This site uses cookies, including third-party cookies that help us provide and improve our services. If you want to find out more, click “Read more” to read our Privacy Policy.

READ MORE COOKIE SETTINGS

Agenda

Time Event & Speakers
08:00

Registration & Networking

09:25

Welcome Address

Andries Lombaard
Country Manager, IDC South Africa
09:30

Security Strategies in an Era of Multiplied Innovation

Jonathan Tullett
Research Manager, IT Services

Organizations in South Africa are increasingly trying to find a balance between keeping the lights on and improving business agility. National-level strategies and shifting industry dynamics are driving organizations in the region to innovate and experiment with new types of technologies, and thereby change IT and business-wide processes. IT security is no longer limited to protecting technology assets; today, security also aims to ensure business resiliency. As digital transformation initiatives progress, organizations will need to build business-level strategies for security. This presentation will examine the current state of the security landscape and explain how risk, trust, and consent must be built into security strategies as we enter an era of multiplied innovation

10:00

Using Intelligence to Build a Resilient Organization

Effective cyberdefense requires a holistic security approach incorporating broad process and technology strategies. To be fully prepared and decrease the probability of targeted attacks, future potential threats need to be considered as well. This session will look at how threat intelligence can help organizations identify ongoing security threats and take precautions against future dangers..

10:25

Driving Security via Platforms

Most large organizations must manage 50+ security products and 20+ providers. Security platforms and security ecosystems offer comprehensive, integrated solutions from a single vendor, or integrated solutions via an app marketplace. This presentation will evaluate whether this is the way to solve the scale and complexity challenge.

10:50

Tea/Coffee Break & Networking

11:20

Credential Abuse: Detection Strategies, Understanding Your Attack Surface and Real-World Attack Examples

Credential stuffing is among the top security challenges facing online businesses today. Come learn more about what credential abuse is and what you can do about it, including both solutions to address the problem as well as how your own application architecture could be making the problem worse.

 

11:45

Digital Transformation & Its Effects on Business Security
Presentation by IDC Invited End User

As organizations introduce innovative technologies into their ecosystems, they are simultaneously creating new types of risks and vulnerabilities. This presentation will provide an end-user perspective on the steps organizations can take to ensure business security as they engage in digital transformation.

12:00

Technology Track Session (Parallel Sessions)

Technology Track Session A: Convergence of OT & IT Security
Chaired by Jonathan Tullett, Research Manager-IT Services, IDC

12:00 - 12:05

Raffle Draw

12:05 - 12:25

Addressing the Security of Critical Systems

12:25 - 12:45

Security & the Extended OT Environment

12:45 - 13:15

Panel Discussion: Best Practices Around OT Security

13:15 - 13:20

Raffle Draw

Technology Track Session B: Making Cloud Security a Reality
Chaired by Mark Walker, Associate VP, Sub-Saharan Africa, IDC

12:00 - 12:05

Raffle Draw

12:05 - 12:25

Securing Multiple Clouds Within Your Organization

12:25 - 12:45

Enhancing Security with Cloud

12:45 - 13:15

Panel Discussion: Effective Security Strategies for the Cloud

13:15 - 13:20

Raffle Draw

13:20

Lunch & Networking

14:15

Technology Track Session (Parallel Sessions)

New-Age Security Dimensions
Chaired by Jonathan Tullett, Research Manager-IT Services, IDC

14:15 - 14:20

Raffle Draw

14:20 - 14:35

Addressing Security Complexity in the Digital Era

14:35 - 14:50

Addressing Security Complexity in the Digital Era

14:50 - 15:15

Panel Discussion: Building an Effective Security Strategy

15:10 - 15:15
15:15 - 15:20

Final Raffle Draw !!

15:20 - 15:30

Summary & Close

Dealing with Modern Risks
Chaired by Mark Walker, Associate VP, Sub-Saharan Africa, IDC

14:15 - 14:20

Raffle Draw

14:20 - 14:35

Modern Data Security Strategies

14:35 - 14:50

The Rise of Insider Risk

14:50 - 15:15

Panel Discussion: Ensuring Effective Data Security & Insider Risk Management

15:15 - 15:20

Final Raffle Draw !!

15:20 - 15:30

Summary & Close

Contacts

Eileen Gengan

Conference Manager

+27 84 088 1020

Lydia Botha

Senior Sales Manager

About IDC

55 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit www.idc.com.