This site uses cookies, including third-party cookies that help us provide and improve our services. If you want to find out more, click “Read more” to read our Privacy Policy.

READ MORE COOKIE SETTINGS

Agenda

Time Event & Speakers
08:00

Registration & Networking

09:15

Welcome Address

Andries Lombaard
Country Manager, IDC South Africa
09:20

Introduction & Felicitation of IT Security Advisory Council

Andries Lombaard
Country Manager, IDC South Africa
09:30

Security Strategies in an Era of Multiplied Innovation

Jonathan Tullett
Research Manager, IT Services

Organizations in South Africa are increasingly trying to find a balance between keeping the lights on and improving business agility. National-level strategies and shifting industry dynamics are driving organizations in the region to innovate and experiment with new types of technologies, and thereby change IT and business-wide processes. IT security is no longer limited to protecting technology assets; today, security also aims to ensure business resiliency. As digital transformation initiatives progress, organizations will need to build business-level strategies for security. This presentation will examine the current state of the security landscape and explain how risk, trust, and consent must be built into security strategies as we enter an era of multiplied innovation

10:00

No NotPetya, No BadRabbit, and no WannaCry: Did Anything Happen in Cyber Last Year?!

Zeki Turedi
Technology Strategist, EMEA, CrowdStrike

This presentation will discuss the alarming trends observed in the global threat landscape, & the evolving best practices proving most successful against criminal, hacktivist & nation-state adversaries. The latest threat intel discovered in 2018 & predictions for 2019 and how you can use this to shape your security strategy. Lessons learnt in the course of conducting in-depth digital forensics, IR and remediation with real-world strategic insight into the current threat landscape.

10:25

Credential Abuse: Detection Strategies, Understanding Your Attack Surface and Real-World Attack Examples

Richard Meeus
EMEA Manager - Enterprise Security Architects, Akamai Technologies

Credential stuffing is among the top security challenges facing online businesses today. Come learn more about what credential abuse is and what you can do about it, including both solutions to address the problem as well as how your own application architecture could be making the problem worse.

10:50

Cybersecurity Evolved: Combating Coordinated Threats

Pieter Nel
Regional Head – SADC, Sophos
Threat Landscape is evolving, today’s attacks are more sophisticated and coordinated than ever. Dealing with today’s threats has caused nearly insurmountable challenges for even the world’s largest and most forward-thinking organizations. Attack surfaces keep expanding as end users leverage smartphones, cloud applications, and multiple portable devices. Attacks keep getting more complex and coordinated, while point products meant to defend against them often work in isolation. Cyber defense needs to be evolved! Only an artificial intelligence (AI) based coordinated Cybersecurity system can help organizations to counter today’s most advanced attacks.
11:15

Tea/Coffee Break & Networking

11:45

Raffle Draw !!

11:50

Digital Transformation & Its Effects on Business Security

Nkhane Lugisani
CIO, Gautrain Management Agency

As organizations introduce innovative technologies into their ecosystems, they are simultaneously creating new types of risks and vulnerabilities. This presentation will provide an end-user perspective on the steps organizations can take to ensure business security as they engage in digital transformation.

12:10

Privileged Access Management - The Cyber Security Priority

Paresh Makwana
Vice President of Business Development Africa, ARCON
12:30

Realities of Ransomware

Andrew Vogues
Sales Leader-Africa, Check Point
12:50

An Introduction To Applications Security

Eli Menashe
Regional Sales Manager, Africa, Checkmarx
13:05

Panel Discussion: Best Practices Around OT Security

Jonathan Tullett
Research Manager, IT Services
In this session the panelists will discuss best practices for introducing and improving OT security within organizations. In particular, they will focus on the strategies that organizations should adopt given the rising prevalence of industrial IoT solutions.

13:35

Summary and Close

13:40

Mega Raffle Draw !!

13:45

Lunch & Networking

Contacts

Deepa Ahuja

Conference Director, Africa

+91 981874 7089

Lydia Botha

Senior Sales Manager

About IDC

55 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit www.idc.com.