<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=306561&amp;fmt=gif">

CISO Africa 2020

18 February | Pre-Conference Focus Day
19 - 20 February | Main Conference Days
Maslow Hotel, Sandton, Johannesburg

Sponsor CISO Africa 2020 Download The Agenda Book Your Seat Today

Presentation Download: How to Prevent Culture Trumping Technology

Information Security Awareness

At CISO Africa 2019, Steve Jump, Head: Corporate Information Security Governance, Telkom, presented: How to Prevent Culture Trumping Technology.

ciso Steve jump

Included in his presentation:

  • The most sophisticated bit of kit won’t save you from human error
  • Security doesn’t have to be boring
  • Educate to eradicate threats

Download the presentation now arrow2

Don’t miss Steve’s keynote presentation on 20 February at CISO 2020:

Cyber Risk Ontology

  • When the board says “cyber risk is one of our most significant concerns”, what do they mean (or think they mean)?
  • The broken-telephone effect: why do cyber risks “lose value” when they cascade up management structures
  • The real risk of not articulating risk; the difficulty in explaining urgency and scale
  • Cyber risk ontology is part of broader information security awareness

Register Now

 

 

Information Security Awareness

At CISO Africa 2019, Steve Jump, Head: Corporate Information Security Governance, Telkom, presented: How to Prevent Culture Trumping Technology.

ciso Steve jump

Included in his presentation:

  • The most sophisticated bit of kit won’t save you from human error
  • Security doesn’t have to be boring
  • Educate to eradicate threats

Download the presentation now arrow2

Don’t miss Steve’s keynote presentation on 20 February at CISO 2020:

Cyber Risk Ontology

  • When the board says “cyber risk is one of our most significant concerns”, what do they mean (or think they mean)?
  • The broken-telephone effect: why do cyber risks “lose value” when they cascade up management structures
  • The real risk of not articulating risk; the difficulty in explaining urgency and scale
  • Cyber risk ontology is part of broader information security awareness

Register Now