<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=306561&amp;fmt=gif">

WHY CISO AFRICA: LIVE?

team

400+ Live Attendees

Meet Senior Security Decision Makers From Across The Africa region

speaker

20 + Speakers

Learn From Those At The Forefront Of ICT Security

meeting (2)

10+ Exhibitors

Explore Our Virtual Exhibition And Find Solutions To Your Challenges

play-button

On-Demand Sessions

Can't Make The Whole Event? Get Some Sessions On-Demand

Day 1 22 September 2020
09:20

Opening Remarks & Welcome

Speaking:

Ross G Saunders

Speaker // Consultant // AdvisorCIPP/E, MSc, C|EH (v10), Ross G Saunders

Opening Remarks & Welcome

September 22 | 09:20 - 09:30

REGISTER YOUR FREE TICKET

Speaking:

Ross G Saunders

Ross G Saunders

09:30

Lead Partner Palo Alto SOC of the Future: Remote, Automated, and a Frankenstein No More!

Presentation Synopsis: As we adapt to COVID, cyberattacks have not abated. The threat landscape and insidious bad actors are looking to leverage chaotic situations in hopes of catching us with our defenses scattered or adrift. Many businesses and governments must continue vital activities. They play a central role in the recovery process or simply provide services that keep the economy moving. With employees working at home, securing the remote workforce has moved front and center. That means you have to keep your cybersecurity brain center—your Security Operations Center (SOC)—up and running. The SOC must continue to identify and remediate threats, constantly and in real-time. This requires a new mindset. It means rethinking how SOCs are operated from this point forward. This keynote looks at how we can avoid following the Frankenstein approach of building our SOC, and the key principles for a successful transition as businesses rely on remote operations while reducing cyber risk.

  • COVID 19 has seen an increase of cyberattacks, specifically targeting Work-from-Home employees. 
  • The SOC must evolve by adapting, empowering, and protecting the business in real-time.
  • Traditional SOCs must pave the way for integrated, automated, and cost-effective cyber fusion centers.

Speaking:

Haider Pasha

Sr. Director and Chief Security Officer for Northern Europe, Middle East, Africa, Palo Alto Networks

Lead Partner Palo Alto SOC of the Future: Remote, Automated, and a Frankenstein No More!

September 22 | 09:30 - 10:00

Presentation Synopsis: As we adapt to COVID, cyberattacks have not abated. The threat landscape and insidious bad actors are looking to leverage chaotic situations in hopes of catching us with our defenses scattered or adrift. Many businesses and governments must continue vital activities. They play a central role in the recovery process or simply provide services that keep the economy moving. With employees working at home, securing the remote workforce has moved front and center. That means you have to keep your cybersecurity brain center—your Security Operations Center (SOC)—up and running. The SOC must continue to identify and remediate threats, constantly and in real-time. This requires a new mindset. It means rethinking how SOCs are operated from this point forward. This keynote looks at how we can avoid following the Frankenstein approach of building our SOC, and the key principles for a successful transition as businesses rely on remote operations while reducing cyber risk.

  • COVID 19 has seen an increase of cyberattacks, specifically targeting Work-from-Home employees. 
  • The SOC must evolve by adapting, empowering, and protecting the business in real-time.
  • Traditional SOCs must pave the way for integrated, automated, and cost-effective cyber fusion centers.
REGISTER YOUR FREE TICKET

Speaking:

Haider Pasha

Palo Alto Networks

10:05

Platinum Partner 1 Mimecast Why do we still see email security as only a perimeter problem?

  • The threat landscape is constantly evolving
  • Email remains the number one attack vector as most cyber-attacks start with email
  • Most organisations are far along their digital transformation and cloud journeys but many have not realigned their email security posture beyond a perimeter defence approach
  • Email remains a key business application and critical means of client communications
  • Insider threats and account compromise have increased inside our perimeters especially in cloud based implementations
  • Brand exploitation beyond the traditional perimeter is growing unchecked

Speaking:

Brian Pinnock

Director of Sales Engineering, Mimecast

Platinum Partner 1 Mimecast Why do we still see email security as only a perimeter problem?

September 22 | 10:05 - 10:35

  • The threat landscape is constantly evolving
  • Email remains the number one attack vector as most cyber-attacks start with email
  • Most organisations are far along their digital transformation and cloud journeys but many have not realigned their email security posture beyond a perimeter defence approach
  • Email remains a key business application and critical means of client communications
  • Insider threats and account compromise have increased inside our perimeters especially in cloud based implementations
  • Brand exploitation beyond the traditional perimeter is growing unchecked
REGISTER YOUR FREE TICKET

Speaking:

Brian Pinnock

Mimecast

10:40

Keynote: Cyber Security & Privacy | The New Normal

  • A readjusted plan to deal Cyber Security & Privacy
  • Innovation during a Crisis
  • Being Agile, Shifting & Elevating the Plans

Speaking:

Julian Ramiah

Group CISO, Alexander Forbes

Keynote: Cyber Security & Privacy | The New Normal

September 22 | 10:40 - 11:10

  • A readjusted plan to deal Cyber Security & Privacy
  • Innovation during a Crisis
  • Being Agile, Shifting & Elevating the Plans
REGISTER YOUR FREE TICKET

Speaking:

Julian Ramiah

Alexander Forbes

11:15

Platinum Partner 2 Fortinet The Cloud journey is Not a One-way Ticket

2021 is bringing amazing innovations. Robots beat humans at table tennis, more because they learn our weaknesses than because they play fast. 5G is around the corner ready to make mobile broadband the theatre of all transformations. And the threat becomes silent, making even more devastating damages. Now, how is the Cloud doing in this picture? Fortinet asked the question to 350 companies around the globe and the results have brought amazing findings.

Speaking:

Alain Sanchez

EMEA CISO and Senior Evangelist, Fortinet

Platinum Partner 2 Fortinet The Cloud journey is Not a One-way Ticket

September 22 | 11:15 - 11:40

2021 is bringing amazing innovations. Robots beat humans at table tennis, more because they learn our weaknesses than because they play fast. 5G is around the corner ready to make mobile broadband the theatre of all transformations. And the threat becomes silent, making even more devastating damages. Now, how is the Cloud doing in this picture? Fortinet asked the question to 350 companies around the globe and the results have brought amazing findings.

REGISTER YOUR FREE TICKET

Speaking:

Alain Sanchez

Fortinet

11:45

International Keynote: IAM in Combination With GDPR - What Has Changed Since The GDPR For Identity and Access Management

  • What Identities do we see most (at the moment)
  • How to verify an identity within the boundaries of the GDPR
    • Short example with Dutch Identity Tooling 
  • Why is IAM Tooling used in protection of the of privacy  
  • Why is Authorization management so important?
    • Past
    • Present
    • Issues to tackle (e.g. what if you have multiple company attributes with different authorizations)  

Speaking:

International Keynote: IAM in Combination With GDPR - What Has Changed Since The GDPR For Identity and Access Management

September 22 | 11:45 - 12:15

  • What Identities do we see most (at the moment)
  • How to verify an identity within the boundaries of the GDPR
    • Short example with Dutch Identity Tooling 
  • Why is IAM Tooling used in protection of the of privacy  
  • Why is Authorization management so important?
    • Past
    • Present
    • Issues to tackle (e.g. what if you have multiple company attributes with different authorizations)  
REGISTER YOUR FREE TICKET

Speaking:

Jurriaan Raaijmakers

12:20

Virtual Lunch Break

Virtual Lunch Break

September 22 | 12:20 - 13:00

REGISTER YOUR FREE TICKET

Speaking:

1:05

Gold Partner 1 Okta Identity Centric Security and What it Means for Your IT & HR Department

Identity Centric Security and What it Means for Your IT & HR Department 

Today, there is more data to protect in more places, including cloud, mobile, applications and physical hardware. With the traditional perimeter dissolving, identity is the new approach to redefining security. Join this talk to learn how modern Identity & Access Management (IAM) solutions allow users quick and easy access that is simple for admins to manage, whilst keeping hackers at bay.

Speaking:

Max Faun

Head of EMEA Consulting, Okta

Gold Partner 1 Okta Identity Centric Security and What it Means for Your IT & HR Department

September 22 | 13:05 - 13:35

Identity Centric Security and What it Means for Your IT & HR Department 

Today, there is more data to protect in more places, including cloud, mobile, applications and physical hardware. With the traditional perimeter dissolving, identity is the new approach to redefining security. Join this talk to learn how modern Identity & Access Management (IAM) solutions allow users quick and easy access that is simple for admins to manage, whilst keeping hackers at bay.

REGISTER YOUR FREE TICKET

Speaking:

Max Faun

Okta

1:40

Panel Discussion: What Does The Security World Look Like Post COVID – 19?

This panel discussion will look at the impact of Covid 19 on cybersecurity and what the implications will be. What is the new norm for the cyber security space? What measures can be taken to minimize risk?

Speaking:

Simphiwe Makhoba - Exxaro II

Simphiwe Makhoba

Cloud Architect Lead, Exxaro Resources

Panel Discussion: What Does The Security World Look Like Post COVID – 19?

September 22 | 13:40 - 14:10

This panel discussion will look at the impact of Covid 19 on cybersecurity and what the implications will be. What is the new norm for the cyber security space? What measures can be taken to minimize risk?

REGISTER YOUR FREE TICKET

Speaking:

Simphiwe Makhoba - Exxaro II

Simphiwe Makhoba

Exxaro Resources

2:15

Virtual Coffee Break

Virtual Coffee Break

September 22 | 14:15 - 14:40

REGISTER YOUR FREE TICKET

Speaking:

Stream A Data Risk and Security

2:45

Gold Partner Presentation 2 Dreamlab Technologies Nearly 50 Years of Email, a Legacy Service With Legacy Problems

  • The significance of email in organizations today
  • Old weaknesses & new attacks
  • Existing solutions and where they fall short
  • An analysis of enterprise email providers
    Recommendations

Speaking:

Abdullah Maskari

Security Consultant, Dreamlab Technologies

Gold Partner Presentation 2 Dreamlab Technologies Nearly 50 Years of Email, a Legacy Service With Legacy Problems

September 22 | 14:45 - 15:35

  • The significance of email in organizations today
  • Old weaknesses & new attacks
  • Existing solutions and where they fall short
  • An analysis of enterprise email providers
    Recommendations
REGISTER YOUR FREE TICKET

Speaking:

Abdullah Maskari

Dreamlab Technologies

Stream B Government and Public Sector

3:05

Gold Partner Presentation 3 – BCX Cyber Resilience – How ready is your organisation?

  • Who is required from the organisation when a cyber incident occurs?
  • Why organisational resilience is key to an effective recovery.
  • The importance of educating end users and incident responders.
  • Be prepared.

Speaking:

Bavani Chetty

IT and Information Security Manager, BCX

Gold Partner Presentation 3 – BCX Cyber Resilience – How ready is your organisation?

September 22 | 15:05 - 15:35

  • Who is required from the organisation when a cyber incident occurs?
  • Why organisational resilience is key to an effective recovery.
  • The importance of educating end users and incident responders.
  • Be prepared.
REGISTER YOUR FREE TICKET

Speaking:

Bavani Chetty

BCX

Stream A Data Risk and Security

3:40

Data Privacy Risk and the Impact on Business

  • Confidentiality risk and Security
  • Ethical processing and reputational risk
  • Trust and competition
  • Legal risks
    • Contractual obligations
    • Claims for loss/damage
    • Compliance and penalties for non-compliance with applicable laws
    • Market conduct requirements e.g. Treating Customers Fairly

Speaking:

Isabella Hofmeyr-Pretorius

Legal Advisor: Risk Management , Capitec Bank

Data Privacy Risk and the Impact on Business

September 22 | 15:40 - 16:10

  • Confidentiality risk and Security
  • Ethical processing and reputational risk
  • Trust and competition
  • Legal risks
    • Contractual obligations
    • Claims for loss/damage
    • Compliance and penalties for non-compliance with applicable laws
    • Market conduct requirements e.g. Treating Customers Fairly
REGISTER YOUR FREE TICKET

Speaking:

Isabella Hofmeyr-Pretorius

Capitec Bank

Stream B Government and Public Sector

3:40

Interweaving Security Awareness into Working Culture - Where to start? Top-down, bottom-up or both?

  • IAM vs Zero Trust vs Education
  • The perimeter is shrinking; how to bring awareness to an increasingly mobile workforce
  • How do you measure the success of security awareness programmes?
  • Managing anomalies and identifying baseline metrics

Speaking:

Khensani Khoza

Chief Information Officer, AgriSETA (Agricultural Sector Education and Training Authority)

Interweaving Security Awareness into Working Culture - Where to start? Top-down, bottom-up or both?

September 22 | 15:40 - 16:10

  • IAM vs Zero Trust vs Education
  • The perimeter is shrinking; how to bring awareness to an increasingly mobile workforce
  • How do you measure the success of security awareness programmes?
  • Managing anomalies and identifying baseline metrics
REGISTER YOUR FREE TICKET

Speaking:

Khensani Khoza

AgriSETA (Agricultural Sector Education and Training Authority)

Stream B Government and Public Sector

4:10

IT Security Leadership In A Digital World

  • Is IT security receiving the necessary attention it deserves at government level?
  • What lessons can be learned from the private sector?
  • How to motivate sufficient budget allocation – what can be done at low cost
  • How to motivate and make the most of the talent available in IT department

Speaking:

Tumelo Zwane

Chief Information Officer, Special Investigation Unit

IT Security Leadership In A Digital World

September 22 | 16:10 - 16:40

  • Is IT security receiving the necessary attention it deserves at government level?
  • What lessons can be learned from the private sector?
  • How to motivate sufficient budget allocation – what can be done at low cost
  • How to motivate and make the most of the talent available in IT department
REGISTER YOUR FREE TICKET

Speaking:

Tumelo Zwane

Special Investigation Unit

Stream A Data Risk and Security

4:15

Case Study: absa You're the IO - Now what?

  • The role of the information officer
  • Navigating the "mindfield"
  • Keeping the lines of communication open

Speaking:

Zaheera Ahmed - absa logo

Zaheera Ahmed

Group Head of Privacy, absa

Case Study: absa You're the IO - Now what?

September 22 | 16:15 - 16:40

  • The role of the information officer
  • Navigating the "mindfield"
  • Keeping the lines of communication open
REGISTER YOUR FREE TICKET

Speaking:

Zaheera Ahmed - absa logo

Zaheera Ahmed

absa

4:40

Day 1 Close –Out

Speaking:

Ross G Saunders

Speaker // Consultant // AdvisorCIPP/E, MSc, C|EH (v10), Ross G Saunders

Day 1 Close –Out

September 22 | 16:40

REGISTER YOUR FREE TICKET

Speaking:

Ross G Saunders

Ross G Saunders

Day 2 23 September 2020
09:20

Opening Remarks & Welcome

Speaking:

Ross G Saunders

Speaker // Consultant // AdvisorCIPP/E, MSc, C|EH (v10), Ross G Saunders

Opening Remarks & Welcome

September 22 | 09:20 - 09:30

REGISTER YOUR FREE TICKET

Speaking:

Ross G Saunders

Ross G Saunders

09:30

Platinum Partner 3 Crowdstrike

According to the latest CrowdStrike threat report, more than 50% of modern attacks are file-less, and leverage the existing tools and legitimate software on the endpoint, to easily fly under the radar of the traditional security stack, such as the antivirus, the firewall, or the sandbox. With threat actors getting increasingly potent and sophisticated, Roland Daccache, SE Team Leader CrowdStrike META, is going to cover the kill chain of the modern cyber-attack, and how to stop it in its track, at each stage of the lifecycle. Join the session to learn more about modernizing your defense arsenal, and properly leveraging the Endpoint Detection and Response technology so you stack the deck in your favor against your cyber adversaries

Speaking:

Roland Daccache

Team Leader – Sales Engineering, Company

Platinum Partner 3 Crowdstrike

September 23 | 09:30 - 10:00

According to the latest CrowdStrike threat report, more than 50% of modern attacks are file-less, and leverage the existing tools and legitimate software on the endpoint, to easily fly under the radar of the traditional security stack, such as the antivirus, the firewall, or the sandbox. With threat actors getting increasingly potent and sophisticated, Roland Daccache, SE Team Leader CrowdStrike META, is going to cover the kill chain of the modern cyber-attack, and how to stop it in its track, at each stage of the lifecycle. Join the session to learn more about modernizing your defense arsenal, and properly leveraging the Endpoint Detection and Response technology so you stack the deck in your favor against your cyber adversaries

REGISTER YOUR FREE TICKET

Speaking:

Roland Daccache

Company

10:05

Keynote: The Evolution of the CISO, From Techie to Executive

  • The last 10 years of security leadership
  • Where are we now, and what is expected of the CISO
  • The near future

Speaking:

Ian Keller

Chief Security Officer, SBV

Keynote: The Evolution of the CISO, From Techie to Executive

September 23 | 10:05 - 10:35

  • The last 10 years of security leadership
  • Where are we now, and what is expected of the CISO
  • The near future
REGISTER YOUR FREE TICKET

Speaking:

Ian Keller

SBV

10:40

Women In Security Open Dialogue

This discussion takes a look at the struggles, successes and challenges that women in the security industry face.

Speaking:

Isabella Hofmeyr-Pretorius

Legal Advisor: Risk Management , Capitec Bank

Itumeleng Makgati

CISO, Sasol

Adele Jones

Lead Architect: Information Security & Blockchain, Nedbank

Chene Maartens

Executive: IT GRC, Edcon

Janine West

Data Privacy Officer, Investec

Loritta Kudumbu

Loritta Kudumba

Head of IT Governance, Risk and Compliance, Barloworld Equipment

Women In Security Open Dialogue

September 23 | 10:40 - 11:10

This discussion takes a look at the struggles, successes and challenges that women in the security industry face.

REGISTER YOUR FREE TICKET

Speaking:

Adele Jones

Nedbank

Loritta Kudumbu

Loritta Kudumba

Barloworld Equipment

Itumeleng Makgati

Sasol

Isabella Hofmeyr-Pretorius

Capitec Bank

Chene Maartens

Edcon

Janine West

Investec

11:15

Platinum Partner 4 F5 Adaptive Applications - The key to delivering great customer experiences

  • Customer expectations for digital experiences and how to overcome challenges
  • How to ensure end users have secure and reliable access
  • The foundations for fast and secure digital customer experiences

Speaking:

Alain Tshal

District Sales Manager – Sub-Saharan Africa, F5

Platinum Partner 4 F5 Adaptive Applications - The key to delivering great customer experiences

September 23 | 11:15 - 11:40

  • Customer expectations for digital experiences and how to overcome challenges
  • How to ensure end users have secure and reliable access
  • The foundations for fast and secure digital customer experiences
REGISTER YOUR FREE TICKET

Speaking:

Alain Tshal

F5

11:45

Keynote: Data security in today's world

  • Know your data - what does that mean
  • Data in the cloud - what should I consider
  • Data privacy - what can I do to protect my personal data

Speaking:

Adele Jones

Lead Architect: Information Security & Blockchain, Nedbank

Keynote: Data security in today's world

September 23 | 11:45 - 12:15

  • Know your data - what does that mean
  • Data in the cloud - what should I consider
  • Data privacy - what can I do to protect my personal data
REGISTER YOUR FREE TICKET

Speaking:

Adele Jones

Nedbank

12:20

Virtual Lunch Break

Virtual Lunch Break

September 23 | 12:20 - 13:00

REGISTER YOUR FREE TICKET

Speaking:

1:00

Gold Sponsor Netskope Consolidate Security Tools in the Cloud to Enable Remote Working for all Your Employees

Working remotely is the new norm, and your remote workers are spending more time connected to the cloud than their own network. Can you really keep remote workers secure when your security stack is still located in your data centre? And are the limitations of your remote access VPN appliances frustrating your remote workers? Recently, collaboration apps such as Microsoft Teams, Zoom and Slack have seen a huge surge in adoption. But these tools, that help get business done, also introduce additional risks. Collaboration in the cloud needs to be managed to prevent sensitive data being uploaded or shared, and employees need protecting from the threat of today’s cloud-enabled kill chains.In this session we’ll explore the reasons you should choose cloud security for securing and enabling remote workers.

Speaking:

Gold Sponsor Netskope Consolidate Security Tools in the Cloud to Enable Remote Working for all Your Employees

September 23 | 13:00 - 13:30

Working remotely is the new norm, and your remote workers are spending more time connected to the cloud than their own network. Can you really keep remote workers secure when your security stack is still located in your data centre? And are the limitations of your remote access VPN appliances frustrating your remote workers? Recently, collaboration apps such as Microsoft Teams, Zoom and Slack have seen a huge surge in adoption. But these tools, that help get business done, also introduce additional risks. Collaboration in the cloud needs to be managed to prevent sensitive data being uploaded or shared, and employees need protecting from the threat of today’s cloud-enabled kill chains.In this session we’ll explore the reasons you should choose cloud security for securing and enabling remote workers.

REGISTER YOUR FREE TICKET

Speaking:

1:35

Virtual Coffee Break

Virtual Coffee Break

September 23 | 13:35 - 14:30

REGISTER YOUR FREE TICKET

Speaking:

Stream C Cloud Security

2:30

Gold Partner Presentation 4 F-Secure CLOUD-NATIVE SECURITY AT SCALE

Focus on the cloud has never been greater within cyber security. This market is now worth an estimated $240 billion a year and counting, as organizations move to the cloud at pace.

Attackers’ objectives and motivations may be the same, but the Techniques, Tactics and Procedures (TTPs) they use against organizations’ cloud environments have changed. To secure and defend your own environment, it is necessary to understand these changes and adapt security management and threat detection approaches accordingly. In this presentation, F-Secure’s Cloud Security Lead, Nick Jones, will talk about the real issues identified in many of the cloud environments we have assessed. Going beyond those well-understood misconfigurations seen in the news, such as Amazon S3 buckets left open, he will use his examples to explain how architecture and user awareness are critical to effective cloud security.

  • About the common cloud breach scenarios from real client engagements 
  • How the security of your cloud environment extends beyond the cloud resources deployed
  • How architecting business-wide cloud adoption can support the prevention and detection of security incidents

Speaking:

Nick Jones

Cloud Security Lead, F-Secure

Gold Partner Presentation 4 F-Secure CLOUD-NATIVE SECURITY AT SCALE

September 23 | 14:30 - 15:00

Focus on the cloud has never been greater within cyber security. This market is now worth an estimated $240 billion a year and counting, as organizations move to the cloud at pace.

Attackers’ objectives and motivations may be the same, but the Techniques, Tactics and Procedures (TTPs) they use against organizations’ cloud environments have changed. To secure and defend your own environment, it is necessary to understand these changes and adapt security management and threat detection approaches accordingly. In this presentation, F-Secure’s Cloud Security Lead, Nick Jones, will talk about the real issues identified in many of the cloud environments we have assessed. Going beyond those well-understood misconfigurations seen in the news, such as Amazon S3 buckets left open, he will use his examples to explain how architecture and user awareness are critical to effective cloud security.

  • About the common cloud breach scenarios from real client engagements 
  • How the security of your cloud environment extends beyond the cloud resources deployed
  • How architecting business-wide cloud adoption can support the prevention and detection of security incidents
REGISTER YOUR FREE TICKET

Speaking:

Nick Jones

F-Secure

Stream D IAM PAM

2:30

Gold Partner Presentation 5 Infoblox

Speaking:

Mark Apker

Snr. Pre-Sales Engineer , Infoblox

Gold Partner Presentation 5 Infoblox

September 23 | 14:30 - 15:00

REGISTER YOUR FREE TICKET

Speaking:

Mark Apker

Infoblox

Stream C Cloud Security

3:05

Cloud Security: Governance, Compliance & Contract Management

This talk will expose participants to the ework to which Cloud is subjected; it will also highlight the myriad business benefits associated with a move to the Cloud and how an effective migration strategy that includes all the relevant security aspects will result in successful migration for all parts of the business.

Speaking:

Simphiwe Makhoba - Exxaro II

Simphiwe Makhoba

Cloud Architect Lead, Exxaro Resources

Cloud Security: Governance, Compliance & Contract Management

September 23 | 15:05 - 15:35

This talk will expose participants to the ework to which Cloud is subjected; it will also highlight the myriad business benefits associated with a move to the Cloud and how an effective migration strategy that includes all the relevant security aspects will result in successful migration for all parts of the business.

REGISTER YOUR FREE TICKET

Speaking:

Simphiwe Makhoba - Exxaro II

Simphiwe Makhoba

Exxaro Resources

Stream D IAM PAM

3:05

Next-Generation Identity Analytics & Intelligence

  • Moving towards data-driven risk based IAM
  • Automating critical identity-based controls with artificial intelligence (AI) and machine learning (ML)
  • Using advanced analytics to identify and monitor access risk while transforming compliance-driven processes with risk intelligence
  • Adding enhanced analytics to your IAM solution

Speaking:

Marlon Nair AF

Marlon Nair

Head: IAM, Alexander Forbes

Next-Generation Identity Analytics & Intelligence

September 23 | 15:05 - 15:35

  • Moving towards data-driven risk based IAM
  • Automating critical identity-based controls with artificial intelligence (AI) and machine learning (ML)
  • Using advanced analytics to identify and monitor access risk while transforming compliance-driven processes with risk intelligence
  • Adding enhanced analytics to your IAM solution
REGISTER YOUR FREE TICKET

Speaking:

Marlon Nair AF

Marlon Nair

Alexander Forbes

Stream C Cloud Security

3:40

Aligning Business Strategy with Operational Security

  • Finding common ground between business, operations and IT
  • Wag the dog: when operational security defines business strategy
  • Influencing the culture of a century old business
  • Making the business case for IT security in an operations and manufacturing focused enterprise

Speaking:

Darryl Potgieter - SAPPI

Darryl Potgieter

Global Head of IT Security, Sappi

Aligning Business Strategy with Operational Security

September 23 | 15:40 - 16:05

  • Finding common ground between business, operations and IT
  • Wag the dog: when operational security defines business strategy
  • Influencing the culture of a century old business
  • Making the business case for IT security in an operations and manufacturing focused enterprise
REGISTER YOUR FREE TICKET

Speaking:

Darryl Potgieter - SAPPI

Darryl Potgieter

Sappi

Stream D IAM PAM

3:40

Using Privileged Access Management to beat ransomware

  • Why PAM is such a necessary intrusion prevention capability
  • How your SOC can use PAM as your intrusion canary
  • How PAM and MFA can reduce or prevent ransomware damage

Speaking:

Steve Jump

Director and CEO, Custodiet Advisory Services

Using Privileged Access Management to beat ransomware

September 23 | 15:40 - 16:05

  • Why PAM is such a necessary intrusion prevention capability
  • How your SOC can use PAM as your intrusion canary
  • How PAM and MFA can reduce or prevent ransomware damage
REGISTER YOUR FREE TICKET

Speaking:

Steve Jump

Custodiet Advisory Services

4:05

Event Close –Out

Speaking:

Ross G Saunders

Speaker // Consultant // AdvisorCIPP/E, MSc, C|EH (v10), Ross G Saunders

Event Close –Out

September 23 | 16:05

REGISTER YOUR FREE TICKET

Speaking:

Ross G Saunders

Ross G Saunders

Terms & Conditions

The following Terms and Conditions (“Terms”) apply to you or your proxy in relation to your registration for this Corinium Global Intelligence (“Corinium”) offer. The definition of “registration” for purposes of these Terms will include all anyone who completes the above form. By entering your contact details, you agree to these Terms.

Disclosure of your information

You agree that we have the right to share such portions of your personal information as may be appropriate with selected third parties including:

- Business partners
- Suppliers
- Sub-contractors for the performance of any contract we enter into with either them or you.
- Professional organizations involved in the provision of services for the event contracted for, such as, for example ON24.
- Sponsors - we may share your information with event sponsors who may contact you in relation to special offers, products and services related to your role within your company. You may also opt-out at any time by emailing inquiries@coriniumintel.com

Data protection

The personal information shown and/or provided by you will be held in a database. It may be used to keep you up to date with developments in your industry. Sometimes your details may be obtained or made available to third parties for marketing purposes. If you do not with your details to be used for this purpose, please email us at inquiries@coriniumintel.com