Fahad Nisar

BIG DATA

Game of phones

  Advertise on ITWeb         Sun, 22 Apr, 20:27:46 PM
Speaker
Presentation
Media
Jason Jordaan
Exposing the enemy - organised cyber crime
SecuritySummit2015/Jason%20Jordaan.mp3
SecuritySummit2015/Jason%20Jordaan.jpg
Exposing the enemy - organised cyber crime
Jason Jordaan, founder and principal forensic scientist, DFIRLABS
Abdulkarim Chukkol
Fighting Cybercrime in Africa
SecuritySummit2015/Abdulkarim%20Chukkol.mp3
SecuritySummit2015/Abdulkarim%20Chukkol.jpg
Fighting Cybercrime in Africa - the Nigerian perspective
Abdulkarim Chukkol, head of the Advance Fee Fraud and Cyber Crime Section for the Economic and Financial Crimes Commission, Nigeria
Yusuph Kileo
Pan African security initiatives
SecuritySummit2015/Yusuph%20Kileo.mp3
SecuritySummit2015/Yusuph%20Kileo.jpg
Pan African security initiatives - how to interface with initiatives on the continent, with a specific focus on Tanzania
Yusuph Kileo, cyber security and digital forensics investigation expert
Antonio Forzieri
Attackers and defenders
SecuritySummit2015/Antonio%20Forzieri.mp3
SecuritySummit2015/Antonio%20Forzieri.jpg
Attackers and defenders: the never-ending story
Antonio Forzieri, EMEA cyber security and ISS technology lead: technology sales and services, Symantec
Maiendra Moodley
TRACK1 - The privacy paradox
SecuritySummit2015/Maiendra%20Moodley.mp3
SecuritySummit2015/Maiendra%20Moodley.jpg
The privacy paradox: implications for security practitioners
Maiendra Moodley, divisional head (GM) for Financial Systems and Processes, State
Ignus Swart
TRACK1 - South Africa's national ICT infrastructure
SecuritySummit2015/Ignus%20Swart.mp3
SecuritySummit2015/Ignus%20Swart.jpg
South Africa's national ICT infrastructure - how vulnerable is it? A research-based investigation
Ignus Swart, senior information security specialist: cyber defence unit, CSIR
Maeson Maherry
TRACK1 - Case study, Digital identities on the national ID card
SecuritySummit2015/Maeson%20Maherry.mp3
SecuritySummit2015/Maeson%20Maherry.jpg
Case study: Digital identities on the national ID card
Maeson Maherry, solutions director, LAWTrust
Danny Myburgh
TRACK2 - Digital forensics
SecuritySummit2015/Danny%20Myburgh.mp3
SecuritySummit2015/Danny%20Myburgh.jpg
Digital forensics - how to make the charges stick
Danny Myburgh, founder and MD, Cyanre
Barry Irwin
TRACK2 - Case study, NTP amplification attacks
SecuritySummit2015/Barry%20Irwin.mp3
SecuritySummit2015/Barry%20Irwin.jpg
Case study: NTP amplification attacks from the view of the network reflectors
Prof Barry Irwin, founder and head, Security and Networks Research Group, Rhodes University
Tyrone Erasmus
TRACK2 - Becoming the adversary
SecuritySummit2015/Tyrone%20Erasmus.mp3
SecuritySummit2015/Tyrone%20Erasmus.jpg
Becoming the adversary
Tyrone Erasmus, managing consultant, MWR InfoSecurity South Africa
Reino Mostert
TRACK3 - Hacked - why we all fail at information security
SecuritySummit2015/Reino%20Mostert.mp3
SecuritySummit2015/Reino%20Mostert.jpg
Hacked - why we all fail at information security
Reino Mostert, security analyst, Telspace
Ed Macnair
TRACK3 - Cloud apps control
SecuritySummit2015/Ed%20MacNair.mp3
SecuritySummit2015/Ed%20MacNair.jpg
Cloud apps control - going beyond secure web gateway
Ed Macnair, CEO, CensorNet
Raymond du Plessis
TRACK3 - How to ensure the successful implementation of a new information security solution
SecuritySummit2015/Raymond%20du%20Plessis.mp3
SecuritySummit2015/Raymond%20du%20Plessis.jpg
How to ensure the successful implementation of a new information security solution
Raymond du Plessis, managing consultant, Mobius
  to ITWeb's daily newsletter.

 

Advertisement


Top news

..

ITWeb Security Summit 2018
JHB 21 - 25 May | Vodacom World, Midrand
CPT 28 & 29 May | One&Only, Cape Town
International keynote speaker and cyber security luminary talks to information security across the globe – where are we right now, what is happening now and what happens next
Mikko Hypponen
Mikko Hypponen, chief research officer, F-Secure
Event Sponsor
Cisco
Kevin Hall

CRM

Customer care