<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=306561&amp;fmt=gif">






CISO AFRICA: LIVE

MARCH 16 & 17, 2021 | DESKTOP, MOBILE & TABLET

ENGAGE SENIOR SECURITY LEADERS AT THIS UNIQUE VIRTUAL EVENT

DOWNLOAD THE AGENDA REGISTER TO WATCH ON-DEMAND
Day 1 16 March 2021
08:45

CISO Africa 2021 Platform Opens

Speaking:

Ross G Saunders

Speaker // Consultant // AdvisorCIPP/E, MSc, C|EH (v10), Ross G Saunders

CISO Africa 2021 Platform Opens

March 16 | 08:45 - 09:00

REGISTER TO WATCH ON-DEMAND

Speaking:

Ross G Saunders

Ross G Saunders

09:00

International Keynote: A look at New Cyber Security Trends Globally

  • Addressing the global challenges of information security with limited resources
  • The value of community and partners in Information Security.
  • Continual learning and education helps us overcome challenges.

Speaking:

Mitch Parker

CISO, Indiana University Health (USA)

International Keynote: A look at New Cyber Security Trends Globally

March 16 | 09:00 - 09:30

  • Addressing the global challenges of information security with limited resources
  • The value of community and partners in Information Security.
  • Continual learning and education helps us overcome challenges.
REGISTER TO WATCH ON-DEMAND

Speaking:

Mitch Parker

Indiana University Health (USA)

09:35

Lead Partner IBM Protecting Data Expedites the Journey to Cloud with Regulatory Compliance and Automated Risk Remediation

Speaking:

Wesley Gyure

Director of Strategy & Offering Management, IBM

Lead Partner IBM Protecting Data Expedites the Journey to Cloud with Regulatory Compliance and Automated Risk Remediation

March 16 | 09:35 - 10:05

REGISTER TO WATCH ON-DEMAND

Speaking:

Wesley Gyure

IBM

10:10

International Keynote: Improving the Security Culture Within Your Organisation

Speaking:

Ronald Martey

Chief Information Security Officer (CISO), GCB Bank Limited (Ghana)

International Keynote: Improving the Security Culture Within Your Organisation

March 16 | 10:10 - 10:40

REGISTER TO WATCH ON-DEMAND

Speaking:

Ronald Martey

GCB Bank Limited (Ghana)

10:45

Demo Session: Puleng

Demo Session: Puleng

March 16 | 10:45 - 11:00

REGISTER TO WATCH ON-DEMAND

Speaking:

10:45

Demo Session: Savyint Access requests and approvals with Saviynt’s intelligent identity platform

  • See typical scenario-based access requests & approvals
  • Learn how risk signals and real-time insights empower better decisions
  • Witness built-in intelligence with AI/ML

Speaking:

Chris Radband

Solutions Engineer, Saviynt

Demo Session: Savyint Access requests and approvals with Saviynt’s intelligent identity platform

March 16 | 10:45 - 11:00

  • See typical scenario-based access requests & approvals
  • Learn how risk signals and real-time insights empower better decisions
  • Witness built-in intelligence with AI/ML
REGISTER TO WATCH ON-DEMAND

Speaking:

Chris Radband

Saviynt

10:45

Virtual Coffee Break

Virtual Coffee Break

March 16 | 10:45 - 11:00

REGISTER TO WATCH ON-DEMAND

Speaking:

11:00

Platinum Partner 1 Darktrace Securing the New Normal: How Cyber AI Learns on the Job

The future of work remains unpredictable and uncertain. More than ever before, business leaders need to remain confident that their operations can continue securely in the face of global or even regional crises, and while sections of the economy are slowly re-opening, cyber-attackers are ramping up their campaigns.   

As businesses look set to rely on cloud and SaaS tools for the long term, our digital environments are going to be more dynamic than ever. Yet organizations are finding themselves undergoing a delicate balancing act—each new work practice and technology that is introduced also brings unforeseen risk. Static, legacy approaches have become redundant, both unintelligent and ill-equipped to adapt.   

Organizations must rethink their approach to security and rely on new technologies like AI to achieve much-needed adaptability and resilience. Darktrace is the world leader in cyber-AI technology, and leverages unsupervised machine learning to seamlessly adapt and integrate into changing environments, and to detect and respond to attacks in the earliest moments

Speaking:

Andrew Tsonchev

Director of Technology, Darktrace

Platinum Partner 1 Darktrace Securing the New Normal: How Cyber AI Learns on the Job

March 16 | 11:00 - 11:30

The future of work remains unpredictable and uncertain. More than ever before, business leaders need to remain confident that their operations can continue securely in the face of global or even regional crises, and while sections of the economy are slowly re-opening, cyber-attackers are ramping up their campaigns.   

As businesses look set to rely on cloud and SaaS tools for the long term, our digital environments are going to be more dynamic than ever. Yet organizations are finding themselves undergoing a delicate balancing act—each new work practice and technology that is introduced also brings unforeseen risk. Static, legacy approaches have become redundant, both unintelligent and ill-equipped to adapt.   

Organizations must rethink their approach to security and rely on new technologies like AI to achieve much-needed adaptability and resilience. Darktrace is the world leader in cyber-AI technology, and leverages unsupervised machine learning to seamlessly adapt and integrate into changing environments, and to detect and respond to attacks in the earliest moments

REGISTER TO WATCH ON-DEMAND

Speaking:

Andrew Tsonchev

Darktrace

11:35

Case Study: Endpoint Security: Securing the Extended Enterprise

Speaking:

Itumeleng Makgati

CISO, Sasol

Case Study: Endpoint Security: Securing the Extended Enterprise

March 16 | 11:35 - 12:05

REGISTER TO WATCH ON-DEMAND

Speaking:

Itumeleng Makgati

Sasol

12:10

Platinum Partner 2 Saviynt in partnership with Microsoft Extending Azure AD Customer Value with Saviynt

  • Saviynt and Microsoft Azure AD better together
  • Solving Hybrid and Multi-cloud Governance scenarios
  • Benefits of delivering Identity Governance as a Service

Speaking:

Chris Gregory

VP Channel Development and Operations, Saviynt

Peter van Leeuwen

Senior Program Manager in the Identity Division of the Cloud + Enterprise organization, Microsoft

Platinum Partner 2 Saviynt in partnership with Microsoft Extending Azure AD Customer Value with Saviynt

March 16 | 12:10 - 12:40

  • Saviynt and Microsoft Azure AD better together
  • Solving Hybrid and Multi-cloud Governance scenarios
  • Benefits of delivering Identity Governance as a Service
REGISTER TO WATCH ON-DEMAND

Speaking:

Chris Gregory

Saviynt

Peter van Leeuwen

Microsoft

12:40

Demo Session: Puleng

Demo Session: Puleng

March 16 | 12:40 - 13:10

REGISTER TO WATCH ON-DEMAND

Speaking:

12:40

Virtual Lunch Break

Virtual Lunch Break

March 16 | 12:40 - 13:10

REGISTER TO WATCH ON-DEMAND

Speaking:

1:10

Gold Partner 1 Commvault Security, A Journey Not A Destination

  • Today’s emerging challenges
  • Why dedicated ransomware protection
  • Microsoft and Commvault Partnership
  • How Metallic Works

Speaking:

Ronnie Kaftal

EMEA Sales Engineering Director, Metallic , Commvault

Johannes Kanis

Cloud and Enterprise Business Group Lead, Microsoft

Gold Partner 1 Commvault Security, A Journey Not A Destination

March 16 | 13:10 - 13:40

  • Today’s emerging challenges
  • Why dedicated ransomware protection
  • Microsoft and Commvault Partnership
  • How Metallic Works
REGISTER TO WATCH ON-DEMAND

Speaking:

Ronnie Kaftal

Commvault

Johannes Kanis

Microsoft

1:45

Panel Discussion: What Are the Current Threat Vectors Impact of Cyber Security

A discussion of the most prominent threat vectors and their impact on business at the moment. Such as: Ransomware, Data Security, Trust Relationships, Zero-Day Vulnerabilities, Brute Force Attack, Distributed Denial of Service (DDoS)

Speaking:

Ross G Saunders

Speaker // Consultant // AdvisorCIPP/E, MSc, C|EH (v10), Ross G Saunders

Darryl Potgieter - SAPPI

Darryl Potgieter

Global Head of IT Security, Sappi

Ahmed Nabil Mahmoud

Regional Senior Information Security & Risk Manager, Leading International Bank (UAE)

BTMaetsa_profile_pic

Bramley Maetsa

DevOps Enablement Team Lead , Sasol Information Management

Panel Discussion: What Are the Current Threat Vectors Impact of Cyber Security

March 16 | 13:45 - 14:15

A discussion of the most prominent threat vectors and their impact on business at the moment. Such as: Ransomware, Data Security, Trust Relationships, Zero-Day Vulnerabilities, Brute Force Attack, Distributed Denial of Service (DDoS)

REGISTER TO WATCH ON-DEMAND

Speaking:

Darryl Potgieter - SAPPI

Darryl Potgieter

Sappi

Ahmed Nabil Mahmoud

Leading International Bank (UAE)

BTMaetsa_profile_pic

Bramley Maetsa

Sasol Information Management

Ross G Saunders

Ross G Saunders

2:15

Demo Session: Puleng

Demo Session: Puleng

March 16 | 14:15 - 14:30

REGISTER TO WATCH ON-DEMAND

Speaking:

2:15

Virtual Coffee Break

Virtual Coffee Break

March 16 | 14:15 - 14:30

REGISTER TO WATCH ON-DEMAND

Speaking:

Stream A

2:30

Gold Partner Presentation 2 OpenText Increase SOC efficacy & efficiency with automated incident response

In today’s threat landscape, SOC teams are buried under countless security alerts impacting their ability to address those events that present the greatest risk to the organisation.  Identifying key areas for response automation can help with alert fatigue, ensure the team is focused on the most critical alerts, and significantly reduce mean-time-to-recovery.

In this presentation, Anthony Di Bello, Vice President of Strategic Development at OpenText will look at:

  • What security response automation is and isn’t
  • The benefits of augmenting your existing alerting solutions with digital forensics and incident response (DFIR)
  • Automating high-prevalence response workflows
  • Using endpoint telemetry for proactive threat hunting

Speaking:

Anthony Di Bello

Vice President of Strategic Development, OpenText

Gold Partner Presentation 2 OpenText Increase SOC efficacy & efficiency with automated incident response

March 16 | 14:30 - 15:00

In today’s threat landscape, SOC teams are buried under countless security alerts impacting their ability to address those events that present the greatest risk to the organisation.  Identifying key areas for response automation can help with alert fatigue, ensure the team is focused on the most critical alerts, and significantly reduce mean-time-to-recovery.

In this presentation, Anthony Di Bello, Vice President of Strategic Development at OpenText will look at:

  • What security response automation is and isn’t
  • The benefits of augmenting your existing alerting solutions with digital forensics and incident response (DFIR)
  • Automating high-prevalence response workflows
  • Using endpoint telemetry for proactive threat hunting
REGISTER TO WATCH ON-DEMAND

Speaking:

Anthony Di Bello

OpenText

Stream B

2:30

Gold Partner Presentation 2 - Sailpoint The 2021 Identity Journey: Building Your Identity Program Start to Finish

Today we will discuss how to approach your IGA Programme so it meets these key objectives

  • Hear how to streamline the delivery of access to users while learning & adapting to change
  • Learn to uncover where access risks reside & remediate, proving security posture
  • How to automate compliance & audit 
  • And remove complexity while ensuring a secure Identity model

Speaking:

Caroline Lawson

Identity Strategist, SailPoint

Gold Partner Presentation 2 - Sailpoint The 2021 Identity Journey: Building Your Identity Program Start to Finish

March 16 | 14:30 - 15:00

Today we will discuss how to approach your IGA Programme so it meets these key objectives

  • Hear how to streamline the delivery of access to users while learning & adapting to change
  • Learn to uncover where access risks reside & remediate, proving security posture
  • How to automate compliance & audit 
  • And remove complexity while ensuring a secure Identity model
REGISTER TO WATCH ON-DEMAND

Speaking:

Caroline Lawson

SailPoint

Stream C

2:30

Gold Partner Presentation 3 Snyk Empower Your Developers To Scale Application Security

As companies of all kinds increasingly compete with technology, the need for fast and nimble software development has changed the way applications are built. Modern DevOps processes, daily deployments, cloud-native technologies, and an ever-increasing number of developers have all accelerated the development process - and application security needs to keep pace. In order to scale and manage risk in this fast-paced environment, security teams need to shift from the role of gate-keepers to empowerers - enabling their developers to become the front line in the security process.

Speaking:

Ravi Maira

Head of Product, Customer and Partner Marketing , Snyk

Gold Partner Presentation 3 Snyk Empower Your Developers To Scale Application Security

March 16 | 14:30 - 15:00

As companies of all kinds increasingly compete with technology, the need for fast and nimble software development has changed the way applications are built. Modern DevOps processes, daily deployments, cloud-native technologies, and an ever-increasing number of developers have all accelerated the development process - and application security needs to keep pace. In order to scale and manage risk in this fast-paced environment, security teams need to shift from the role of gate-keepers to empowerers - enabling their developers to become the front line in the security process.

REGISTER TO WATCH ON-DEMAND

Speaking:

Ravi Maira

Snyk

Stream A

3:05

Case Study: Enabling working from Home Permanently

  • Remote Access
  • How to keep machines up to date and secure over the internet
  • Educating staff on securing their home network

Speaking:

Stanley Langa

Senior: Information Security Officer, Vitality Group Inc

Case Study: Enabling working from Home Permanently

March 16 | 15:05 - 15:35

  • Remote Access
  • How to keep machines up to date and secure over the internet
  • Educating staff on securing their home network
REGISTER TO WATCH ON-DEMAND

Speaking:

Stanley Langa

Vitality Group Inc

Stream B

3:05

Case Study: Data Sovereignty - How Cloud Computing is Used to Co-own Data and the Struggle to Penetrate the Businesses Using Blockchain Technology.

The controversy on how data is secretly acquired and used to inform major innovations without the host knowing and possibly raising the issues of compensation as well (data monetisation)

Speaking:

Trymore Chawurura

Deputy Director for ICT, Ministry of Health & Child Care (MoHCC)

Case Study: Data Sovereignty - How Cloud Computing is Used to Co-own Data and the Struggle to Penetrate the Businesses Using Blockchain Technology.

March 16 | 15:05 - 15:35

The controversy on how data is secretly acquired and used to inform major innovations without the host knowing and possibly raising the issues of compensation as well (data monetisation)

REGISTER TO WATCH ON-DEMAND

Speaking:

Trymore Chawurura

Ministry of Health & Child Care (MoHCC)

Stream C

3:05

Knowledge Partner: Deloitte Smart Cyber - How AI Can Manage Cyber Risk

The cyber threat landscape is growing exponentially. Insider threats are learning to evade signature-based systems and bad actors are using AI to avoid detection by learning the most common detection rules.

By applying AI and advanced analytics to vast amounts of internal and external data, smart cyber technologies can generate predictive, usable insights that help you make better cyber decisions and protect your organisation from threats.

AI also helps you to detect and respond to threats faster by monitoring the cyber environment with a level of speed and accuracy only machines can provide. Perhaps most important, smart cyber helps you keep pace with today's endless barrage of increasingly sophisticated attacks.

Speaking:

Dina Kamal

Risk Artificial Intelligence Leader, Deloitte

Knowledge Partner: Deloitte Smart Cyber - How AI Can Manage Cyber Risk

March 16 | 15:05 - 15:35

The cyber threat landscape is growing exponentially. Insider threats are learning to evade signature-based systems and bad actors are using AI to avoid detection by learning the most common detection rules.

By applying AI and advanced analytics to vast amounts of internal and external data, smart cyber technologies can generate predictive, usable insights that help you make better cyber decisions and protect your organisation from threats.

AI also helps you to detect and respond to threats faster by monitoring the cyber environment with a level of speed and accuracy only machines can provide. Perhaps most important, smart cyber helps you keep pace with today's endless barrage of increasingly sophisticated attacks.

REGISTER TO WATCH ON-DEMAND

Speaking:

Dina Kamal

Deloitte

Stream A

3:40

Securing your people Crown Jewels: A look at High risk users

  • What and who are your High Risk users
  • Why they need to be secured – Importance and benefits?
  • Some measures that can be put in place
  • Poll results

Speaking:

Jacqueline Hanson Kotei

CGEIT CCO GRCP, MTN Ghana

Securing your people Crown Jewels: A look at High risk users

March 16 | 15:40 - 16:10

  • What and who are your High Risk users
  • Why they need to be secured – Importance and benefits?
  • Some measures that can be put in place
  • Poll results
REGISTER TO WATCH ON-DEMAND

Speaking:

Jacqueline Hanson Kotei

MTN Ghana

Stream B

3:40

Security Organisations Architecture & Design, Multi-sourcing of Security Services and Communicating Cyber Security Value to the Board

Speaking:

Dr. Maclaud Mafaiti

CISO, SAPO

Security Organisations Architecture & Design, Multi-sourcing of Security Services and Communicating Cyber Security Value to the Board

March 16 | 15:40 - 16:10

REGISTER TO WATCH ON-DEMAND

Speaking:

Dr. Maclaud Mafaiti

SAPO

Stream C

3:40

Evolution of SOC

Speaking:

Yaron Slutzky

CISO, Agoda

Evolution of SOC

March 16 | 15:40 - 16:10

REGISTER TO WATCH ON-DEMAND

Speaking:

Yaron Slutzky

Agoda

Stream A

4:15

Panel Discussion: The Pros and Cons of Zero Trust

A deliberation of whether an organisation should you incorporate this Zero Trust framework into its security practices by looking at the following:

  • What is it?
  • How have they moved towards it? If at all?
  • What’s hype, and what’s valuable?
  • How have staff reacted to Zero Trust?
  • Where do you strike a balance between zero trust and draconian policies?

Speaking:

Ross G Saunders

Speaker // Consultant // AdvisorCIPP/E, MSc, C|EH (v10), Ross G Saunders

Bhoopendra [Sanjeev] Jhurry

Head of Security, Bank One (Mauritius)

Ian_Keller SBV

Ian Keller

Executive Member, CyberEdBoard Community

Panel Discussion: The Pros and Cons of Zero Trust

March 16 | 16:15 - 16:45

A deliberation of whether an organisation should you incorporate this Zero Trust framework into its security practices by looking at the following:

  • What is it?
  • How have they moved towards it? If at all?
  • What’s hype, and what’s valuable?
  • How have staff reacted to Zero Trust?
  • Where do you strike a balance between zero trust and draconian policies?
REGISTER TO WATCH ON-DEMAND

Speaking:

Bhoopendra [Sanjeev] Jhurry

Bank One (Mauritius)

Ross G Saunders

Ross G Saunders

Ian_Keller SBV

Ian Keller

CyberEdBoard Community

Stream B

4:15

Panel Discussion: IAM & PAM Systems Monitoring and Measuring

A majority of successful ransomware and malware related breaches are due to identity and privilege exploits. In spite of massive investment in the implementation of privileged user and normal user IAM and PAM systems, these attacks continue to occur, and to succeed and are increasing in their severity.  

  • Is this increase because the IAM and PAM systems have been left almost unmonitored or poorly-configured
  • Are the breaches attributed to a systemic failure of governance, where control presence compliance (i.e Tick Box style control verification) has been used for regulatory compliance purposes, rather than risk based compliance
  • How can this be overcome?

Speaking:

Steve Jump

Director and CEO, Custodiet Advisory Services

Mark Eggleston

VP, CISPO, Health Partners Plan

Gerhard Cronje

Head: Cyber and Information Security, South African Reserve Bank

Itumeleng Makgati

CISO, Sasol

Jawad Khalid Mirza

Chief Information Security Officer, Askari Bank

Panel Discussion: IAM & PAM Systems Monitoring and Measuring

March 16 | 16:15 - 16:45

A majority of successful ransomware and malware related breaches are due to identity and privilege exploits. In spite of massive investment in the implementation of privileged user and normal user IAM and PAM systems, these attacks continue to occur, and to succeed and are increasing in their severity.  

  • Is this increase because the IAM and PAM systems have been left almost unmonitored or poorly-configured
  • Are the breaches attributed to a systemic failure of governance, where control presence compliance (i.e Tick Box style control verification) has been used for regulatory compliance purposes, rather than risk based compliance
  • How can this be overcome?
REGISTER TO WATCH ON-DEMAND

Speaking:

Itumeleng Makgati

Sasol

Steve Jump

Custodiet Advisory Services

Jawad Khalid Mirza

Askari Bank

Gerhard Cronje

South African Reserve Bank

Mark Eggleston

Health Partners Plan

Stream C

4:15

Panel Discussion: Challenges to Gender Equality in the Security Sector

A lot has been done in the area of ICT Security but what are the best ways to increase women’s meaningful participation in the peace and security sectors.

Speaking:

Kerissa Varma

Chief Information Security Officer, Old Mutual Limited (SA)

Adele Jones

Lead Architect: Information Security & Blockchain, Nedbank

Panel Discussion: Challenges to Gender Equality in the Security Sector

March 16 | 16:15 - 16:15

A lot has been done in the area of ICT Security but what are the best ways to increase women’s meaningful participation in the peace and security sectors.

REGISTER TO WATCH ON-DEMAND

Speaking:

Adele Jones

Nedbank

Kerissa Varma

Old Mutual Limited (SA)

4:40

End of Day 1

End of Day 1

March 16 | 16:40 - 12:15

REGISTER TO WATCH ON-DEMAND

Speaking:

Day 2 17 March 2021
08:45

CISO Africa 2021 Platform Opens

CISO Africa 2021 Platform Opens

March 17 | 08:45 - 09:00

REGISTER TO WATCH ON-DEMAND

Speaking:

09:00

Platinum Partner 4 – OneTrust GRC Secure Work Anywhere

The global pandemic and impacts stemming from COVID-19 shook up operations across the globe. Both, security and cultural impacts stemming from the pandemic continue to emerge for businesses. As organizations have navigated their way through return to office scenarios, there are a number of new employee expectations and employer considerations to think through. Rather than only focusing on the point-in-time circumstances of “secure work-from-home” operations, many organizations are considering a proactive “secure-work-anywhere” policy. In this webinar, we’ll highlight what aspects of secure work anywhere have been successfully in place prior to regional waves of quarantine, supporting productivity through employee mental and physical health considerations, privacy considerations for employees' personal environments, empowering your plan with innovative solutions and technology. ​

KEY TAKEAWAYS:  ​
  • What disciplines and business structure have already been operating “secure work anywhere”?​
  • How can the extent of your internal governance policies can help or inhibit your employees ability to execute their job effectively?​
  • Considerations to balance security-based monitoring and employee privacy rights within personal environments​
  • Technology and innovative strategies to put your “secure-work-anywhere” plans in motion. 

Speaking:

Scott Bridgen

GRC Consulting Director, OneTrust

Platinum Partner 4 – OneTrust GRC Secure Work Anywhere

March 17 | 09:00 - 09:30

The global pandemic and impacts stemming from COVID-19 shook up operations across the globe. Both, security and cultural impacts stemming from the pandemic continue to emerge for businesses. As organizations have navigated their way through return to office scenarios, there are a number of new employee expectations and employer considerations to think through. Rather than only focusing on the point-in-time circumstances of “secure work-from-home” operations, many organizations are considering a proactive “secure-work-anywhere” policy. In this webinar, we’ll highlight what aspects of secure work anywhere have been successfully in place prior to regional waves of quarantine, supporting productivity through employee mental and physical health considerations, privacy considerations for employees' personal environments, empowering your plan with innovative solutions and technology. ​

KEY TAKEAWAYS:  ​
  • What disciplines and business structure have already been operating “secure work anywhere”?​
  • How can the extent of your internal governance policies can help or inhibit your employees ability to execute their job effectively?​
  • Considerations to balance security-based monitoring and employee privacy rights within personal environments​
  • Technology and innovative strategies to put your “secure-work-anywhere” plans in motion. 
REGISTER TO WATCH ON-DEMAND

Speaking:

Scott Bridgen

OneTrust

09:30

Panel Discussion: Cyber Security Evolution Due to Covid- 19

What will the new security landscape look like in the era of Covid? How are organizations coping? What new strategies are they adopting?

Speaking:

Ross G Saunders

Speaker // Consultant // AdvisorCIPP/E, MSc, C|EH (v10), Ross G Saunders

Tauseef Aslam

CISO, Telenor

Ahmed Nabil Mahmoud

Regional Senior Information Security & Risk Manager, Leading International Bank (UAE)

Panel Discussion: Cyber Security Evolution Due to Covid- 19

March 17 | 09:30 - 10:00

What will the new security landscape look like in the era of Covid? How are organizations coping? What new strategies are they adopting?

REGISTER TO WATCH ON-DEMAND

Speaking:

Ahmed Nabil Mahmoud

Leading International Bank (UAE)

Ross G Saunders

Ross G Saunders

Tauseef Aslam

Telenor

10:00

Platinum Partner 5 – Kaspersky From Surviving to Thriving - CISO’s Lessons From 2020 and Priorities for 2021

  • Teleworking in 2020, what did we learn
  • Strategic priorities for CISO’s going into 2021

Speaking:

Lehan van den Heever

Enterprise Cyber Security Advisor, Kaspersky

Platinum Partner 5 – Kaspersky From Surviving to Thriving - CISO’s Lessons From 2020 and Priorities for 2021

March 17 | 10:00 - 10:30

  • Teleworking in 2020, what did we learn
  • Strategic priorities for CISO’s going into 2021
REGISTER TO WATCH ON-DEMAND

Speaking:

Lehan van den Heever

Kaspersky

10:30

Demo Session: Puleng

Demo Session: Puleng

March 17 | 10:30 - 10:45

REGISTER TO WATCH ON-DEMAND

Speaking:

10:30

Virtual Coffee Break

Virtual Coffee Break

March 17 | 10:30 - 11:00

REGISTER TO WATCH ON-DEMAND

Speaking:

10:45

Case Study: Shared Cybersecurity

Speaking:

Farooq Naiyer

CISO, Ontario Cybersecurity Higher Education Consortium, Canada

Case Study: Shared Cybersecurity

March 17 | 10:45 - 11:15

REGISTER TO WATCH ON-DEMAND

Speaking:

Farooq Naiyer

Ontario Cybersecurity Higher Education Consortium, Canada

11:15

Platinum Partner 6 Numata Cyber Security in partnership with Ironscales The challenges of an interconnected world: are you prepared for tomorrow’s phishing attacks today?

Speaking:

Liza Weschta

Cyber Security Product Manager – SA & UK, NI, Numata Cyber Security

Platinum Partner 6 Numata Cyber Security in partnership with Ironscales The challenges of an interconnected world: are you prepared for tomorrow’s phishing attacks today?

March 17 | 11:15 - 11:45

REGISTER TO WATCH ON-DEMAND

Speaking:

Liza Weschta

Numata Cyber Security

11:45

Case Study: Enterprise DevSecOps Transformation – Our Story

Speaking:

BTMaetsa_profile_pic

Bramley Maetsa

DevOps Enablement Team Lead , Sasol Information Management

Case Study: Enterprise DevSecOps Transformation – Our Story

March 17 | 11:45 - 12:15

REGISTER TO WATCH ON-DEMAND

Speaking:

BTMaetsa_profile_pic

Bramley Maetsa

Sasol Information Management

12:15

Demo Session: Puleng

Demo Session: Puleng

March 17 | 12:15 - 12:30

REGISTER TO WATCH ON-DEMAND

Speaking:

12:15

Virtual Lunch Break

Virtual Lunch Break

March 17 | 12:15 - 12:30

REGISTER TO WATCH ON-DEMAND

Speaking:

12:30

Gold Partner Presentation 4 Veeam Software South Africa (Pty) Ltd Where Is My Data !! ? We Still Got Breached !! How Do We Remediate ? & What Trends Should We Be Aware of For 2021 ?

Cyberthreats, including attacks such as ransomware, spyware and malware, are among the most common IT challenge for CISO's ,what would you do in the case your Data is attacked and held ransom? Attacks have increased in numbers and complexity and spread to organisations of all industries globally . As the new norm , we must accept the fact that cyberattacks are more prevalent than ever . This impact both our professional and personal lives, unless we are prepared — this session will help you gain insight into data protection best practises in preparation for Cyberthreats & to gain insights into new advanced threat trends.

  • How to prepare against Cyberthreats
  • Backup is essential, but Restore is critical
  • Can you be 100% Secure?
  • Insights in advanced threats outside your organisation 2021

Speaking:

Ian Engelbrecht

Team Lead, Systems Engineer , Veeam Software

Gold Partner Presentation 4 Veeam Software South Africa (Pty) Ltd Where Is My Data !! ? We Still Got Breached !! How Do We Remediate ? & What Trends Should We Be Aware of For 2021 ?

March 17 | 12:30 - 13:15

Cyberthreats, including attacks such as ransomware, spyware and malware, are among the most common IT challenge for CISO's ,what would you do in the case your Data is attacked and held ransom? Attacks have increased in numbers and complexity and spread to organisations of all industries globally . As the new norm , we must accept the fact that cyberattacks are more prevalent than ever . This impact both our professional and personal lives, unless we are prepared — this session will help you gain insight into data protection best practises in preparation for Cyberthreats & to gain insights into new advanced threat trends.

  • How to prepare against Cyberthreats
  • Backup is essential, but Restore is critical
  • Can you be 100% Secure?
  • Insights in advanced threats outside your organisation 2021
REGISTER TO WATCH ON-DEMAND

Speaking:

Ian Engelbrecht

Veeam Software

1:15

Case Study: The Undeniable Link Between Cyber Hygiene and Cyber Security

Speaking:

Khensani Khoza

Chief Information Officer, AgriSETA (Agricultural Sector Education and Training Authority)

Case Study: The Undeniable Link Between Cyber Hygiene and Cyber Security

March 17 | 13:15 - 13:45

REGISTER TO WATCH ON-DEMAND

Speaking:

Khensani Khoza

AgriSETA (Agricultural Sector Education and Training Authority)

1:45

Platinum Partner 7 CyberArk It’s Human Error to Make Mistakes – Attackers are banking on it

Falling victim to a Social Engineering Attack, Accidental Damage caused by excessive permissions and Misconfiguration are all elements of Human Error that Attackers will exploit – and persistently have done so to date. In this session we review what approaches could be taken to prevent such mistakes but also, and perhaps more importantly, limit their impact. The last point being – should we assume it is human to make mistakes, and so they will continue to happen – therefore our strategy should initially focus on reducing the impact of such incidents? We therefore will discuss isolating attacks from the initial point of intrusion, controlling user privileges and some methods for reducing and identifying misconfiguration.

Speaking:

Gary Pollock

Solutions Engineering Team-Leader: Middle-East & Africa, CyberArk

Platinum Partner 7 CyberArk It’s Human Error to Make Mistakes – Attackers are banking on it

March 17 | 13:45 - 14:15

Falling victim to a Social Engineering Attack, Accidental Damage caused by excessive permissions and Misconfiguration are all elements of Human Error that Attackers will exploit – and persistently have done so to date. In this session we review what approaches could be taken to prevent such mistakes but also, and perhaps more importantly, limit their impact. The last point being – should we assume it is human to make mistakes, and so they will continue to happen – therefore our strategy should initially focus on reducing the impact of such incidents? We therefore will discuss isolating attacks from the initial point of intrusion, controlling user privileges and some methods for reducing and identifying misconfiguration.

REGISTER TO WATCH ON-DEMAND

Speaking: