<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=306561&amp;fmt=gif">

CISO Africa Cape Town 2019

6 August | Pre-Conference Focus Day
7 - 8 August | Main Conference Days

Download the Agenda Sponsor CISO Africa Cape Town

CISO Africa Cape Town 2019 Agenda

For information on speaking opportunities, please contact ryan.matthews@coriniumgroup.com ; Agenda subject to change.

Pre-Conference Focus Day
6 August 2019
07:30

Registration Opens

Registration Opens

August 6 | 07:30 - 09:00

Speaking:

08:55

Welcome & Opening Remarks

Workshop Leader: Verine Etsebeth, Senior Lecturer: School of Law, WITS University

Verine Etsebeth is a senior lecturer at the Wits School of Law. Verine is an admitted attorney who did her articles in the IT law department of Edward Nathan Sonnenbergs Attorneys. She has a Masters degree in Law (LLM dissertation entitled “The Legal Implications of Information Security Governance”) and Higher Diplomas in Corporate Law, Tax Law and Labour Law, and is currently enrolled for a PhD at WITS. Verine specialises in Information Security and data protection law, and is the co-ordinator of and a lecturer on WITS’ LLM course in Cyber Law and Access to Information and Privacy Law. She has presented papers at numerous national and international conferences and has published articles in a range of local and international publications on the subject matter of IT law.

Speaking:

Verine Etsebeth - WITS

Verine Etsebeth

Senior Lecturer, WITS University

Welcome & Opening Remarks

August 6 | 08:55 - 09:00

Workshop Leader: Verine Etsebeth, Senior Lecturer: School of Law, WITS University

Verine Etsebeth is a senior lecturer at the Wits School of Law. Verine is an admitted attorney who did her articles in the IT law department of Edward Nathan Sonnenbergs Attorneys. She has a Masters degree in Law (LLM dissertation entitled “The Legal Implications of Information Security Governance”) and Higher Diplomas in Corporate Law, Tax Law and Labour Law, and is currently enrolled for a PhD at WITS. Verine specialises in Information Security and data protection law, and is the co-ordinator of and a lecturer on WITS’ LLM course in Cyber Law and Access to Information and Privacy Law. She has presented papers at numerous national and international conferences and has published articles in a range of local and international publications on the subject matter of IT law.

Speaking:

Verine Etsebeth - WITS

Verine Etsebeth

WITS University

09:00

Workshop Topic 1: The Legal Considerations for Cyber & Information Security

Having worked in both the corporate environment and now in academia, Verine will discuss the legal position relating to operating internal and outsourced IT Security and Data Protection/Privacy roles. Outlining the history of data protection, this session will provide the foundation for the following sessions on POPIA, GDPR and US Privacy Shield, allowing you the opportunity to voice where you’re experiencing

Workshop Topic 1: The Legal Considerations for Cyber & Information Security

August 6 | 09:00 - 10:30

Having worked in both the corporate environment and now in academia, Verine will discuss the legal position relating to operating internal and outsourced IT Security and Data Protection/Privacy roles. Outlining the history of data protection, this session will provide the foundation for the following sessions on POPIA, GDPR and US Privacy Shield, allowing you the opportunity to voice where you’re experiencing

Speaking:

10:30

Morning Tea & Networking

Morning Tea & Networking

August 6 | 10:30 - 11:00

Speaking:

11:00

Workshop Topic 2: POPIA – the When and How?

Vagaries of regulator-speak have left most South African businesses confounded as to the implementation of POPIA. Several burning questions will be asked and answered during this session: are you compliant (should you be); when is the POPI commencement date or POPI effective date for the rest; what is the relationship to GDPR – surely the one covers the other, right? Drawing on several case studies, the session will also detail the Information Regulator’s final POPI Regulations, implementation strategies, and making use of an easy to interpret framework that the rest of the business can understand.

Workshop Topic 2: POPIA – the When and How?

August 6 | 11:00 - 12:30

Vagaries of regulator-speak have left most South African businesses confounded as to the implementation of POPIA. Several burning questions will be asked and answered during this session: are you compliant (should you be); when is the POPI commencement date or POPI effective date for the rest; what is the relationship to GDPR – surely the one covers the other, right? Drawing on several case studies, the session will also detail the Information Regulator’s final POPI Regulations, implementation strategies, and making use of an easy to interpret framework that the rest of the business can understand.

Speaking:

12:30

Lunch & Networking

Lunch & Networking

August 6 | 12:30 - 13:30

Speaking:

1:30

Workshop Topic 3: Lifting the Veil of GDPR

Since coming into effect, GDPR has brought up several misunderstandings and contradictions, particularly from a South African and indeed continent-wide perspective. This session will further go into detail on key GDPR definitions and principles; consent, contracting and legal obligations; individuals’ rights; the impact of data protection on business; GDPR in international, indeed African, context; data breaches and possible exemptions.

Workshop Topic 3: Lifting the Veil of GDPR

August 6 | 13:30 - 15:00

Since coming into effect, GDPR has brought up several misunderstandings and contradictions, particularly from a South African and indeed continent-wide perspective. This session will further go into detail on key GDPR definitions and principles; consent, contracting and legal obligations; individuals’ rights; the impact of data protection on business; GDPR in international, indeed African, context; data breaches and possible exemptions.

Speaking:

3:00

Afternoon Tea & Networking

Afternoon Tea & Networking

August 6 | 15:00 - 15:30

Speaking:

3:30

Workshop Topic 4: US Privacy Shield in Context

We’ve covered local regulation, GDPR, and now US data privacy frameworks. Again drawing on case material, how does the US Privacy Shield influence GDPR, what are its different components, is this a play to assert global data control, and what are the criticisms of the system? This session will also provide a summary of the previous sessions in context.

Workshop Topic 4: US Privacy Shield in Context

August 6 | 15:30 - 17:00

We’ve covered local regulation, GDPR, and now US data privacy frameworks. Again drawing on case material, how does the US Privacy Shield influence GDPR, what are its different components, is this a play to assert global data control, and what are the criticisms of the system? This session will also provide a summary of the previous sessions in context.

Speaking:

5:00

Close of Focus Day

Close of Focus Day

August 6 | 17:00

Speaking:

Main Conference Day 1
7 August 2019
07:30

Main Conference Registration Opens

Main Conference Registration Opens

August 7 | 07:30 - 09:00

Speaking:

09:00

Welcome & Opening Remarks

Welcome & Opening Remarks

August 7 | 09:00 - 09:15

Speaking:

09:15

Keynote: Reserved for Lead Partner

Want to showcase your products and services to an elite audience? Contact michelle.meldau@coriniumgroup.com for more detials.

Keynote: Reserved for Lead Partner

August 7 | 09:15 - 9:45

Want to showcase your products and services to an elite audience? Contact michelle.meldau@coriniumgroup.com for more detials.

Speaking:

09:45

Keynote: Why IT Security Needs to be Prioritised at Board Level

  • Why understanding threats and vulnerabilities is critical to modern leadership
  • Cyber-crime is local – why phishing and hacks are closer to home
  • Where should South African and African companies be prioritising IT Security – is it one size fits all?
  • Why we should collaborate more, across industries and jurisdictions

Speaking:

Julian Ramiah - Liberty

Julian Ramiah

Group Chief Information Security Officer, Liberty Holdings

Keynote: Why IT Security Needs to be Prioritised at Board Level

August 7 | 09:45 - 10:15

  • Why understanding threats and vulnerabilities is critical to modern leadership
  • Cyber-crime is local – why phishing and hacks are closer to home
  • Where should South African and African companies be prioritising IT Security – is it one size fits all?
  • Why we should collaborate more, across industries and jurisdictions

Speaking:

Julian Ramiah - Liberty

Julian Ramiah

Liberty Holdings

10:15

Keynote: Risk Based Due Diligence Challenges & Solutions

  • What are the crucial steps when considering IT risk based due diligence
  • Identifying third parties (and types) and implementing proper risk mitigation
  • What are the greatest third party risk we face
  • Is business and IT working together effectively to sole compliance issues?

Speaking:

Martins Ogbolu - Vodacom

Martins Ogbolu

Group Executive Head Anti-Corruption Risk Compliance, Vodacom

Keynote: Risk Based Due Diligence Challenges & Solutions

August 7 | 10:15 - 10:45

  • What are the crucial steps when considering IT risk based due diligence
  • Identifying third parties (and types) and implementing proper risk mitigation
  • What are the greatest third party risk we face
  • Is business and IT working together effectively to sole compliance issues?

Speaking:

Martins Ogbolu - Vodacom

Martins Ogbolu

Vodacom

10:45

International Keynote: IT Risk & Compliance Environment for East African Financial Services

  • Overview of the regulatory environment in Tanzania and East Africa
  • What are the risks to non-compliance
  • Technical and talent problems and pitfalls – where are the opportunities to make improvements, and how?
  • Seeking domestic and internal collaboration to improve the status quo

Speaking:

Lusekelo Thompson - NBC Tanzania

Lusekelo Thompson

Head of IT Risk & Compliance, NBC Bank (Tanzania)

International Keynote: IT Risk & Compliance Environment for East African Financial Services

August 7 | 10:45 - 11:15

  • Overview of the regulatory environment in Tanzania and East Africa
  • What are the risks to non-compliance
  • Technical and talent problems and pitfalls – where are the opportunities to make improvements, and how?
  • Seeking domestic and internal collaboration to improve the status quo

Speaking:

Lusekelo Thompson - NBC Tanzania

Lusekelo Thompson

NBC Bank (Tanzania)

11:15

Morning Tea & Networking

Morning Tea & Networking

August 7 | 11:15 - 11:45

Speaking:

11:45

Keynote: Reserved for Associate Partner

Want to showcase your products and services to an elite audience? Contact michelle.meldau@coriniumgroup.com for more detials.

Keynote: Reserved for Associate Partner

August 7 | 11:45 - 12:15

Want to showcase your products and services to an elite audience? Contact michelle.meldau@coriniumgroup.com for more detials.

Speaking:

12:15

Keynote: Information Security & Data Governance in the Medical Sector

  • Protecting clients most sensitive data and the need to comply with international legislation
  • Driving organisational change to improve governance, and readily available information
  • What would the consequences be of a data breach within the group
  • Safeguarding compliance across multiple territories

Speaking:

Nhlanhla Xaba - Mediclinic

Nhlanhla Xaba

IT GRC & Security Director, Mediclinic

Keynote: Information Security & Data Governance in the Medical Sector

August 7 | 12:15 - 12:45

  • Protecting clients most sensitive data and the need to comply with international legislation
  • Driving organisational change to improve governance, and readily available information
  • What would the consequences be of a data breach within the group
  • Safeguarding compliance across multiple territories

Speaking:

Nhlanhla Xaba - Mediclinic

Nhlanhla Xaba

Mediclinic

12:45

Keynote: Protecting your Customers Money, Data & Time

  • How do you build an effective and proactive strategy in the complex world of cyber risk?
  • Are your security investments fixing the right problems?
  • Learning from building a strategy across 18 different territories.

Speaking:

Robin Barnwell - Standard Bank

Robin Barnwell

Head: Security Strategy Enablement, Standard Bank

Keynote: Protecting your Customers Money, Data & Time

August 7 | 12:45 - 13:15

  • How do you build an effective and proactive strategy in the complex world of cyber risk?
  • Are your security investments fixing the right problems?
  • Learning from building a strategy across 18 different territories.

Speaking:

Robin Barnwell - Standard Bank

Robin Barnwell

Standard Bank

1:15

Lunch & Networking

Lunch & Networking

August 7 | 13:15 - 14:15

Speaking:

2:15

Stream A1: Topic TBC

Stream Sponsored by ITR Technology. Topic and speaker details to follow shortly.

Stream A1: Topic TBC

August 7 | 14:15 - 14:45

Stream Sponsored by ITR Technology. Topic and speaker details to follow shortly.

Speaking:

2:15

Stream B1: Topic TBC

Stream Sponsored by Cerebus Forensics

Stream B1: Topic TBC

August 7 | 14:15 - 14:45

Stream Sponsored by Cerebus Forensics

Speaking:

2:45

Stream A1: Discussion Group: Can you Prioritise Business Strategy Over Operational Security?

The relationship between business and operations is not always harmonious. How does one prioritise the availability of assets to the confidentiality of data? Discussions will focus on corporate culture, access control case studies and high-level learning education programmes.

Speaking:

Darryl Potgieter - SAPPI

Darryl Potgieter

Head of Architecture & Security, Sappi

Stream A1: Discussion Group: Can you Prioritise Business Strategy Over Operational Security?

August 7 | 14:45 - 15:25

The relationship between business and operations is not always harmonious. How does one prioritise the availability of assets to the confidentiality of data? Discussions will focus on corporate culture, access control case studies and high-level learning education programmes.

Speaking:

Darryl Potgieter - SAPPI

Darryl Potgieter

Sappi

2:45

Stream B1: Topic TBC

Stream Sponsored by Cerebus Forensics

Stream B1: Topic TBC

August 7 | 14:45 - 15:25

Stream Sponsored by Cerebus Forensics

Speaking:

3:25

Afternoon Tea & Networking

Afternoon Tea & Networking

August 7 | 15:25 - 15:55

Speaking:

3:55

Stream A2: Discussion Group: Cyber Risk Culture & Psychology

In light of increased scrutiny on data protection, security and access, how do you engage with multi-national, multi-cultural, geographically diverse offices?

Speaking:

Siegfried Moyo - FMCG

Siegfried Moyo

Regional Head of Cyber Security - EMEA, A Leading FMCG Company

Stream A2: Discussion Group: Cyber Risk Culture & Psychology

August 7 | 15:55 - 16:35

In light of increased scrutiny on data protection, security and access, how do you engage with multi-national, multi-cultural, geographically diverse offices?

Speaking:

Siegfried Moyo - FMCG

Siegfried Moyo

A Leading FMCG Company

3:55

Stream B2: Discussion Group: GRC & Corporate Culture

The way in which we do business is changing rapidly. Are internal audit and GRC teams keeping up with these emerging trends (digital transformation)? How can you make compliance ‘attractive’ to the rest of the business? Do you agree that organizational governance needs to be integrated into company culture – how so?

Speaking:

Percy Ramokone - SARB

Percy Ramokone

Head: GRC, Reporting & Strategy Management, South African Reserve Bank

Stream B2: Discussion Group: GRC & Corporate Culture

August 7 | 15:55 - 16:35

The way in which we do business is changing rapidly. Are internal audit and GRC teams keeping up with these emerging trends (digital transformation)? How can you make compliance ‘attractive’ to the rest of the business? Do you agree that organizational governance needs to be integrated into company culture – how so?

Speaking:

Percy Ramokone - SARB

Percy Ramokone

South African Reserve Bank

4:35

Stream A2: Discussion Group: Does Outsourcing IT Security Make Sense

Making security a top priority costs time, money and requires a lot more highly-qualified people. Is there an alternative? What do you think are the pros and cons to outsourcing?

Speaking:

Alex Bowdler - Aspen Pharmacare

Alex Bowdler

IT Operations & Security Manager, Aspen Pharmacare

Stream A2: Discussion Group: Does Outsourcing IT Security Make Sense

August 7 | 16:35 - 17:15

Making security a top priority costs time, money and requires a lot more highly-qualified people. Is there an alternative? What do you think are the pros and cons to outsourcing?

Speaking:

Alex Bowdler - Aspen Pharmacare

Alex Bowdler

Aspen Pharmacare

4:35

Stream B2: Discussion Group: Cloud-Ready Data Governance & GRC

More businesses are looking at a cloud or a hybrid approach to managing data. This session will look at some of the data risks associated with the cloud, how is data sovereignty impacted, and what is the role of third party providers.

Speaking:

Ken Chikwanha - Standard Bank

Ken Chikwanha

Executive Head of Data Governance: Personal & Business Banking, Standard Bank

Stream B2: Discussion Group: Cloud-Ready Data Governance & GRC

August 7 | 16:35 - 17:15

More businesses are looking at a cloud or a hybrid approach to managing data. This session will look at some of the data risks associated with the cloud, how is data sovereignty impacted, and what is the role of third party providers.

Speaking:

Ken Chikwanha - Standard Bank

Ken Chikwanha

Standard Bank

5:15

Cocktail Function & Networking

Join us for well-earned libations at the end of a busy first day.

Cocktail Function & Networking

August 7 | 17:15 - 18:30

Join us for well-earned libations at the end of a busy first day.

Speaking:

Main Conference Day 2
8 August 2019
07:30

Registration Opens

Registration Opens

August 8 | 07:30 - 09:00

Speaking:

09:00

Welcome & Opening Remarks

Welcome & Opening Remarks

August 8 | 09:00 - 09:15

Speaking:

09:15

Keynote: Why Machines Need Humans – Culture is Not Measured in Terabytes

  • Continuous education can become tedious, but what can tech do to make it “fun”
  • The most sophisticated bit of kit won’t save you from human error, but AI might make it worse
  • All of us are on the cloud, why not the business too?
  • Multiple access points can lead to disaster, but can you use a carrot and stick method to avoid catastrophe?

Speaking:

Steve Jump - Telkom

Steve Jump

Head: Corporate Information Security Governance, Telkom

Keynote: Why Machines Need Humans – Culture is Not Measured in Terabytes

August 8 | 09:15 - 09:45

  • Continuous education can become tedious, but what can tech do to make it “fun”
  • The most sophisticated bit of kit won’t save you from human error, but AI might make it worse
  • All of us are on the cloud, why not the business too?
  • Multiple access points can lead to disaster, but can you use a carrot and stick method to avoid catastrophe?

Speaking:

Steve Jump - Telkom

Steve Jump

Telkom

09:45

Keynote: Cloud Security Strategy: A View from the Trench Lines

Cloud has been around for over a decade, and in the last few years, there has been an acceleration to adopt cloud given the value proposition offered. How do we as security leaders, enable cloud adoption within our respective organisations to ensure that we can support the digital transformation and not become a barrier to business strategy execution?

Speaking:

Suren Naidoo - TFG

Suren Naidoo

Head of Enterprise Architecture, Information Security & GRC, The Foschini Group

Keynote: Cloud Security Strategy: A View from the Trench Lines

August 8 | 09:45 - 10:15

Cloud has been around for over a decade, and in the last few years, there has been an acceleration to adopt cloud given the value proposition offered. How do we as security leaders, enable cloud adoption within our respective organisations to ensure that we can support the digital transformation and not become a barrier to business strategy execution?

Speaking:

Suren Naidoo - TFG

Suren Naidoo

The Foschini Group

10:15

Keynote: Determining Corruption Risks

What is the current state of Anti-Corruption laws in South Africa, Africa and the rest of the world? How does corruption risk fit into the governance framework and enterprise risk management?

Speaking:

Prasantha Maistry - Discovery

Prasantha Maistry

Head of Financial Crime Compliance, Discovery Bank

Keynote: Determining Corruption Risks

August 8 | 10:15 - 10:45

What is the current state of Anti-Corruption laws in South Africa, Africa and the rest of the world? How does corruption risk fit into the governance framework and enterprise risk management?

Speaking:

Prasantha Maistry - Discovery

Prasantha Maistry

Discovery Bank

10:45

Morning Tea & Networking

Morning Tea & Networking

August 8 | 10:45 - 11:15

Speaking:

11:15

Keynote: Data Privacy in the Digital Age

  • Does compliance equal security
  • Don’t be overwhelmed – what are the basics around privacy
  • Finding new meaning: Cloud, digitalization & privacy
  • Taking a new approach to privacy that is not overtly defensive

Speaking:

Zaheera Ahmed - absa logo

Zaheera Ahmed

Group Head of Privacy, absa

Keynote: Data Privacy in the Digital Age

August 8 | 11:15 - 11:45

  • Does compliance equal security
  • Don’t be overwhelmed – what are the basics around privacy
  • Finding new meaning: Cloud, digitalization & privacy
  • Taking a new approach to privacy that is not overtly defensive

Speaking:

Zaheera Ahmed - absa logo

Zaheera Ahmed

absa

11:45

Keynote: IT Security & Data Risks within National Government

  • The government’s approach to IT security and security education across departments
  • Data governance, risks and the delicacy of dealing with sensitive information
  • Key differences between outcomes of corporate vs government IT security
  • Reputational damage vs national security risk

Speaking:

Rapule Kgalaki - SA Government

Rapule Kgalaki

Deputy Director: Specialised Audit, DIRCO

Keynote: IT Security & Data Risks within National Government

August 8 | 11:45 - 12:15

  • The government’s approach to IT security and security education across departments
  • Data governance, risks and the delicacy of dealing with sensitive information
  • Key differences between outcomes of corporate vs government IT security
  • Reputational damage vs national security risk

Speaking:

Rapule Kgalaki - SA Government

Rapule Kgalaki

DIRCO

12:15

Keynote: The Influence of National Culture on Information Security Culture

  • The dimensions of information security awareness: organisational, public, socio-political, ethical and institutionally educational
  • National culture has an impact on organisational culture which has an impact on information security culture; but how can this be managed in a multi-cultural, multi-national organisation?
  • What other factors could be at play: generational, economic and over human dynamics

Speaking:

Sunthoshan Govender - AB InBev

Sunthoshan Govender

Enterprise Architect: IT Security & Compliance, AB InBev

Keynote: The Influence of National Culture on Information Security Culture

August 8 | 12:15 - 12:45

  • The dimensions of information security awareness: organisational, public, socio-political, ethical and institutionally educational
  • National culture has an impact on organisational culture which has an impact on information security culture; but how can this be managed in a multi-cultural, multi-national organisation?
  • What other factors could be at play: generational, economic and over human dynamics

Speaking:

Sunthoshan Govender - AB InBev

Sunthoshan Govender

AB InBev

12:45

Lunch & Netwokring

Lunch & Netwokring

August 8 | 12:45 - 13:45

Speaking:

1:45

Stream A1: Discussion Group: DevSecOps – An Introduction

The purpose of DevSecOps is to create the mindset that everyone is responsible for security, embedding security into the early DevOps workflow. Are your security and dev teams working together?

Speaking:

Tania Paulse - Sanlam (new)

Tania Paulse

Group Enterprise Architect, Sanlam

Stream A1: Discussion Group: DevSecOps – An Introduction

August 8 | 13:45 - 14:25

The purpose of DevSecOps is to create the mindset that everyone is responsible for security, embedding security into the early DevOps workflow. Are your security and dev teams working together?

Speaking:

Tania Paulse - Sanlam (new)

Tania Paulse

Sanlam

2:15

Stream B1: Discussion Group: Integrating AI into IT Security

This discussion will first look into what the current status of AI, what is reality and what is moonshot thinking. How are the bad guys using bots, and how to hunt them? Are there any data risks to deception tactics? Will AI better orchestrate human intervention, or will machines do more than the grunt work?

Speaking:

Asterico Adams - Direct Axis

Asterico Adams

Head of Information Security, DirectAxis

Stream B1: Discussion Group: Integrating AI into IT Security

August 8 | 14:15 - 14:25

This discussion will first look into what the current status of AI, what is reality and what is moonshot thinking. How are the bad guys using bots, and how to hunt them? Are there any data risks to deception tactics? Will AI better orchestrate human intervention, or will machines do more than the grunt work?

Speaking:

Asterico Adams - Direct Axis

Asterico Adams

DirectAxis

2:25

Stream A1: Discussion Group: Taking DevSecOps to the Next Level

Are you putting your users, or even customers, at the heart of your DevSecOps agenda? What if you’re still working in partitioned silos – can design thinking still apply to security?

Speaking:

Quintin Laljit - Old Mutual

Quintin Laljit

Programme Manager: IT Security Design Thinking, A Leading Financial Services Firm

Stream A1: Discussion Group: Taking DevSecOps to the Next Level

August 8 | 14:25 - 15:05

Are you putting your users, or even customers, at the heart of your DevSecOps agenda? What if you’re still working in partitioned silos – can design thinking still apply to security?

Speaking:

Quintin Laljit - Old Mutual

Quintin Laljit

A Leading Financial Services Firm

2:25

Stream B1: Discussion Group: Cloud vs On-Premise vs Hybrid

Cloud has its benefits, on-premise storage has its own advantages (perhaps more psychological), but what is the best solution for your business to protect data and sensitive information. Does your ideal scenario not match your corporate status quo?

Speaking:

Lonette Genis - Nacelle

Lonette Genis

Data Protection & Information Officer, Nacelle

Stream B1: Discussion Group: Cloud vs On-Premise vs Hybrid

August 8 | 14:25 - 15:05

Cloud has its benefits, on-premise storage has its own advantages (perhaps more psychological), but what is the best solution for your business to protect data and sensitive information. Does your ideal scenario not match your corporate status quo?

Speaking:

Lonette Genis - Nacelle

Lonette Genis

Nacelle

3:05

Afternoon Tea & Networking

Afternoon Tea & Networking

August 8 | 15:05 - 15:35

Speaking:

3:35

Stream A2: Discussion Group: Sharing the Burden of Governance, Risk & Compliance

This discussion will look in the roles and responsibilities of all those in the value-chain, including those who straddle the business, risk/compliance and IT security mantle. Is there a one-size-fits-all strategy here?

Speaking:

Karin Kleynhans - Capitec

Karin Kleynhans

Manager: Risk & Compliance Systems, Capitec

Stream A2: Discussion Group: Sharing the Burden of Governance, Risk & Compliance

August 8 | 15:35 - 16:15

This discussion will look in the roles and responsibilities of all those in the value-chain, including those who straddle the business, risk/compliance and IT security mantle. Is there a one-size-fits-all strategy here?

Speaking:

Karin Kleynhans - Capitec

Karin Kleynhans

Capitec

3:35

Stream B2: Discussion Group: Are you Aware you are Under Attack?

This discussion will look at the relationship between tech, talent, awareness and wearing a target on your back. Cities, local government and other state entities are seen as soft targets or a rite of passage for young hackers; often under prepared and under resourced to respond. What solutions could mitigate this increasing problem?

Speaking:

Silas Mhembere - City of Cape Town

Silas Mhembere

IT Security Consultant, City of Cape Town

Stream B2: Discussion Group: Are you Aware you are Under Attack?

August 8 | 15:35 - 16:15

This discussion will look at the relationship between tech, talent, awareness and wearing a target on your back. Cities, local government and other state entities are seen as soft targets or a rite of passage for young hackers; often under prepared and under resourced to respond. What solutions could mitigate this increasing problem?

Speaking:

Silas Mhembere - City of Cape Town

Silas Mhembere

City of Cape Town

4:15

Close of Conference

Close of Conference

August 8 | 16:15

Speaking: