Advertise on ITWeb         Mon, 23 Sep, 10:07:25 AM
Business Matchmaking New strategies and tactics: Lessons from the battlefield

   
What is the Security Summit 2013 Business Matchmaking Programme?

The Security Summit 2013 Business Matchmaking Programme creates a proactive, pre-show platform enabling conference delegates, key speakers and sponsors to view profiles of participants and select who they want to meet at the event.

As soon as you are confirmed to attend the event, the Security Summit 2013 Business Matchmaking Team will profile your company and provide access to the online matchmaking programme.

The Business Matchmaking Team works four weeks before the event by pre-profiling all confirmed participants, creating individual matching reports, encouraging meeting selections and pushing meeting requests into confirmed interactions that take place at the event.

In addition, the onsite Security Summit 2013 Business Matchmaking Team assists you with your meeting arrangements.

Benefits of business matchmaking

This proactive programme enables you to be proactive before arriving at the event, maximising the networking experience!

Researching event profiles, you can select exactly who you want to meet, send a meeting request and confirm all your meetings that take place at convenient times for the meeting invitee.

Online diaries allow you to track your meeting requests in a real-time environment, providing up-to-date information through your private online matchmaking account.

All meetings take place in the Security Summit 2013 Business Matchmaking lounge, at meeting tables or on relevant sponsor stands.

Personal service

We have a team of matchmakers to assist you with your meetings.

IN THE NEWS
Operators monitor for attacks
17 Apr 2013 – Distributed denial of service strikes can cause major traffic headaches for cellphone companies.
Desperately seeking cyber security skills
17 Apr 2013 – Skills training in SA is on par with international standards, but the country does not have enough experts to prevent cyber attacks, says UJ’s Basie von Solms.
Spending needed to thwart attacks
11 Apr 2013 – Most security issues can be contained to some extent, if companies are prepared to invest.
SA fails on forensic readiness
4 Apr 2013 – Forensic readiness is crucial to successful investigations and prosecutions, yet few South African firms are prepared, says Cyanre.
Cyber security risk cannot be eliminated
25 March 2013 – In the past two years, there has been remarkable development and spread in organised hacking of corporates, says expert.
IT-based fraud on the increase
25 March 2013 – The ease with which fraudsters can acquire tools needed to commit fraud and the explosion in data are contributing to the growth, says Paladion.
BYOD - no turning back
20 March 2013 – For most organisations, it's too late to stop BYOD, but it's not too late to manage it, says a security expert.
Formulating an attack-focused security plan
26 Feb 2013 – To successfully formulate an attack-focused plan, start with an assessment to find live attackers on the network, says MANDIANT.
Info security needs new focus
12 Feb 2013 – Information security has to shift beyond perimeter protection to understanding the attacker, says De Beers.
SA progresses in cyber crime fight
8 Feb 2013 – Moves are afoot to get SA’s cyber crime policing up to speed with the rest of the world, says ISG.
Understanding "bad guys" key in cyber warfare
6 Jan 2013 – Offence-oriented defence has become key in the battle against cyber crime, according to a security expert.
For the latest headlines visit our Security Summit news portal
 
EVENT SPONSOR
in partnership with

PLATINUM SPONSOR
GOLD SPONSOR
in partnership with
SILVER SPONSORS

in partnership with
 
BRONZE SPONSORS
                 
in partnership with
in partnership with
COFFEE BAR SPONSOR
DISPLAY SPONSORS
in partnership with             
      
in partnership with
       
SPONSOR
   
ENDORSED BY

                                          




 

Home
About our speakers
About our sponsors
View the post-event video
View picture gallery
Cyber Readiness Challenge

EVENT SPONSOR

in partnership with
Established in 2009, Performanta specializes only in the discipline of Information Security. The company provides technology, services and consulting solutions allowing them to give customers an end to end information security service. Their focus on pragmatic solutions is reflected in their motto: Practical Trust Performanta.

PLATINUM SPONSOR
Symantec protects the world’s information, and is a global leader in security, backup and availability solutions. Our innovative products and services protect people and information in any environment – from the smallest mobile device, to the enterprise data center, to cloud-based systems. Our world-renowned expertise in protecting data, identities and interactions gives our customers confidence in a connected world.
Visit www.symantec.com/en/za/

IN THE NEWS
Unified security management key to rapid response
24 Apr 2013 - Visibility of the entire ecosystem, and immediate access to necessary information, is key to effectively managing information security, says McAfee.
Consolidation: a new infosec imperative
17 Apr 2013 – Addressing multiple security areas with a variety of solutions can result in weak points and areas being overlooked, says McAfee.
Security certificates 'an infosec weak spot'
12 Apr 2013 – Malware with embedded digital security certificates can easily penetrate enterprise systems, says Venafi.
For the latest headlines visit our Security Summit news portal

WHO SHOULD ATTEND?
This event is aimed at senior Info Sec professionals, and would include people with the following job responsibilities:
CIOs, CISOs and CFOs
CEOs/MDs
Chief security, risk, compliance, process and technology officers
Senior business executives whose jobs include enterprise security responsibilities
Senior business executives whose jobs include critical infrastructure protection
Information security managers and directors
Information security staff network and systems security administrators
Enterprise security architects
Business continuity managers
Data security professionals
IT auditors
IT/MIS staff
Internet security managers
Systems planners and analysts
Security analysts
Systems administrators
Software and application developers
Software engineers
Technical and support specialists
Systems integrators
App and mobile developers
Strategic planners

TWITTER
Follow us on twitter and tweet about your thoughts around this event, #itwebsec

SPONSORSHIP OPPORTUNITIES
Do you want to join other leading security vendors and firmly position your company, brand, products and services to a high-level business decision maker audience at southern Africa’s only business focused information security event?
Don’t miss out on the opportunity to capitalise on the valuable marketing opportunities ITWeb’s annual Security Summit offers and 
click here to learn about available sponsorship options or contact Debbie Visser,debbiev@itweb.co.za for a customised proposal designed to meet your objectives and budget.

TECHNICAL COMMITTEE
Sensepost is an independent company that provides services in the Information Security Services area. Combining experience and knowledge, SensePost specialises in Information Security Consulting, Training, Security Assessment Services and IT Vulnerability Management.

MEDIA PARTNERS


Tweet about the ITWeb Security Summit