Advertise on ITWeb         Sun, 25 Oct, 15:06:58 PM

ITWeb Security Summit 2012

Programme - Tuesday, 15 May: Conference (Day 1)

Conference Day 1 - 15 May Conference Day 2 - 16 May Workshops - 17 May SANS Training - 17 & 18  May
07h30 - 08h30 Arrival and registration
08h30 - 08h40
Welcome address and housekeeping by chair

Chris Gibbons

Anchor of The Mid Day Report on 702
08h40 - 0910
Putting the 2012 ITWeb Security Summit in context

Charl van der Walt,
Co-Founder and Managing Director at SensePost

09h00 - 13h20

Plenary session - What do you trust?
In the wake of recent IT security breaches and compromises, the question has to be asked: who do you trust? The 7th Annual ITWeb Security Summit kicks off with a look at what we can still trust when it comes to information security.



A State of Dynamic Risk: Containment and Victory in a World of Advanced Threats

Eddie Schwartz
The Security Division of EMC


Moxie Marlinspike

The demise of SSL & Internet Trust

Moxie Marlinspike
Whitehat hacker and security researcher and fellow of the Institute for Disruptive Studies
10h40 - 11h20 Tea break


Haroon Meer

Information Security: The things we dont say...

Haroon Meer
Founder of Thinkst



Raj Samani

Cybercriminals and social engineering: understanding and overcoming these attacks

Raj Samani
VP Chief Technology Officer EMEA
McAfee International Ltd


Strong Security in a vulnerable world - Discussing principles to protect against current threats and attacks

Gabi Reish

Head of Product Management
Check Point Software Technologies
13h20 - 14h20 Lunch
14h20 - 17h15 Track 1 - The Changing Landscape (Chair - Craig Rosewarne, ISG)
  This track looks at emerging threats and how these are driving necessary paradigm shifts. The speakers will describe the current security landscape and assess what is working and what isn't.
14h00 - 17h15 Track 2 - Mobility (Chair - Jon Tullett, Editor: News analysis, ITWeb)
  With increased mobility, come increased and varied threats. This track is packed with information about malware, spyware and tactics. It provides an analysis of key vulnerabilities and different attack scenarios. It addresses the possibilities and risks of mobility in Africa.
14h00 - 17h15 Track 3 - Enterprise Resource Planning (Chair - Dominic White, Senior Consultant, SensePost)
  This track presents the three most important presentations on SAP insecurity from last year and combines them into one session for the first time. If you’re running SAP, you’ll want to be in this track.

Track 1 - The Changing Landscape
Chair - Craig Rosewarne, ISG


Search Engine Poisoning: Why Business Should Care?

  Pieter Blaauw, Security Consultant at Performanta

An analysis of the recent 2012 Security Survey (conducted by ITWeb in partnership with RSA, The Security Division of EMC), the latest Microsoft Security Intelligence Report, and the WolfPack report, applied to a South African context

  Craig Rosewarne, MD at Wolfpack and founder and chairman at Information Security Group of Africa and Dr Khomotso Kganyago, Chief Security Advisor at Microsoft South Africa

Making the case for the professionalisation of the technical Information Assurance industry and the need for international standards in this important area

  Ian Glover, President of the Council of Registered Ethical Security Testers (CREST)

Incident Case Analysis - where they went wrong

  Steve Armstrong, SANS Certified Instructor

Track 2 - Mobility

Chair - Jon Tullett, Editor: News analysis, ITWeb


What's the deal with Mobile and Africa

  Charl van der Walt, co-Founder and Managing Director at SensePost

Mobile Security - Breaking out of the box

Christiaan Brand, CTO at Entersekt

At the tone of the beep, leave your spyware

  Bennie Labuschagne, Director of Cyber Forensics at Cyanre

Pilfering information from the masses

  Tyrone Erasmus, security consultant at MWR InfoSecurity

Track 3 - Enterprise Resource Planning
Chair - Dominic White, Senior Consultant, SensePost


Cyber-Attacks on SAP & ERP systems: Is Our Business-Critical Infrastructure Exposed?

  Juan Pablo Perez Etchegoyen, CTO at Onapsis, Inc:

SAP (in)security: Scrubbing SAP clean with SOAP

  Chris John Riley, Penetration Tester, Security Analyst and Security Researcher

Systems Applications Proxy Pwnage

  Ian de Villiers, Associate at SensePost

SAP security presentation

  Marnius van Aswegen, security architect at Telic Consulting
17h00 - 17h15 Close with Chair / Speaker Panel
17h15 - 19h15 Cocktails and networking sponsored by Event Sponsor - Performanta
Conference Day 1 - 15 May Conference Day 2 - 16 May Workshops - 17 May SANS Training - 17 & 18  May


in partnership with





in partnership with


in partnership with

in partnership with


distributor of




Conference Day 1 - 15 May
Conference Day 2 - 16 May
Workshops - 17 May
SANS Training - 17 & 18 May
About our sponsors | Floorplan
Delegate attractions
Programme committee

Download the conference PDF

in partnership with


Infosec needs an injection of honesty
10 Apr 2012 - Fresh approaches are urgently needed in the IT security space, says Haroon Meer, founder of Thinkst.


Social engineering gets broader target
2 Apr 2012 - The Internet and social media are facilitating wider-ranging social engineering campaigns than ever before, says Raj Samani, VP and CTO of McAfee.
Bitcoin: a mobile money alternative
By Gareth van Zyl, Editor, ITWeb Africa
26 Mar 2012 -
The virtual currency could take off in Africa, just like payment systems such as M-Pesa.
The right to bear (electronic) arms
By Jon Tullett, Editor: News analysis
22 Mar 2012 -
International cyber warfare is a reality today, as governments engage with one another in espionage and sabotage.
Pwn2Own: the real story behind browser hacks
By Jon Tullett, Editor: News analysis
13 Mar 2012 - The annual Pwn2Own competition highlights vulnerabilities in software. How concerned should you really be?
SANS IT security training in SA for the first time
13 Mar 2012 - The globally respected SANS Institute will deliver its IT security professionals' training in South Africa for the first time, when it participates in the annual ITWeb Security Summit, in Sandton, in May.
Click here to visit our Virtual Press Office

Those charged with developing and implementing their organisation's information security programmes, including:
CEOs/Managing Directors
- CIOs, CISOs and CFOs
- Chief security, risk, compliance, process and technology officers
Senior Business Executives whose jobs include enterprise security responsibilities
Senior Business Executives whose jobs include critical infrastructure protection
Information Security Managers and Directors
Information Security Staff
Network and Systems Security Administrators
Enterprise Security Architects
Business Continuity Managers
Data Security Professionals
IT Auditors
IT/MIS Staff
Internet Security Managers
Systems Planners and Analysts
Security Analysts
Systems Administrators
Software and Application Developers
Technical and Support Specialists
Systems Integrators
Web Masters
Strategic Planners

Follow us on twitter and tweet about your thoughts around this event, #itwebsec

If you have an IT security solution, product or technology, then ITWeb Security Summit is the platform for you! Join the ranks of the IS elite at the ITWeb Security Summit 2012 and reap the marketing rewards and investment returns. Contact Debbie Visser at or call (011) 807-3294
Sponsorship opportunities


Tweet about the ITWeb Security Summit