2. Dear Participant,
On behalf of Fleming. we would like to welcome you to “ Africa Cyber Security Summit”.
We have carefully selected leading industry experts to speak at this event, giving you the opportunity to hear
first-hand experiences from industry leaders and share solutions for overcoming the latest challenges in the field.
Through presentations & interactive panel discussions, we are bringing together industry experts and thought
leaders to address and discuss the rapidly changing business environment in the fieald of Cyber Security in Africa
We hope that your participation at this Fleming. summit is just the beginning of our business relationship and
that we will have the opportunity to make a continuing contribution to your company’s profitability and success.
If you would like to offer any comments related to the content or format of the program, or would like to contribute
to a future platform we would be very pleased to hear from you. To that end, we ask that you kindly fill up and
return the Conference Evaluation Form.
Thank you for attending and hope to see you again.
Best regards,
JosephVipinRajan
Conference Producer
Fleming.
AlphyNangani
Conference Coordinator
Fleming.
Africa Cyber Security Summit
9th
- 10th
March, 2016 | Birchwood Hotel & OR Tambo Conference Centre, Johannesburg, South Africa
3. Administrative details for your perusal:-
1. If there are any changes to the conference program, you will find the updated version in your documentation
folder or it will reflect on the board next to the registration desk.
2. The conference will take place on the 9th
and 10th
of March 2016 in Marco Polo
3. Exhibition & Coffee Breaks will be held in Heathrow. If you have any special dietary requirements, kindly
inform our Registration Desk during the first coffee break. Lunch will be served at Restaurant - Clovers
Green.
4. Name tags have been provided to help attendees identify fellow delegates. That apart, the name tags will
also assist the conference production team to easily identify attendees when delivering messages.
5. Kindly adhere to specified break durations considering the program schedule of the day. The Chairperson
shall try his/her best to begin all sessions on the scheduled time.
6. Kindly wait until the end of each presentation for the Question & Answer (Q&A) session, the Chairperson
shall give an opportunity to raise the questions. Also please introduce yourself and the organization you
represent prior to raising a query.
7. Kindly keep your cell phones on silent mode or switched off when the sessions are in progress.
8. Kindly do not forget to fill in the Conference Evaluation Form and return the same to the Conference
Coordinator Alphy Nangani at the Registration Desk. Your valuable feedback will be of great help to
evaluate and enhance our upcoming events.
If you have any queries before, after or during the conference, the Fleming. Team would be more than happy
to assist you with whatever concerns you might have. Your valuable feedback will be of great help to evaluate
and enhance our upcoming events.
Fleming. recognizes the intellectual property rights of speakers over the transcribed material. No reproduction of any part may take place without
the written permission of relevant speaker. The presentations are not for sale and have no commercial value.
Africa Cyber Security Summit
9th
- 10th
March, 2016 | Birchwood Hotel & OR Tambo Conference Centre, Johannesburg, South Africa
4. Event Chair:
Dave Dodge, Chairman
South African Institute of Security, South Africa
Dave Dodge is a Senior Partner with the Temi Group. He comes from a policing background, having been
a police officer with the Metropolitan Police, London (Scotland Yard) for over 30 years. During this career,
he served in operational and support roles in uniformed, investigative and intelligence fields, which saw
him awarded a number of commendations. He retired as a senior detective in the Department of Strategy,
Modernisation and Performance. His relocation to South Africa saw a move into the security risk management
in the role of consultant and Chief Advisor to Group Security at Eskom, and recent board certification as a
Certified Protection Professional (CPP).Dave has also made significant contributions to the development of
security training in South Africa as a member of a Safety and Security Sector Education andTraining Authority
(SASSETA) Task Team and a South African Qualifications Authority (SAQA) Reference Group. He is an active
member of various national and international security organisations, including the US Overseas Security
Advisory Council (OSAC) and the World Institute of Nuclear Security (WINS) in addition to being the Vice-
Chairman of the Board of Governors of the South African Institute of Security (SAIS) and Assistant Regional
Vice-President for ASIS International (ASIS) in Southern and Eastern Africa.
5. Africa Cyber Security Summit
9 - 10 March, 2016 | Birchwood Hotel & OR Tambo Conference Centre,
Johannesburg, South Africa
Associate Sponsor
Media Partners
Strategic Security Sponsor Networking Solution Provider
Supported ByEndorsed By
6. Africa Cyber Security Summit
9 - 10 March, 2016 | Birchwood Hotel & OR Tambo Conference Centre,
Johannesburg, South Africa
9th
March, 2016 DAY 1
8:00 Registration and Coffee
8:50 Welcome by Fleming.
8:55 Opening Remarks from the Chairperson
Dave Dodge, South African Institute of Security, South Africa
Chairman
9:00 Cybercrime: A reality in South Africa
Brigadier NT Pieterse, South African Police Service
Section Head: Electronic Crime Unit, South Africa
9:30 Understanding the touch-points between privacy
cyber security:
• Getting to grips with where privacy cyber security come
together
• Understanding what these touch points mean from a regulatory
and corporate perspective
Ritasha Jethva, Nedbank Limited
Information Privacy Officer
10:00 The Rising Cases of Cyber Crime:“A challenge for LEAs
and Industry”
• The paper will amongst other things identified some of
the current trends of cyber threats affecting businesses,
government and individuals.
• It will also look at evolution of cybercrimes resulting into online
cyber criminal markets putting sophisticated attack tools into
the hands of more low-level attackers with case studies.
• The paper will also look at how over dependent of Government,
Agencies and Ministries and Business in technology without
the requisite security controls give birth to the rising wave of
cybercrime.
Abdulkarim Chukkol, Economic and Financial Crimes
Commission, Head, Advance Fee Fraud and Cybercrimes Section,
Nigeria
10:30 Coffee Break Networking
11:00 Lack of Technical Know-how in terms of Cyber Security
• Inability to monitor and defend national networks
• Making African countries vulnerable to cyber espionage
• African countries vulnerable incidences of cyber
terrorism
James Saaka, National Information Technology Authority-
Uganda (NITA-U), Executive Director, Uganda
11:30 Security for the Digital Economy
• The current security landscape
• Cisco’s Vision for Security: Before, During and After an attack
Niall Moynihan, Cisco, Security Specialist
12:00 Inside the Threats to Cyber Security, their
consequences, vulnerabilities and, mitigation
measures
• The risks associated with insider threats
• Individual motivations, behaviors and indicators
• Organisational factors leading to insider acts
• Mitigation measures to reduce the risks
Dave Dodge, South African Institute of Security, South Africa
Chairman
12:30 Networking Lunch
13:30 Making The African Internet Ecosystem More Secure
and Resilient.
• Introduction
• Africa Threat Landscape
• The need for Regional Cooperation
Jacques Houngbo, AfricaCERT, Instructor, ICT Specialist
13:45 MASTERCLASS : Cyber Maturity Assessment approach
to:
• Create opportunity to reflect on current situation
• Give insight in potential cybersecurity issues and opportunities
or rooms for improvement
• Raise awareness and call for action
Ngeje Nganate, AfricaCERT, Southern Africa Representative
14:10 What is the need for Cyber Insurance
• Individual awareness towards“Cyber Insurance”
• Responsibility faced by a company in terms of a hacking activity
or any other threat
Thokozani Miya, Vodacom, Head, Principal Specialist - Security
14:45 Networking Tea/Coffee Break
15:15 The Enterprise Immune System: Using Machine
Learning to Detect‘Unknown Unknown’Threats
• Learn why‘immune system’technologies represent a
fundamental innovation for cyber defence
• Discover how to apply machine learning and mathematics to
detect advanced, internal threats
• Understand how to gain 100% network visibility to investigate
emerging anomalies in real time
• Hear real-world Enterprise Immune System case studies
Nick Trim, Darktrace, UK, Managing Director EMEA
15:45 TRIO ROUNDTABLE
Delegates will be split into three teams to have independent
discussions on their respective tracks, brainstorm and arrive at
conclusions. Format to be followed:
• 5 minutes for introduction `
• 30 minutes for topic discussion
• 10 minutes for the round table leader of each group to share
the conclusions
ROUNDTABLE 1: Lack of Technical Know-how in terms of Cyber
Security
Moderator:
Abdulkarim Chukkol, Economic and Financial Crimes
Commission, Head, Advance Fee Fraud and Cybercrimes Section,
Nigeria
ROUNDTABLE 2: IT Security Budget - Well Spent or Never Spent?
Moderator:
Sean Maritz, Eskom, Chief Information Officer, South Africa
ROUNDTABLE 3: Is Your Organization Cyber Insured?
Moderator:
Thokozani Miya, Vodacom, Head, Principal Specialist - Security
16:30 Detection of APT Attacks
• Cyber trainer
• CyberShield Analysis Detection (AnD) for SCADA Networks
• CyberShield Analysis Detection (AnD) for IP Networks
• CyberShield Mitigation Response (MnR)
• CyberShield for Mobile
Shllomi Ezra, Cyberbit, Isreal, Sales Director EMEA
16:45 Closing Remarks and from the Event
Chairperson Summarizing the Day‘s takeaways
Dave Dodge, South African Institute of Security, South Africa
Chairman
7. Africa Cyber Security Summit
9 - 10 March, 2016 | Birchwood Hotel OR Tambo Conference Centre,
Johannesburg, South Africa
8:00 Registration and Coffee
8:50 Welcome by Fleming.
8:55 Opening Remarks from the Chairperson
Dave Dodge, South African Institute of Security, South Africa
Chairman
9:00 IT Security Budget - Well Spent or Never Spent?
• IT Security Head‘s key role in gaining and spending security
budget
• Effective utilisation of the cyber budget
• Return on security investment (ROSI)
Sean Maritz, CIO, Group Information Technology, Eskom SOC
Limited
9:30 The South African Cybersecurity Environment:
• Where are we?
• Proposed actions to reduce the treat.
Joey Jansen Van Vuuren, Council for Scientific Industrial
Research, Research Group Leader Cyber Defense, South Africa
10:00 Cyberspace challenges in South Africa:
• Empower the man on the street
• Ordinary societal members are the most vulnerable
• Cultivating a security mindset at primary schools
• Government and private sector’s commitment
Manqoba Mngomezulu, Telkom, Senior Info Security Specialist
Author, South Africa
10:30 Coffee Break Networking
11:00 PANEL DISCUSSION - Cyber Crime 2.0
• Cyber crime cases are doubling every year – What is the
potential problem?
• Despite the research for over a decade, cyber crime still tops the
chart of a threat
Panelists:
Abdulkarim Chukkol, Economic and Financial Crimes
Commission, Head, Advance Fee Fraud and Cybercrimes Section,
Nigeria
Ahamad Shah, FirstRand Group, Head CISO Team, South Africa
Maletsema Phofu, Eskom, Chief Information Security Advisor,
South Africa
Moderator :-
Dave Dodge, South African Institute of Security, South Africa
Chairman
11:45 Developing an IT Security Infrastructure Landscape –
Role of Data Protection
• Developing an industry-wide technology infrastructure
• Avoiding pitfalls to IT Operations
Teki Akuetteh Falconer, Data Protection Commission
Executive Director, Ghana
12:20 Developing cybersecurity skills for organisational
resilience
• Workforce challenges and the evolution of cyber skill
requirements
• Training professionals to deal with day to day cyber threats
• Enhancing cyber knowledge in the organisation
Maletsema Phofu, Eskom
Chief Information Security Advisor, South Africa
13:00 Networking Lunch
14:00 BREAK OUT SESSION: Road map to an effective
cyberspace
Delegates will be split into three teams to have independent
discussions on their respective tracks, brainstorm and arrive at
conclusions. Format to be followed:
• 5 minutes for introduction
• 30 minutes for topic discussion
• 10 minutes for the round table leader of each group to share the
conclusions
• Initiatives taken by the continent to overcome cyber banking
threats
Jacques Houngbo, AfricaCERT, Instructor, ICT Specialist
• Building a truly‚effective‘ Security
Joey Jansen Van Vuuren, Council for Scientific Industrial
Research, Research Group Leader Cyber Defence, South Africa
• Enabling the Risk team that would reduce the risks to a large
extent
Ngeje Nganate, AfricaCERT, Southern Africa Representative
14:45 Focus session on wireless security
• The truth about wireless security
• How secure is your data
• Shortcuts for a achieving a watertight wireless security
Ahamad Shah, FirstRand Group, Head CISO Team, South Africa
15:15 Networking Tea/Coffee Break
15:45 Book a Prize -“Bring Back My Identity”
6 Signed copies of the book “Bring Back My Identity” by Manqoba
Mngomezulu would be handed out to delegates who can answer
to the questions laid out by speakers at the summit. The question
would be asked by the Chairperson and the Delegates are
requested to answer to these using the Sli.do Application.
The top 3 answers would be reviewed and the best answer would
be awarded the signed copy of the book“Bring Back My Identity”by
the author Manqoba Mngomezulu, himself
16:15 Closing Remarks from the Event Chairperson
Dave Dodge, South African Institute of Security, South Africa
Chairman
10th
March, 2016 DAY 2
8. Africa Cyber Security Summit
9 - 10 March, 2016 | Birchwood Hotel OR Tambo Conference Centre,
Johannesburg, South Africa
Abdulkarim Chukkol, Economic and Financial Crimes
Commission (EFCC) Nigeria, Head, Advance Fee Fraud and
Cybercrime Section
Abdulkarim Chukkol is a Deputy Chief Detective Superintendent
who currently heads the Lagos Office of the Advance Fee Fraud and
Cybercrime Section of Nigeria’s Economic Financial Crimes Commission.
He holds a Post Graduate Certificate in Criminal Justice Education. He
graduated from the University of Maiduguri (2000) and University of Virginia (2011). He
also had professional training at the Nigeria Police Academy and FBI National Academy,
Quantico VA, United States. He also holds post graduate diploma in Cybersecurity and
Spectrum Management from the United States Telecommunication Training Institute,
Washington DC, United States. Mr. Chukkol is a versatile fraud investigator who has been
involved in several multinational operations and participated in several anti-cybercrime
fraud disruptive activities at the Commission including Operations ‘Octopus’, Operations
‘Stop Payment’, Operations ‘Cyberstorm 1’ and Operations ‘Apollo’ leading to arrest and
successful prosecution of fraudsters/ cybercriminals. He represents the Commission at the
International Mass-Marketing Coordinating Group, which consists of law enforcement,
regulatory, and consumer protection agencies from seven countries, including Australia,
Belgium, Canada, the Netherlands, the United Kingdom and the United States. He has
supervised the prosecution of 212 Advance Fee Fraud and Cybercrime related cases at
various High Courts all over Nigeria between June 2012- December 2014. 69 of the cases
were successfully convicted, including the extradition of 2 fugitives to the United States.
He is a certified fraud examiner and an active member of the International Association
of Computer Investigative Specialist. Mr. Chukkol is also member and Nigeria contact
person of the G8 24/7 High Tech Crime Network and has contributed immensely in the
fight against Transnational Crimes in Nigeria and abroad. He is married with three children.
Jacques Houngbo, AfricaCERT, Instructor, ICT Specialist
ICT Specialist and Information Security expert, Jacques Houngbo has
extensive experience assessing IT systems and processes, IT Strategy
Development Programme Management. He uses to work for diverse
clients: government, private companies and international organizations.
He is more and more engaged in the field of cybersecurity. As such,
Jacques Houngbo is member of AfricaCERT where he is in charge of
Development Program and also serves as Instructor. Jacques Houngbo is CEH (Certified
Ethical Hacker) and ECSA (EC Council Certified Security Analyst).
Ngeje Nganate, AfricaCERT, Southern Africa Representative
Mr. Ngeje Nganate is the current AfricaCERT Representative for Southern
Africa .He is currently based in Gaborone, Botswana. As an AfricaCERT
representative for the Southern Africa region, Mr. Ngeje Nganate’s work
includes raising cyber security awareness, conducting workshops and
seminars, conducting security audits and assessments and organizing
cyber security training for the Southern Africa region. Prior to joining
AfricaCERT, Mr Ngeje Nganate worked as an Information Security Analyst from 2011 to
2013 at the International Multilateral Partnership Against Cyber Threats (IMPACT). IMPACT
is an International cyber security organization headquartered in Cyberjaya, Malaysia. At
IMPACT, Ngeje Nganate was involved in the establishment of Computer Emergency
Response Teams in the African continent. He was involved as a project manager for the
establishment of the Computer Incident ResponseTeams (CIRT) in the Republics of Zambia
(cirt.zm) and Burkina Faso (cirt.bf) .He was also part of the team that conducted CIRT
readiness assessments for Ghana, Ivory Coast, Burundi, Tanzania and Kenya and Niger. Mr.
Ngeje Nganate is a candidate for a Master of Science (Computer Science) at the Botswana
International University of Science and Technology (BIUST).He graduated with a Bachelor
of Information Technology (HONS) degree from Multimedia University (MMU) in Cyberjaya,
Malaysia. He is an EC-Council Certified Ethical Hacker (C|EH), a Cisco Certified Network
Associate (CCNA) and an IBM Certified Academic Associate in IBM DB2 database. Mr. Ngeje
Nganate is also a recipient of various certificates of training in the field of cyber security
including CERT implementation and establishment. “A More Secure African Cyber Space”
is one of Mr. Ngeje Nganate’s goals and he believes enough cyber security awareness and
capacity building are key to the realization of that goal.
Brigadier NT Pieterse, South African Police Service
Section Head: Electronic Crime Unit, South Africa
Brigadier Pieterse joined the South African Police Service on 1 December
1979 and have been assigned to the Division: Detective Service from
1983, where he performed his duties within a number of specialised
environments, inclusive of the Stock Theft- ; Murder and Robbery- and
Crime Intelligence Units. During 1987 he received his Commission rank,
and has since served in a number of managerial positions within the South African Police
Service. During 1992 to 2001 Brig Pieterse furthered his career within the Commercial
Crime establishment, having being assigned to a number of commander positions, also
“seconded” to the Department of Justice’s Investigative Directorate: Serious Economic
Offences (IDSEO). For the period 2001 to 2009 he served as a member of the Directorate
for Special Operations (DSO Scorpions), where he held the position of Chief Investigating
Officer (CIO). From 2009 to date Brig Pieterse again became part of Commercial Crime
within the South African Police Service, where he is currently performing his duties as
the National Section Head: Electronic Crime Unit. Brig Pieterse has extensive exposure to
the investigation of cybercrime, specifically in as far as it relates to the broader financial/
banking platform.
Thokozani Miya, Vodacom, Head, Principal Specialist
-Security, South Africa
Thokozani Miya is a Principal Specialist – Cloud Security Services at one
of the biggest telecommunication company, Vodacom Business. He has
been in the information security sector for over 16 years and over 19 years
in Information Technology. He started out as an IT Specialist and moved
into Information Security 3 years later. He has worked in different sectors
and industries holding different roles that includes; Information Technology Specialist,
Information Security Specialist and Information Security Architect.Thokozani holds various
Information Technology, Information Security and business leadership certifications which
he accrued in his career journey. His entrepreneurial passion and attitude has helped
him to acquire business acumen skills through freelancing and contracting in the field of
Information Security. This has given him an edge to grow to more senior business roles
driving strategy for Information Security for customers and business alike. Thokozani
belongs to the Johannesburg Toastmaster Club. He likes to read business books and
security articles. He loves Mountain Biking and is working towards completing his PPL
(Private Pilot License).
James Saaka (MSc. Comp. Sc), Executive Director, National
Information Technology Authority-Uganda (NITA-U)
In August 2010, James Saaka joined the National Information Technology
Authority-Uganda (NITA-U) as Executive Director. His responsibility is
to ensure that NITA-U achieves its mandate: to coordinate, promote
and monitor IT development within the context of national, social and
economic development of Uganda. Mr Saaka joined NITA-U from Shell
International B.V., where he spent 12 years – from July 1998 until July 2010. James’s last
assignment in Shell from 2008 to 2010, was Business Services Manager for Strategy
Compliance for the Shell Group, under the Group CIO office based in The Hague, in the
Netherlands. He started his career in Bank of Uganda as a Systems Analyst from 1993
to 1995. James Saaka graduated from the University of Vladimir Polytechnic Institute,
The Soviet Union, with Bachelors in Computer Science in 1988. He obtained a Masters
in Computer Science from the same University in 1991. Mr. James Saaka has attended
numerous international trainings, conferences and workshops and has given many
presentations and key note addresses.
Teki Akuetteh Falconer, Data Protection Commission
Executive Director, Ghana
Teki has worked consistently on research and policy issues affecting
information technology and telecommunications law in Ghana. She also
worked on several legal due diligence and transaction advisory services
in the ICT sector. Her prior work experience included managing a law
firm and practicing law. Between 2008 and 2014, Teki worked as an ICT
Legal Expert in the Ministry of Communications under the eGhana Project. Her dedication
and commitment led to the development and passage of eleven (11) key legislations for
the ICT sector in Ghana between 2008 and 2012. These legislations include the National
Communications Authority Act, 2008 (Act 769), the National Information Technology
Agency Act, 2008 (Act 771), the Electronic Transactions Act, 2008 (Act 772), the Electronic
Communications Act, 2008 ( Act 775), the Electronic Communications Regulations, 2011
(L.I. 1991), The Mobile Number Portability Regulations, 2011 (L.I. 1994), Subscriber Identity
Module Registration Regulations, 2011 (L.I.2006) and the Data Protection Act, 2012
(Act 843). She also taught informative seminars on E-banking at the National Banking
College, ICT and Telecom Law at the Ghana Telecom University College and the Ghana
School of Law. She was the Secretary to the Ministerial Advisory Board of the Ministry of
Communications in 2009 and has been a Board Member of the Postal and Courier Services
Regulatory Commission from 2010 to date. Teki holds an LLM in Information Technology
and Telecommunications Law from the University of Strathclyde, Glasgow – Scotland
(2005); Qualifying Certificate in Law from the Ghana School of Law (2003) and a Bachelor of
Arts Degree in Law and Political Science from the University of Ghana (2001). Teki loves to
cook and bake, entertain guests , travel, exercise and dance.
Maletsema Phofu, Eskom, Chief Information Security
Advisor, South Africa
Maletsema has a software development background and has since
moved on to acquire skills and experience in areas of information
management, contracts management, business process development
and improvement, strategy development and implementation, incident
management, IT continuity management, delivery of projects, IT
governance, risk and compliance. She is currently working at Eskom Holdings as a Chief
Advisor Information Security with primary responsibility of looking after the security
operations of the endpoints, threat and vulnerability and the Security Operations Center
(SOC). Maletsema has successfully delivered multi-million rand security projects in
support of business objectives and received numerous organisational awards. She has
always been passionate and in the forefront of the development of change management
programmes directed towards up-skilling end users and cyber professionals (in IT and OT).
Maletsema holds a BCom (hons) Informatics degree from University of Pretoria, industry
related certifications and in the process of completing MCom Informatics. Outside of the
profession, Maletsema is a social activist with interest in education and use of technology
as tools to restore dignity and self-sufficiency.
SPEAKER PROFILES
9. Africa Cyber Security Summit
9 - 10 March, 2016 | Birchwood Hotel OR Tambo Conference Centre,
Johannesburg, South Africa
Joey Jansen Van Vuuren, Council for Scientific Industrial
Research, Research Group Leader Cyber Defence, South
Africa
Joey Jansen van Vuuren is the Research Group Leader for Cyber Defence
for Scientific Research at the CSIR South Africa. She gives the strategic
research direction for the research group that is mainly involved in
research for the SANDF and Government sectors on Cyber Defence.
She is involved more than 20 years in academia and research, 10 years as the HOD for an
academic IT department and 7 years as research leader at the CSIR. She joined the CSIR
with the focus of the research group on cybersecurity that includes network and mobile
security, forensics, social media, and national security. As Cyber threats become extremely
important for the RSA with the broadband changes, the focus of her research is around
cybersecurity, and government policy and frameworks required ensuring national security.
These also include structures to ensure cybersecurity and curriculums for cybersecurity. Her
research includes journal papers, conference papers and book chapters on cybersecurity
governance. She has been invited as keynote speaker at international conferences, and has
presented on several forums including national and international conferences and Cyber
awareness programmes in South Africa. She was also involved with the establishment of the
Cybersecurity Centre of Innovation for research collaboration, cybersecurity education and
a platform for cybersecurity threat exchange. She is also involved in the establishment of a
network emulator and simulator testing facility at the CSIR that can support cybersecurity
training and exercises as well as new product development in the cyber environment.
Apart from the research, she is the Vice President (Academic) of the Higher Education
Informations and Communication Technology Association and received several accolades
for entrepreneurship, contract excellence and community service over the years.
Dave Dodge, South African Institute of Security, South
Africa, Chairman
Dave is a former police officer with London’s Metropolitan Police (Scotland
Yard) who served in uniformed, investigative, training and intelligence
fields before retiring as a senior detective after 30 years and having been
awarded a number of commendations. His relocation to South Africa
saw a move into security risk management in the role of Chief Advisor
to Group Security at Eskom, and the achievement of international board certification as a
Certified Protection Professional (CPP) and Professional Certified Investigator (CPI) through
ASIS International. The Eskom role included conducting operational risk assessments
and operational security planning for major events, including the 2010 FIFA World Cup,
major infrastructure projects and the development of an enterprise Security Management
Framework and Security Operating Model. He also contributed to the development of
training for the private security industry in South Africa as a member of a SASSETA Task
Team reviewing training material and assisting SAQA with a revision of the national policy
for the Recognition of Prior Learning. The transition into the private sector has resulted in
Dave being a frequent speaker at international security conferences. In additional to his
professional accreditations, Dave holds a Bachelor’s degree in Adult Education andTraining
and a Diploma in Security Risk Management.
Ritasha Jethva, Nedbank Limited, South Africa, Information
Privacy Officer,
Ritasha Jethva is currently the Head of Information Privacy and the PAIA
Officer at Nedbank, where she is accountable for the rollout of a Group
wide and National Privacy programme, spanning all local geographic
locations as well as all applicable product and service offerings. She
is also the Group’s PAIA Officer, where she facilitates all requests for
access to information. She recently obtained her MBA (Cum Laude) in October 2015.
Ritasha has approximately 11 years’ experience in Information Technology, Governance,
Security, Risk Management, Compliance and Privacy concerns. She is an active member
providing a leading role on the Banking Association of South Africa, where she is assisting
in steering the practical implications of privacy implementations within SA. She is also
currently the Deputy Chair of the NCAC (National Cyber security Advisory Council) for
South Africa, reporting to the Minister of Postal andTelecommunications. She obtained her
CIPP (Certified Information Privacy Professional) certification in the US after undergoing
US training within the privacy space. Previously, Ritasha implemented Privacy across the
Absa Group over a period of 3 years under the guidance of Barclays Plc. and followed on
to become the COO of the Barclays Africa operation. She also spent approximately a year
at Liberty Life, where she provided strategic advisory across the Privacy and Information
Security Programme, as well as launched the IT Governance programme for the Group.
Prior to these corporate roles, she headed up the Information Privacy, Security Cyber
division for Accenture Southern Africa. She also headed up the Information Privacy
Cyber Security division whilst at Deloitte, within the Risk Advisory department of Deloitte
SA. She has led the implementation of Information Security Management Systems at a
multitude of corporate institutions, both locally and globally. She has also consulted on
major IT Governance initiatives to organisations in the health, energy, manufacturing,
retail and banking sectors. She has also been involved in consulting in the information risk
management space, particularly in respect to information and data classification, focussing
on the practical implementation of IT focussed Governance, Risk and Compliance practices
to facilitate regulatory compliance and privacy requirements for large multinational
organisations.
Interests:
• Watching movies (action, adventure and comedy movies)
• Am quite a car fanatic (enjoy high performance sport cars)
• Reading books (leadership, spiritual advancement, fiction and non-fiction, etc.)
Sean Maritz, Eskom SOC Limited, CIO (Acting), Group
Information Technology
Sean Maritz is currently acting as the CIO of Eskom Holdings Limited.
Eskom is a state owned enterprise and generates approximately 95%
of the electricity used in South Africa and approximately 45% of the
electricity used in Africa. Eskom generates, transmits and distributes
electricity to industrial, mining, commercial, agricultural and residential
customers and redistributors. As such the Group IT Division of Eskom is one of the
largest IT houses in Africa and amongst its full array of IT Services manages the only fully
accredited SAP CoE on the continent. Sean has in excess of 26 years of service in Eskom
since graduating and his practical knowledge of the issues facing the utility currently is
diverse and based on invaluable practical experience he has obtained in a wide range
of roles within IT. Sean has amongst other things spearheaded the introduction of a
digitization strategy in Eskom and is positioning IT to partner the Eskom business in its
turnaround strategy. Sean is passionate about people and this fact is evident in the manner
in which he leads and motivates the human capital within the Group IT Division. Sean
consistently conceives, strategizes and develops plans for the IT Division drawing on his
strong base of personal knowledge to empower the managers and employees in Group
IT to respond with deliverables that support Eskom’s strategic imperatives. Sean is most
comfortable when applying new approaches and methodologies to ensure a successful
outcome for business. He enjoys exploring areas where there is little or no theory to guide
experimentation or application, particularly where new approaches and methodologies
need to be developed, and where future lines of outcomes are difficult to determine. Sean
consistently demonstrates a strong value system in the transparent manner in which he
makes mission critical decisions and is extremely passionate about new technologies and
the role they can play in becoming game-changes for both business and people in their
personal lives.
Mr. Manqoba Mngomezulu, Bring Back My Identity
Snr Information Security Specialist and author
Manqoba is currently employed by Telkom as a Senior Information
Security specialist, among other things on his role, he is responsible
for designing, implementing and executing an effective information
security awareness programme. He is a visionary and a self-motivated
individual. He is also passionate about human development. He has
written and published a book about identity theft and protection of personal information,
a book aimed at empowering the society about identity theft incidents and the role that
societal members can play to protect themselves. The minister of Home Affairs, honorable
Malusi Gigaba wrote the foreword of his book. Manqoba has been on different media
platforms talking about identity theft and Cybercrime. Media such as Talk702, SAFM,
UmhloboWeneneFM, PowerFM, KayaFM, ANN7, SABC1-SHIFT, SABC1-Identity, DRUM
Magazine, YOU Magazine, Huisgeenoot Magazine, DailySun Newspaper just to mention a
few. He is currently planning National Empowerment Seminars, aimed at raising awareness
to the society about identity theft, cybercrime, protection of personal information etc. as
this is hugely affecting the societal members. He believes that with the high increase of
smart phone usage, Cybercrime should be taught as a subject as from primary school. He
holds a BSc honors in Computer Science, SABSA certified and a Business Development
certificate from GIBS
Niall Moynihan, Cisco, Security Specialist
Niall Moynihan is a Security Specialist at Cisco and has been with the
company for 18 months after relocating from Australia, where he was
focused on security solutions for large financial and retail enterprises. He
is responsible for driving customer business transformation using Cisco’s
innovations and technology architecture solutions in Content Security,
Networking Security and Cyber Security solutions in emerging markets
based out of South Africa. Prior to joining Cisco, he worked in Europe, Middle East, Asia,
Australia and America, holding positions in engineering, programming, sales, consultancy
and management of WebSense, BlueCoat, Check Point and Sun Microsystems.
Nick Trim, Darktrace, UK, Managing Director EMEA
Nick Trim has fifteen years’ experience working in operational
environments in the UK cyber defense effort. In collaboration with
various government departments, he played a critical role in creating
cutting-edge operational capabilities to defend against a range of threats
to national security, for the protection of critical infrastructure. Nick has
worked extensively with partners around the world, and is an expert
in human intelligence and social engineering. He has also worked as a cyber consultant,
advising large companies on their areas of vulnerability and helping devise their cyber
strategy. Nick is the head of Darktrace’s commercial division. He has a Master’s degree in
History from Durham University.
Shllomi Ezra, Cyberbit, Director of Sales Business
Development EMEA
Shllomi comes with over 10 years’ experience in the high-tech
Telecommunication, Wireless, Voice, Data, Internet, Cyber Intelligence
and SW solution Sales. With specialization in matching various
technologies to different verticals. Shllomi is currently focused on the
EMEA region for Cyberbit, and is responsible for Business development
and sales within the territory. Shllomi is a global, driven, and professional sales executive
who builds long-lasting client relationships and understands how to develop, advance,
deliver large scale project. Prior to joining the team at Cyberbit Shllomi was Sales Director
for NICE Systems
SPEAKER PROFILES
10. Watchful Software provides advanced persistent security solutions that keep sensitive information
safe from security breaches resulting from accidental or malicious disclosure. Watchful was formed to
protect an organization’s most critical asset after its people – its information. The company addresses
the growing need for protecting sensitive and proprietary information against accidental or malicious
theft, leakage, or loss. Leveraging key technologies including advanced encryption algorithms, digital
rights management, and eBiometrics, Watchful has developed a suite of solutions that ensure only
authorized personnel have access to enterprise systems and information, protecting against potentially
massive economic and competitive damage from cyberterrorists and information thieves.
Named Technology Pioneer by The World Economic Forum 2015, Darktrace is one of the world’s
leading cyber threat defence companies. Its Enterprise Immune System technology detects previously
unidentified threats in real time, powered by machine learning and mathematics developed at the
University of Cambridge, which analyse the behaviour of every device, user and network within an
organisation. Some of the world’s largest corporations rely on Darktrace’s self-learning appliance in
sectorsincludingenergyandutilities,financialservices,telecommunications,healthcare,manufacturing,
retail and transportation. The company was founded in 2013 by leading machine learning specialists
and government intelligence experts, and is headquartered in Cambridge, UK and San Francisco,
including offices in Auckland, Boston, Chicago, Dallas, London, Los Angeles, Milan, Mumbai, New York,
Paris, Seoul, Singapore, Sydney, Tokyo, Toronto and Washington D.C.
ASSOCIATE SPONSOR
11. We in CYBERBIT understand that in order to detect and respond fast and efficiently to advanced threats
organizational security has to go through major changes. Detection and response cycles must become
optimal and short, leveraging past knowledge and experience, automating processes and capabilities,
and allowing the organization to be agile, alert and prompt. That’s what CYBERSHIELD portfolio is all
about - securing IP SCADA networks against advanced and targeted threats. CYBERBIT, based on its
vast experience and field-proven technologies, leveraging the knowledge of our experienced cyber
experts and system engineers, is securing today some of the most critical enterprises and national
level infrastructures, where we already Defeat the Unknow.Additionally, CYBERBIT’s Intelligence
division is a world leader in providing interception and Intelligence products and solutions to Law
Enforcement Agencies (LEA) all over the globe, bringing the cyber dimension intelligence potential
to the maximum. CYBERBIT has won the prestigious Frost and Sullivan 2015 award for competitive
strategy innovation and leadership in the global cyber intelligence and security markets (Read more)
CYBERBIT was honored to be ranked at 45# in Cybersecurity Hot Cyber Security Companies - 500 List of
Companies to Watch in 2015 http://cybersecurityventures.com/cybersecurity-500/ CYBERBIT has won
the prestigious Frost and Sullivan 2015 award for competitive strategy innovation and leadership in the
global cyber intelligence and security markets
ASSOCIATE SPONSOR
12. Arbor Networks helps secure the world‘s largest enterprise and service provider networks from DDoS
attacksandadvancedthreats.Arboristheworld‘sleadingproviderofDDOSprotectionintheenterprise,
carrier and mobile market segments, according to Infonetics Research. Arbor‘s advanced threat
solutions deliver complete network visibility through a combination of packet capture and NetFlow
technology, enabling the rapid detection and mitigation of malware and malicious insiders. Arbor also
delivers market leading analytics for dynamic incident response, historical analysis, visualisation and
forensics. Arbor strives to be a „force multiplier,“ making network and security teams the experts. Its
goal is to provide a richer picture into networks and more security context – so customers can solve
problems faster and reduce the risk to their business. To learn more about Arbor products and services,
please visit its Web site atarbornetworks.com. Arbor‘s research, analysis and insight, together with data
from the ATLAS global threat intelligence system, can be found at the ATLAS Threat Portal.
Networks Unlimited is a value-added distributor, offering the best and latest solutions within the
converged technology, data centre, networking, and security landscapes. The company distributes
best-of-breed products, including Arbor Networks, Arista, Aruba Networks, CensorNet, Centrify,
Fortinet, F5, ProLabs, Riverbed, RSA, SimpliVity andTintri.The product portfolio provides solutions from
the edge to the data centre, and addresses key areas such as cloud networking and integration, WAN
optimisation, application performance management, application delivery networking, WiFi-, mobile-
and networking security, load balancing, data centre in-a-box, and storage for virtual machines. Since
its formation in 1994, Networks Unlimited has continually adapted to today‘s progressively competitive
and evolving marketplace, and has reaped the benefits by being a leading value-added distributor
(VAD) within the sub-Saharan Africa market.
ASSOCIATE SPONSOR
13. Cisco (NASDAQ: CSCO) is the worldwide leader in IT that helps companies seize the opportunities of
tomorrow by proving that amazing things can happen when you connect the previously unconnected.
Cisco has shaped the future of the Internet by creating unprecedented value and opportunity for our
customers, employees, investors and ecosystem partners and has become the worldwide leader in
networking - transforming how people connect, communicate and collaborate.
STRATEGIC SECURITY SPONSOR
Ubuntu Business Advisory and Consulting (Pty) Ltd together Bowline Security, provide integrated
forensic investigation and trusted cyber security solutions to the private and public sector. Our team
members are qualified professionals, rich in experience, committed to excellence, and specialize in
designing, implementing and maintaining holistic integrated and sustainable programs. We offer a
unique technology and services framework for clients to actively prevent, detect and respond to risks,
through the implementation of risk management and mitigation measures by: • Defining threats and
vulnerabilities • Assessing likelihoods and probabilities • Evaluating scope and magnitude • Considering
controls and counter measures UBAC and BOWLINE contribute to servicing our client needs by using
our industry knowledge and security-related expertise in: • Digital Forensics; • Security Architecture;
• Identity and Access Management; • Cyber Security Operations Center; • Fraud Risk Management
Services; • Training and Awareness programs; • Fraud and Corruption Investigations; • Application Code
Assessment Services. • Enterprise Security Program Development; and • Security Governance, Risk and
Compliance.
ASSOCIATE SPONSOR
14. Bitdefenderisaglobalsecuritytechnologycompanythatdeliverssolutionsinmorethan100countries.
Since 2001, Bitdefender has consistently produced award-winning business and consumer security
technology. Bitdefender is a leading innovator in protecting consumers with breakthrough integrated
home cybersecurity products such as Bitdefender Box. Through RD, alliances and partnership teams,
Bitdefender has elevated the highest standards of security excellence in both its number-one-ranked
technology and its strategic alliances with the world’s leading technology providers.
New ways of engaging customers and business operations demand a new approach to protecting
critical systems and services. Transforming security to protect the opportunities of digital business is
a strategic imperative. Blue Turtle enables this transformation by blending advanced technology and
best practice so our customers can meet the challenge of cyber threats. We protect business against
cyber attacks, malicious behavior and insider threat. By employing machine learning, big data, and
real-time automation technologies we deliver‘end-to-end’security – whether Datacenter or Endpoint,
Cloud, Industrial or IoT systems. Cyber-defense needs to be ‘always-on’ and our solutions some of the
world’s most innovative security systems are active 24 x 7.Our technology partners are award winning,
game changing market leaders such as Darktrace, Fireeye, Forcepoint, ObserveIT, Radware, SentinelOne
and Splunk ! Our specialists work with you to understand, prioritize, and manage cyber security in the
context of your business, delivering advanced security for tomorrow’s challenges – Today.
NETWORKING SOLUTION PROVIDER
15. Cyber Defense Magazine
Cyber Defense Magazine is by ethical, honest, passionate information security professionals for IT
Security professionals. Our mission is to share cutting edge knowledge, real world stories and awards
on the best ideas, products and services in the information technology industry.
Vigilance
Vigilance is the undisputed leading voice of the global security industry. The depth of our reportage,
the brilliance of our analysis of the global security issues and the global influence of our editorials are
incomparable.The intellectual and marketing bent ofVigilance are the results of many years of research.
Our writers and contributors are key players of the global security industry; no wonder Vigilance is not
only the magazine for decision makers and those who are in charge of purchasing budgets in their
various organizations across the globe, but the world’s leading security magazine. Because our focus
is international, our news has the farthest reach, so also is every advert placed on Vigilance. Vigilance
therefore, is your definitive guide to the global security market.
MEDIA PARTNERS