<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=306561&amp;fmt=gif">






CISO AFRICA: LIVE

SEPTEMBER 21 & 22, 2021 | DESKTOP, MOBILE & TABLET

ENGAGE SENIOR SECURITY LEADERS AT THIS UNIQUE VIRTUAL EVENT

DOWNLOAD THE AGENDA REGISTER AND WATCH ON DEMAND
Day 1 - 21 September 2021
08:30

Opening of CISO Africa Live 2021

Opening of CISO Africa Live 2021

September 21 | 08:30 - 09:00

REGISTER AND WATCH ON DEMAND

Speaking:

09:00

Diamond Partner Presentation: The New Security & Compliance Landscape

Speaking:

Cyril Voisin

EMEA Leader: Chief Security Advisor

Diamond Partner Presentation: The New Security & Compliance Landscape

September 21 | 09:00 - 09:30

REGISTER AND WATCH ON DEMAND

Speaking:

Cyril Voisin

09:35

International Keynote: How To Build Security Governance For Digital Transformation That Security Transformation

Speaking:

International Keynote: How To Build Security Governance For Digital Transformation That Security Transformation

September 21 | 09:35 - 10:00

REGISTER AND WATCH ON DEMAND

Speaking:

10:00

International Keynote: New Frontiers For Cyber Attacks

Speaking:

Tunde Dada

Group Head IT, Inq Digital in Africa (Formerly Vodacom Africa)

International Keynote: New Frontiers For Cyber Attacks

September 21 | 10:00 - 10:20

REGISTER AND WATCH ON DEMAND

Speaking:

Tunde Dada

10:20

Demo Partner Session - Sonatype

Demo Partner Session - Sonatype

September 21 | 10:20 - 10:35

REGISTER AND WATCH ON DEMAND

Speaking:

10:20

Virtual Coffee Break & Demo Theatre

Virtual Coffee Break & Demo Theatre

September 21 | 10:20 - 10:35

REGISTER AND WATCH ON DEMAND

Speaking:

10:35

Platinum Partner Presentation - The Battle of the Algorithms: How AI is Beating AI at it's Own Game

Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. As AI-driven attacks evolve, they will be almost indistinguishable from genuine activity, and conducted at an unprecedented speed and scale. In the face of offensive AI, only defensive AI can fight back, detecting even the most subtle indicators of attack in real time, and respond with surgical actions to neutralize threats - wherever they strike.  

  In this session, discover: 

  • How cyber-criminals are leveraging AI tools to create sophisticated cyber weapons  
  • What an AI-powered spoofing threat may look like, and why humans will not be able to spot them 
  • Why defensive AI technologies are uniquely positioned to fight back  

Speaking:

Max Heinemeyer

Director: Threat Hunting, Darktrace

Platinum Partner Presentation - The Battle of the Algorithms: How AI is Beating AI at it's Own Game

September 21 | 10:35 - 11:10

Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. As AI-driven attacks evolve, they will be almost indistinguishable from genuine activity, and conducted at an unprecedented speed and scale. In the face of offensive AI, only defensive AI can fight back, detecting even the most subtle indicators of attack in real time, and respond with surgical actions to neutralize threats - wherever they strike.  

  In this session, discover: 

  • How cyber-criminals are leveraging AI tools to create sophisticated cyber weapons  
  • What an AI-powered spoofing threat may look like, and why humans will not be able to spot them 
  • Why defensive AI technologies are uniquely positioned to fight back  
REGISTER AND WATCH ON DEMAND

Speaking:

Max Heinemeyer

11:10

The African Cyber Security Leaders Panel

Speaking:

Gus Clarke

Head of Security, Tari Labs

Happy Amon

Deputy Director: Cyber Security, Government of Botswana

Stacy Chege

CISO, IPSL

The African Cyber Security Leaders Panel

September 21 | 11:10 - 11:35

REGISTER AND WATCH ON DEMAND

Speaking:

Gus Clarke

Happy Amon

Stacy Chege

11:35

Platinum Partner Presentation - Supply Chain Attacks are the New High Watermark of Attacks

Supply chain-based attacks continue to be on the rise. Attackers always choose the easiest path. Today, it’s often done by first compromising one of the end target’s suppliers, and then abusing the trust relationship that they have with the target to gain entry.  Simply speaking, what is more likely, that the target opens an unknown email with an attachment, or the invoice that a known supplier sends?

In this talk, you will discover:

  1. An analysis of some of the most prominent supply-chain-based attacks, including Kayesa, SolarWinds, and NotPetya
  2. Recommendations for C-Level decision-makers on how to combat supply chain-based attacks.

Speaking:

Milad Aslaner

Senior Director: Cyber Defense Strategy, SentinelOne

Platinum Partner Presentation - Supply Chain Attacks are the New High Watermark of Attacks

September 21 | 11:35 - 12:10

Supply chain-based attacks continue to be on the rise. Attackers always choose the easiest path. Today, it’s often done by first compromising one of the end target’s suppliers, and then abusing the trust relationship that they have with the target to gain entry.  Simply speaking, what is more likely, that the target opens an unknown email with an attachment, or the invoice that a known supplier sends?

In this talk, you will discover:

  1. An analysis of some of the most prominent supply-chain-based attacks, including Kayesa, SolarWinds, and NotPetya
  2. Recommendations for C-Level decision-makers on how to combat supply chain-based attacks.
REGISTER AND WATCH ON DEMAND

Speaking:

Milad Aslaner

12:10

Demo Partner Session - Checkpoint

Demo Partner Session - Checkpoint

September 21 | 12:10 - 12:25

REGISTER AND WATCH ON DEMAND

Speaking:

12:10

Virtual Lunch Break & Demo Theatre

Virtual Lunch Break & Demo Theatre

September 21 | 12:10 - 12:40

REGISTER AND WATCH ON DEMAND

Speaking:

12:40

Challenges & Opportunities in Cyber Threat Intelligence

Speaking:

Ronald Martey

Chief Information Security Officer (CISO), GCB Bank Limited

Challenges & Opportunities in Cyber Threat Intelligence

September 21 | 12:40 - 13:05

REGISTER AND WATCH ON DEMAND

Speaking:

Ronald Martey

1:05

The Australian Cyber Security Leaders Panel: Moving Rapidly to Secure Remote Work

Speaking:

Ashwin Pal

Director, Cyber Security, Unisys

The Australian Cyber Security Leaders Panel: Moving Rapidly to Secure Remote Work

September 21 | 13:05 - 13:30

REGISTER AND WATCH ON DEMAND

Speaking:

Ashwin Pal

1:30

More Threats, More Systems, More Locations: The Challenges of Scaling Security

There are more threats, with far smarter attacks and hackers than ever before. When coupled with the massive growth in systems, endpoints and platforms as well as the wide array of tools and solutions, it can be overwhelming. The multi-location security dream is only achievable with DevSecOps and artificially intelligent tooling to help humans scale.
 
Join the Snapt team discussion to gain insights on global trends so you can future proof your systems. Dave will share his approach to AI and how it, when combined with machine learning, can augment humans and what DevSecOps teams' roles are in scaling and automating responses to these trends.

Speaking:

Dave Blakey

CEO, Snapt

More Threats, More Systems, More Locations: The Challenges of Scaling Security

September 21 | 13:30 - 14:05

There are more threats, with far smarter attacks and hackers than ever before. When coupled with the massive growth in systems, endpoints and platforms as well as the wide array of tools and solutions, it can be overwhelming. The multi-location security dream is only achievable with DevSecOps and artificially intelligent tooling to help humans scale.
 
Join the Snapt team discussion to gain insights on global trends so you can future proof your systems. Dave will share his approach to AI and how it, when combined with machine learning, can augment humans and what DevSecOps teams' roles are in scaling and automating responses to these trends.
REGISTER AND WATCH ON DEMAND

Speaking:

Dave Blakey

2:05

Interview: Preventing the Skills Shortage Pandemic

Speaking:

Karissa Varma

CISO, Old Mutual (South Africa)

Interview: Preventing the Skills Shortage Pandemic

September 21 | 14:05 - 14:30

REGISTER AND WATCH ON DEMAND

Speaking:

Karissa Varma

2:30

Virtual Coffee Break & Demo Theatre

Virtual Coffee Break & Demo Theatre

September 21 | 14:30 - 14:45

REGISTER AND WATCH ON DEMAND

Speaking:

Track A

2:45

Reserved for Gold Partner - Oracle

Speaking:

Loumi Hakim

Product Manager: Database Security, Oracle

Reserved for Gold Partner - Oracle

September 21 | 14:45 - 15:10

REGISTER AND WATCH ON DEMAND

Speaking:

Loumi Hakim

Track B

2:45

Gold Partner Presentation: Building a Robust Cybersecurity, Privacy & Resilience (CPR) Program

Speaking:

Craig Rosewarne

Managing Director, Wolfpack Information Risk

Gold Partner Presentation: Building a Robust Cybersecurity, Privacy & Resilience (CPR) Program

September 21 | 14:45 - 14:55

REGISTER AND WATCH ON DEMAND

Speaking:

Craig Rosewarne

Track C

2:45

Reserved for Gold Partner - Commvault

Speaking:

Patrick McGrath

Director: Product Manager - Data Intelligence

Reserved for Gold Partner - Commvault

September 21 | 14:45 - 15:10

REGISTER AND WATCH ON DEMAND

Speaking:

Patrick McGrath

Track B

2:55

Gold Partner Presentation: Using Hackers to Beat Hackers: Harnessing 1,500 Elite Hackers to Keep Your Organisation Safe

Speaking:

Justin Shaw-Gray

Sales Director UKI, Synack

Ross Asquith

Solutions Architect, Synack

Gold Partner Presentation: Using Hackers to Beat Hackers: Harnessing 1,500 Elite Hackers to Keep Your Organisation Safe

September 21 | 14:55 - 15:05

REGISTER AND WATCH ON DEMAND

Speaking:

Ross Asquith

Justin Shaw-Gray

Track A

3:10

The Impact of Cyber Threats on Organisational Data Integrity within Supply Chain Management

Speaking:

Nehson Pillay

Independent CISO and Forensics Investigator

The Impact of Cyber Threats on Organisational Data Integrity within Supply Chain Management

September 21 | 15:10 - 15:35

REGISTER AND WATCH ON DEMAND

Speaking:

Nehson Pillay

Track B

3:10

Back to Basics – A Look at Basic Cyber Hygiene Practices Every CISO Should be Doing

Speaking:

Back to Basics – A Look at Basic Cyber Hygiene Practices Every CISO Should be Doing

September 21 | 15:10 - 15:35

REGISTER AND WATCH ON DEMAND

Speaking:

Track C

3:10

Moving to DevSecOps

Speaking:

Yaron Slutzky

CISO, Agoda

Moving to DevSecOps

September 21 | 15:10 - 15:35

REGISTER AND WATCH ON DEMAND

Speaking:

Yaron Slutzky

Track A

3:35

Interview: The Great Cybersecurity Automation Debate - Is Automation a Viable Alternative to Addressing the Cyber Skills Shortage?

Speaking:

Marcus Or

Manager: Technology Risk & Compliance, crypto.com

Interview: The Great Cybersecurity Automation Debate - Is Automation a Viable Alternative to Addressing the Cyber Skills Shortage?

September 21 | 15:35 - 16:00

REGISTER AND WATCH ON DEMAND

Speaking:

Marcus Or

Track B

3:35

Cloud Security in 2021 - What’s New?

Speaking:

Ahmed Nabil Mahmoud

Regional Senior Information Security & Risk Manager, Standard Chartered Bank (UAE)

Cloud Security in 2021 - What’s New?

September 21 | 15:35 - 16:00

REGISTER AND WATCH ON DEMAND

Speaking:

Ahmed Nabil Mahmoud

Track C

3:35

The Importance of Basic Controls & Metrics in a Cyber Security Strategy

Speaking:

The Importance of Basic Controls & Metrics in a Cyber Security Strategy

September 21 | 15:35 - 16:00

REGISTER AND WATCH ON DEMAND

Speaking:

Day 2 - 22 September 2021
09:00

Opening of CISO Africa Live 2021

Opening of CISO Africa Live 2021

September 22 | 09:00 - 09:35

REGISTER AND WATCH ON DEMAND

Speaking:

09:35

Opening Keynote: Fostering a Security Culture - Turning your Workforce into Cyber Superheroes

Speaking:

Henry Denner

IT Security Officer, Gautrain Management Agency

Opening Keynote: Fostering a Security Culture - Turning your Workforce into Cyber Superheroes

September 22 | 09:35 - 10:00

REGISTER AND WATCH ON DEMAND

Speaking:

Henry Denner

10:00

Driving Open Source Innovation Using DevSecOps

Speaking:

Driving Open Source Innovation Using DevSecOps

September 22 | 10:00 - 10:20

REGISTER AND WATCH ON DEMAND

Speaking:

10:20

Virtual Coffee Break & Demo Theatre

Virtual Coffee Break & Demo Theatre

September 22 | 10:20 - 10:35

REGISTER AND WATCH ON DEMAND

Speaking:

10:35

Reserved for Platinum Partner - KnowBe4

Reserved for Platinum Partner - KnowBe4

September 22 | 10:35 - 11:10

REGISTER AND WATCH ON DEMAND

Speaking:

11:10

2021 BoIS Global Top 100 LinkedIn Live Panel Discussion - MEA

Speaking:

Robin Barnwell

Head: Security Strategy Enablement, Standard Bank

Loritta Kudumba

Head of IT Governance, Risk and Compliance, Barloworld Equipment

2021 BoIS Global Top 100 LinkedIn Live Panel Discussion - MEA

September 22 | 11:10 - 11:35

REGISTER AND WATCH ON DEMAND

Speaking:

Loritta Kudumba

Robin Barnwell

11:35

Reserved for Platinum Partner 5

Reserved for Platinum Partner 5

September 22 | 11:35 - 12:10

REGISTER AND WATCH ON DEMAND

Speaking:

12:10

Virtual Lunch Break & Demo Theatre

Virtual Lunch Break & Demo Theatre

September 22 | 12:10 - 12:40

REGISTER AND WATCH ON DEMAND

Speaking:

12:40

My Neighbour Hacked my Toothbrush!

Speaking:

Garry Scobie

Deputy CISO, The University of Edinburgh

My Neighbour Hacked my Toothbrush!

September 22 | 12:40 - 13:05

REGISTER AND WATCH ON DEMAND

Speaking:

Garry Scobie

1:05

Fireside Chat: What has been your Approach to Cloud Security?

Speaking:

Paul Morley

Executive: Group Data Service, Nedbank (South Africa)

Muhammad Rizwan Baig

Head Governance, Risk & Controls, Standard Chartered

Fireside Chat: What has been your Approach to Cloud Security?

September 22 | 13:05 - 13:30

REGISTER AND WATCH ON DEMAND

Speaking:

Paul Morley

Muhammad Rizwan Baig

1:30

Reserved for Platinum Partner 6

Reserved for Platinum Partner 6

September 22 | 13:30 - 14:05

REGISTER AND WATCH ON DEMAND

Speaking:

2:05

Developing a Multicultural Security & Resilience Framework

Speaking:

David Inaneishvili

Director of Global Information Security and Business Continuity, FINCA Microfinance Global Services, LLC

Developing a Multicultural Security & Resilience Framework

September 22 | 14:05 - 14:30

REGISTER AND WATCH ON DEMAND

Speaking:

David Inaneishvili

2:30

Virtual Coffee Break & Demo Theatre

Virtual Coffee Break & Demo Theatre

September 22 | 14:30 - 14:45

REGISTER AND WATCH ON DEMAND

Speaking:

Track A

2:45

Reserved for Gold Partner - GlassHouse South Africa

Speaking:

Mike Styer

Country Manager, GlassHouse South Africa

Reserved for Gold Partner - GlassHouse South Africa

September 22 | 14:45 - 15:10

REGISTER AND WATCH ON DEMAND

Speaking:

Mike Styer

Track B

2:45

Reserved for Gold Partner

Reserved for Gold Partner

September 22 | 14:45 - 15:10

REGISTER AND WATCH ON DEMAND

Speaking:

Track C

2:45

Reserved for Gold Partner

Reserved for Gold Partner

September 22 | 14:45 - 15:10

REGISTER AND WATCH ON DEMAND

Speaking:

Track A

3:10

Case Study: Banking Goes Cloud - How Security & Compliance Keep us on Track

Speaking:

Muhammad Rizwan Baig

Head Governance, Risk & Controls, Standard Chartered

Case Study: Banking Goes Cloud - How Security & Compliance Keep us on Track

September 22 | 15:10 - 15:35

REGISTER AND WATCH ON DEMAND

Speaking:

Muhammad Rizwan Baig

Track B

3:10

Developing Cyber Partnerships

Speaking:

Laura Temesi

Chief Information Risk Officer

Developing Cyber Partnerships

September 22 | 15:10 - 15:35

REGISTER AND WATCH ON DEMAND

Speaking:

Laura Temesi

Track C

3:10

Keynote: Applying Security Controls to Secure & Drive Digital Transformation

Speaking:

Keynote: Applying Security Controls to Secure & Drive Digital Transformation

September 22 | 15:10 - 15:35

REGISTER AND WATCH ON DEMAND

Speaking:

Track A

3:35

3rd Party & Supplier Risk Management: Overcoming the Challenges

Speaking:

Samresh Ramjith

Deputy CISO, ABSA (South Africa)

3rd Party & Supplier Risk Management: Overcoming the Challenges

September 22 | 15:35 - 16:00

REGISTER AND WATCH ON DEMAND

Speaking:

Samresh Ramjith

Track B

3:35

The Women in Cyber Security Open Dialogue

Speaking:

Itumeleng Makgati

Vice President – Information Management , Sasol

Isabella Hofmeyr-Pretorius

Isabella Hofmeyr-Pretorius, LLB, LLM, CIS, CIPP/E, CIPM, Specialist: Group Data Privacy, Capitec Bank

The Women in Cyber Security Open Dialogue

September 22 | 15:35 - 16:00

REGISTER AND WATCH ON DEMAND

Speaking:

Isabella Hofmeyr-Pretorius

Itumeleng Makgati

Track C

3:35

Panel Discussion: Building a Comprehensive Data Privacy & Protection Framework

Speaking:

Janine West

Head of Privacy: Africa, Experian (South Africa)

Imraan Kharwa

Data Protection Officer, Infobip

Panel Discussion: Building a Comprehensive Data Privacy & Protection Framework

September 22 | 15:35 - 16:00

REGISTER AND WATCH ON DEMAND

Speaking:

Imraan Kharwa

Janine West

Register Your Free Pass

4 REASONS TO ATTEND CISO AFRICA LIVE

1. Learn from the most successful leaders in the security world, and explore the strategic issues that matter to you. We have years of experience in creating security events which deliver true insights.

2. Enjoy the convenience of an online event. There’s no need to spend time & money on travel, no time out of the office, and you can fit the event around your schedule, or catch up on-demand.

3. Interact with the Security community’s leading lights. Our technology and live broadcasts mean you can put your specific pain points & questions to our expert speakers, and get direct, actionable answers.

4. All for free! There’s no fee to register, and no travel costs. All you need is access to the internet, from anywhere in the world, on any device! 


If you have any problems registering your pass, please email rachel.paterson@coriniumgroup.com

Terms & Conditions

The following Terms and Conditions (“Terms”) apply to you or your proxy in relation to your registration for this Corinium Global Intelligence (“Corinium”) offer. The definition of “registration” for purposes of these Terms will include all anyone who completes the above form. By entering your contact details, you agree to these Terms.

Disclosure of your information

You agree that we have the right to share such portions of your personal information as may be appropriate with selected third parties including:

- Business partners
- Suppliers
- Sub-contractors for the performance of any contract we enter into with either them or you.
- Professional organizations involved in the provision of services for the event contracted for, such as, for example ON24.
- Sponsors - we may share your information with event sponsors who may contact you in relation to special offers, products and services related to your role within your company. You may also opt-out at any time by emailing inquiries@coriniumintel.com

Data protection

The personal information shown and/or provided by you will be held in a database. It may be used to keep you up to date with developments in your industry. Sometimes your details may be obtained or made available to third parties for marketing purposes. If you do not with your details to be used for this purpose, please email us at inquiries@coriniumintel.com