Advertise on ITWeb         Fri, 20 Sep, 21:25:21 PM
WHY YOU SHOULD ATTEND New strategies and tactics: Lessons from the battlefield
Register your seat now!
Plenary sessions 7 & 8 May:

Renowned industry experts and leading analysts are invited to present high-level talks during our plenary sessions. They will provide an essential update by offering an overview of the current landscape and commenting on current trends. They will share practical advice on the way forward for senior business decision-makers, highlighting successful approaches to improved security and reduced breaches.


 
Why you should attend
Here are six reasons this is a must-attend event for InfoSec professionals like yourself:
 
1. Must-hear keynotes by Misha Glenny and Richard Bejtlich.
2. Thirty-four conference sessions with key insights from leading InfoSec experts.
3. Six specialised tracks to suit your specific needs.
4. Three practical workshops to equip you for the challenges you face.
5. Extensive expo area with leading solutions providers.
6. Unparalleled networking opportunities with business matchmaking.
Track overview:

In addition to the high-level talks in our plenary sessions, we have six specialised tracks from which to choose. These tracks allow you to gain the expert insight best suited to your most pressing information security needs. The tracks have been carefully designed to cater to the range of delegates that attend Security Summit, whether you are a C-level executive or more technically inclined, there is something for you.

Having attended your selected tracks and sessions, you will be equipped with the necessary knowledge to realise improved results from your IT and information security strategies and initiatives.

Track one: Defence in depth
Track two: Know your enemy
Track three: C-level security update
Track four: Security & compliance
Track five: New offensive techniques
Track six: Incident response and forensics approaches

Track one: Defence in depth
Agenda: Day 1 - 7 May
Click here to view speakers

Defence in depth refers to the coordinated use of multiple security countermeasures and diverse defensive strategies to manage risk. If one layer of defence turns out to be inadequate, another layer of defence should prevent a full breach. This is based on the idea that a full attack occurs over a chain of events, and not a single, isolated event. During this track you will understand this chain, and how to develop innovative ways of tracking who is attacking them, and build in controls beyond the perimeter.

Key questions this track will answer include:

1. What is the best strategy to respond to the new security environment for corporate networks (with mobility in mind)?
2. What key questions should I ask when assessing the security of my organisation?
3. What security controls should I be considering?

Track two: Know your enemy
Agenda: Day 1 - 7 May
Click here to view speakers

Insiders pose a sizeable threat to organisations. Desperate or disgruntled employees may try to exploit their current or previous companies. Equally worrying would be an incident that was a result of negligence – employees without security awareness are security liabilities. During this track you will learn more about the potential threats from employees and outsiders. In addition, businesses need to be aware of the national approach to cyber security, in order to ensure they are adequately prepared for risk.

1. What can I do to counter insider threats?
2. What are the external threats I am most likely to face?
3. What cyber security threats should I be prepared for?

Track three: C-level security update
Agenda: Day 1 - 7 May
Click here to view speakers

When corporate security is at risk, the entire organisation is at risk. It is necessary for CIOs, CISOs, and other C-Suite executives with a security mandate to be up to date on how to optimise their corporate security, and be informed about key threats. This track will alert the C-Suite to key security concerns they don’t know about, but should. Delegates will be equipped to keep their organisations secure against ever-evolving security threats.

Key questions this track will answer include:

1. What points can I action in the next fortnight to tighten my organisation’s security?
2. How can my organisation better defend itself, its staff and key assets?
3. How can I identify ‘obvious’ gaps in my security policies?

Track four: Security & compliance
Agenda: Day 2 - 8 May
Click here to view speakers

The governance and management of information and technology has become a complex topic. Information security professionals work in an environment in which they have to address a range of threats while meeting regulatory and legal requirements. They also need to cater to the risks of rapid innovation in technology and an increasingly mobile workforce. This track will equip you to address evolving risk. This track will also address the subject of liberation tech. This will look at developing an understanding of how IT can be used to defend human rights, improve governance, empower the poor, promote economic development, and pursue a variety of other social goods that organisations need to be supporting.

Key questions this track will answer include:

1. How can my organisation meet compliance, audit, regulations and standards requirements?
2. How do I incorporate vulnerability and patch management into my GRC initiative?
3. How can I automate IT GRC within my organisation?

Track five: New offensive techniques
Agenda: Day 2 - 8 May
Click here to view speakers

The world of infosec is very dynamic. Even seasoned security professionals are faced with the new challenges brought about by smart devices, social networks, virtualisation, cloud computing, malware and regulations. The new offensive techniques track reveals the latest attack methods that organisations need to be aware of. This track will inform you about new challenges, and ways in which to overcome these.

Key questions this track will answer include:

1. When embracing BYOD, what security issues should be a priority?
2. Which new security threats should be on my radar?
3. How can my organisation stay ahead of security threats?

Track six: Incident response and forensics approaches
Agenda: Day 2 - 8 May
Click here to view speakers

As infosec professionals get more involved in incidents day to day, they need to know how to handle situations, and to be aware of what and how the forensics aspect works. It is essential to have an accurate idea of the risk your organisation faces. Learn how to create a plan for exactly what to do before, during, and after an incident. This track will inform you of the technical and administrative details of effective incident response planning, as well as which tools are available to you.

Key questions this track will answer include:

1. How can our security team prepare for and respond to any emergency incident?
2. How to do we assess the possible damage from an incident?
3. How do we preserve the integrity of the evidence?
IN THE NEWS
Operators monitor for attacks
17 Apr 2013 – Distributed denial of service strikes can cause major traffic headaches for cellphone companies.
Desperately seeking cyber security skills
17 Apr 2013 – Skills training in SA is on par with international standards, but the country does not have enough experts to prevent cyber attacks, says UJ’s Basie von Solms.
Spending needed to thwart attacks
11 Apr 2013 – Most security issues can be contained to some extent, if companies are prepared to invest.
SA fails on forensic readiness
4 Apr 2013 – Forensic readiness is crucial to successful investigations and prosecutions, yet few South African firms are prepared, says Cyanre.
Cyber security risk cannot be eliminated
25 March 2013 – In the past two years, there has been remarkable development and spread in organised hacking of corporates, says expert.
IT-based fraud on the increase
25 March 2013 – The ease with which fraudsters can acquire tools needed to commit fraud and the explosion in data are contributing to the growth, says Paladion.
BYOD - no turning back
20 March 2013 – For most organisations, it's too late to stop BYOD, but it's not too late to manage it, says a security expert.
Formulating an attack-focused security plan
26 Feb 2013 – To successfully formulate an attack-focused plan, start with an assessment to find live attackers on the network, says MANDIANT.
Info security needs new focus
12 Feb 2013 – Information security has to shift beyond perimeter protection to understanding the attacker, says De Beers.
SA progresses in cyber crime fight
8 Feb 2013 – Moves are afoot to get SA’s cyber crime policing up to speed with the rest of the world, says ISG.
Understanding "bad guys" key in cyber warfare
6 Jan 2013 – Offence-oriented defence has become key in the battle against cyber crime, according to a security expert.
For the latest headlines visit our Security Summit news portal
 
EVENT SPONSOR
in partnership with

PLATINUM SPONSOR
GOLD SPONSOR
in partnership with
SILVER SPONSORS

in partnership with
 
BRONZE SPONSORS
                 
in partnership with
in partnership with
COFFEE BAR SPONSOR
DISPLAY SPONSORS
in partnership with             
      
in partnership with
       
SPONSOR
   
ENDORSED BY

                                          




 

Home
About our speakers
About our sponsors
View the post-event video
View picture gallery
Cyber Readiness Challenge

EVENT SPONSOR

in partnership with
Established in 2009, Performanta specializes only in the discipline of Information Security. The company provides technology, services and consulting solutions allowing them to give customers an end to end information security service. Their focus on pragmatic solutions is reflected in their motto: Practical Trust Performanta.

PLATINUM SPONSOR
Symantec protects the world’s information, and is a global leader in security, backup and availability solutions. Our innovative products and services protect people and information in any environment – from the smallest mobile device, to the enterprise data center, to cloud-based systems. Our world-renowned expertise in protecting data, identities and interactions gives our customers confidence in a connected world.
Visit www.symantec.com/en/za/

IN THE NEWS
Unified security management key to rapid response
24 Apr 2013 - Visibility of the entire ecosystem, and immediate access to necessary information, is key to effectively managing information security, says McAfee.
Consolidation: a new infosec imperative
17 Apr 2013 – Addressing multiple security areas with a variety of solutions can result in weak points and areas being overlooked, says McAfee.
Security certificates 'an infosec weak spot'
12 Apr 2013 – Malware with embedded digital security certificates can easily penetrate enterprise systems, says Venafi.
For the latest headlines visit our Security Summit news portal

BUSINESS MATCHMAKING PROGRAMME
The Security Summit 2013 Business Matchmaking Programme creates a proactive, pre-show platform enabling conference delegates, key speakers and sponsors to view profiles of participants and select who they want to meet at the event.

As soon as you are confirmed to attend the event, the Security Summit 2013 Business Matchmaking Team will profile your company and provide access to the online matchmaking programme.

The Business Matchmaking Team works four weeks before the event by pre-profiling all confirmed participants, creating individual matching reports, encouraging meeting selections and pushing meeting requests into confirmed interactions that take place at the event.

TWITTER
Follow us on twitter and tweet about your thoughts around this event, #itwebsec

SPONSORSHIP OPPORTUNITIES
Do you want to join other leading security vendors and firmly position your company, brand, products and services to a high-level business decision maker audience at southern Africa’s only business focused information security event?
Don’t miss out on the opportunity to capitalise on the valuable marketing opportunities ITWeb’s annual Security Summit offers and 
click here to learn about available sponsorship options or contact Debbie Visser,debbiev@itweb.co.za for a customised proposal designed to meet your objectives and budget.

TECHNICAL COMMITTEE
Sensepost is an independent company that provides services in the Information Security Services area. Combining experience and knowledge, SensePost specialises in Information Security Consulting, Training, Security Assessment Services and IT Vulnerability Management.

MEDIA PARTNERS


Tweet about the ITWeb Security Summit