21 - 25 May 2018

28 & 29 May 2018

Business Benefits

What you can expect to learn and take away with you from the ITWeb Security Summit 2018:

  • Threat intelligence, automating responses, and sharing across technologies and organisations
  • Insight into cloud security and virtualisation, including the security aspects of using and leveraging cloud services and virtualisation technologies/services, segmentation, deployment models, and extended architectures
  • A better understanding of the cyber security landscape in South Africa and the threats that exist inside it
  • Deeper understanding of mobile and IOT security, with a focus on policies, processes and technologies for managing mobile security in the enterprise, including device management and emerging threats to mobile platforms
  • How and why to integrate development teams with Red/Blue Teams to build more secure software
  • How AI has a profound impact on our future Internet, and the potential for it to enable digital criminals
  • Classify, track and protect data in the extended enterprise focusing on encryption, tokenisation, data protection regulations, threats to sensitive data and emerging trends
  • How to project against data theft with machine learning and advanced mathematics tools
  • Redefining the scope of ransomware since WannaCry and NotPetya
  • Why we are still getting hacked, often by unsophisticated attackers, leveraging misconfigurations
  • Get a highly technical view on strategic planning, security monitoring, and vulnerability perspectives for security of networks, endpoints, and systems, including rights management, mobile systems, devices and penetration testing
  • An overview of existing cyber crime offences, proposed cyber crime offences as well as institutional structures that impact the governance of cyber security
  • Why the leap from the Electronic Communications and Transactions Act, 2002, to the latest draft of the Cybercrimes and Cybersecurity Bill?
  • How to obtain global regulatory compliance with regards to privacy laws through electronic handshakes as a cyber security tool
  • How personality traits influence online behaviour and how to use this data in security culture and awareness programmes
  • How to safely use and decommission such devices to circumvent the loss of sensitive information
  • Rethinking patch management strategies
  • More about backdoors, encryption and Internet surveillance
  • The latest DDOS research ideas unveiled
  • Guide for C-level and the board to ensure cyber security risk is given the attention it deserves
  • Some of the ways mobile applications can be compromised; the various mistakes that are made in software developments; best ways to implement BYOD policies and device management; as well as remediation methods that should be employed
  • Understanding of key elements and approach for successful implementation of vulnerability management programmes
  • The privacy claim of any technology that uses different encryption keys to isolate hypervisor administrators from guest VMs cannot be guaranteed
  • Identify the key skill and knowledge areas required of a digital forensics practitioner
  • How to ensure incident response findings and communication throughout an organisation isn't totally dependent on the output of software, but rather on the assessments and judgment of experienced information security professionals
  • Human behaviour and what needs to be modified for the sake of better security


Event Sponsor

Security Survey and Executive Roundtable Sponsor

Urban Café Sponsor

Gold sponsors

Workshop sponsor

Silver sponsors

Bronze sponsors

Display sponsors

Showcase sponsors

Host sponsor


Endorsed by

Media Partners