JOHANNESBURG
21 - 25 May 2018

CAPE TOWN
28 & 29 May 2018

WORKSHOPSMonday 21 May 2018 - Focus Rooms, Sunninghill

The Electronic Handshake: Obtaining GDPR and APAC region privacy and data protection regulatory requirements through an integrated IT compliancy solution

Using Red Team tactics to create Blue Team solutions

Threat Led Penetration Testing

Cisco Threat Response Clinics: Leveraging the network for end-to-end security

WORKSHOP 1 - The Electronic Handshake: Obtaining GDPR and APAC region privacy and data protection regulatory requirements through an integrated IT compliancy solution

Gideon Bouwer
cyber law and criminal law forensic specialist, Cyber Law Forensics

No economic region will be untouched by the implementation of the GDPR in May 2018. Every company or government who engages in the processing of EU citizens privacy information will have to be GDPR compliant or face a 2 to 4 present fine of their total global turnover. Simply put if a government or business is not GDPR compliant it can result in financial ruin.

This training session will provide delegates with an in-depth knowledge on how to reach GDPR and APAC region privacy and data protection regulatory requirements, through an integrated IT compliancy solution.

  • Uniform requirements of privacy and data protection regulatory requirements
  • How to comply simplistically and practically
  • A practical and implementable IT compliancy solution
Arrival and registration
Welcome
Workshop one commences
Networking and refreshments
Workshop one ends, lunch and networking opportunity

WORKSHOP 2 - Using Red Team tactics to create Blue Team solutions

Jayson Street
VP: infosec, SphereNY

Learn how to use modern social engineering attack tools and gain a better understanding of physical and network attack vectors. Classroom hands on exercises will include basic open-source intelligence (OSINT) skill-building, risk evaluation of humans. The emphasis of the class exercises, real-world case studies, and demonstrations is on building comprehension of attack techniques that can be used to create awareness programmes.

  • The students will learn how to create a comprehensive strategy to better protect their company and its employees from social engineering attacks.
Registration and lunch
Welcome
Workshop two commences
Networking and refreshments
Workshop two ends

WORKSHOP 3 - Threat Led Penetration Testing

Stewart K Bertram
director, threat intelligence and professional services, Digital Shadows

Threat Led Penetration Testing (TLPT) is the new buzz-phrase within the threat intelligence industry, with schemes such as the UK's CBEST and the Netherlands' TIBER programmes leading the way for the development of TLPT. But, what is TLPT and how is it effectively used to increase the cyber security of an organisation?

This workshop addresses these issues directly and develops the understanding of TLPT through a combination of short theory lectures and practical sessions. Focus areas for the training include the differences between the surface, deep and dark Web, defining critical functions within an organisation and developing threat actor profiles.

The workshop is aimed at non-technical practitioners who wish to gain an understanding of TLPT, cyber threat intelligence or who aspire to run their own TLPT projects in the future.

  • Develop an understanding of what Threat Led Penetration Testing is and how it can be applied to test critical systems within an organisation's environment.
  • Learn more about what a threat landscape is and how this can be applied to a TLPT project.
  • Understand what threat intelligence is and how it can be operationalised within the wider organisation's security posture.
Arrival and registration
Welcome
Workshop one commences
Networking and refreshments
Workshop three ends, lunch and networking opportunity

WORKSHOP 4 - Cisco Threat Response Clinics: Leveraging the network for end-to-end security

Greg Griessel, consulting systems engineer, CISCO, and
Paul Beyleveld, consulting systems engineer, CISCO

In the real world, it's no longer a matter of if an attacker will get in, but when. Security professionals need to evolve their strategy from a point-in-time approach to pervasive protection across the full attack continuum – before, during and after an attack. Network professionals need to understand how their network infrastructure can be used as a sensor and enforcer to help improve network security and prevent data breaches.

In this workshop, security and network professionals will experience a day in the life of a malware attack and how to respond to it. It will also cover steps you can take before a breach to minimise attacks. In this session, you will:

  • Explore Cisco's threat-centric approach to security that provides unmatched visibility, consistent control, and advanced threat protection;
  • Experience live policy and attack responses that illustrate solutions to real-world problems; and
  • View a live demonstration on Cisco Firepower Threat Defence, Cisco Advanced Malware Prevention and StealthWatch tools that enable you to identify, diagnose and respond to threats quickly and accurately.

Who should attend:

The Cisco Cyber Threat Response (CTR) Clinic is designed for the average engineer. This course is primarily targeted to engineers, analysts and managers of security operations and network infrastructure. Customers with a basic understanding of networking will be able to follow the workshop.

Workshop opens, lunch and networking opportunity
Registration and lunch
Workshop session two
Networking and refreshments
Workshop two ends

Sponsors

Event Sponsor

Security Survey and Executive Roundtable Sponsor

Gold sponsors

Workshop sponsor

Silver sponsors

Bronze sponsors

Display sponsors

Showcase sponsors

Sponsors

Endorsed by

Media Partners