<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=306561&amp;fmt=gif">

CISO Africa: Live

16 -17 March 2021
Tackling Today’s Mission-Critical Security Objectives

REGISTER YOUR FREE SEAT

Why do we still see email as a perimeter problem?

Ross Saunders joins Brian Pinnock of Mimecast to discuss the following:

  • The evolution of the threat landscape,
  • Email being used as an attack vector,
  • How is email being addressed as part of digital transformation and COVID-19 and
  • Threat and brand exploitation increases

The Ins and Outs of Incident Response

Ian Keller, CISO SBV

As we all know, the more organised the approach to an incident when addressing and managing the aftermath of a security breach limits damage and reduces recovery time and costs.

Ian Keller, former group CISO of Discovery Health and Current CISO of SBV shared insights based on his 30 years in ICT Security Industry. Ian was joined by Ross Saunders to discuss the importance of an incident response plan and having an incidence response plan. Ian Keller discussed the benefits of having a solid plan approved by the board, the importance of having an incident response plan and the value of a rapid response for businesses.

The discussion also highlights how culture plays a part in Incident Response and how one can build a culture around security.

#incidentresponse #cybersecurity

Zero Trust – What is it, what is valuable, and what is hype?

Steve Jump,Director and CEO, Custodiet Advisory Services

In this episode of Saunders on Security, Ross Saunders chats to Steve Jump about the hype around Zero Trust in marketing, where the value comes in for Zero Trust, the principles that can be implemented, the implementation in smaller companies and the effects of culture on Zero Trust.

Data Processing Agreements

In this interview with David Luyt of Michalsons, Ross and David discuss the following points:

  • What is a data processing agreement?,
  • The significance of a data processing agreement,
  • Differences and similarities between the South African and European context,
  • How data processing agreements affect information security and
  • Is there “wiggle room” in these agreements?