Winston Hayden, independent management consultant and advisor
Charl van der Walt, head of security research, Orange Cyberdefense
Dr Kenneth Geers, senior fellow, ambassador, NATO Cyber Centre (Mozambique)
Jo Stewart-Rattray, director of Information Security & IT Assurance, BRM Advisory (Australia)
Suelette Dreyfus, academic specialist, School of Computing and Information Systems, University of Melbourne (Australia)
You’ve built the biggest, strongest cybersecurity wall ever. Then your organisation’s staff unlocks the front door to welcome in the intruders. AI is touted as the magic fix for solving the weakness of human factors in the cybersecurity chain. But the technology is seen as immature relative to need and is perceived as taking more time and budget to implement than is worth the pay off. Most of all, there is no ‘press a button and problem’s solved’ solution here – there is no replacement for human IT managers understanding what such systems recommend and why. Trust and transparency in AI platforms handling cybersecurity are essential - but will vendors provide this?This keynote will look at what the international academic research finds about human factors in cybersecurity. What are they and what approaches can be used to address them? This isn’t just about understanding human behaviour, it’s also about how organisations can make their security responses fit with the humans, instead of demanding the humans fit security programmes and protocols. Some IT security experts recommend putative measures against employees who repeatedly don’t attend to cybersecurity – but is it realistic to punish the busy C-suite exec? Are there better ways to win security for your organisation?
Roger A. Grimes, data-driven defense evangelist, KnowBe4 (USA)
Quantum computing is getting ready to break all traditional public key crypto, like RSA and Diffie-Hellman, and every secret it protects. This means that digital certificates, PKI, TLS, VPNs, Wi-Fi networks and even most crypto-currencies are left unprotected in an instant. The only question is when it will happen. Many experts think it’s sooner than you think. The digital day of reckoning is coming. Will you be prepared? In this eye-opening presentation, Roger will explain:
This track takes a look at the latest research into the state of cyber security and best practice in threat intelligence sharing. It will also focus on user awareness and creating a culture shift in your organisation. It closes with an update on privacy legislation, both local and global
Winston Hayden, independent management consultant and advisor
Eric Mc Gee, associate director: Risk Advisory Southern Africa, Deloitte
As the world becomes smaller, cyber is getting bigger. With every new connected device, digital discovery, or automated process comes new vulnerabilities and cyber concerns. In the burgeoning era of “cyber everywhere,” are organisations positioned to embrace the opportunities that cyber will create? Or is there a stark disconnect between an organisation’s transformational goals and the reality of disparate agendas and ﬁnite resources?
Deloitte conducted a survey in conjunction with Wakefield Research among 500 C-level executives who oversee cybersecurity at companies with $500 million or more in annual revenue including 100 chief information security officers, 100 chief security officers, 100 chief technology officers, 100 chief information officers, and 100 chief revenue officers. This survey enabled us to gain deep insight into what our customers are thinking about cyber and how they are integrating it into their organisations.
• Cyber requires more executive attention, budget, prioritisation, people, tools, processes, governance and overall collective thought
Jason Jordaan, principal forensic analyst, DFIR Labs
Celia Mantshiyane, CISO, Coca-Cola Beverages Africa
Susi du Preez, InfoSec engineer, Impact IT & Risk Services
Privacy law refers to the laws that deal with the regulation, storing, and using of personally identifiable information of individuals, which can be collected by governments, public or private organisations, or other individuals. This presentation will explore why a global effort is important to make our privacy and data safe and why a silo approach is not the answer internationally. Susi will explain what the major countries have in place regarding privacy acts (e.g. GDPR, POPIA) and how they compare. She will also discuss the African continent and how we as a global community can make our privacy and data safe again.
This track focuses on the latest technology developments and the implications that they have for information and cybersecurity.Topics covered include Cloud security, container security, AI, IoT and supply chain risk.
O'Shea Bowens, founder and CEO
As a defender we've seen the landscape change over the last few years. A shift to cloud, better endpoint detection capabilities and overall acceptance of leveraging threat intelligence. All these items are advantages for SOC personnel, but how are we incorporating application security? How the heck are we securing our containers? The idea of "shifting left" is based upon secure SDLC, but how do we build detection, response and monitoring of applications and containers into the SOC? The normal gambit of next-generation firewalls and antivirus products aren't applicable as applications differ from build to build. This presentation will focus on building out capabilities to help defenders identify vulnerable containers, attacks against the application, detection mechanisms and how to leverage this information for triage.
ManageEngine is the enterprise IT management division of Zoho Corporation. 60 percent of the Fortune 500 - rely on our real-time IT management tools to ensure optimal performance of their IT infrastructure, including networks, servers, applications, desktops and more.
About ITR Technology
ITR Technology have been the sole distributers of ManageEngine software in South Africa for over 19 years. With certified support engineers, a dedicated sales team and a newly constructed ManageEngine training centre, ITR Technology values making a difference in the lives of South African IT professionals
Learn more at itrtech.co.za
Magix Security delivers comprehensive and trusted Cybercrime Defense and Detection solutions and services to address, manage, and contain the risks of financial losses and reputational damage arising from the misuse of applications, or other IT information assets, by employees and/or third parties.
Checkmarx is the global leader in software security solutions for modern enterprise software development. Checkmarx delivers the industry’s most comprehensive software security platform that unifies with DevOps and provides static and interactive application security testing, SCA and developer AppSec training to reduce and remediate risk from software vulnerabilities.
Learn more at Checkmarx.com
Popcorn Training - a KnowBe4 company create high quality, engaging and effective security awareness videos, games and interactive learning modules.
All content is locally produced and available on KnowBe4's award-winning training and simulated phishing platform.
KnowBe4, whose mission it is to help organisations manage the ongoing problem of social engineering are a leader in the Gartner Magic Quadrant for security awareness.
Please visit popcorntraining.com