JOHANNESBURG
21 - 25 May 2018

CAPE TOWN
28 & 29 May 2018

Speaker

Muyowa Mutemwa, RAD: senior cyber security specialist, CSIR

Muyowa Mutemwa

RAD: senior cyber security specialist, CSIR

Mutemwa has five years working experience with Telkom SA as a strategy architect in various roles such as designing data centre networks, user-access networks and storage networks. Since joining the Cyber Warfare team at the Council of Science and Industrial Research, he has more than two years working experience firstly as a cyber security specialist and currently as a senior cyber security specialist. His role at the CSIR involves the following, namely: secure network design; firewall configurations design and implementation; creating and managing VMware ESXi servers and virtual machine back up; participation in Red and Blue Team for clients, both internal and external; creating and managing Big Data cluster, including processing big data sets; and finally writing research papers. He has the following qualifications and certifications namely: A masters' degree in computer science (2011); CEH - Certified Ethical Hacking (ECC48905747097) – 2016; CompTIA Security+ (COMP001021239259) – 2017; CCNA – 2009; Cisco ACI Test Drive ACI-TD – 2015 and ITIL® Foundation Certificate in IT Service Management - 2015.

Muyowa Mutemwa will be speaking on the following topic:

17:10
Thought-leadership Cyber security threats and mitigation techniques for multifunctional devices

Every small, medium or enterprise organisation makes use of printers, copiers, scanners, faxes and multifunctional devices for day-to-day operational functions of the organisation. These devices are either purchased outright or obtained on a lease contract. When the device's end-of-life is reached, the devices are either disposed of through donations to non-profit organisations or retuned back to the original equipment manufacturer at the end of a lease agreement contract. Unknown to most IT operations personnel and information security personnel, these devices carry an inherent vulnerability. These devices have secure and unsecure network communications protocols, hard disk drives, volatile memory, and non-volatile memory. All these device specifications are vulnerable to cyber threats and attacks.

  • Determine the extent to which your organisation is expose to the threat of sensitive information belonging to either an organisation or its employees being accessed
  • Gain insight into research that was conducted on such devices
  • Get guidelines on how to safely use and decommission such devices to circumvent the loss of sensitive information

Sponsors

Event Sponsor

Security Survey and Executive Roundtable Sponsor

Urban Café Sponsor

Gold sponsors

Workshop sponsor

Silver sponsors

Bronze sponsors

Display sponsors

Showcase sponsors

Host sponsor

Sponsors

Endorsed by

Media Partners