The struggle for the Internet: Web control, crime, commercial espionage, and spying and warfare
The struggle for the Internet: Web control, crime, commercial espionage, and spying and warfare Misha Glenny, investigative journalist, author and broadcaster
Mike Armistead
An in-depth look at the trends that are emerging in the world of cyber-crime, cyber-security, and the threat landscape. Can we use what we know about our adversaries in order to create a more effective response?
An in-depth look at the trends that are emerging in the world of cyber-crime, cyber-security, and the threat landscape. Can we use what we know about our adversaries in order to create a more effective response? Mike Armistead, vice president and general manager, Enterprise Security Products, Fortify, Hewlett-Packard
Cyber Amber: A zero-interaction honey-pot system with modular intelligence
Cyber Amber: A zero-interaction honey-pot system with modular intelligence Adam Schoeman, information security officer, First National Bank Private Clients
Socially engineered Trojans: How to defend your organisation from targeted attacks with Trojans and social engineering
Socially engineered Trojans: How to defend your organisation from targeted attacks with Trojans and social engineering Beza Belayaeh, chief executive officer and chief information security officer, South African Centre for Information Security
Lesson learned from the trenches of targeted attacks
Lesson learned from the trenches of targeted attacks Robert McArdle, senior advanced threat researcher / manager: Forward Looking Threat Research Team, Trend Micro
Integrating information security with world-class physical security: What can we learn
Integrating information security with world-class physical security: What can we learn Johann van der Merwe, global head of information security, De Beers Group
Transforming your security organisation to be next generation and business enabling
Transforming your security organisation to be next generation and business enabling Jason Clark, chief information security and strategy officer, Websense
Richard Bejtlich
Formulating an attack-focused security plan
Formulating an attack-focused security plan Richard Bejtlich , chief security officer, MANDIANT
Executive cyber-risk responsibility: Defense-in-depth, breadth and width for the enterprise
Executive cyber-risk responsibility: Defense-in-depth, breadth and width for the enterprise Doug DepeppeJD, LL.M., director, Cyber-Risk Solutions, The Soufan Group co-founder, Western Cyber Exchange
Privacy Officers, regulators and reality – The global perspective
Privacy Officers, regulators and reality – The global perspective Daniella Kafouris, senior manager and leads data privacy / POPI compliance, Deloitte Risk Advisory
The benefits of Advanced Electronic Signatures Heinz Kuhn , senior manager: legal services, Department of Co-operative Governance and Traditional Affairs Maeson Maherry , solutions director, LAWtrust
An overview of the cyber security legal and regulatory landscape in SA – facts, promises and wishes
An overview of the cyber security legal and regulatory landscape in SA – facts, promises and wishes Prof Basie von Solms , research professor, Academy for Computer Science and Software Engineering: University of Johannesburg
Recovery from chaos: a practical look at a real-world example
Recovery from chaos: a practical look at a real-world example Tony Olivier , managing director, Performanta Consulting & Mobile Security Brendan Kotze , managing director, Performanta Services