Pete Herzog is the co-founder and on the Board of Directors of ISECOM, researching and creating new solutions to complex security problems. As Managing Director of this non-profit research organisation, he manages the research of all projects including the two most recognized: OSSTMM and Hacker Highschool. He manages communications and sharing with the ISECOM community of over 10,000 participants, making interviews, articles and overseeing content for all ISECOM's public and private interactions. He created and now oversees maintenance of the ISECOM certifications for security testing and analysis, trust analysis and professional hacking. He also leads ISECOM's consulting and analysis engagements for private research initiatives and is a frequent trainer and presenter at security conferences and internal seminars for corporations.
There is something quietly unsettling about cybersecurity. There is something pathetically optimistic about cybersafety. There's something nauseously helpless about being breached. Let's face it, cybersecurity is made from human suffering. We didn't know this when we got into it. With wide, shiny eyes we jumped in to do good. And like growing into adulthood, it slowly ate away our naïve joy. Your job is to secure operations. But nobody listens to you. There's no budget. Management keeps making bad security decisions that seem to sabotage your efforts. The security books, blogs, and tweeting pundits out there tell us we need to learn the language of business. We need to put risk in terms of money that management understands. We need to be like the management we're trying to protect. And that's where it all falls apart. The security to business relationship is often textbook abusive codependency. You do well and nobody notices. You fail and you get fired or worse - shamed by your peers over social media for whatever the company releases as the statement for the breach. So how do you do SecOps under those conditions? This talk will focus on new ways to approach SecOps to face the challenges you have today with business demands. We will look at new security research that will make a difference for how you do your job. Most of all we will show you technical security practices to help you sustain your new-found stance. This is how we get the thrill back from our jobs while lessening the pain: the technical, the managerial and the emotional.
Axiz is SA’s leading information technology value added distributor that focuses on solutions covering edge devices, data centre and cloud. We believe in building ecosystems and transcending technology, with a results-driven focus that enables us to offer tailored solutions to our partners.
McAfee McAfee is the device-to-cloud cybersecurity company providing security solutions with transformation in mind to protect data and stop threats from device to cloud using an open, proactive, and intelligence-driven approach.
Dynamic Recovery Services - experts in ICT services and solutions. We enable cyber resilience through innovation in information security, IT risk management and IT governance. We provide an array of security services from the creation of security strategy to the daily operation of point security products. We partner with market-leading technology providers to ensure the best supply of infrastructure, enabling us to deliver professional services and ensure that all of our products are effectively implemented and operate efficiently in the business environment.
Please visit: www.drs.co.za.
NETSCOUT’s business is Smart Data: distilling real time, precise
intelligence from the noise of traffic data. We get the right data, fast, to
the people and the systems that need it, providing the real-time
intelligence you need to drive network and application performance, deliver
unmatched user experience, and find and fix advanced cyber and DDoS threats.
Please visit: /www.netscout.com.
Empowering Africa through innovative IT solutions.
Networks Unlimited is a Value-added Distributor, offering some of Gartner’s most highly recognised solutions within the Cybersecurity, Enterprise Systems Management, Cloud, Networking and Storage arena. Our solutions are sold through an extensive, reputable and solution-focused reseller base across 36 countries on the African continent.
For more information visit: www.networksunlimited.africa
ASG Africa focuses on solving client challenges around Advanced Endpoint Security including Cyber, Malware and Ransomware attack solutions, Content Disarm and Construct (CDR) technologies, and the Correlation, Auditability and Security aspects of cross-platform Event Log Management including out-of-the-box Compliance capability for standards such as PCI DSS, King III, GDPR, SOX, etc. ASG Africa also offers additional Financial Sector focused solutions on Governance requirements such as for BCBS 239, GDPR and Solvency II, amongst others.
See more at: www.asg.africa.com.
LAWtrust (an Etion company) is a specialist cyber security solutions provider that focusses in establishing positive identity, ensuring authenticity and protecting privacy. Solutions include SSL certificates and certificate management systems, FIDO certified strong authentication, digital signature and approval solutions, managed public key infrastructure (PKI), encryption solutions for database and cloud systems, biometric enrolment and matching systems and insider threat prevention with the eDNA platform.
More information on how we can assist can be found at: www.lawtrust.co.za.
Magix Security delivers comprehensive and trusted Cybercrime Defense and Detection solutions and services to address, manage, and contain the risks of financial losses and reputational damage arising from the misuse of applications, or other IT information assets, by employees and/or third parties.
Checkmarx Checkmarx is the Software Exposure Platform for the enterprise. Over 1,400 organizations around the globe rely on Checkmarx to measure and manage software risk at the speed of DevOps. Checkmarx serves five of the world's top 10 software vendors, four of the top American banks, and many government organizations and Fortune 500 enterprises, including SAP, Samsung, and Salesforce.com.
Learn more at Checkmarx.com or follow us on Twitter: @checkmarx.
Obscure Technologies is a security centric organisation of people, distributing best in class advanced security brands and their solutions to market through our valued partner community.
Please visit www.obscuretech.net
Panda Security is a European based security vendor with a global footprint. Initially focused on the development of antivirus software, the company has since expanded its line of business to advanced cyber-security services with technology for preventing cyber-crime and addressing advanced threats. The Adaptive Defense product family is an Endpoint Detection and Response (EDR) solution that addresses the changed threat landscape with a differentiated approach using machine learning and big data. The company is recognized by Gartner as Europe's sole EDR vendor. In 2006, Jeremy Matthews founded Panda's local office in Cape Town, opening the international vendor's first presence on the African continent.
Please visit www.pandasecurity.com/southafrica/intelligence-platform/
Popcorn Training - a KnowBe4 company create high quality, engaging and effective security awareness videos, games and interactive learning modules.
All content is locally produced and available on KnowBe4's award-winning training and simulated phishing platform.
KnowBe4, whose mission it is to help organisations manage the ongoing problem of social engineering are a leader in the Gartner Magic Quadrant for security awareness.
Please visit popcorntraining.com
Business downtime is over! So too, is high storage costs, siloed data, and difficult access. At Redstor, we’re disrupting the norm and changing everything you know about data storage, backup, and recovery. Our pioneering technology is the first of its kind and provides you with on-demand access to your data from a single control centre (on any device). Simply stream your data in real-time and eradicate business downtime… forever.
See more at: www.redstor.com/en-za.
As the fastest-growing, independent identity and access management (IAM) provider, SailPoint helps hundreds of global organizations securely and effectively deliver and manage user access from any device to data and applications residing in the datacenter, on mobile devices, and in the cloud. The company's innovative product portfolio offers customers an integrated set of core services including identity governance, provisioning, and access management delivered on-premises or from the cloud (IAM-as-a-service).
Please visit www.sailpoint.com
OT-Morpho is now IDEMIA, the global leader in trusted identities for an increasingly digital world. Through Augmented Identity, we empower citizens and consumers alike to interact, pay, connect, travel and vote in ways that are now possible in a connected environment.
For more information visit: www.idemia.com