|
|
DAY TWO PLENARY SESSION
Day two is opened with a talk by Richard Bejtlich, MANDIANT's Chief Security Officer. Richard has more than 13 years of experience in enterprise-level intrusion detection and incident response working with the federal government, defense industrial base, and Fortune 100 companies. The other high-level talks presented by leading infosec experts during the plenary session will address pressing security issues and concerns, providing an essential update.
|
07h30 |
Exhibition opens |
08h30 |
 |
Welcome
Jeremy Maggs,
journalist, radio host and television presenter
|
|
|
 |
08h40
Keynote |
 |
Formulating an attack-focused security plan
Richard Bejtlich
chief security officer, MANDIANT
|
|
|
 |
09h25 |
 |
The year gone by: highlights of the most interesting stories infosec of 2012, and a hypothesis on what the rest of 2013 holds in store for the industry
Patrick Gray
Risky Business
|
|
|
 |
10h05 |
 |
The Board Conversation: Why Identity & Access Governance is a business and not an IT decision:
Phil Allen
director, identity and access management, Dell EMEA
|
|
|
 |
10h45 |
Tea break |
|
 |
11h15 |
 |
Lessons learned when building and selling security software online - the Maltego story
Roelof Temmingh
managing director, Paterva
- Five slides and five years – the concise Maltego history
- What is Maltego? A quick demo of capabilities.
- Who uses Maltego and what does it tell us about our industry?
- Lessons learned – How to develop security software
- Lessons learned – Marketing and selling security software on the Internet
KEY QUESTIONS
- What is Maltego and where did it come from?
- Who uses Maltego? Why and what for? What can we learn from this?
- What is a good strategy when developing and selling security software online?
|
|
|
 |
11h55 |
 |
Executive cyber risk responsibility: defence in depth, breadth and width for the enterprise
Doug DePeppe
JD, LL.M., director, Cyber-Risk Solutions,
The Soufan Group co-founder, Western Cyber Exchange
|
|
|
 |
12h35 |
Sponsor giveaways |
|
 |
13h05 |
Lunch |
|
|
|
Track 1 - Security and compliance |
|
The governance and management of information and technology has become a complex topic. Information security professionals work in an environment in which they have to address a range of threats while meeting regulatory and legal requirements. They also need to cater to the risks of rapid innovation in technology and an increasingly mobile workforce. This track will equip you to address evolving risk. This track will also address the subject of liberation tech. This will look at developing an understanding of how IT can be used to defend human rights, improve governance, empower the poor, promote economic development, and pursue a variety of other social goods that organisations need to be supporting. |
|
Key questions this track will answer include:
|
|
- How can my organisation meet compliance, audit, regulations and standards requirements?
- How do I incorporate vulnerability and patch management into my GRC initiative?
- How can I automate IT GRC within my organisation?
|
|
 |
14h05 |
 |
Privacy officers, regulators and reality: The global perspective
Daniella Kafouris
senior manager and lead data privacy/POPI compliance, Deloitte Risk Advisory
|
|
|
|
 |
14h50 |
|

The benefits of Advanced Electronic Signatures
Heinz Kuhn
senior manager: Legal Services, Department of Co-operative Governance and Traditional Affairs
|
|
|
|
|
 |
15h30 |
Tea break |
|
 |
16h00 |
 |

IT asset disposal – a view into a telco world
Kayode Adesemow
information assurance consultant, chartered engineer and project manager
|
|
|
|
 |
16h45 |
 |
An overview of the cyber security legal and regulatory landscape in SA – facts, promises and wishes
Prof Basie von Solms
research professor, Academy for Computer Science and Software Engineering: University of Johannesburg
|
|
|
|
|
|
Track 2 - New offensive techniques |
|
The world of infosec is very dynamic. Even seasoned security professionals are faced with the new challenges brought about by smart devices, social networks, virtualisation, cloud computing, malware and regulations. The new offensive techniques track reveals the latest attack methods that organisations need to be aware of. This track will inform you about new challenges, and ways in which to overcome these. |
|
Key questions this track will answer include:
|
|
- When embracing BYOD, what security issues should be a priority?
- Which new security threats should be on my radar?
- How can my organisation stay ahead of security threats?
|
|
 |
14h05 |
 |
PinPadPwn
Nils
head: security research, MWR InfoSecurity
|
|
|
 |
14h50 |
 |
SHA256 Vulnerabilities exposed by Bitcoin
Dr Frans Lategan
security engineer with Amazon Web Services
|
|
|
 |
15h30 |
Tea break |
|
 |
16h00 |
 |
Cryptanalysis of the Enigma
Ben Gatti
independent software hacker, and
|
|
|
|
|
 |
16h45 |
 |
88MPH: Digital tricks to bypass physical security
Andrew MacPherson
operational manager, Paterva
|
|
|
|
|
Track 3 - Incident response and forensic approaches |
|
As infosec professionals get more involved in incidents day to day, they need to know how to handle situations, and to be aware of what and how the forensics aspect works. It is essential to have an accurate idea of the risk your organisation faces. Learn how to create a plan for exactly what to do before, during, and after an incident. This track will inform you of the technical and administrative details of effective incident response planning, as well as which tools are available to you. |
|
Key questions this track will answer include:
|
|
- How can our security team prepare for and respond to any emergency incident?
- How to do we assess the possible damage from an incident?
- How do we preserve the integrity of the evidence?
|
|
 |
14h05 |
 |
Breaking, forensicating and anti-forensicating SAP Portal and J2EE Engine
Alexander Polyakov
chief technology officer, ERPScan
|
|
|
 |
14h50 |
 |
The role of big data and analytics in forensics and incident response
Yolandé Byrd
director, FACTS Consulting
|
|
|
 |
15h30 |
Tea break |
|
 |
16h00 |
 |
Recovery from chaos: a practical look at a real-world example
Tony Olivier
managing director, Performanta Consulting & Mobile Security, and
|
|
|
 |
Brendan Kotze
managing director, Performanta Services
|
|
|
 |
17h25 |
Close of conference |
17h45 - 20h30 |
|
|
|
The presentation will introduce the idea of "incident response as a continuous business process" as a countermeasure, and will discuss two key metrics for measuring the effectiveness of your IR operation.
KEY QUESTIONS