CISO AFRICA: LIVE
MARCH 16 & 17, 2021 | DESKTOP, MOBILE & TABLET
Speaking:
Speaker // Consultant // AdvisorCIPP/E, MSc, C|EH (v10), Ross G Saunders
Speaking:
CISO, Indiana University Health (USA)
March 16 | 09:00 - 09:30
Speaking:
Director of Strategy & Offering Management, IBM
Speaking:
Chief Information Security Officer (CISO), GCB Bank Limited (Ghana)
Speaking:
Solutions Engineer, Saviynt
March 16 | 10:45 - 11:00
The future of work remains unpredictable and uncertain. More than ever before, business leaders need to remain confident that their operations can continue securely in the face of global or even regional crises, and while sections of the economy are slowly re-opening, cyber-attackers are ramping up their campaigns.
As businesses look set to rely on cloud and SaaS tools for the long term, our digital environments are going to be more dynamic than ever. Yet organizations are finding themselves undergoing a delicate balancing act—each new work practice and technology that is introduced also brings unforeseen risk. Static, legacy approaches have become redundant, both unintelligent and ill-equipped to adapt.
Organizations must rethink their approach to security and rely on new technologies like AI to achieve much-needed adaptability and resilience. Darktrace is the world leader in cyber-AI technology, and leverages unsupervised machine learning to seamlessly adapt and integrate into changing environments, and to detect and respond to attacks in the earliest moments
Speaking:
Director of Technology, Darktrace
March 16 | 11:00 - 11:30
The future of work remains unpredictable and uncertain. More than ever before, business leaders need to remain confident that their operations can continue securely in the face of global or even regional crises, and while sections of the economy are slowly re-opening, cyber-attackers are ramping up their campaigns.
As businesses look set to rely on cloud and SaaS tools for the long term, our digital environments are going to be more dynamic than ever. Yet organizations are finding themselves undergoing a delicate balancing act—each new work practice and technology that is introduced also brings unforeseen risk. Static, legacy approaches have become redundant, both unintelligent and ill-equipped to adapt.
Organizations must rethink their approach to security and rely on new technologies like AI to achieve much-needed adaptability and resilience. Darktrace is the world leader in cyber-AI technology, and leverages unsupervised machine learning to seamlessly adapt and integrate into changing environments, and to detect and respond to attacks in the earliest moments
Speaking:
CISO, Sasol
Speaking:
VP Channel Development and Operations, Saviynt
Senior Program Manager in the Identity Division of the Cloud + Enterprise organization, Microsoft
March 16 | 12:10 - 12:40
Speaking:
EMEA Sales Engineering Director, Metallic , Commvault
Cloud and Enterprise Business Group Lead, Microsoft
Speaking:
Speaker // Consultant // AdvisorCIPP/E, MSc, C|EH (v10), Ross G Saunders
Global Head of IT Security, Sappi
Regional Senior Information Security & Risk Manager, Leading International Bank (UAE)
DevOps Enablement Team Lead , Sasol Information Management
March 16 | 13:45 - 14:15
In today’s threat landscape, SOC teams are buried under countless security alerts impacting their ability to address those events that present the greatest risk to the organisation. Identifying key areas for response automation can help with alert fatigue, ensure the team is focused on the most critical alerts, and significantly reduce mean-time-to-recovery.
In this presentation, Anthony Di Bello, Vice President of Strategic Development at OpenText will look at:
Speaking:
Vice President of Strategic Development, OpenText
March 16 | 14:30 - 15:00
In today’s threat landscape, SOC teams are buried under countless security alerts impacting their ability to address those events that present the greatest risk to the organisation. Identifying key areas for response automation can help with alert fatigue, ensure the team is focused on the most critical alerts, and significantly reduce mean-time-to-recovery.
In this presentation, Anthony Di Bello, Vice President of Strategic Development at OpenText will look at:
Today we will discuss how to approach your IGA Programme so it meets these key objectives
Speaking:
Identity Strategist, SailPoint
March 16 | 14:30 - 15:00
Today we will discuss how to approach your IGA Programme so it meets these key objectives
As companies of all kinds increasingly compete with technology, the need for fast and nimble software development has changed the way applications are built. Modern DevOps processes, daily deployments, cloud-native technologies, and an ever-increasing number of developers have all accelerated the development process - and application security needs to keep pace. In order to scale and manage risk in this fast-paced environment, security teams need to shift from the role of gate-keepers to empowerers - enabling their developers to become the front line in the security process.
Speaking:
Head of Product, Customer and Partner Marketing , Snyk
March 16 | 14:30 - 15:00
As companies of all kinds increasingly compete with technology, the need for fast and nimble software development has changed the way applications are built. Modern DevOps processes, daily deployments, cloud-native technologies, and an ever-increasing number of developers have all accelerated the development process - and application security needs to keep pace. In order to scale and manage risk in this fast-paced environment, security teams need to shift from the role of gate-keepers to empowerers - enabling their developers to become the front line in the security process.
Speaking:
Senior: Information Security Officer, Vitality Group Inc
The controversy on how data is secretly acquired and used to inform major innovations without the host knowing and possibly raising the issues of compensation as well (data monetisation)
Speaking:
Deputy Director for ICT, Ministry of Health & Child Care (MoHCC)
March 16 | 15:05 - 15:35
The controversy on how data is secretly acquired and used to inform major innovations without the host knowing and possibly raising the issues of compensation as well (data monetisation)
The cyber threat landscape is growing exponentially. Insider threats are learning to evade signature-based systems and bad actors are using AI to avoid detection by learning the most common detection rules.
By applying AI and advanced analytics to vast amounts of internal and external data, smart cyber technologies can generate predictive, usable insights that help you make better cyber decisions and protect your organisation from threats.
AI also helps you to detect and respond to threats faster by monitoring the cyber environment with a level of speed and accuracy only machines can provide. Perhaps most important, smart cyber helps you keep pace with today's endless barrage of increasingly sophisticated attacks.
Speaking:
Risk Artificial Intelligence Leader, Deloitte
March 16 | 15:05 - 15:35
The cyber threat landscape is growing exponentially. Insider threats are learning to evade signature-based systems and bad actors are using AI to avoid detection by learning the most common detection rules.
By applying AI and advanced analytics to vast amounts of internal and external data, smart cyber technologies can generate predictive, usable insights that help you make better cyber decisions and protect your organisation from threats.
AI also helps you to detect and respond to threats faster by monitoring the cyber environment with a level of speed and accuracy only machines can provide. Perhaps most important, smart cyber helps you keep pace with today's endless barrage of increasingly sophisticated attacks.
Speaking:
CGEIT CCO GRCP, MTN Ghana
Speaking:
CISO, Agoda
A deliberation of whether an organisation should you incorporate this Zero Trust framework into its security practices by looking at the following:
Speaking:
Speaker // Consultant // AdvisorCIPP/E, MSc, C|EH (v10), Ross G Saunders
Head of Security, Bank One (Mauritius)
Executive Member, CyberEdBoard Community
March 16 | 16:15 - 16:45
A deliberation of whether an organisation should you incorporate this Zero Trust framework into its security practices by looking at the following:
A majority of successful ransomware and malware related breaches are due to identity and privilege exploits. In spite of massive investment in the implementation of privileged user and normal user IAM and PAM systems, these attacks continue to occur, and to succeed and are increasing in their severity.
Speaking:
Director and CEO, Custodiet Advisory Services
VP, CISPO, Health Partners Plan
Head: Cyber and Information Security, South African Reserve Bank
CISO, Sasol
Chief Information Security Officer, Askari Bank
March 16 | 16:15 - 16:45
A majority of successful ransomware and malware related breaches are due to identity and privilege exploits. In spite of massive investment in the implementation of privileged user and normal user IAM and PAM systems, these attacks continue to occur, and to succeed and are increasing in their severity.
A lot has been done in the area of ICT Security but what are the best ways to increase women’s meaningful participation in the peace and security sectors.
Speaking:
Chief Information Security Officer, Old Mutual Limited (SA)
Lead Architect: Information Security & Blockchain, Nedbank
March 16 | 16:15 - 16:15
A lot has been done in the area of ICT Security but what are the best ways to increase women’s meaningful participation in the peace and security sectors.
Speaking:
GRC Consulting Director, OneTrust
March 17 | 09:00 - 09:30
What will the new security landscape look like in the era of Covid? How are organizations coping? What new strategies are they adopting?
Speaking:
Speaker // Consultant // AdvisorCIPP/E, MSc, C|EH (v10), Ross G Saunders
CISO, Telenor
Regional Senior Information Security & Risk Manager, Leading International Bank (UAE)
March 17 | 09:30 - 10:00
What will the new security landscape look like in the era of Covid? How are organizations coping? What new strategies are they adopting?
Speaking:
Enterprise Cyber Security Advisor, Kaspersky
Speaking:
CISO, Ontario Cybersecurity Higher Education Consortium, Canada
Speaking:
Cyber Security Product Manager – SA & UK, NI, Numata Cyber Security
Speaking:
DevOps Enablement Team Lead , Sasol Information Management
Cyberthreats, including attacks such as ransomware, spyware and malware, are among the most common IT challenge for CISO's ,what would you do in the case your Data is attacked and held ransom? Attacks have increased in numbers and complexity and spread to organisations of all industries globally . As the new norm , we must accept the fact that cyberattacks are more prevalent than ever . This impact both our professional and personal lives, unless we are prepared — this session will help you gain insight into data protection best practises in preparation for Cyberthreats & to gain insights into new advanced threat trends.
Speaking:
Team Lead, Systems Engineer , Veeam Software
March 17 | 12:30 - 13:15
Cyberthreats, including attacks such as ransomware, spyware and malware, are among the most common IT challenge for CISO's ,what would you do in the case your Data is attacked and held ransom? Attacks have increased in numbers and complexity and spread to organisations of all industries globally . As the new norm , we must accept the fact that cyberattacks are more prevalent than ever . This impact both our professional and personal lives, unless we are prepared — this session will help you gain insight into data protection best practises in preparation for Cyberthreats & to gain insights into new advanced threat trends.
Speaking:
Chief Information Officer, AgriSETA (Agricultural Sector Education and Training Authority)
Falling victim to a Social Engineering Attack, Accidental Damage caused by excessive permissions and Misconfiguration are all elements of Human Error that Attackers will exploit – and persistently have done so to date. In this session we review what approaches could be taken to prevent such mistakes but also, and perhaps more importantly, limit their impact. The last point being – should we assume it is human to make mistakes, and so they will continue to happen – therefore our strategy should initially focus on reducing the impact of such incidents? We therefore will discuss isolating attacks from the initial point of intrusion, controlling user privileges and some methods for reducing and identifying misconfiguration.
Speaking:
Solutions Engineering Team-Leader: Middle-East & Africa, CyberArk
March 17 | 13:45 - 14:15
Falling victim to a Social Engineering Attack, Accidental Damage caused by excessive permissions and Misconfiguration are all elements of Human Error that Attackers will exploit – and persistently have done so to date. In this session we review what approaches could be taken to prevent such mistakes but also, and perhaps more importantly, limit their impact. The last point being – should we assume it is human to make mistakes, and so they will continue to happen – therefore our strategy should initially focus on reducing the impact of such incidents? We therefore will discuss isolating attacks from the initial point of intrusion, controlling user privileges and some methods for reducing and identifying misconfiguration.