Threat Risk Assessments are...

Speaking:

Grant Reynolds - Netskope

Grant Reynolds

Regional Sales Manager, Netskope

Jacque Fouche - Telkom

Jacques Fouche

Senior Information Security Specialist, Telkom

Alfred Musarurwa - Nedabnk Zimbabwe

Dr Alfred Musarurwa

Chief Information Officer, Nedbank Zimbabwe

Julian Ramiah - Liberty

Julian Ramiah

Group Chief Information Security Officer, Liberty Holdings

Robin Barnwell - Standard Bank

Robin Barnwell

Head: Security Strategy Enablement, Standard Bank

Panel Discussion: Cybersecurity Leadership in a Digital World

February 20 | 10:00 - 10:45

  • Is IT security getting the attention it deserves
  • How to motivate sufficient budget allocation from the board
  • Are teams equipped to handle the barrage of cyber attacks
  • Why Threat Risk Assessments are never-ending
Early Bird Special: Register Today and Save

Speaking:

Alfred Musarurwa - Nedabnk Zimbabwe

Dr Alfred Musarurwa

Nedbank Zimbabwe

Julian Ramiah - Liberty

Julian Ramiah

Liberty Holdings

Jacque Fouche - Telkom

Jacques Fouche

Telkom

Robin Barnwell - Standard Bank

Robin Barnwell

Standard Bank

Grant Reynolds - Netskope

Grant Reynolds

Netskope

10:45

Morning Tea & Networking

Morning Tea & Networking

February 20 | 10:45 - 11:30

Early Bird Special: Register Today and Save

Speaking:

11:30

Keynote: The South African CISO Perspective

  • The critical role of leadership in identifying threats and vulnerabilities
  • Cyber-crime is local – why phishing and hacks are closer to home
  • Why should South African companies make security a priority

Speaking:

Julian Ramiah - Liberty

Julian Ramiah

Group Chief Information Security Officer, Liberty Holdings

Keynote: The South African CISO Perspective

February 20 | 11:30 - 12:00

  • The critical role of leadership in identifying threats and vulnerabilities
  • Cyber-crime is local – why phishing and hacks are closer to home
  • Why should South African companies make security a priority
  • Could we collaborate more to mitigate threats?
Early Bird Special: Register Today and Save

Speaking:

Julian Ramiah - Liberty

Julian Ramiah

Liberty Holdings

12:00

Fortinet Fabric & Multi-cloud Solution

  • Introduction to Fortinet’s Security Fabric
  • Advanced Threat market trends
  • Secure SD-WAN
  • Multi-cloud market is changing
  • Importance of visibility and reporting

Speaking:

Paul Williams - Fortinet-1

Paul Williams

Country Manager - Southern Africa & IOL, Fortinet

Fortinet Fabric & Multi-cloud Solution

February 20 | 12:00 - 12:30

  • Introduction to Fortinet’s Security Fabric
  • Advanced Threat market trends
  • Secure SD-WAN
  • Multi-cloud market is changing
  • Importance of visibility and reporting
Early Bird Special: Register Today and Save

Speaking:

Paul Williams - Fortinet-1

Paul Williams

Fortinet

12:30

Keynote: AI-Driven Incident Management: Keeping up the pace with the Increased Sophisticated Attacks

  • AI in the Frontline of Defense
  • Can AI detect intrusions before they start
  • Are we talking AI or Machine Learning

Speaking:

Ernest Ketcha - MTN

Prof. Ernest Ketcha Ngassam

General Manager: Information Security Architecture & Technical Excellence, MTN

Keynote: AI-Driven Incident Management: Keeping up the pace with the Increased Sophisticated Attacks

February 20 | 12:30 - 13:00

  • AI in the Frontline of Defense
  • Can AI detect intrusions before they start
  • Are we talking AI or Machine Learning
Early Bird Special: Register Today and Save

Speaking:

Ernest Ketcha - MTN

Prof. Ernest Ketcha Ngassam

MTN

1:00

Lunch & Networking

Lunch & Networking

February 20 | 13:00 - 14:00

Early Bird Special: Register Today and Save

Speaking:

2:00

Stream A1: Keynote: Data Privacy by design, driven by Intelligent Data Security

Digital transformation changes expectations: better service, faster delivery, with less cost. Businesses must transform to stay relevant and data holds the answers. Cyber crime on that data is a cost...

Speaking:

Erwin De Smaele - Informatica

Erwin De Smaele

EMEA DSG Product Specialist, Informatica

Stream A1: Keynote: Data Privacy by design, driven by Intelligent Data Security

February 20 | 14:00 - 14:30

Digital transformation changes expectations: better service, faster delivery, with less cost. Businesses must transform to stay relevant and data holds the answers. Cyber crime on that data is a cost that is soaring, the global economy is forecast to be spending £335 billion tackling this issue, according to the World Economic Forum’s Global Risks Report. While the skies are clearly darkening, there is a bright light on the horizon in the form of AI. Knowing where your data is and having security automation helps security analysts to be proactive and innovative, giving them the ability to detect both the old known attacks, as well as new, previously unknown attacks. Enabling individuals to better focus on the next generation of complex attacks and through intelligent application of knowledge gained from data, be prepared for them. As the world’s leader in Enterprise Cloud Data Management, we’re prepared to help you intelligently lead—in any sector, category or niche.

Early Bird Special: Register Today and Save

Speaking:

Erwin De Smaele - Informatica

Erwin De Smaele

Informatica

2:00

Stream B1: Keynote: A New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks

  • Leveraging machine learning and AI algorithms to defend against advanced, never seen-before, cyber-threats.
  • How new immune system technologies enable you to pre-empt emerging threats and reduce...

Speaking:

Sean Raymond - Darktrace

Sean Raymond

Senior Cyber Security Manager, Darktrace

Stream B1: Keynote: A New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks

February 20 | 14:00 - 14:30

  • Leveraging machine learning and AI algorithms to defend against advanced, never seen-before, cyber-threats.
  • How new immune system technologies enable you to pre-empt emerging threats and reduce incident response time.
  • How to achieve 100% visibility of your entire business including cloud, network and IoT environments.
  • Why automation and autonomous response is enabling security teams to neutralise in-progress attacks, prioritise resources, and tangibly lower risk.
  • Real-world examples of subtle, unknown threats that routinely bypass traditional controls.
Early Bird Special: Register Today and Save

Speaking:

Sean Raymond - Darktrace

Sean Raymond

Darktrace

2:30

Stream A1: Keynote: Information Security as Business Enabler

  • Translating cybersecurity data into GRC information
  • Defining risk as ‘information risk’ not ‘technology risk’
  • Security and compliance go hand-in-hand

Speaking:

Gadija Ryklief - Edcon

Gadija Ryklief

Information Security Lead, Major SA Retailer

Stream A1: Keynote: Information Security as Business Enabler

February 20 | 14:30 - 15:00

  • Translating cybersecurity data into GRC information
  • Defining risk as ‘information risk’ not ‘technology risk’
  • Security and compliance go hand-in-hand
Early Bird Special: Register Today and Save

Speaking:

Gadija Ryklief - Edcon

Gadija Ryklief

Major SA Retailer

2:30

Stream B1: Keynote: How to Protect Your Customers Money, Data & Time

How do you build an effective and proactive strategy in the complex world of cyber risk? Are your security investments fixing the right problems? Learning from building a strategy across 18 different...

Speaking:

Robin Barnwell - Standard Bank

Robin Barnwell

Head: Security Strategy Enablement, Standard Bank

Stream B1: Keynote: How to Protect Your Customers Money, Data & Time

February 20 | 14:30 - 15:00

How do you build an effective and proactive strategy in the complex world of cyber risk? Are your security investments fixing the right problems? Learning from building a strategy across 18 different territories.

Early Bird Special: Register Today and Save

Speaking:

Robin Barnwell - Standard Bank

Robin Barnwell

Standard Bank

3:00

Stream A1: Keynote: The Legal Implications of Outsourcing your Company’s Information Security

Having worked in both the corporate environment and now in academia, Verine will discuss the legal position relating to outsourcing Infosec specifically for top management and members of the board

Speaking:

Verine Etsebeth - WITS

Verine Etsebeth

Senior Lecturer, WITS University

Stream A1: Keynote: The Legal Implications of Outsourcing your Company’s Information Security

February 20 | 15:00 - 15:30

Having worked in both the corporate environment and now in academia, Verine will discuss the legal position relating to outsourcing Infosec specifically for top management and members of the board

Early Bird Special: Register Today and Save

Speaking:

Verine Etsebeth - WITS

Verine Etsebeth

WITS University

3:00

Stream B1: Keynote: Why Culture Trumps Technology (mostly)

  • The most sophisticated bit of kit won’t save you from human error
  • Security doesn’t have to be boring
  • Educate to eradicate threats

Speaking:

Steve Jump - Telkom

Steve Jump

Head: Corporate Information Security Governance, Telkom

Stream B1: Keynote: Why Culture Trumps Technology (mostly)

February 20 | 15:00 - 15:30

  • The most sophisticated bit of kit won’t save you from human error
  • Security doesn’t have to be boring
  • Educate to eradicate threats
Early Bird Special: Register Today and Save

Speaking:

Steve Jump - Telkom

Steve Jump

Telkom

3:30

Afternoon Tea & Networking

Afternoon Tea & Networking

February 20 | 15:30 - 16:00

Early Bird Special: Register Today and Save

Speaking:

4:00

Stream B2: Discussion Group - How to Translate Complex Cybersecurity Issues into Simple Business Context

This discussion will cover theses key topics:

  • Measuring and communicating security risks to the board, and how could this be improved for greater understanding
  • How can security teams become a business...

Speaking:

Nick Trigg - BitSight

Nick Trigg

Enterprise Risk Management Consultant, BitSight

Stream B2: Discussion Group - How to Translate Complex Cybersecurity Issues into Simple Business Context

February 20 | 16:00 - 16:45

This discussion will cover theses key topics:

  • Measuring and communicating security risks to the board, and how could this be improved for greater understanding
  • How can security teams become a business enabler alongside the ever-increasing threat landscape?
  • Effective and efficient management of the risk from your digital supply chain

Nick Trigg will share ideas and best practice for effective conversations on risk with your security teams, board members, business partners, insurers and regulators.

Early Bird Special: Register Today and Save

Speaking:

Nick Trigg - BitSight

Nick Trigg

BitSight

4:00

Stream A2: Discussion Group - Security in the Cloud

What new vulnerabilities do we face now that we are all online, store everything in the cloud, work remotely and are mobile?

Speaking:

Willie Strydom (new) - Wesbank

Willie Strydom

Enterprise Security Architect, Wesbank

Stream A2: Discussion Group - Security in the Cloud

February 20 | 16:00 - 16:45

What new vulnerabilities do we face now that we are all online, store everything in the cloud, work remotely and are mobile?

Early Bird Special: Register Today and Save

Speaking:

Willie Strydom (new) - Wesbank

Willie Strydom

Wesbank

4:45

Stream A2: Discussion Group - DevSecOps

The purpose of DevSecOps is to create the mindset that everyone is responsible for security, embedding security into the early DevOps workflow. Are your security and dev teams working together?

Speaking:

Tania Paulse - Sanlam (new)

Tania Paulse

Group Enterprise Architect, Sanlam

Stream A2: Discussion Group - DevSecOps

February 20 | 16:45 - 17:30

The purpose of DevSecOps is to create the mindset that everyone is responsible for security, embedding security into the early DevOps workflow. Are your security and dev teams working together?

Early Bird Special: Register Today and Save

Speaking:

Tania Paulse - Sanlam (new)

Tania Paulse

Sanlam

4:45

Stream B2: Discussion Group - The Effectiveness of Regulators Implementing POPIA

Where are we now with POPIA implementation, and to what extent is the regulator responsible.

Speaking:

Verine Etsebeth - WITS

Verine Etsebeth

Senior Lecturer, WITS University

Stream B2: Discussion Group - The Effectiveness of Regulators Implementing POPIA

February 20 | 16:45 - 17:30

Where are we now with POPIA implementation, and to what extent is the regulator responsible.

Early Bird Special: Register Today and Save

Speaking:

Verine Etsebeth - WITS

Verine Etsebeth

WITS University

5:30

Cocktail Function & Networking

Cocktail Function & Networking

February 20 | 17:30 - 18:30

Early Bird Special: Register Today and Save

Speaking:

6:30

Corinium Connected CISO Dinner Sponsored by VMware (Contact Us for Further Information - Limited Reserved Seating)

Proudly sponsored by VMware. Right of admission reserved.

Join our panel of local and international CISOs as they discuss the most searing issues that keep them up at night. From malware intrusions...

Speaking:

Lorna Hardie - VMWare

Lorna Hardie

Regional Director - Sub-Saharan Africa, VMware

Gareth James - VMware

Gareth James

Network & Security Sales Specialist, VMware

Ahmed Nabil

Ahmed Nabil

Chief Information Security Officer, PGESCo Egypt

Julian Ramiah - Liberty

Julian Ramiah

Group Chief Information Security Officer, Liberty Holdings

Thelma Kganakga - RMB

Thelma Kganakga

Chief Information Security Officer, Rand Merchant Bank

Corinium Connected CISO Dinner Sponsored by VMware (Contact Us for Further Information - Limited Reserved Seating)

February 20 | 18:30 - 21:30

Proudly sponsored by VMware. Right of admission reserved.

Join our panel of local and international CISOs as they discuss the most searing issues that keep them up at night. From malware intrusions and phising, IoT security to access control, no stone will be left unturned. Is Blockchain the Holy Grail? Will deep learning and AI capabilities help us or the bad guys more? How do you rebuild your bran reputation after an attack? Do you have the right leadership structure in place? Is there enough budget allocated – will there ever be?! All these questions and more will be answered at this exclusive networking event.

Early Bird Special: Register Today and Save

Speaking:

Thelma Kganakga - RMB

Thelma Kganakga

Rand Merchant Bank

Julian Ramiah - Liberty

Julian Ramiah

Liberty Holdings

Ahmed Nabil

Ahmed Nabil

PGESCo Egypt

Lorna Hardie - VMWare

Lorna Hardie

VMware

Gareth James - VMware

Gareth James

VMware

Main Conference Day 2
21 February 2019
07:30

Registration Opens

Registration Opens

February 21 | 07:30 - 09:00

Early Bird Special: Register Today and Save

Speaking:

09:00

Welcome & Opening Remarks

Welcome & Opening Remarks

February 21 | 09:00 - 09:10

Early Bird Special: Register Today and Save

Speaking:

09:10

Keynote: A Security Context View of Digital Transformation

With reference to a ‘digital business’ and ‘digital operations’ framework, this presentation reviews the scope of services and associated security landscape for digital transformation. The roles of...

Speaking:

Andrew Hutchison - Tsystems

Dr Andrew Hutchison

Cyber Security Specialist, T-Systems Switzerland

Keynote: A Security Context View of Digital Transformation

February 21 | 09:10 - 09:40

With reference to a ‘digital business’ and ‘digital operations’ framework, this presentation reviews the scope of services and associated security landscape for digital transformation. The roles of SecOps, DevSecOps, ICT Operations, Process Control Networks, Robotic Process Automation etc., supported by analytics across an enterprise data repository, will be explored. From a security perspective, the impact of new network and cloud processing models on identity, availability and confidentiality will be assessed. The benefits of specialist, tier-1 insights into attack vectors and actionable primary threat intelligence is also considered.

Early Bird Special: Register Today and Save

Speaking:

Andrew Hutchison - Tsystems

Dr Andrew Hutchison

T-Systems Switzerland

09:40

Keynote: Balancing Security Risk with Investment

  • How much of your IT budget should go towards security
  • If it’s not your information assets at risk, what about your brand
  • Is there a ceiling to how much investment should be made?

Speaking:

Thelma Kganakga - RMB

Thelma Kganakga

Chief Information Security Officer, Rand Merchant Bank

Keynote: Balancing Security Risk with Investment

February 21 | 09:40 - 10:10

  • How much of your IT budget should go towards security
  • If it’s not your information assets at risk, what about your brand
  • Is there a ceiling to how much investment should be made?
Early Bird Special: Register Today and Save

Speaking:

Thelma Kganakga - RMB

Thelma Kganakga

Rand Merchant Bank

10:10

Keynote: Communicating IT Security Across the Business

  • How to get the business to understand problems before they happen
  • When disaster strikes you need to respond as a team
  • Keep it transparent: manage your reputation and keeping your customers happy

Speaking:

Maclaud Mafaiti

Maclaud Mafaiti

General Manager IT Security & Trust Centre, South African Post Office

Keynote: Communicating IT Security Across the Business

February 21 | 10:10 - 10:40

  • How to get the business to understand problems before they happen
  • When disaster strikes you need to respond as a team
  • Keep it transparent: manage your reputation and keeping your customers happy
Early Bird Special: Register Today and Save

Speaking:

Maclaud Mafaiti

Maclaud Mafaiti

South African Post Office

10:40

Morning Tea & Networking

Morning Tea & Networking

February 21 | 10:40 - 11:10

Early Bird Special: Register Today and Save

Speaking:

11:10

Keynote: Securing your Digital Transformation C-level Problem

  • Digital Transformation, the threat landscape and common threats per region
  • Old cyber-security threats, new threats (IoT, Critical Infrastructure), and problems with IoT security
  • Critical...

Speaking:

Ahmed Nabil

Ahmed Nabil

Chief Information Security Officer, PGESCo Egypt

Keynote: Securing your Digital Transformation C-level Problem

February 21 | 11:10 - 11:40

  • Digital Transformation, the threat landscape and common threats per region
  • Old cyber-security threats, new threats (IoT, Critical Infrastructure), and problems with IoT security
  • Critical infrastructure case studies and what we can expect next
Early Bird Special: Register Today and Save

Speaking:

Ahmed Nabil

Ahmed Nabil

PGESCo Egypt

11:40

Keynote: Protecting Physical Assets

  • Going digital has made us more vulnerable than ever before
  • Device, communication layers, cloud layers and lifecycle management
  • How to automate IoT security tasks
  • What can we expect from IoT security...

Speaking:

Sindisiwe Moloi - Transnet

Sindisiwe Moloi

Chief Information Officer, Transnet SOC

Keynote: Protecting Physical Assets

February 21 | 11:40 - 12:10

  • Going digital has made us more vulnerable than ever before
  • Device, communication layers, cloud layers and lifecycle management
  • How to automate IoT security tasks
  • What can we expect from IoT security in an African context
Early Bird Special: Register Today and Save

Speaking:

Sindisiwe Moloi - Transnet

Sindisiwe Moloi

Transnet SOC

12:10

Panel Discussion: Securing IoT Connected Devices

  • What are some of the challenges to protecting IoT devices and data?
  • Managing the human aspect: identity management layers to protect devices, users and applications
  • Where does IoT security...

Speaking:

Sherisa Rajah - Fasken

Sherisa Rajah

Partner, Fasken

Ahmed Nabil

Ahmed Nabil

Chief Information Security Officer, PGESCo Egypt

Sindisiwe Moloi - Transnet

Sindisiwe Moloi

Chief Information Officer, Transnet SOC

Nadia Veeran-Patel  - Babcock-1

Nadia Veeran-Patel

Information Security Compliance Manager, Leading Support Services Firm

Panel Discussion: Securing IoT Connected Devices

February 21 | 12:10 - 12:50

  • What are some of the challenges to protecting IoT devices and data?
  • Managing the human aspect: identity management layers to protect devices, users and applications
  • Where does IoT security responsibility lie – with manufacturers, users or both?
  • What government guidelines are in place for IoT security – what can we learn from abroad
Early Bird Special: Register Today and Save

Speaking:

Nadia Veeran-Patel  - Babcock-1

Nadia Veeran-Patel

Leading Support Services Firm

Ahmed Nabil

Ahmed Nabil

PGESCo Egypt

Sindisiwe Moloi - Transnet

Sindisiwe Moloi

Transnet SOC

Sherisa Rajah - Fasken

Sherisa Rajah

Fasken

12:50

Lunch & Networking

Lunch & Networking

February 21 | 12:50 - 13:50

Early Bird Special: Register Today and Save

Speaking:

1:50

Stream A1: Discussion Group - Cross-Sector Collaboration

What advantages are there to cross-sector collaboration? Is it imperative to work together? Is there a case for regional, or indeed global collaboration?

Speaking:

Rob Brine - Mastercard

Rob Brine

Director Security and Network , Mastercard

Stream A1: Discussion Group - Cross-Sector Collaboration

February 21 | 13:50 - 14:35

What advantages are there to cross-sector collaboration? Is it imperative to work together? Is there a case for regional, or indeed global collaboration?

Early Bird Special: Register Today and Save

Speaking:

Rob Brine - Mastercard

Rob Brine

Mastercard

1:50

Stream B1: Discussion Group - Blockchain Tech in Security

Data availability, integrity and confidentiality – how Blockchain can eliminate tampering. What are the limitations to using Blockchain. Can Blockchain ease customers’ ‘lack of trust’?

Speaking:

Johan van der Merwe - CSIR

Johan van der Merwe

Principal Information Security & Systems Engineer, CSIR

Stream B1: Discussion Group - Blockchain Tech in Security

February 21 | 13:50 - 14:35

Data availability, integrity and confidentiality – how Blockchain can eliminate tampering. What are the limitations to using Blockchain. Can Blockchain ease customers’ ‘lack of trust’?

Early Bird Special: Register Today and Save

Speaking:

Johan van der Merwe - CSIR

Johan van der Merwe

CSIR

2:35

Stream A1: Discussion Group - How to Become the Next CISO

A career path in IT security has many lanes, including technical, research and strategic competencies. Bridging the gap between IT and the rest of the business has many challenges. Are you up to the...

Speaking:

Thelma Kganakga - RMB

Thelma Kganakga

Chief Information Security Officer, Rand Merchant Bank

Stream A1: Discussion Group - How to Become the Next CISO

February 21 | 14:35 - 15:20

A career path in IT security has many lanes, including technical, research and strategic competencies. Bridging the gap between IT and the rest of the business has many challenges. Are you up to the task?

Early Bird Special: Register Today and Save

Speaking:

Thelma Kganakga - RMB

Thelma Kganakga

Rand Merchant Bank

2:35

Stream B1: Discussion Group - Can Blockchain be Compliant

Can Blockchain meet the obligations of GDPR, PICI and other regulatory standards? What jurisdiction issues are(n’t) there for cross-border transactions? What about IP ownership and data privacy?

Speaking:

Adele Jones - Nedbank

Adele Jones

Lead Architect: Information Security & Blockchain, Nedbank

Stream B1: Discussion Group - Can Blockchain be Compliant

February 21 | 14:35 - 15:20

Can Blockchain meet the obligations of GDPR, PICI and other regulatory standards? What jurisdiction issues are(n’t) there for cross-border transactions? What about IP ownership and data privacy?

Early Bird Special: Register Today and Save

Speaking:

Adele Jones - Nedbank

Adele Jones

Nedbank

3:20

Afternoon Tea & Networking

Afternoon Tea & Networking

February 21 | 15:20 - 15:50

Early Bird Special: Register Today and Save

Speaking:

3:50

Stream A2: Discussion Group - Does Outsourcing IT Security Make Sense

Making security a top priority costs time, money and requires a lot more highly-qualified people. Is there an alternative? What do you think are the pros and cons to outsourcing?

Speaking:

Horatio Huxham - VISA

Horatio Huxham

Founder & CEO, QsecGlobal

Stream A2: Discussion Group - Does Outsourcing IT Security Make Sense

February 21 | 15:50 - 16:35

Making security a top priority costs time, money and requires a lot more highly-qualified people. Is there an alternative? What do you think are the pros and cons to outsourcing?

Early Bird Special: Register Today and Save

Speaking:

Horatio Huxham - VISA

Horatio Huxham

QsecGlobal

3:50

Stream B2: Discussion Group - Cybersecurity into the Workplace

Beyond policies (which are ignored), how do you communicate and encourage employees to be vigilant. Change doesn’t happen overnight, but where can you start with education, motivation and training.

Speaking:

Denisha - DBSA

Dr Denisha Jairam-Owthar

ICT Head: Shared Services, Development Bank of South Africa

Stream B2: Discussion Group - Cybersecurity into the Workplace

February 21 | 15:50 - 16:35

Beyond policies (which are ignored), how do you communicate and encourage employees to be vigilant. Change doesn’t happen overnight, but where can you start with education, motivation and training.

Early Bird Special: Register Today and Save

Speaking:

Denisha - DBSA

Dr Denisha Jairam-Owthar

Development Bank of South Africa

4:35

Close of Conference

Close of Conference

February 21 | 16:35

Early Bird Special: Register Today and Save

Speaking: