<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=306561&amp;fmt=gif">






CISO AFRICA: LIVE

MARCH 16 & 17, 2021 | DESKTOP, MOBILE & TABLET

ENGAGE SENIOR SECURITY LEADERS AT THIS UNIQUE VIRTUAL EVENT

DOWNLOAD THE AGENDA REGISTER YOUR FREE SEAT
Day 1 16 March 2021
08:45

CISO Africa 2021 Platform Opens

Speaking:

CISO Africa 2021 Platform Opens

March 16 | 08:45 - 09:00

REGISTER TO WATCH ON-DEMAND

Speaking:

09:00

International Keynote: A look at New Cyber Security Trends Globally

  • Addressing the global challenges of information security with limited resources
  • The value of community and partners in Information Security.
  • Continual learning and education helps us overcome challenges.

Speaking:

Mitch Parker

CISO, Indiana University Health (USA)

International Keynote: A look at New Cyber Security Trends Globally

March 16 | 09:00 - 09:30

  • Addressing the global challenges of information security with limited resources
  • The value of community and partners in Information Security.
  • Continual learning and education helps us overcome challenges.
REGISTER TO WATCH ON-DEMAND

Speaking:

Mitch Parker

Indiana University Health (USA)

09:35

Reserved for Lead Partner

Reserved for Lead Partner

March 16 | 09:35 - 10:05

REGISTER TO WATCH ON-DEMAND

Speaking:

10:10

International Keynote: Improving the Security Culture Within Your Organisation

Speaking:

Ronald Martey

Chief Information Security Officer (CISO), GCB Bank Limited (Ghana)

International Keynote: Improving the Security Culture Within Your Organisation

March 16 | 10:10 - 10:40

REGISTER TO WATCH ON-DEMAND

Speaking:

Ronald Martey

GCB Bank Limited (Ghana)

10:45

Virtual Coffee Break

Virtual Coffee Break

March 16 | 10:45 - 11:00

REGISTER TO WATCH ON-DEMAND

Speaking:

11:00

Reserved for Platinum Partner 1

Reserved for Platinum Partner 1

March 16 | 11:00 - 11:30

REGISTER TO WATCH ON-DEMAND

Speaking:

11:35

Case Study: Endpoint Security: Securing the Extended Enterprise

Speaking:

Itumeleng Makgati

CISO, Sasol

Case Study: Endpoint Security: Securing the Extended Enterprise

March 16 | 11:35 - 12:05

REGISTER TO WATCH ON-DEMAND

Speaking:

Itumeleng Makgati

Sasol

12:10

Reserved for Platinum Partner 2

Reserved for Platinum Partner 2

March 16 | 12:10 - 12:40

REGISTER TO WATCH ON-DEMAND

Speaking:

12:40

Virtual Lunch Break

Virtual Lunch Break

March 16 | 12:40 - 13:10

REGISTER TO WATCH ON-DEMAND

Speaking:

1:10

Reserved for Platinum Partner 3

Reserved for Platinum Partner 3

March 16 | 13:10 - 13:40

REGISTER TO WATCH ON-DEMAND

Speaking:

1:45

Panel Discussion: What Are the Current Threat Vectors Impact of Cyber Security

A discussion of the most prominent threat vectors and their impact on business at the moment. Such as: Ransomware, Data Security, Trust Relationships, Zero-Day Vulnerabilities, Brute Force Attack, Distributed Denial of Service (DDoS)

Speaking:

Ross G Saunders

Speaker // Consultant // AdvisorCIPP/E, MSc, C|EH (v10), Ross G Saunders

Darryl Potgieter - SAPPI

Darryl Potgieter

Global Head of IT Security, Sappi

Ahmed Nabil Mahmoud

Regional Senior Information Security & Risk Manager, Standards Chartered Bank

BTMaetsa_profile_pic

Bramley Maetsa

DevOps Enablement Team Lead , Sasol Information Management

Panel Discussion: What Are the Current Threat Vectors Impact of Cyber Security

March 16 | 13:45 - 14:15

A discussion of the most prominent threat vectors and their impact on business at the moment. Such as: Ransomware, Data Security, Trust Relationships, Zero-Day Vulnerabilities, Brute Force Attack, Distributed Denial of Service (DDoS)

REGISTER TO WATCH ON-DEMAND

Speaking:

Darryl Potgieter - SAPPI

Darryl Potgieter

Sappi

BTMaetsa_profile_pic

Bramley Maetsa

Sasol Information Management

Ahmed Nabil Mahmoud

Standards Chartered Bank

Ross G Saunders

Ross G Saunders

2:15

Virtual Coffee Break

Virtual Coffee Break

March 16 | 14:15 - 14:30

REGISTER TO WATCH ON-DEMAND

Speaking:

Stream A Data Risk and Security

2:30

Gold Partner SailPoint The 2021 Identity Journey: Building Your Identity Program Start to Finish

Speaking:

Caroline Lawson

Identity Strategist, SailPoint

Gold Partner SailPoint The 2021 Identity Journey: Building Your Identity Program Start to Finish

March 16 | 14:30 - 15:00

REGISTER TO WATCH ON-DEMAND

Speaking:

Caroline Lawson

SailPoint

Stream B Government and Public Sector

2:30

Reserved for Gold Partner Presentation 2

Reserved for Gold Partner Presentation 2

March 16 | 14:30 - 15:00

REGISTER TO WATCH ON-DEMAND

Speaking:

Stream C Technology & Insights

2:30

Reserved for Gold Partner Presentation 3

Reserved for Gold Partner Presentation 3

March 16 | 14:30 - 15:00

REGISTER TO WATCH ON-DEMAND

Speaking:

Stream A Data Risk and Security

3:05

Case Study: Enabling working from Home Permanently

  • Remote Access
  • How to keep machines up to date and secure over the internet
  • Educating staff on securing their home network

Speaking:

Stanley Langa

Senior: Information Security Officer, Vitality Group Inc

Case Study: Enabling working from Home Permanently

March 16 | 15:05 - 15:35

  • Remote Access
  • How to keep machines up to date and secure over the internet
  • Educating staff on securing their home network
REGISTER TO WATCH ON-DEMAND

Speaking:

Stanley Langa

Vitality Group Inc

Stream B Government and Public Sector

3:05

Case Study: Data Sovereignty - How Cloud Computing is Used to Co-own Data and the Struggle to Penetrate the Businesses Using Blockchain Technology.

The controversy on how data is secretly acquired and used to inform major innovations without the host knowing and possibly raising the issues of compensation as well (data monetisation)

Speaking:

Trymore Chawurura

Deputy Director for ICT, Ministry of Health & Child Care (MoHCC)

Case Study: Data Sovereignty - How Cloud Computing is Used to Co-own Data and the Struggle to Penetrate the Businesses Using Blockchain Technology.

March 16 | 15:05 - 15:35

The controversy on how data is secretly acquired and used to inform major innovations without the host knowing and possibly raising the issues of compensation as well (data monetisation)

REGISTER TO WATCH ON-DEMAND

Speaking:

Trymore Chawurura

Ministry of Health & Child Care (MoHCC)

Stream C Technology & Insights

3:05

Creating business value through IT Security

In an era where an already limited resources for IT security is being even more restricted as a result of the ailing economy and resource constraints brought about by the Covid-19 pandemic, now is the time to be smart, to be innovative and create value to the organisation from an IT security perspective. During this session the following items will be discussed:

  • Where does IT security fit in the business value chain?
  • IT Security as a strategic enabler
  • Enabling an agile and resilient organisation
  • Delivering real security to counter real threats

Speaking:

Henry Denner

IT Security Officer, Gautrain Management Agency

Creating business value through IT Security

March 16 | 15:05 - 15:35

In an era where an already limited resources for IT security is being even more restricted as a result of the ailing economy and resource constraints brought about by the Covid-19 pandemic, now is the time to be smart, to be innovative and create value to the organisation from an IT security perspective. During this session the following items will be discussed:

  • Where does IT security fit in the business value chain?
  • IT Security as a strategic enabler
  • Enabling an agile and resilient organisation
  • Delivering real security to counter real threats
REGISTER TO WATCH ON-DEMAND

Speaking:

Henry Denner

Gautrain Management Agency

Stream A Data Risk and Security

3:40

Securing your people Crown Jewels: A look at High risk users

  • What and who are your High Risk users
  • Why they need to be secured – Importance and benefits?
  • Some measures that can be put in place
  • Poll results

Speaking:

Jacqueline Hanson Kotei

CGEIT CCO GRCP, MTN Ghana

Securing your people Crown Jewels: A look at High risk users

March 16 | 15:40 - 16:10

  • What and who are your High Risk users
  • Why they need to be secured – Importance and benefits?
  • Some measures that can be put in place
  • Poll results
REGISTER TO WATCH ON-DEMAND

Speaking:

Jacqueline Hanson Kotei

MTN Ghana

Stream B Government and Public Sector

3:40

Security Organisations Architecture & Design, Multi-sourcing of Security Services and Communicating Cyber Security Value to the Board

Speaking:

Dr. Maclaud Mafaiti

CISO, SAPO

Security Organisations Architecture & Design, Multi-sourcing of Security Services and Communicating Cyber Security Value to the Board

March 16 | 15:40 - 16:10

REGISTER TO WATCH ON-DEMAND

Speaking:

Dr. Maclaud Mafaiti

SAPO

Stream C Technology & Insights

3:40

The Benefits of Adopting Blockchain for your ICT Security Initiatives

A deliberation of whether an organisation should you incorporate this Zero Trust framework into its security practices by looking at the following:

  • What is it?
  • How have they moved towards it? If at all?
  • What’s hype, and what’s valuable?
  • How have staff reacted to Zero Trust?
  • Where do you strike a balance between zero trust and draconian policies?

Speaking:

Gbolabo Awelewa

CISO, Sothese Inc. (Nigeria)

The Benefits of Adopting Blockchain for your ICT Security Initiatives

March 16 | 15:40 - 16:10

A deliberation of whether an organisation should you incorporate this Zero Trust framework into its security practices by looking at the following:

  • What is it?
  • How have they moved towards it? If at all?
  • What’s hype, and what’s valuable?
  • How have staff reacted to Zero Trust?
  • Where do you strike a balance between zero trust and draconian policies?
REGISTER TO WATCH ON-DEMAND

Speaking:

Gbolabo Awelewa

Sothese Inc. (Nigeria)

Stream A Data Risk and Security

4:15

Panel Discussion: The Pros and Cons of Zero Trust

A deliberation of whether an organisation should you incorporate this Zero Trust framework into its security practices by looking at the following:

  • What is it?
  • How have they moved towards it? If at all?
  • What’s hype, and what’s valuable?
  • How have staff reacted to Zero Trust?
  • Where do you strike a balance between zero trust and draconian policies?

Speaking:

Ross G Saunders

Speaker // Consultant // AdvisorCIPP/E, MSc, C|EH (v10), Ross G Saunders

Panel Discussion: The Pros and Cons of Zero Trust

March 16 | 16:15 - 16:45

A deliberation of whether an organisation should you incorporate this Zero Trust framework into its security practices by looking at the following:

  • What is it?
  • How have they moved towards it? If at all?
  • What’s hype, and what’s valuable?
  • How have staff reacted to Zero Trust?
  • Where do you strike a balance between zero trust and draconian policies?
REGISTER TO WATCH ON-DEMAND

Speaking:

Ross G Saunders

Ross G Saunders

Stream B Government and Public Sector

4:15

Panel Discussion: IAM & PAM Systems Monitoring and Measuring

A majority of successful ransomware and malware related breaches are due to identity and privilege exploits. In spite of massive investment in the implementation of privileged user and normal user IAM and PAM systems, these attacks continue to occur, and to succeed and are increasing in their severity.  

  • Is this increase because the IAM and PAM systems have been left almost unmonitored or poorly-configured
  • Are the breaches attributed to a systemic failure of governance, where control presence compliance (i.e Tick Box style control verification) has been used for regulatory compliance purposes, rather than risk based compliance
  • How can this be overcome?

Speaking:

Ross G Saunders

Speaker // Consultant // AdvisorCIPP/E, MSc, C|EH (v10), Ross G Saunders

Jawad Khalid Mirza

Chief Information Security Officer, Askari Bank

Julien Jaouën

Head of Identity Management, Airbus (France)

Panel Discussion: IAM & PAM Systems Monitoring and Measuring

March 16 | 16:15 - 16:45

A majority of successful ransomware and malware related breaches are due to identity and privilege exploits. In spite of massive investment in the implementation of privileged user and normal user IAM and PAM systems, these attacks continue to occur, and to succeed and are increasing in their severity.  

  • Is this increase because the IAM and PAM systems have been left almost unmonitored or poorly-configured
  • Are the breaches attributed to a systemic failure of governance, where control presence compliance (i.e Tick Box style control verification) has been used for regulatory compliance purposes, rather than risk based compliance
  • How can this be overcome?
REGISTER TO WATCH ON-DEMAND

Speaking:

Ross G Saunders

Ross G Saunders

Jawad Khalid Mirza

Askari Bank

Julien Jaouën

Airbus (France)

Stream C Technology & Insights

4:15

Panel Discussion: Challenges to Gender Equality in the Security Sector

A lot has been done in the area of ICT Security but what are the best ways to increase women’s meaningful participation in the peace and security sectors.

Speaking:

Kerissa Varma

Chief Information Security Officer, Old Mutual Limited (SA)

Rosario Del Pilar Soria

Specialist Defense & Threat Disruption, IAG (New Zealand)

Panel Discussion: Challenges to Gender Equality in the Security Sector

March 16 | 16:15 - 16:15

A lot has been done in the area of ICT Security but what are the best ways to increase women’s meaningful participation in the peace and security sectors.

REGISTER TO WATCH ON-DEMAND

Speaking:

Kerissa Varma

Old Mutual Limited (SA)

Rosario Del Pilar Soria

IAG (New Zealand)

4:40

End of Day 1

End of Day 1

March 16 | 16:40 - 12:15

REGISTER TO WATCH ON-DEMAND

Speaking:

Day 2 17 March 2021
08:45

CISO Africa 2021 Platform Opens

CISO Africa 2021 Platform Opens

March 17 | 08:45 - 09:00

REGISTER TO WATCH ON-DEMAND

Speaking:

09:00

Keynote: The Future of Privacy in South Africa, with POPIA Coming in to Full Effect in July 2021, Emerging Cyber Security and Infosec Trends etc.

Speaking:

Imraan Kharwa

Group Information Security Officer, Tourvest

Keynote: The Future of Privacy in South Africa, with POPIA Coming in to Full Effect in July 2021, Emerging Cyber Security and Infosec Trends etc.

March 17 | 09:00 - 09:30

REGISTER TO WATCH ON-DEMAND

Speaking:

Imraan Kharwa

Tourvest

09:35

Reserved for Platinum Partner 4

Reserved for Platinum Partner 4

March 17 | 09:35 - 10:05

REGISTER TO WATCH ON-DEMAND

Speaking:

10:10

Panel Discussion: Cyber Security Evolution Due to Covid- 19

What will the new security landscape look like in the era of Covid? How are organizations coping? What new strategies are they adopting?

Speaking:

Tauseef Aslam

CISO, Telenor

Ahmed Nabil Mahmoud

Regional Senior Information Security & Risk Manager, Standards Chartered Bank

Gbolabo Awelewa

CISO, Sothese Inc. (Nigeria)

Panel Discussion: Cyber Security Evolution Due to Covid- 19

March 17 | 10:10 - 10:40

What will the new security landscape look like in the era of Covid? How are organizations coping? What new strategies are they adopting?

REGISTER TO WATCH ON-DEMAND

Speaking:

Ahmed Nabil Mahmoud

Standards Chartered Bank

Gbolabo Awelewa

Sothese Inc. (Nigeria)

Tauseef Aslam

Telenor

10:45

Virtual Coffee Break

Virtual Coffee Break

March 17 | 10:45 - 11:00

REGISTER TO WATCH ON-DEMAND

Speaking:

11:00

Case Study: Ontario Cybersecurity Higher Education Consortium, Canada

Speaking:

Farooq Naiyer

CISO, Ontario Cybersecurity Higher Education Consortium, Canada

Case Study: Ontario Cybersecurity Higher Education Consortium, Canada

March 17 | 11:00 - 11:30

REGISTER TO WATCH ON-DEMAND

Speaking:

Farooq Naiyer

Ontario Cybersecurity Higher Education Consortium, Canada

11:35

Reserved for Platinum Partner 5

Reserved for Platinum Partner 5

March 17 | 11:35 - 12:05

REGISTER TO WATCH ON-DEMAND

Speaking:

12:05

Enterprise DevSecOps Transformation – Our Story

Speaking:

BTMaetsa_profile_pic

Bramley Maetsa

DevOps Enablement Team Lead , Sasol Information Management

Enterprise DevSecOps Transformation – Our Story

March 17 | 12:05 - 12:35

REGISTER TO WATCH ON-DEMAND

Speaking:

BTMaetsa_profile_pic

Bramley Maetsa

Sasol Information Management

12:35

Virtual Lunch Break

Virtual Lunch Break

March 17 | 12:35 - 13:00

REGISTER TO WATCH ON-DEMAND

Speaking:

1:00

Reserved for Gold Partner Presentation 4

Reserved for Gold Partner Presentation 4

March 17 | 13:00 - 13:30

REGISTER TO WATCH ON-DEMAND

Speaking:

1:30

Case Study: The Undeniable Link Between Cyber Hygiene and Cyber Security

Speaking:

Khensani Khoza

Chief Information Officer, AgriSETA (Agricultural Sector Education and Training Authority)

Case Study: The Undeniable Link Between Cyber Hygiene and Cyber Security

March 17 | 13:30 - 14:00

REGISTER TO WATCH ON-DEMAND

Speaking:

Khensani Khoza

AgriSETA (Agricultural Sector Education and Training Authority)

2:00

Virtual Coffee Break

Virtual Coffee Break

March 17 | 14:00 - 14:30

REGISTER TO WATCH ON-DEMAND

Speaking:

Stream D Cloud Security

2:30

Reserved for Gold Partner Presentation 5

Reserved for Gold Partner Presentation 5

March 17 | 14:30 - 15:00

REGISTER TO WATCH ON-DEMAND

Speaking:

Stream E IAM & PAM

2:30

Reserved for Gold Partner Presentation 6

Reserved for Gold Partner Presentation 6

March 17 | 14:30 - 15:00

REGISTER TO WATCH ON-DEMAND

Speaking:

Stream D Cloud Security

3:05

Cloud Security: Identity and Zero Trust

Description: Whether people admit it or not it’s becoming a fact especially after the COVID Pandemic. Cloud is real and we are all moving to the cloud either fully or in hybrid way. This move will open the door for lots of risks and opportunities at the same time. Security comes on top of the risks and with this new mindset and architecture is needed. This session will try to draw the main areas of concern from Security perspective while moving to the cloud and explain the new perimeter of identity coupled with Zero trust. Always remember with the cloud Trust but Verify.

Speaking:

Ahmed Nabil Mahmoud

Regional Senior Information Security & Risk Manager, Standards Chartered Bank

Cloud Security: Identity and Zero Trust

March 17 | 15:05 - 15:35

Description: Whether people admit it or not it’s becoming a fact especially after the COVID Pandemic. Cloud is real and we are all moving to the cloud either fully or in hybrid way. This move will open the door for lots of risks and opportunities at the same time. Security comes on top of the risks and with this new mindset and architecture is needed. This session will try to draw the main areas of concern from Security perspective while moving to the cloud and explain the new perimeter of identity coupled with Zero trust. Always remember with the cloud Trust but Verify.

REGISTER TO WATCH ON-DEMAND

Speaking:

Ahmed Nabil Mahmoud

Standards Chartered Bank

Stream E IAM & PAM

3:05

Keynote: Data security in today's world

  • Know your data - what does that mean
  • Data in the cloud - what should I consider
  • Data privacy - what can I do to protect my personal data

Speaking:

Adele Jones

Lead Architect: Information Security & Blockchain, Nedbank

Keynote: Data security in today's world

March 17 | 15:05 - 15:35

  • Know your data - what does that mean
  • Data in the cloud - what should I consider
  • Data privacy - what can I do to protect my personal data
REGISTER TO WATCH ON-DEMAND

Speaking:

Adele Jones

Nedbank

Stream D Cloud Security

3:40

Machine Learning in Cybersecurity: Getting it right

  • Advances in Cybersecurity from the dark side
  • The rise of ML in Cybersecurity
  • Getting the modelling right
  • Advanced predictive modelling technique to help in Cybersecurity

Speaking:

Tunde Dada

Group Head IT/BCM, Inq Digital in Africa (Formerly Vodacom Africa)

Machine Learning in Cybersecurity: Getting it right

March 17 | 15:40 - 16:05

  • Advances in Cybersecurity from the dark side
  • The rise of ML in Cybersecurity
  • Getting the modelling right
  • Advanced predictive modelling technique to help in Cybersecurity
REGISTER TO WATCH ON-DEMAND

Speaking:

Tunde Dada

Inq Digital in Africa (Formerly Vodacom Africa)

Stream E IAM & PAM

3:40

Evaluating Current IAM/PAM Systems in Place:

This presentation will help you answer the following questions; Do you know who is accessing your data?  And why, where, when, and how they are doing it? Five of the top seven most reported exploit types involve misuse, loss or compromise of an active credential. These five exploits alone were detected in more than 70% of the largest data breaches in the past four years. The companies reporting these breaches all had active, and supposedly working, IAM/PAM systems in place. Can you answer the following questions:?

  • Do you know if a phishing attack has obtained a working credential?
  • Do you know if a sensitive document is sent to the wrong person?
  • Do you know if a password database has been compromised?
  • Do you know if your Directories/User databases are correctly and securely configured?
  • Do you know if a privilege has been elevated without approval?

If your answer to any of the above is “Don’t know” then join Steve to find out why all of these can be managed using systems and processes, you already have.

Speaking:

Steve Jump

Director and CEO, Custodiet Advisory Services

Evaluating Current IAM/PAM Systems in Place:

March 17 | 15:40 - 16:05

This presentation will help you answer the following questions; Do you know who is accessing your data?  And why, where, when, and how they are doing it? Five of the top seven most reported exploit types involve misuse, loss or compromise of an active credential. These five exploits alone were detected in more than 70% of the largest data breaches in the past four years. The companies reporting these breaches all had active, and supposedly working, IAM/PAM systems in place. Can you answer the following questions:?

  • Do you know if a phishing attack has obtained a working credential?
  • Do you know if a sensitive document is sent to the wrong person?
  • Do you know if a password database has been compromised?
  • Do you know if your Directories/User databases are correctly and securely configured?
  • Do you know if a privilege has been elevated without approval?

If your answer to any of the above is “Don’t know” then join Steve to find out why all of these can be managed using systems and processes, you already have.

REGISTER TO WATCH ON-DEMAND

Speaking:

Steve Jump

Custodiet Advisory Services

4:05

Event Close –Out

Event Close –Out

March 17 | 16:05

REGISTER TO WATCH ON-DEMAND

Speaking:

Terms & Conditions

The following Terms and Conditions (“Terms”) apply to you or your proxy in relation to your registration for this Corinium Global Intelligence (“Corinium”) offer. The definition of “registration” for purposes of these Terms will include all anyone who completes the above form. By entering your contact details, you agree to these Terms.

Disclosure of your information

You agree that we have the right to share such portions of your personal information as may be appropriate with selected third parties including:

- Business partners
- Suppliers
- Sub-contractors for the performance of any contract we enter into with either them or you.
- Professional organizations involved in the provision of services for the event contracted for, such as, for example ON24.
- Sponsors - we may share your information with event sponsors who may contact you in relation to special offers, products and services related to your role within your company. You may also opt-out at any time by emailing inquiries@coriniumintel.com

Data protection

The personal information shown and/or provided by you will be held in a database. It may be used to keep you up to date with developments in your industry. Sometimes your details may be obtained or made available to third parties for marketing purposes. If you do not with your details to be used for this purpose, please email us at inquiries@coriniumintel.com