|
|
DAY ONE PLENARY SESSION
Misha Glenny, investigative journalist, author and broadcaster, will open our 2013 Summit. His most recent book, the acclaimed Dark Market, led to his recent TED talk on the subject of cyber security. Misha is joined by other experts who will present an overview of the current landscape and comment on current trends. They will share practical advice on the way forward for senior business decision-makers, highlighting successful approaches to improved security and reduced breaches.
|
|
|
07h30 |
Registration and exhibition opens |
08h30 |
Security Summit 2013 video |
|
 |
08h35 |
 |
Welcome
Jeremy Maggs
journalist, radio host and television presenter
|
|
|
 |
08h45 |
 |
A guide to ITWeb Security Summit 2013
Charl van der Walt
co-founder and managing director, SensePost and
|
|
|
|
|
 |
09h15
Keynote |
 |
The struggle for the Internet: Web control, crime, commercial espionage, and spying and warfare
Misha Glenny
investigative journalist, author and broadcaster
|
|
|
 |
10h00 |
|
An underground education: Lessons in counterintelligence from history's underworld
The Grugq
|
|
|
 |
10h40 |
Tea break |
|
 |
11h10 |
 |
Cybercrime kill chain vs. effectiveness of defense layers
Francisco Artés
research director, NSS Labs
|
|
|
 |
11h50 |
 |
An in-depth look at the trends that are emerging in the world of cyber-crime, cyber-security, and the threat landscape. Can we use what we know about our adversaries in order to create a more effective response?
Mike Armistead
vice president and general manager, Enterprise Security Products, Fortify, Hewlett-Packard
|
|
|
 |
12h30 |
 |
Bringing Down the House – Are South African Organisations Really At Risk?
Gordon Love
regional director for Africa, Symantec
|
|
|
 |
13h10 |
Lunch |
|
 |
|
Track 1 - Defence in depth |
|
Defence in depth refers to the coordinated use of multiple security countermeasures and diverse defensive strategies to manage risk. If one layer of defence turns out to be inadequate, another layer of defence should prevent a full breach. This is based on the idea that a full attack occurs over a chain of events, and not a single, isolated event. During this track you will understand this chain, and how to develop innovative ways of tracking who is attacking them, and build in controls beyond the perimeter. |
|
Key questions this track will answer include:
|
|
- What is the best strategy to respond to the new security environment for corporate networks (with mobility in mind)?
- What key questions should I ask when assessing the security of my organisation?
- What security controls should I be considering?
|
|
 |
14h10 |
 |
Cyber threat combating initiatives planned for Africa
Craig Rosewarne
managing director, Wolfpack and founder and chairman, ISG
|
|
|
 |
14h55 |
|
|
 |
15h35 |
Tea break |
|
 |
16h05 |
 |

DDoS, the silent thunder
Vernon Fryer
chief technology security officer, Vodacom SA
|
|
|
 |
16h50 |
 |

Cyber Amber: A zero-interaction honey-pot system with modular intelligence
Adam Schoeman
information security officer, First National Bank Private Clients
|
|
|
Track 2 - Know your enemy |
|
Insiders pose a sizeable threat to organisations. Desperate or disgruntled employees may try to exploit their current or previous companies. Equally worrying would be an incident that was a result of negligence – employees without security awareness are security liabilities. During this track you will learn more about the potential threats from employees and outsiders. In addition, businesses need to be aware of the national approach to cyber security, in order to ensure they are adequately prepared for risk. |
|
Key questions this track will answer include:
|
|
- What can I do to counter insider threats?
- What are the external threats I am most likely to face?
- What cyber security threats should I be prepared for?
|
|
 |
14h10 |
 |
Internet censorship and the Tor Project
Runa Sandvik
developer, security researcher and translation co-ordinator, The Tor Project
|
|
|
 |
14h55 |
 |
Offence-oriented defence
Dominic White
chief technology officer, SensePost
|
|
|
|
Jeremy du Bruyn
senior penetration tester, SensePost
|
|
|
 |
15h35 |
Tea break |
|
 |
16h05 |
 |
Socially engineered Trojans: How to defend your organisation from targeted attacks with Trojans and social engineering
Beza Belayneh
chief executive officer and chief information security officer, South African Centre for Information Security
|
|
|
 |
16h50 |
 |
Lesson learned from the trenches of targeted attacks
Robert McArdle
senior advanced threat researcher / manager: Forward Looking Threat Research Team, Trend Micro
|
|
|
|
|
Track 3 - C-level security update |
|
When corporate security is at risk, the entire organisation is at risk. It is necessary for CIOs, CISOs, and other C-Suite executives with a security mandate to be up to date on how to optimise their corporate security, and be informed about key threats. This track will alert the C-Suite to key security concerns they don’t know about, but should. Delegates will be equipped to keep their organisations secure against ever-evolving security threats. |
|
Key questions this track will answer include:
|
|
- What points can I action in the next fortnight to tighten my organisation’s security?
- How can my organisation better defend itself, its staff and key assets?
- How can I identify ‘obvious’ gaps in my security policies?
|
|
 |
14h10 |
 |

Integrating information security with world-class physical security: What can we learn
Johann van der Merwe
global head of information security, De Beers Group
|
|
|
 |
14h55 |
 |
The paper peril - thinking outside the hard drive
Duncan Waugh
managing director, DSSS
|
|
|
 |
15h35 |
Tea break |
|
 |
16h05 |
 |
Enterprise fraud: Are you battle ready?
Vinod Vasudevan
chief operations officer, Paladion
|
|
|
 |
16h50 |
 |
Transforming your security organisation to be next generation and business enabling
Jason Clark
chief information security and strategy officer, Websense
|
|
|
 |
17h30 |
Cocktail function sponsored by |
 |
|