SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
Africa
Cyber Security
Summit
9th
- 10th
March, 2016
Birchwood Hotel & OR Tambo Conference Centre,
Johannesburg, South Africa
Organised by
Visit Our Website: www.fleming.events
Dear Participant,
On behalf of Fleming. we would like to welcome you to “ Africa Cyber Security Summit”.
We have carefully selected leading industry experts to speak at this event, giving you the opportunity to hear
first-hand experiences from industry leaders and share solutions for overcoming the latest challenges in the field.
Through presentations & interactive panel discussions, we are bringing together industry experts and thought
leaders to address and discuss the rapidly changing business environment in the fieald of Cyber Security in Africa
We hope that your participation at this Fleming. summit is just the beginning of our business relationship and
that we will have the opportunity to make a continuing contribution to your company’s profitability and success.
If you would like to offer any comments related to the content or format of the program, or would like to contribute
to a future platform we would be very pleased to hear from you. To that end, we ask that you kindly fill up and
return the Conference Evaluation Form.
Thank you for attending and hope to see you again.
Best regards,
JosephVipinRajan	
Conference Producer
Fleming.
AlphyNangani
Conference Coordinator
Fleming.
Africa Cyber Security Summit
9th
- 10th
March, 2016 | Birchwood Hotel & OR Tambo Conference Centre, Johannesburg, South Africa
Administrative details for your perusal:-
1.	 If there are any changes to the conference program, you will find the updated version in your documentation
folder or it will reflect on the board next to the registration desk.
2.	 The conference will take place on the 9th
and 10th
of March 2016 in Marco Polo
3.	 Exhibition & Coffee Breaks will be held in Heathrow. If you have any special dietary requirements, kindly
inform our Registration Desk during the first coffee break. Lunch will be served at Restaurant - Clovers
Green.
4.	 Name tags have been provided to help attendees identify fellow delegates. That apart, the name tags will
also assist the conference production team to easily identify attendees when delivering messages.
5.	Kindly adhere to specified break durations considering the program schedule of the day. The Chairperson
shall try his/her best to begin all sessions on the scheduled time.
6.	 Kindly wait until the end of each presentation for the Question & Answer (Q&A) session, the Chairperson
shall give an opportunity to raise the questions. Also please introduce yourself and the organization you
represent prior to raising a query.
7.	 Kindly keep your cell phones on silent mode or switched off when the sessions are in progress.
8.	 Kindly do not forget to fill in the Conference Evaluation Form and return the same to the Conference
Coordinator Alphy Nangani at the Registration Desk. Your valuable feedback will be of great help to
evaluate and enhance our upcoming events.
	 If you have any queries before, after or during the conference, the Fleming. Team would be more than happy
to assist you with whatever concerns you might have. Your valuable feedback will be of great help to evaluate
and enhance our upcoming events.
Fleming. recognizes the intellectual property rights of speakers over the transcribed material. No reproduction of any part may take place without
the written permission of relevant speaker. The presentations are not for sale and have no commercial value.
Africa Cyber Security Summit
9th
- 10th
March, 2016 | Birchwood Hotel & OR Tambo Conference Centre, Johannesburg, South Africa
Event Chair:
Dave Dodge, Chairman
South African Institute of Security, South Africa
Dave Dodge is a Senior Partner with the Temi Group. He comes from a policing background, having been
a police officer with the Metropolitan Police, London (Scotland Yard) for over 30 years. During this career,
he served in operational and support roles in uniformed, investigative and intelligence fields, which saw
him awarded a number of commendations.  He retired as a senior detective in the Department of Strategy,
Modernisation and Performance. His relocation to South Africa saw a move into the security risk management
in the role of consultant and Chief Advisor to Group Security at Eskom, and recent board certification as a
Certified Protection Professional (CPP).Dave has also made significant contributions to the development of
security training in South Africa as a member of a Safety and Security Sector Education andTraining Authority
(SASSETA) Task Team and a South African Qualifications Authority (SAQA) Reference Group. He is an active
member of various national and international security organisations, including the US Overseas Security
Advisory Council (OSAC) and the World Institute of Nuclear Security (WINS) in addition to being the Vice-
Chairman of the Board of Governors of the South African Institute of Security (SAIS) and Assistant Regional
Vice-President for ASIS International (ASIS) in Southern and Eastern Africa.
Africa Cyber Security Summit
9 - 10 March, 2016 | Birchwood Hotel & OR Tambo Conference Centre,
Johannesburg, South Africa
Associate Sponsor
Media Partners
Strategic Security Sponsor Networking Solution Provider
Supported ByEndorsed By
Africa Cyber Security Summit
9 - 10 March, 2016 | Birchwood Hotel & OR Tambo Conference Centre,
Johannesburg, South Africa
9th
March, 2016 DAY 1
8:00	 Registration and Coffee
8:50	 Welcome by Fleming.
8:55	 Opening Remarks from the Chairperson
Dave Dodge, South African Institute of Security, South Africa
Chairman
9:00	 Cybercrime: A reality in South Africa
Brigadier NT Pieterse, South African Police Service
Section Head: Electronic Crime Unit, South Africa
9:30	 Understanding the touch-points between privacy 
cyber security:
•	 Getting to grips with where privacy  cyber security come
together
•	 Understanding what these touch points mean from a regulatory
and corporate perspective
Ritasha Jethva, Nedbank Limited
Information Privacy Officer
10:00	 The Rising Cases of Cyber Crime:“A challenge for LEAs
and Industry”
•	 The paper will amongst other things identified some of
the current trends of cyber threats affecting businesses,
government and individuals.
•	 It will also look at evolution of cybercrimes resulting into online
cyber criminal markets putting sophisticated attack tools into
the hands of more low-level attackers with case studies.
•	 The paper will also look at how over dependent of Government,
Agencies and Ministries and Business in technology without
the requisite security controls give birth to the rising wave of
cybercrime.
Abdulkarim Chukkol, Economic and Financial Crimes
Commission, Head, Advance Fee Fraud and Cybercrimes Section,
Nigeria
10:30	 Coffee Break  Networking
11:00	 Lack of Technical Know-how in terms of Cyber Security
•	 Inability  to monitor and defend national networks
•	 Making African countries vulnerable to cyber espionage
•	 African countries vulnerable incidences of cyber              
terrorism
James Saaka, National Information Technology Authority-
Uganda (NITA-U), Executive Director, Uganda
11:30	 Security for the Digital Economy
•	 The current security landscape
•	 Cisco’s Vision for Security: Before, During and After an attack
Niall Moynihan, Cisco, Security Specialist
12:00	 Inside the Threats to Cyber Security, their
consequences, vulnerabilities and, mitigation
measures
•	 The risks associated with insider threats
•	 Individual motivations, behaviors and indicators
•	 Organisational factors leading to insider acts
•	 Mitigation measures to reduce the risks
Dave Dodge, South African Institute of Security, South Africa
Chairman
12:30	 Networking Lunch
13:30	 Making The African Internet Ecosystem More Secure
and Resilient.
•	 Introduction
•	 Africa Threat Landscape
•	 The need for Regional Cooperation
Jacques Houngbo, AfricaCERT, Instructor, ICT Specialist
13:45	 MASTERCLASS : Cyber Maturity Assessment approach
to:
•	 Create opportunity to reflect on current situation
•	 Give insight in potential cybersecurity issues and opportunities
or rooms for improvement
•	 Raise awareness and call for action
Ngeje Nganate, AfricaCERT, Southern Africa Representative
14:10	 What is the need for Cyber Insurance
•	 Individual awareness towards“Cyber Insurance”
•	 Responsibility faced by a company in terms of a hacking activity
or any other threat
Thokozani Miya, Vodacom, Head, Principal Specialist - Security
14:45	 Networking Tea/Coffee Break
15:15	 The Enterprise Immune System: Using Machine
Learning to Detect‘Unknown Unknown’Threats
•	 Learn why‘immune system’technologies represent a
fundamental innovation for cyber defence
•	 Discover how to apply machine learning and mathematics to
detect advanced, internal threats
•	 Understand how to gain 100% network visibility to investigate
emerging anomalies in real time
•	 Hear real-world Enterprise Immune System case studies
Nick Trim, Darktrace, UK, Managing Director EMEA
15:45	 TRIO ROUNDTABLE
Delegates will be split into three teams to have independent
discussions on their respective tracks, brainstorm and arrive at
conclusions. Format to be followed:
•	 5 minutes for introduction `
•	 30 minutes for topic discussion
•	 10 minutes for the round table leader of each group to share
the conclusions
ROUNDTABLE 1: Lack of Technical Know-how in terms of Cyber
Security
Moderator:
Abdulkarim Chukkol, Economic and Financial Crimes
Commission, Head, Advance Fee Fraud and Cybercrimes Section,
Nigeria
ROUNDTABLE 2: IT Security Budget - Well Spent or Never Spent?
Moderator:
Sean Maritz, Eskom, Chief Information Officer, South Africa
ROUNDTABLE 3: Is Your Organization Cyber Insured?
Moderator:
Thokozani Miya, Vodacom, Head, Principal Specialist - Security
16:30	 Detection of APT Attacks
•	 Cyber trainer
•	 CyberShield Analysis  Detection (AnD) for SCADA Networks
•	 CyberShield Analysis  Detection (AnD) for IP Networks
•	 CyberShield Mitigation  Response (MnR)
•	 CyberShield for Mobile
Shllomi Ezra, Cyberbit, Isreal, Sales Director EMEA
16:45	 Closing Remarks and from the Event
Chairperson Summarizing the Day‘s takeaways
Dave Dodge, South African Institute of Security, South Africa
Chairman
Africa Cyber Security Summit
9 - 10 March, 2016 | Birchwood Hotel  OR Tambo Conference Centre,
Johannesburg, South Africa
8:00	 Registration and Coffee
8:50	 Welcome by Fleming.
8:55	 Opening Remarks from the Chairperson
Dave Dodge, South African Institute of Security, South Africa
Chairman
9:00	 IT Security Budget - Well Spent or Never Spent?
•	 IT Security Head‘s key role in gaining and spending security
budget
•	 Effective utilisation of the cyber budget
•	 Return on security investment (ROSI)
Sean Maritz, CIO, Group Information Technology, Eskom SOC
Limited
9:30	 The South African Cybersecurity Environment:
•	 Where are we?
•	 Proposed actions to reduce the treat.
Joey Jansen Van Vuuren, Council for Scientific  Industrial
Research, Research Group Leader Cyber Defense, South Africa
10:00	 Cyberspace challenges in South Africa:
•	 Empower the man on the street
•	 Ordinary societal members are the most vulnerable
•	 Cultivating a security mindset at primary schools
•	 Government and private sector’s commitment
Manqoba Mngomezulu, Telkom, Senior Info Security Specialist 
Author, South Africa
10:30	 Coffee Break  Networking
11:00	 PANEL DISCUSSION - Cyber Crime 2.0
•	 Cyber crime cases are doubling every year – What is the
potential problem?
•	 Despite the research for over a decade, cyber crime still tops the
chart of a threat
Panelists:
Abdulkarim Chukkol, Economic and Financial Crimes
Commission, Head, Advance Fee Fraud and Cybercrimes Section,
Nigeria
Ahamad Shah, FirstRand Group, Head CISO Team, South Africa
Maletsema Phofu, Eskom, Chief Information Security Advisor,
South Africa
Moderator :-
Dave Dodge, South African Institute of Security, South Africa
Chairman
11:45	 Developing an IT Security Infrastructure Landscape –
Role of Data Protection
•	 Developing an industry-wide technology infrastructure
•	 Avoiding pitfalls to IT Operations
Teki Akuetteh Falconer, Data Protection Commission
Executive Director, Ghana
12:20	 Developing cybersecurity skills for organisational
resilience
•	 Workforce challenges and the evolution of cyber skill
requirements
•	 Training professionals to deal with day to day cyber threats
•	 Enhancing cyber knowledge in the organisation
Maletsema Phofu, Eskom
Chief Information Security Advisor, South Africa
13:00	 Networking Lunch
14:00	 BREAK OUT SESSION: Road map to an effective
cyberspace
Delegates will be split into three teams to have independent
discussions on their respective tracks, brainstorm and arrive at
conclusions. Format to be followed:
•	 5 minutes for introduction
•	 30 minutes for topic discussion
• 10 minutes for the round table leader of each group to share the
conclusions
•	 Initiatives taken by the continent to overcome cyber banking
threats
Jacques Houngbo, AfricaCERT, Instructor, ICT Specialist
•	 Building a truly‚effective‘ Security
Joey Jansen Van Vuuren, Council for Scientific  Industrial
Research, Research Group Leader Cyber Defence, South Africa
•	 Enabling the Risk team that would reduce the risks to a large
extent
Ngeje Nganate, AfricaCERT, Southern Africa Representative
14:45	 Focus session on wireless security
•	 The truth about wireless security
•	 How secure is your data
•	 Shortcuts for a achieving a watertight wireless security
Ahamad Shah, FirstRand Group, Head CISO Team, South Africa
15:15	 Networking Tea/Coffee Break
15:45	 Book a Prize -“Bring Back My Identity”
6 Signed copies of the book “Bring Back My Identity” by Manqoba
Mngomezulu would be handed out to delegates who can answer
to the questions laid out by speakers at the summit. The question
would be asked by the Chairperson and the Delegates are
requested to answer to these using the Sli.do Application.
The top 3 answers would be reviewed and the best answer would
be awarded the signed copy of the book“Bring Back My Identity”by
the author Manqoba Mngomezulu, himself
16:15	 Closing Remarks from the Event Chairperson
Dave Dodge, South African Institute of Security, South Africa
Chairman
10th
March, 2016 DAY 2
Africa Cyber Security Summit
9 - 10 March, 2016 | Birchwood Hotel  OR Tambo Conference Centre,
Johannesburg, South Africa
Abdulkarim Chukkol, Economic and Financial Crimes
Commission (EFCC) Nigeria, Head, Advance Fee Fraud and
Cybercrime Section
Abdulkarim Chukkol is a Deputy Chief Detective Superintendent
who currently heads the Lagos Office of the Advance Fee Fraud and
Cybercrime Section of Nigeria’s Economic  Financial Crimes Commission.
He holds a Post Graduate Certificate in Criminal Justice Education. He
graduated from the University of Maiduguri (2000) and University of Virginia (2011). He
also had professional training at the Nigeria Police Academy and FBI National Academy,
Quantico VA, United States. He also holds post graduate diploma in Cybersecurity and
Spectrum Management from the United States Telecommunication Training Institute,
Washington DC, United States. Mr. Chukkol is a versatile fraud investigator who has been
involved in several multinational operations and participated in several anti-cybercrime
fraud disruptive activities at the Commission including Operations ‘Octopus’,  Operations
‘Stop Payment’, Operations ‘Cyberstorm 1’ and Operations ‘Apollo’ leading to  arrest and
successful prosecution of fraudsters/ cybercriminals. He represents the Commission at the
International Mass-Marketing Coordinating Group, which consists of law enforcement,
regulatory, and consumer protection agencies from seven countries, including Australia,
Belgium, Canada, the Netherlands, the United Kingdom and the United States. He has
supervised the prosecution of 212 Advance Fee Fraud and Cybercrime related cases at
various High Courts all over Nigeria between June 2012- December 2014. 69 of the cases
were successfully convicted, including the extradition of 2 fugitives to the United States.
He is a certified fraud examiner and an active member of the International Association
of Computer Investigative Specialist. Mr. Chukkol is also member and Nigeria contact
person of the G8 24/7 High Tech Crime Network and has contributed immensely in the
fight against Transnational Crimes in Nigeria and abroad. He is married with three children.
Jacques Houngbo, AfricaCERT, Instructor, ICT Specialist
ICT Specialist and Information Security expert, Jacques Houngbo has
extensive experience assessing IT systems and processes, IT Strategy
Development  Programme Management. He uses to work for diverse
clients: government, private companies and international organizations.
He is more and more engaged in the field of cybersecurity. As such,
Jacques Houngbo is member of AfricaCERT where he is in charge of
Development Program and also serves as Instructor. Jacques Houngbo is CEH (Certified
Ethical Hacker) and ECSA (EC Council Certified Security Analyst).
Ngeje Nganate, AfricaCERT, Southern Africa Representative
Mr. Ngeje Nganate is the current AfricaCERT Representative for Southern
Africa .He is currently based in Gaborone, Botswana. As an AfricaCERT
representative for the Southern Africa region, Mr. Ngeje Nganate’s   work
includes raising cyber security awareness, conducting workshops and
seminars, conducting security audits and assessments and organizing
cyber security training for the Southern Africa region. Prior to joining
AfricaCERT, Mr Ngeje Nganate worked as an Information Security Analyst from 2011 to
2013 at the International Multilateral Partnership Against Cyber Threats (IMPACT). IMPACT
is an International cyber security organization headquartered in Cyberjaya, Malaysia. At
IMPACT, Ngeje Nganate was involved in the establishment of Computer Emergency
Response Teams in the African continent. He was involved as a project manager for the
establishment of the Computer Incident ResponseTeams (CIRT) in the Republics of Zambia
(cirt.zm) and Burkina Faso (cirt.bf) .He was also part of the team that conducted CIRT
readiness assessments for Ghana, Ivory Coast, Burundi, Tanzania and Kenya and Niger. Mr.
Ngeje Nganate is a candidate for a Master of Science (Computer Science) at the Botswana
International University of Science and Technology (BIUST).He graduated with a Bachelor
of Information Technology (HONS) degree from Multimedia University (MMU) in Cyberjaya,
Malaysia. He is an EC-Council Certified Ethical Hacker (C|EH), a Cisco Certified Network
Associate (CCNA) and an IBM Certified Academic Associate in IBM DB2 database. Mr. Ngeje
Nganate is also a recipient of various certificates of training in the field of cyber security
including CERT implementation and establishment. “A More Secure African Cyber Space”
is one of Mr. Ngeje Nganate’s goals and he believes enough cyber security awareness and
capacity building are key to the realization of that goal.
Brigadier NT Pieterse, South African Police Service
Section Head: Electronic Crime Unit, South Africa
Brigadier Pieterse joined the South African Police Service on 1 December
1979 and have been assigned to the Division: Detective Service from
1983, where he performed his duties within a number of specialised
environments, inclusive of the Stock Theft- ; Murder and Robbery- and
Crime Intelligence Units. During 1987 he received his Commission rank,
and has since served in a number of managerial positions within the South African Police
Service. During 1992 to 2001 Brig Pieterse furthered his career within the Commercial
Crime establishment, having being assigned to a number of commander positions, also
“seconded” to the Department of Justice’s Investigative Directorate: Serious Economic
Offences (IDSEO). For the period 2001 to 2009 he served as a member of the Directorate
for Special Operations (DSO Scorpions), where he held the position of Chief Investigating
Officer (CIO). From 2009 to date Brig Pieterse again became part of Commercial Crime
within the South African Police Service, where he is currently performing his duties as
the National Section Head: Electronic Crime Unit. Brig Pieterse has extensive exposure to
the investigation of cybercrime, specifically in as far as it relates to the broader financial/
banking platform.
Thokozani Miya, Vodacom, Head, Principal Specialist
-Security, South Africa
Thokozani Miya is a Principal Specialist – Cloud Security Services at one
of the biggest telecommunication company, Vodacom Business. He has
been in the information security sector for over 16 years and over 19 years
in Information Technology. He started out as an IT Specialist and moved
into Information Security 3 years later. He has worked in different sectors
and industries holding different roles that includes; Information Technology Specialist,
Information Security Specialist and Information Security Architect.Thokozani holds various
Information Technology, Information Security and business leadership certifications which
he accrued in his career journey. His entrepreneurial passion and attitude has helped
him to acquire business acumen skills through freelancing and contracting in the field of
Information Security. This has given him an edge to grow to more senior business roles
driving strategy for Information Security for customers and business alike. Thokozani
belongs to the Johannesburg Toastmaster Club. He likes to read business books and
security articles. He loves Mountain Biking and is working towards completing his PPL
(Private Pilot License).
James Saaka (MSc. Comp. Sc), Executive Director, National
Information Technology Authority-Uganda (NITA-U)
In August 2010, James Saaka joined the National Information Technology
Authority-Uganda (NITA-U) as Executive Director. His responsibility is
to ensure that NITA-U achieves its mandate: to coordinate, promote
and monitor IT development within the context of national, social and
economic development of Uganda. Mr Saaka joined NITA-U from Shell
International B.V., where he spent 12 years – from July 1998 until July 2010. James’s last
assignment in Shell from 2008 to 2010, was Business Services Manager for Strategy 
Compliance for the Shell Group, under the Group CIO office based in The Hague, in the
Netherlands. He started his career in Bank of Uganda as a Systems Analyst from 1993
to 1995. James Saaka graduated from the University of Vladimir Polytechnic Institute,
The Soviet Union, with Bachelors in Computer Science in 1988. He obtained a Masters
in Computer Science from the same University in 1991. Mr. James Saaka has attended
numerous international trainings, conferences and workshops and has given many
presentations and key note addresses.
Teki Akuetteh Falconer, Data Protection Commission
Executive Director, Ghana
Teki has worked consistently on research and policy issues affecting
information technology and telecommunications law in Ghana.  She also
worked on several legal due diligence and transaction advisory services
in the ICT sector. Her prior work experience included managing a law
firm and practicing law. Between  2008  and 2014, Teki worked as an ICT
Legal Expert in the Ministry of Communications under the eGhana Project. Her dedication
and commitment led to the development and passage of eleven (11) key legislations for
the ICT sector in Ghana between 2008 and 2012. These legislations include the National
Communications Authority Act, 2008 (Act 769), the National Information Technology
Agency Act, 2008 (Act 771), the Electronic Transactions Act, 2008 (Act 772), the Electronic
Communications Act, 2008 ( Act 775), the Electronic Communications Regulations, 2011
(L.I. 1991), The Mobile Number Portability Regulations, 2011 (L.I. 1994),  Subscriber Identity
Module Registration Regulations, 2011 (L.I.2006) and the Data Protection Act, 2012
(Act 843). She also taught informative seminars on E-banking at the National Banking
College, ICT and Telecom Law at the Ghana Telecom University College and the Ghana
School of Law. She was the Secretary to the Ministerial Advisory Board of the Ministry of
Communications in 2009 and  has been a  Board Member of the Postal and Courier Services
Regulatory Commission from 2010 to date. Teki holds an LLM in Information Technology
and Telecommunications Law from the University of Strathclyde, Glasgow – Scotland
(2005); Qualifying Certificate in Law from the Ghana School of Law (2003) and a Bachelor of
Arts Degree in Law and Political Science from the University of Ghana (2001). Teki loves to
cook and bake, entertain guests , travel, exercise and dance.
Maletsema Phofu, Eskom, Chief Information Security
Advisor, South Africa
Maletsema has a software development background and has since
moved on to acquire skills and experience in areas of information
management, contracts management, business process development
and improvement, strategy development and implementation, incident
management, IT continuity management, delivery of projects, IT
governance, risk and compliance. She is currently working at Eskom Holdings as a Chief
Advisor Information Security with primary responsibility of looking after the security
operations of the endpoints, threat and vulnerability and the Security Operations Center
(SOC). Maletsema has successfully delivered multi-million rand security projects in
support of business objectives and received numerous organisational awards. She has
always been passionate and in the forefront of the development of change management
programmes directed towards up-skilling end users and cyber professionals (in IT and OT).
Maletsema holds a BCom (hons) Informatics degree from University of Pretoria, industry
related certifications and in the process of completing MCom Informatics. Outside of the
profession, Maletsema is a social activist with interest in education and use of technology
as tools to restore dignity and self-sufficiency.
SPEAKER PROFILES
Africa Cyber Security Summit
9 - 10 March, 2016 | Birchwood Hotel  OR Tambo Conference Centre,
Johannesburg, South Africa
Joey Jansen Van Vuuren, Council for Scientific  Industrial
Research, Research Group Leader Cyber Defence, South
Africa
Joey Jansen van Vuuren is the Research Group Leader for Cyber Defence
for Scientific Research at the CSIR South Africa. She gives the strategic
research direction for the research group that is mainly involved in
research for the SANDF and Government sectors on Cyber Defence.
She is involved more than 20 years in academia and research, 10 years as the HOD for an
academic IT department and 7 years as research leader at the CSIR. She joined the CSIR
with the focus of the research group on cybersecurity that includes network and mobile
security, forensics, social media, and national security. As Cyber threats become extremely
important for the RSA with the broadband changes, the focus of her research is around
cybersecurity, and government policy and frameworks required ensuring national security.
These also include structures to ensure cybersecurity and curriculums for cybersecurity. Her
research includes journal papers, conference papers and book chapters on cybersecurity
governance. She has been invited as keynote speaker at international conferences, and has
presented on several forums including national and international conferences and Cyber
awareness programmes in South Africa. She was also involved with the establishment of the
Cybersecurity Centre of Innovation for research collaboration, cybersecurity education and
a platform for cybersecurity threat exchange. She is also involved in the establishment of a
network emulator and simulator testing facility at the CSIR that can support cybersecurity
training and exercises as well as new product development in the cyber environment.
Apart from the research, she is the Vice President (Academic) of the Higher Education
Informations and Communication Technology Association and received several accolades
for entrepreneurship, contract excellence and community service over the years.
Dave Dodge, South African Institute of Security, South
Africa, Chairman
Dave is a former police officer with London’s Metropolitan Police (Scotland
Yard) who served in uniformed, investigative, training and intelligence
fields before retiring as a senior detective after 30 years and having been
awarded a number of commendations. His relocation to South Africa
saw a move into security risk management in the role of Chief Advisor
to Group Security at Eskom, and the achievement of international board certification as a
Certified Protection Professional (CPP) and Professional Certified Investigator (CPI) through
ASIS International. The Eskom role included conducting operational risk assessments
and operational security planning for major events, including the 2010 FIFA World Cup,
major infrastructure projects and the development of an enterprise Security Management
Framework and Security Operating Model. He also contributed to the development of
training for the private security industry in South Africa as a member of a SASSETA Task
Team reviewing training material and assisting SAQA with a revision of the national policy
for the Recognition of Prior Learning. The transition into the private sector has resulted in
Dave being a frequent speaker at international security conferences. In additional to his
professional accreditations, Dave holds a Bachelor’s degree in Adult Education andTraining
and a Diploma in Security Risk Management.
Ritasha Jethva, Nedbank Limited, South Africa, Information
Privacy Officer,
Ritasha Jethva is currently the Head of Information Privacy and the PAIA
Officer at Nedbank, where she is accountable for the rollout of a Group
wide and National Privacy programme, spanning all local geographic
locations as well as all applicable product and service offerings. She
is also the Group’s PAIA Officer, where she facilitates all requests for
access to information. She recently obtained her MBA (Cum Laude) in October 2015.
Ritasha has approximately 11 years’ experience in Information Technology, Governance,
Security, Risk Management, Compliance and Privacy concerns. She is an active member
providing a leading role on the Banking Association of South Africa, where she is assisting
in steering the practical implications of privacy implementations within SA. She is also
currently the Deputy Chair of the NCAC (National Cyber security Advisory Council) for
South Africa, reporting to the Minister of Postal andTelecommunications. She obtained her
CIPP (Certified Information Privacy Professional) certification in the US after undergoing
US training within the privacy space. Previously, Ritasha implemented Privacy across the
Absa Group over a period of 3 years under the guidance of Barclays Plc. and followed on
to become the COO of the Barclays Africa operation. She also spent approximately a year
at Liberty Life, where she provided strategic advisory across the Privacy and Information
Security Programme, as well as launched the IT Governance programme for the Group.
Prior to these corporate roles, she headed up the Information Privacy, Security  Cyber
division for Accenture Southern Africa. She also headed up the Information Privacy 
Cyber Security division whilst at Deloitte, within the Risk Advisory department of Deloitte
SA. She has led the implementation of Information Security Management Systems at a
multitude of corporate institutions, both locally and globally. She has also consulted on
major IT Governance initiatives to organisations in the health, energy, manufacturing,
retail and banking sectors. She has also been involved in consulting in the information risk
management space, particularly in respect to information and data classification, focussing
on the practical implementation of IT focussed Governance, Risk and Compliance practices
to facilitate regulatory compliance and privacy requirements for large multinational
organisations.
Interests:
•	 Watching movies (action, adventure and comedy movies)
•	 Am quite a car fanatic (enjoy high performance sport cars)
•	 Reading books (leadership, spiritual advancement, fiction and non-fiction, etc.)
Sean Maritz, Eskom SOC Limited, CIO (Acting), Group
Information Technology
Sean Maritz is currently acting as the CIO of Eskom Holdings Limited.
Eskom is a state owned enterprise and generates approximately 95%
of the electricity used in South Africa and approximately 45% of the
electricity used in Africa. Eskom generates, transmits and distributes
electricity to industrial, mining, commercial, agricultural and residential
customers and redistributors. As such the Group IT Division of Eskom is one of the
largest IT houses in Africa and amongst its full array of IT Services manages the only fully
accredited SAP CoE on the continent. Sean has in excess of 26 years of service in Eskom
since graduating and his practical knowledge of the issues facing the utility currently is
diverse and based on invaluable practical experience he has obtained in a wide range
of roles within IT. Sean has amongst other things spearheaded the introduction of a
digitization strategy in Eskom and is positioning IT to partner the Eskom business in its
turnaround strategy. Sean is passionate about people and this fact is evident in the manner
in which he leads and motivates the human capital within the Group IT Division. Sean
consistently conceives, strategizes and develops plans for the IT Division drawing on his
strong base of personal knowledge to empower the managers and employees in Group
IT to respond with deliverables that support Eskom’s strategic imperatives. Sean is most
comfortable when applying new approaches and methodologies to ensure a successful
outcome for business. He enjoys exploring areas where there is little or no theory to guide
experimentation or application, particularly where new approaches and methodologies
need to be developed, and where future lines of outcomes are difficult to determine. Sean
consistently demonstrates a strong value system in the transparent manner in which he
makes mission critical decisions and is extremely passionate about new technologies and
the role they can play in becoming game-changes for both business and people in their
personal lives.
Mr. Manqoba Mngomezulu, Bring Back My Identity
Snr Information Security Specialist and author
Manqoba is currently employed by Telkom as a Senior Information
Security specialist, among other things on his role, he is responsible
for designing, implementing and executing an effective information
security awareness programme. He is a visionary and a self-motivated
individual. He is also passionate about human development. He has
written and published a book about identity theft and protection of personal information,
a book aimed at empowering the society about identity theft incidents and the role that
societal members can play to protect themselves. The minister of Home Affairs, honorable
Malusi Gigaba wrote the foreword of his book. Manqoba has been on different media
platforms talking about identity theft and Cybercrime. Media such as Talk702, SAFM,
UmhloboWeneneFM, PowerFM, KayaFM, ANN7, SABC1-SHIFT, SABC1-Identity, DRUM
Magazine, YOU Magazine, Huisgeenoot Magazine, DailySun Newspaper just to mention a
few. He is currently planning National Empowerment Seminars, aimed at raising awareness
to the society about identity theft, cybercrime, protection of personal information etc. as
this is hugely affecting the societal members. He believes that with the high increase of
smart phone usage, Cybercrime should be taught as a subject as from primary school. He
holds a BSc honors in Computer Science, SABSA certified and a Business Development
certificate from GIBS
Niall Moynihan, Cisco, Security Specialist
Niall Moynihan is a Security Specialist at Cisco and has been with the
company for 18 months after relocating from Australia, where he was
focused on security solutions for large financial and retail enterprises. He
is responsible for driving customer business transformation using Cisco’s
innovations and technology architecture solutions in Content Security,
Networking Security and Cyber Security solutions in emerging markets
based out of South Africa. Prior to joining Cisco, he worked in Europe, Middle East, Asia,
Australia and America, holding positions in engineering, programming, sales, consultancy
and management of WebSense, BlueCoat, Check Point and Sun Microsystems.
Nick Trim, Darktrace, UK, Managing Director EMEA
Nick  Trim has fifteen years’ experience working in operational
environments in the UK cyber defense effort. In collaboration with
various government departments, he played a critical role in creating
cutting-edge operational capabilities to defend against a range of threats
to national security, for the protection of critical infrastructure. Nick has
worked extensively with partners around the world, and is an expert
in human intelligence and social engineering. He has also worked as a cyber consultant,
advising large companies on their areas of vulnerability and helping devise their cyber
strategy. Nick is the head of Darktrace’s commercial division. He has a Master’s degree in
History from Durham University.
Shllomi Ezra, Cyberbit, Director of Sales  Business
Development EMEA
Shllomi comes with over 10 years’ experience in the high-tech
Telecommunication, Wireless, Voice, Data, Internet, Cyber  Intelligence
and SW solution Sales. With specialization in matching various
technologies to different verticals. Shllomi is currently focused on the
EMEA region for Cyberbit, and is responsible for Business development
and sales within the territory. Shllomi is a global, driven, and professional sales executive
who builds long-lasting client relationships and understands how to develop, advance,
deliver large scale project. Prior to joining the team at Cyberbit Shllomi was Sales Director
for NICE Systems
SPEAKER PROFILES
Watchful Software provides advanced persistent security solutions that keep sensitive information
safe from security breaches resulting from accidental or malicious disclosure. Watchful was formed to
protect an organization’s most critical asset after its people – its information. The company addresses
the growing need for protecting sensitive and proprietary information against accidental or malicious
theft, leakage, or loss. Leveraging key technologies including advanced encryption algorithms, digital
rights management, and eBiometrics, Watchful has developed a suite of solutions that ensure only
authorized personnel have access to enterprise systems and information, protecting against potentially
massive economic and competitive damage from cyberterrorists and information thieves.
Named Technology Pioneer by The World Economic Forum 2015, Darktrace is one of the world’s
leading cyber threat defence companies. Its Enterprise Immune System technology detects previously
unidentified threats in real time, powered by machine learning and mathematics developed at the
University of Cambridge, which analyse the behaviour of every device, user and network within an
organisation. Some of the world’s largest corporations rely on Darktrace’s self-learning appliance in
sectorsincludingenergyandutilities,financialservices,telecommunications,healthcare,manufacturing,
retail and transportation. The company was founded in 2013 by leading machine learning specialists
and government intelligence experts, and is headquartered in Cambridge, UK and San Francisco,
including offices in Auckland, Boston, Chicago, Dallas, London, Los Angeles, Milan, Mumbai, New York,
Paris, Seoul, Singapore, Sydney, Tokyo, Toronto and Washington D.C.
ASSOCIATE SPONSOR
We in CYBERBIT understand that in order to detect and respond fast and efficiently to advanced threats
organizational security has to go through major changes. Detection and response cycles must become
optimal and short, leveraging past knowledge and experience, automating processes and capabilities,
and allowing the organization to be agile, alert and prompt. That’s what CYBERSHIELD portfolio is all
about - securing IP  SCADA networks against advanced and targeted threats. CYBERBIT, based on its
vast experience and field-proven technologies, leveraging the knowledge of our experienced cyber
experts and system engineers, is securing today some of the most critical enterprises and national
level infrastructures, where we already Defeat the Unknow.Additionally, CYBERBIT’s Intelligence
division is a world leader in providing interception and Intelligence products and solutions to Law
Enforcement Agencies (LEA) all over the globe, bringing the cyber dimension intelligence potential
to the maximum. CYBERBIT has won the prestigious Frost and Sullivan 2015 award for competitive
strategy innovation and leadership in the global cyber intelligence and security markets (Read more)
CYBERBIT was honored to be ranked at 45# in Cybersecurity Hot Cyber Security Companies - 500 List of
Companies to Watch in 2015 http://cybersecurityventures.com/cybersecurity-500/ CYBERBIT has won
the prestigious Frost and Sullivan 2015 award for competitive strategy innovation and leadership in the
global cyber intelligence and security markets
ASSOCIATE SPONSOR
Arbor Networks helps secure the world‘s largest enterprise and service provider networks from DDoS
attacksandadvancedthreats.Arboristheworld‘sleadingproviderofDDOSprotectionintheenterprise,
carrier and mobile market segments, according to Infonetics Research. Arbor‘s advanced threat
solutions deliver complete network visibility through a combination of packet capture and NetFlow
technology, enabling the rapid detection and mitigation of malware and malicious insiders. Arbor also
delivers market leading analytics for dynamic incident response, historical analysis, visualisation and
forensics. Arbor strives to be a „force multiplier,“ making network and security teams the experts. Its
goal is to provide a richer picture into networks and more security context – so customers can solve
problems faster and reduce the risk to their business. To learn more about Arbor products and services,
please visit its Web site atarbornetworks.com. Arbor‘s research, analysis and insight, together with data
from the ATLAS global threat intelligence system, can be found at the ATLAS Threat Portal.
Networks Unlimited is a value-added distributor, offering the best and latest solutions within the
converged technology, data centre, networking, and security landscapes. The company distributes
best-of-breed products, including Arbor Networks, Arista, Aruba Networks, CensorNet, Centrify,
Fortinet, F5, ProLabs, Riverbed, RSA, SimpliVity andTintri.The product portfolio provides solutions from
the edge to the data centre, and addresses key areas such as cloud networking and integration, WAN
optimisation, application performance management, application delivery networking, WiFi-, mobile-
and networking security, load balancing, data centre in-a-box, and storage for virtual machines. Since
its formation in 1994, Networks Unlimited has continually adapted to today‘s progressively competitive
and evolving marketplace, and has reaped the benefits by being a leading value-added distributor
(VAD) within the sub-Saharan Africa market.
ASSOCIATE SPONSOR
Cisco (NASDAQ: CSCO) is the worldwide leader in IT that helps companies seize the opportunities of
tomorrow by proving that amazing things can happen when you connect the previously unconnected.
Cisco has shaped the future of the Internet by creating unprecedented value and opportunity for our
customers, employees, investors and ecosystem partners and has become the worldwide leader in
networking - transforming how people connect, communicate and collaborate.
STRATEGIC SECURITY SPONSOR
Ubuntu Business Advisory and Consulting (Pty) Ltd together Bowline Security, provide integrated
forensic investigation and trusted cyber security solutions to the private and public sector. Our team
members are qualified professionals, rich in experience, committed to excellence, and specialize in
designing, implementing and maintaining holistic integrated and sustainable programs. We offer a
unique technology and services framework for clients to actively prevent, detect and respond to risks,
through the implementation of risk management and mitigation measures by: • Defining threats and
vulnerabilities • Assessing likelihoods and probabilities • Evaluating scope and magnitude • Considering
controls and counter measures UBAC and BOWLINE contribute to servicing our client needs by using
our industry knowledge and security-related expertise in: • Digital Forensics; • Security Architecture;
• Identity and Access Management; • Cyber Security Operations Center; • Fraud Risk Management
Services; • Training and Awareness programs; • Fraud and Corruption Investigations; • Application Code
Assessment Services. • Enterprise Security Program Development; and • Security Governance, Risk and
Compliance.
ASSOCIATE SPONSOR
Bitdefenderisaglobalsecuritytechnologycompanythatdeliverssolutionsinmorethan100countries.
Since 2001, Bitdefender has consistently produced award-winning business and consumer security
technology. Bitdefender is a leading innovator in protecting consumers with breakthrough integrated
home cybersecurity products such as Bitdefender Box. Through RD, alliances and partnership teams,
Bitdefender has elevated the highest standards of security excellence in both its number-one-ranked
technology and its strategic alliances with the world’s leading technology providers.
New ways of engaging customers and business operations demand a new approach to protecting
critical systems and services. Transforming security to protect the opportunities of digital business is
a strategic imperative. Blue Turtle enables this transformation by blending advanced technology and
best practice so our customers can meet the challenge of cyber threats. We protect business against
cyber attacks, malicious behavior and insider threat. By employing machine learning, big data, and
real-time automation technologies we deliver‘end-to-end’security – whether Datacenter or Endpoint,
Cloud, Industrial or IoT systems. Cyber-defense needs to be ‘always-on’ and our solutions  some of the
world’s most innovative security systems are active 24 x 7.Our technology partners are award winning,
game changing market leaders such as Darktrace, Fireeye, Forcepoint, ObserveIT, Radware, SentinelOne
and Splunk ! Our specialists work with you to understand, prioritize, and manage cyber security in the
context of your business, delivering advanced security for tomorrow’s challenges – Today.
NETWORKING SOLUTION PROVIDER
Cyber Defense Magazine
Cyber Defense Magazine is by ethical, honest, passionate information security professionals for IT
Security professionals. Our mission is to share cutting edge knowledge, real world stories and awards
on the best ideas, products and services in the information technology industry.
Vigilance
Vigilance is the undisputed leading voice of the global security industry. The depth of our reportage,
the brilliance of our analysis of the global security issues and the global influence of our editorials are
incomparable.The intellectual and marketing bent ofVigilance are the results of many years of research.
Our writers and contributors are key players of the global security industry; no wonder Vigilance is not
only the magazine for decision makers and those who are in charge of purchasing budgets in their
various organizations across the globe, but the world’s leading security magazine. Because our focus
is international, our news has the farthest reach, so also is every advert placed on Vigilance. Vigilance
therefore, is your definitive guide to the global security market.
MEDIA PARTNERS
#ACSS16
Get it on
Download on the
App Store

Mais conteúdo relacionado

Mais procurados

Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsPeter Wood
 
ISC2014 Beijing Keynote
ISC2014 Beijing KeynoteISC2014 Beijing Keynote
ISC2014 Beijing KeynoteCyphort
 
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'Chris Hails
 
Combating Advanced Persistent Threats with Flow-based Security Monitoring
Combating Advanced Persistent Threats with Flow-based Security MonitoringCombating Advanced Persistent Threats with Flow-based Security Monitoring
Combating Advanced Persistent Threats with Flow-based Security MonitoringLancope, Inc.
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017Riaan Bellingan
 
Clear and present danger: Cyber Threats and Trends 2017
Clear and present danger: Cyber Threats and Trends 2017Clear and present danger: Cyber Threats and Trends 2017
Clear and present danger: Cyber Threats and Trends 2017Morakinyo Animasaun
 
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Security B-Sides
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent ThreatAmmar WK
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
A Look Into Cyber Security
A Look Into Cyber SecurityA Look Into Cyber Security
A Look Into Cyber SecurityGTreasury
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeMelbourne IT
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021Chris Hails
 
Drexel 2012 signal analysis using low cost tools - masint v3
Drexel 2012   signal analysis using low cost tools - masint v3Drexel 2012   signal analysis using low cost tools - masint v3
Drexel 2012 signal analysis using low cost tools - masint v3warezjoe
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoPrime Infoserv
 

Mais procurados (17)

Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent Threats
 
ISC2014 Beijing Keynote
ISC2014 Beijing KeynoteISC2014 Beijing Keynote
ISC2014 Beijing Keynote
 
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
 
Maritime Cyber Security
Maritime Cyber SecurityMaritime Cyber Security
Maritime Cyber Security
 
Combating Advanced Persistent Threats with Flow-based Security Monitoring
Combating Advanced Persistent Threats with Flow-based Security MonitoringCombating Advanced Persistent Threats with Flow-based Security Monitoring
Combating Advanced Persistent Threats with Flow-based Security Monitoring
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017
 
Clear and present danger: Cyber Threats and Trends 2017
Clear and present danger: Cyber Threats and Trends 2017Clear and present danger: Cyber Threats and Trends 2017
Clear and present danger: Cyber Threats and Trends 2017
 
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent Threat
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
A Look Into Cyber Security
A Look Into Cyber SecurityA Look Into Cyber Security
A Look Into Cyber Security
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
 
Drexel 2012 signal analysis using low cost tools - masint v3
Drexel 2012   signal analysis using low cost tools - masint v3Drexel 2012   signal analysis using low cost tools - masint v3
Drexel 2012 signal analysis using low cost tools - masint v3
 
TSCM-June15
TSCM-June15TSCM-June15
TSCM-June15
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 

Destaque

Práctica calificada rm - 3º
Práctica calificada   rm - 3ºPráctica calificada   rm - 3º
Práctica calificada rm - 3ºbrisagaela29
 
Terapia inhalatoria completa
Terapia inhalatoria completaTerapia inhalatoria completa
Terapia inhalatoria completaHospital Guadix
 
Revisão Bahiana - 2ª etapa
Revisão Bahiana - 2ª etapaRevisão Bahiana - 2ª etapa
Revisão Bahiana - 2ª etapaemanuel
 
La salud es un derecho internacional
La salud es un derecho internacionalLa salud es un derecho internacional
La salud es un derecho internacionalHospital Guadix
 
Sesion higiene manos 2016
Sesion higiene manos 2016Sesion higiene manos 2016
Sesion higiene manos 2016Hospital Guadix
 
(2016 10-31) actualización urología
(2016 10-31) actualización urología(2016 10-31) actualización urología
(2016 10-31) actualización urologíaHospital Guadix
 
Revisão ENEM III - Aspectos gerais da célula
Revisão ENEM III - Aspectos gerais da célulaRevisão ENEM III - Aspectos gerais da célula
Revisão ENEM III - Aspectos gerais da célulaemanuel
 
Virologia - Super super med
Virologia - Super super medVirologia - Super super med
Virologia - Super super medemanuel
 
Cc.ss. 5to
Cc.ss. 5toCc.ss. 5to
Cc.ss. 5tocepecole
 
Objetivo miedo
Objetivo miedoObjetivo miedo
Objetivo miedocepecole
 
Tablón facebook
Tablón facebookTablón facebook
Tablón facebookcepecole
 
Fotossintese
FotossinteseFotossintese
Fotossinteseemanuel
 
2º sec. conteo de figuras y caminos
2º sec. conteo de figuras y caminos2º sec. conteo de figuras y caminos
2º sec. conteo de figuras y caminoscepecole
 
Introdução a citologia
Introdução a citologiaIntrodução a citologia
Introdução a citologiaemanuel
 

Destaque (17)

Trauma gynecologyc
Trauma gynecologycTrauma gynecologyc
Trauma gynecologyc
 
Post Show Report for the 2nd Annual Gas Flaring management Summit
Post Show Report for the 2nd Annual Gas Flaring management SummitPost Show Report for the 2nd Annual Gas Flaring management Summit
Post Show Report for the 2nd Annual Gas Flaring management Summit
 
Práctica calificada rm - 3º
Práctica calificada   rm - 3ºPráctica calificada   rm - 3º
Práctica calificada rm - 3º
 
Terapia inhalatoria completa
Terapia inhalatoria completaTerapia inhalatoria completa
Terapia inhalatoria completa
 
Revisão Bahiana - 2ª etapa
Revisão Bahiana - 2ª etapaRevisão Bahiana - 2ª etapa
Revisão Bahiana - 2ª etapa
 
La salud es un derecho internacional
La salud es un derecho internacionalLa salud es un derecho internacional
La salud es un derecho internacional
 
Sesion higiene manos 2016
Sesion higiene manos 2016Sesion higiene manos 2016
Sesion higiene manos 2016
 
(2016 10-31) actualización urología
(2016 10-31) actualización urología(2016 10-31) actualización urología
(2016 10-31) actualización urología
 
Revisão ENEM III - Aspectos gerais da célula
Revisão ENEM III - Aspectos gerais da célulaRevisão ENEM III - Aspectos gerais da célula
Revisão ENEM III - Aspectos gerais da célula
 
Virologia - Super super med
Virologia - Super super medVirologia - Super super med
Virologia - Super super med
 
Cc.ss. 5to
Cc.ss. 5toCc.ss. 5to
Cc.ss. 5to
 
Objetivo miedo
Objetivo miedoObjetivo miedo
Objetivo miedo
 
Tablón facebook
Tablón facebookTablón facebook
Tablón facebook
 
Meiose
MeioseMeiose
Meiose
 
Fotossintese
FotossinteseFotossintese
Fotossintese
 
2º sec. conteo de figuras y caminos
2º sec. conteo de figuras y caminos2º sec. conteo de figuras y caminos
2º sec. conteo de figuras y caminos
 
Introdução a citologia
Introdução a citologiaIntrodução a citologia
Introdução a citologia
 

Semelhante a DBAD16_Magazine_LR

2nd Annual Pan African High Security Printing Summit 2013
2nd Annual Pan African High Security Printing Summit 20132nd Annual Pan African High Security Printing Summit 2013
2nd Annual Pan African High Security Printing Summit 2013Matshego Rawula
 
AfriSecure Info Pack (5)
AfriSecure Info Pack (5)AfriSecure Info Pack (5)
AfriSecure Info Pack (5)Barry Newman
 
Forensic Accounting & Litigation Support Forum 2015
Forensic Accounting & Litigation Support Forum 2015Forensic Accounting & Litigation Support Forum 2015
Forensic Accounting & Litigation Support Forum 2015Kennedy Mwangi
 
SECCON 2014, Post Show Report
SECCON 2014, Post Show ReportSECCON 2014, Post Show Report
SECCON 2014, Post Show ReportMesseIntl
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Business Finland
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...Neil Curran MSc CISSP CRISC CGEIT CISM CISA
 
System Partner Day Presentation.pptx
System Partner Day Presentation.pptxSystem Partner Day Presentation.pptx
System Partner Day Presentation.pptxCaitlinHeugh
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agendaCopperberg
 
MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013
MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013
MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013Linuxmalaysia Malaysia
 
Brochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochure
Brochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochureBrochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochure
Brochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochureLinuxmalaysia Malaysia
 
Webinar Slides: Critical Steps to Keep your BSA Program Current
Webinar Slides: Critical Steps to Keep your BSA Program CurrentWebinar Slides: Critical Steps to Keep your BSA Program Current
Webinar Slides: Critical Steps to Keep your BSA Program CurrentPneuron
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaZsolt Nemeth
 

Semelhante a DBAD16_Magazine_LR (20)

2nd Annual Pan African High Security Printing Summit 2013
2nd Annual Pan African High Security Printing Summit 20132nd Annual Pan African High Security Printing Summit 2013
2nd Annual Pan African High Security Printing Summit 2013
 
AfriSecure Info Pack (5)
AfriSecure Info Pack (5)AfriSecure Info Pack (5)
AfriSecure Info Pack (5)
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
FSA 2016
FSA 2016FSA 2016
FSA 2016
 
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
 
Forensic Accounting & Litigation Support Forum 2015
Forensic Accounting & Litigation Support Forum 2015Forensic Accounting & Litigation Support Forum 2015
Forensic Accounting & Litigation Support Forum 2015
 
SECCON 2014, Post Show Report
SECCON 2014, Post Show ReportSECCON 2014, Post Show Report
SECCON 2014, Post Show Report
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
 
System Partner Day Presentation.pptx
System Partner Day Presentation.pptxSystem Partner Day Presentation.pptx
System Partner Day Presentation.pptx
 
3rd Annual CISO Round Table
3rd Annual CISO Round Table3rd Annual CISO Round Table
3rd Annual CISO Round Table
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agenda
 
CTO Cybersecurity Forum 2013 Pierre Dandjinou Promoting Cybersecurity in Africa
CTO Cybersecurity Forum 2013 Pierre Dandjinou Promoting Cybersecurity in AfricaCTO Cybersecurity Forum 2013 Pierre Dandjinou Promoting Cybersecurity in Africa
CTO Cybersecurity Forum 2013 Pierre Dandjinou Promoting Cybersecurity in Africa
 
MECSCE 2015 - Brochure
MECSCE 2015 - BrochureMECSCE 2015 - Brochure
MECSCE 2015 - Brochure
 
MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013
MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013
MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013
 
Brochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochure
Brochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochureBrochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochure
Brochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochure
 
lr_MondaySN1_2016-1
lr_MondaySN1_2016-1lr_MondaySN1_2016-1
lr_MondaySN1_2016-1
 
Webinar Slides: Critical Steps to Keep your BSA Program Current
Webinar Slides: Critical Steps to Keep your BSA Program CurrentWebinar Slides: Critical Steps to Keep your BSA Program Current
Webinar Slides: Critical Steps to Keep your BSA Program Current
 
NFC Symposium 2014
NFC Symposium 2014NFC Symposium 2014
NFC Symposium 2014
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
 

Mais de JosephVipin Rajan جوزيف راجان (8)

Final magazine
Final magazineFinal magazine
Final magazine
 
DBHS60_magazine_Draft
DBHS60_magazine_DraftDBHS60_magazine_Draft
DBHS60_magazine_Draft
 
Australian Plant Shutdown and Turnaround Forum
Australian Plant Shutdown and Turnaround ForumAustralian Plant Shutdown and Turnaround Forum
Australian Plant Shutdown and Turnaround Forum
 
Post show report for Waste Management Middle East Forum
Post show report for Waste Management Middle East Forum Post show report for Waste Management Middle East Forum
Post show report for Waste Management Middle East Forum
 
DBHS49_Magazine_LR
DBHS49_Magazine_LRDBHS49_Magazine_LR
DBHS49_Magazine_LR
 
Kingdom Downstream Optimization and Technology
Kingdom Downstream Optimization and TechnologyKingdom Downstream Optimization and Technology
Kingdom Downstream Optimization and Technology
 
3rd Annual Gas Flaring Management SUmmit 2016
3rd Annual Gas Flaring Management SUmmit 20163rd Annual Gas Flaring Management SUmmit 2016
3rd Annual Gas Flaring Management SUmmit 2016
 
50456_DBTR34_P_Info
50456_DBTR34_P_Info50456_DBTR34_P_Info
50456_DBTR34_P_Info
 

DBAD16_Magazine_LR

  • 1. Africa Cyber Security Summit 9th - 10th March, 2016 Birchwood Hotel & OR Tambo Conference Centre, Johannesburg, South Africa Organised by Visit Our Website: www.fleming.events
  • 2. Dear Participant, On behalf of Fleming. we would like to welcome you to “ Africa Cyber Security Summit”. We have carefully selected leading industry experts to speak at this event, giving you the opportunity to hear first-hand experiences from industry leaders and share solutions for overcoming the latest challenges in the field. Through presentations & interactive panel discussions, we are bringing together industry experts and thought leaders to address and discuss the rapidly changing business environment in the fieald of Cyber Security in Africa We hope that your participation at this Fleming. summit is just the beginning of our business relationship and that we will have the opportunity to make a continuing contribution to your company’s profitability and success. If you would like to offer any comments related to the content or format of the program, or would like to contribute to a future platform we would be very pleased to hear from you. To that end, we ask that you kindly fill up and return the Conference Evaluation Form. Thank you for attending and hope to see you again. Best regards, JosephVipinRajan Conference Producer Fleming. AlphyNangani Conference Coordinator Fleming. Africa Cyber Security Summit 9th - 10th March, 2016 | Birchwood Hotel & OR Tambo Conference Centre, Johannesburg, South Africa
  • 3. Administrative details for your perusal:- 1. If there are any changes to the conference program, you will find the updated version in your documentation folder or it will reflect on the board next to the registration desk. 2. The conference will take place on the 9th and 10th of March 2016 in Marco Polo 3. Exhibition & Coffee Breaks will be held in Heathrow. If you have any special dietary requirements, kindly inform our Registration Desk during the first coffee break. Lunch will be served at Restaurant - Clovers Green. 4. Name tags have been provided to help attendees identify fellow delegates. That apart, the name tags will also assist the conference production team to easily identify attendees when delivering messages. 5. Kindly adhere to specified break durations considering the program schedule of the day. The Chairperson shall try his/her best to begin all sessions on the scheduled time. 6. Kindly wait until the end of each presentation for the Question & Answer (Q&A) session, the Chairperson shall give an opportunity to raise the questions. Also please introduce yourself and the organization you represent prior to raising a query. 7. Kindly keep your cell phones on silent mode or switched off when the sessions are in progress. 8. Kindly do not forget to fill in the Conference Evaluation Form and return the same to the Conference Coordinator Alphy Nangani at the Registration Desk. Your valuable feedback will be of great help to evaluate and enhance our upcoming events. If you have any queries before, after or during the conference, the Fleming. Team would be more than happy to assist you with whatever concerns you might have. Your valuable feedback will be of great help to evaluate and enhance our upcoming events. Fleming. recognizes the intellectual property rights of speakers over the transcribed material. No reproduction of any part may take place without the written permission of relevant speaker. The presentations are not for sale and have no commercial value. Africa Cyber Security Summit 9th - 10th March, 2016 | Birchwood Hotel & OR Tambo Conference Centre, Johannesburg, South Africa
  • 4. Event Chair: Dave Dodge, Chairman South African Institute of Security, South Africa Dave Dodge is a Senior Partner with the Temi Group. He comes from a policing background, having been a police officer with the Metropolitan Police, London (Scotland Yard) for over 30 years. During this career, he served in operational and support roles in uniformed, investigative and intelligence fields, which saw him awarded a number of commendations.  He retired as a senior detective in the Department of Strategy, Modernisation and Performance. His relocation to South Africa saw a move into the security risk management in the role of consultant and Chief Advisor to Group Security at Eskom, and recent board certification as a Certified Protection Professional (CPP).Dave has also made significant contributions to the development of security training in South Africa as a member of a Safety and Security Sector Education andTraining Authority (SASSETA) Task Team and a South African Qualifications Authority (SAQA) Reference Group. He is an active member of various national and international security organisations, including the US Overseas Security Advisory Council (OSAC) and the World Institute of Nuclear Security (WINS) in addition to being the Vice- Chairman of the Board of Governors of the South African Institute of Security (SAIS) and Assistant Regional Vice-President for ASIS International (ASIS) in Southern and Eastern Africa.
  • 5. Africa Cyber Security Summit 9 - 10 March, 2016 | Birchwood Hotel & OR Tambo Conference Centre, Johannesburg, South Africa Associate Sponsor Media Partners Strategic Security Sponsor Networking Solution Provider Supported ByEndorsed By
  • 6. Africa Cyber Security Summit 9 - 10 March, 2016 | Birchwood Hotel & OR Tambo Conference Centre, Johannesburg, South Africa 9th March, 2016 DAY 1 8:00 Registration and Coffee 8:50 Welcome by Fleming. 8:55 Opening Remarks from the Chairperson Dave Dodge, South African Institute of Security, South Africa Chairman 9:00 Cybercrime: A reality in South Africa Brigadier NT Pieterse, South African Police Service Section Head: Electronic Crime Unit, South Africa 9:30 Understanding the touch-points between privacy cyber security: • Getting to grips with where privacy cyber security come together • Understanding what these touch points mean from a regulatory and corporate perspective Ritasha Jethva, Nedbank Limited Information Privacy Officer 10:00 The Rising Cases of Cyber Crime:“A challenge for LEAs and Industry” • The paper will amongst other things identified some of the current trends of cyber threats affecting businesses, government and individuals. • It will also look at evolution of cybercrimes resulting into online cyber criminal markets putting sophisticated attack tools into the hands of more low-level attackers with case studies. • The paper will also look at how over dependent of Government, Agencies and Ministries and Business in technology without the requisite security controls give birth to the rising wave of cybercrime. Abdulkarim Chukkol, Economic and Financial Crimes Commission, Head, Advance Fee Fraud and Cybercrimes Section, Nigeria 10:30 Coffee Break Networking 11:00 Lack of Technical Know-how in terms of Cyber Security • Inability to monitor and defend national networks • Making African countries vulnerable to cyber espionage • African countries vulnerable incidences of cyber terrorism James Saaka, National Information Technology Authority- Uganda (NITA-U), Executive Director, Uganda 11:30 Security for the Digital Economy • The current security landscape • Cisco’s Vision for Security: Before, During and After an attack Niall Moynihan, Cisco, Security Specialist 12:00 Inside the Threats to Cyber Security, their consequences, vulnerabilities and, mitigation measures • The risks associated with insider threats • Individual motivations, behaviors and indicators • Organisational factors leading to insider acts • Mitigation measures to reduce the risks Dave Dodge, South African Institute of Security, South Africa Chairman 12:30 Networking Lunch 13:30 Making The African Internet Ecosystem More Secure and Resilient. • Introduction • Africa Threat Landscape • The need for Regional Cooperation Jacques Houngbo, AfricaCERT, Instructor, ICT Specialist 13:45 MASTERCLASS : Cyber Maturity Assessment approach to: • Create opportunity to reflect on current situation • Give insight in potential cybersecurity issues and opportunities or rooms for improvement • Raise awareness and call for action Ngeje Nganate, AfricaCERT, Southern Africa Representative 14:10 What is the need for Cyber Insurance • Individual awareness towards“Cyber Insurance” • Responsibility faced by a company in terms of a hacking activity or any other threat Thokozani Miya, Vodacom, Head, Principal Specialist - Security 14:45 Networking Tea/Coffee Break 15:15 The Enterprise Immune System: Using Machine Learning to Detect‘Unknown Unknown’Threats • Learn why‘immune system’technologies represent a fundamental innovation for cyber defence • Discover how to apply machine learning and mathematics to detect advanced, internal threats • Understand how to gain 100% network visibility to investigate emerging anomalies in real time • Hear real-world Enterprise Immune System case studies Nick Trim, Darktrace, UK, Managing Director EMEA 15:45 TRIO ROUNDTABLE Delegates will be split into three teams to have independent discussions on their respective tracks, brainstorm and arrive at conclusions. Format to be followed: • 5 minutes for introduction ` • 30 minutes for topic discussion • 10 minutes for the round table leader of each group to share the conclusions ROUNDTABLE 1: Lack of Technical Know-how in terms of Cyber Security Moderator: Abdulkarim Chukkol, Economic and Financial Crimes Commission, Head, Advance Fee Fraud and Cybercrimes Section, Nigeria ROUNDTABLE 2: IT Security Budget - Well Spent or Never Spent? Moderator: Sean Maritz, Eskom, Chief Information Officer, South Africa ROUNDTABLE 3: Is Your Organization Cyber Insured? Moderator: Thokozani Miya, Vodacom, Head, Principal Specialist - Security 16:30 Detection of APT Attacks • Cyber trainer • CyberShield Analysis Detection (AnD) for SCADA Networks • CyberShield Analysis Detection (AnD) for IP Networks • CyberShield Mitigation Response (MnR) • CyberShield for Mobile Shllomi Ezra, Cyberbit, Isreal, Sales Director EMEA 16:45 Closing Remarks and from the Event Chairperson Summarizing the Day‘s takeaways Dave Dodge, South African Institute of Security, South Africa Chairman
  • 7. Africa Cyber Security Summit 9 - 10 March, 2016 | Birchwood Hotel OR Tambo Conference Centre, Johannesburg, South Africa 8:00 Registration and Coffee 8:50 Welcome by Fleming. 8:55 Opening Remarks from the Chairperson Dave Dodge, South African Institute of Security, South Africa Chairman 9:00 IT Security Budget - Well Spent or Never Spent? • IT Security Head‘s key role in gaining and spending security budget • Effective utilisation of the cyber budget • Return on security investment (ROSI) Sean Maritz, CIO, Group Information Technology, Eskom SOC Limited 9:30 The South African Cybersecurity Environment: • Where are we? • Proposed actions to reduce the treat. Joey Jansen Van Vuuren, Council for Scientific Industrial Research, Research Group Leader Cyber Defense, South Africa 10:00 Cyberspace challenges in South Africa: • Empower the man on the street • Ordinary societal members are the most vulnerable • Cultivating a security mindset at primary schools • Government and private sector’s commitment Manqoba Mngomezulu, Telkom, Senior Info Security Specialist Author, South Africa 10:30 Coffee Break Networking 11:00 PANEL DISCUSSION - Cyber Crime 2.0 • Cyber crime cases are doubling every year – What is the potential problem? • Despite the research for over a decade, cyber crime still tops the chart of a threat Panelists: Abdulkarim Chukkol, Economic and Financial Crimes Commission, Head, Advance Fee Fraud and Cybercrimes Section, Nigeria Ahamad Shah, FirstRand Group, Head CISO Team, South Africa Maletsema Phofu, Eskom, Chief Information Security Advisor, South Africa Moderator :- Dave Dodge, South African Institute of Security, South Africa Chairman 11:45 Developing an IT Security Infrastructure Landscape – Role of Data Protection • Developing an industry-wide technology infrastructure • Avoiding pitfalls to IT Operations Teki Akuetteh Falconer, Data Protection Commission Executive Director, Ghana 12:20 Developing cybersecurity skills for organisational resilience • Workforce challenges and the evolution of cyber skill requirements • Training professionals to deal with day to day cyber threats • Enhancing cyber knowledge in the organisation Maletsema Phofu, Eskom Chief Information Security Advisor, South Africa 13:00 Networking Lunch 14:00 BREAK OUT SESSION: Road map to an effective cyberspace Delegates will be split into three teams to have independent discussions on their respective tracks, brainstorm and arrive at conclusions. Format to be followed: • 5 minutes for introduction • 30 minutes for topic discussion • 10 minutes for the round table leader of each group to share the conclusions • Initiatives taken by the continent to overcome cyber banking threats Jacques Houngbo, AfricaCERT, Instructor, ICT Specialist • Building a truly‚effective‘ Security Joey Jansen Van Vuuren, Council for Scientific Industrial Research, Research Group Leader Cyber Defence, South Africa • Enabling the Risk team that would reduce the risks to a large extent Ngeje Nganate, AfricaCERT, Southern Africa Representative 14:45 Focus session on wireless security • The truth about wireless security • How secure is your data • Shortcuts for a achieving a watertight wireless security Ahamad Shah, FirstRand Group, Head CISO Team, South Africa 15:15 Networking Tea/Coffee Break 15:45 Book a Prize -“Bring Back My Identity” 6 Signed copies of the book “Bring Back My Identity” by Manqoba Mngomezulu would be handed out to delegates who can answer to the questions laid out by speakers at the summit. The question would be asked by the Chairperson and the Delegates are requested to answer to these using the Sli.do Application. The top 3 answers would be reviewed and the best answer would be awarded the signed copy of the book“Bring Back My Identity”by the author Manqoba Mngomezulu, himself 16:15 Closing Remarks from the Event Chairperson Dave Dodge, South African Institute of Security, South Africa Chairman 10th March, 2016 DAY 2
  • 8. Africa Cyber Security Summit 9 - 10 March, 2016 | Birchwood Hotel OR Tambo Conference Centre, Johannesburg, South Africa Abdulkarim Chukkol, Economic and Financial Crimes Commission (EFCC) Nigeria, Head, Advance Fee Fraud and Cybercrime Section Abdulkarim Chukkol is a Deputy Chief Detective Superintendent who currently heads the Lagos Office of the Advance Fee Fraud and Cybercrime Section of Nigeria’s Economic Financial Crimes Commission. He holds a Post Graduate Certificate in Criminal Justice Education. He graduated from the University of Maiduguri (2000) and University of Virginia (2011). He also had professional training at the Nigeria Police Academy and FBI National Academy, Quantico VA, United States. He also holds post graduate diploma in Cybersecurity and Spectrum Management from the United States Telecommunication Training Institute, Washington DC, United States. Mr. Chukkol is a versatile fraud investigator who has been involved in several multinational operations and participated in several anti-cybercrime fraud disruptive activities at the Commission including Operations ‘Octopus’, Operations ‘Stop Payment’, Operations ‘Cyberstorm 1’ and Operations ‘Apollo’ leading to arrest and successful prosecution of fraudsters/ cybercriminals. He represents the Commission at the International Mass-Marketing Coordinating Group, which consists of law enforcement, regulatory, and consumer protection agencies from seven countries, including Australia, Belgium, Canada, the Netherlands, the United Kingdom and the United States. He has supervised the prosecution of 212 Advance Fee Fraud and Cybercrime related cases at various High Courts all over Nigeria between June 2012- December 2014. 69 of the cases were successfully convicted, including the extradition of 2 fugitives to the United States. He is a certified fraud examiner and an active member of the International Association of Computer Investigative Specialist. Mr. Chukkol is also member and Nigeria contact person of the G8 24/7 High Tech Crime Network and has contributed immensely in the fight against Transnational Crimes in Nigeria and abroad. He is married with three children. Jacques Houngbo, AfricaCERT, Instructor, ICT Specialist ICT Specialist and Information Security expert, Jacques Houngbo has extensive experience assessing IT systems and processes, IT Strategy Development Programme Management. He uses to work for diverse clients: government, private companies and international organizations. He is more and more engaged in the field of cybersecurity. As such, Jacques Houngbo is member of AfricaCERT where he is in charge of Development Program and also serves as Instructor. Jacques Houngbo is CEH (Certified Ethical Hacker) and ECSA (EC Council Certified Security Analyst). Ngeje Nganate, AfricaCERT, Southern Africa Representative Mr. Ngeje Nganate is the current AfricaCERT Representative for Southern Africa .He is currently based in Gaborone, Botswana. As an AfricaCERT representative for the Southern Africa region, Mr. Ngeje Nganate’s work includes raising cyber security awareness, conducting workshops and seminars, conducting security audits and assessments and organizing cyber security training for the Southern Africa region. Prior to joining AfricaCERT, Mr Ngeje Nganate worked as an Information Security Analyst from 2011 to 2013 at the International Multilateral Partnership Against Cyber Threats (IMPACT). IMPACT is an International cyber security organization headquartered in Cyberjaya, Malaysia. At IMPACT, Ngeje Nganate was involved in the establishment of Computer Emergency Response Teams in the African continent. He was involved as a project manager for the establishment of the Computer Incident ResponseTeams (CIRT) in the Republics of Zambia (cirt.zm) and Burkina Faso (cirt.bf) .He was also part of the team that conducted CIRT readiness assessments for Ghana, Ivory Coast, Burundi, Tanzania and Kenya and Niger. Mr. Ngeje Nganate is a candidate for a Master of Science (Computer Science) at the Botswana International University of Science and Technology (BIUST).He graduated with a Bachelor of Information Technology (HONS) degree from Multimedia University (MMU) in Cyberjaya, Malaysia. He is an EC-Council Certified Ethical Hacker (C|EH), a Cisco Certified Network Associate (CCNA) and an IBM Certified Academic Associate in IBM DB2 database. Mr. Ngeje Nganate is also a recipient of various certificates of training in the field of cyber security including CERT implementation and establishment. “A More Secure African Cyber Space” is one of Mr. Ngeje Nganate’s goals and he believes enough cyber security awareness and capacity building are key to the realization of that goal. Brigadier NT Pieterse, South African Police Service Section Head: Electronic Crime Unit, South Africa Brigadier Pieterse joined the South African Police Service on 1 December 1979 and have been assigned to the Division: Detective Service from 1983, where he performed his duties within a number of specialised environments, inclusive of the Stock Theft- ; Murder and Robbery- and Crime Intelligence Units. During 1987 he received his Commission rank, and has since served in a number of managerial positions within the South African Police Service. During 1992 to 2001 Brig Pieterse furthered his career within the Commercial Crime establishment, having being assigned to a number of commander positions, also “seconded” to the Department of Justice’s Investigative Directorate: Serious Economic Offences (IDSEO). For the period 2001 to 2009 he served as a member of the Directorate for Special Operations (DSO Scorpions), where he held the position of Chief Investigating Officer (CIO). From 2009 to date Brig Pieterse again became part of Commercial Crime within the South African Police Service, where he is currently performing his duties as the National Section Head: Electronic Crime Unit. Brig Pieterse has extensive exposure to the investigation of cybercrime, specifically in as far as it relates to the broader financial/ banking platform. Thokozani Miya, Vodacom, Head, Principal Specialist -Security, South Africa Thokozani Miya is a Principal Specialist – Cloud Security Services at one of the biggest telecommunication company, Vodacom Business. He has been in the information security sector for over 16 years and over 19 years in Information Technology. He started out as an IT Specialist and moved into Information Security 3 years later. He has worked in different sectors and industries holding different roles that includes; Information Technology Specialist, Information Security Specialist and Information Security Architect.Thokozani holds various Information Technology, Information Security and business leadership certifications which he accrued in his career journey. His entrepreneurial passion and attitude has helped him to acquire business acumen skills through freelancing and contracting in the field of Information Security. This has given him an edge to grow to more senior business roles driving strategy for Information Security for customers and business alike. Thokozani belongs to the Johannesburg Toastmaster Club. He likes to read business books and security articles. He loves Mountain Biking and is working towards completing his PPL (Private Pilot License). James Saaka (MSc. Comp. Sc), Executive Director, National Information Technology Authority-Uganda (NITA-U) In August 2010, James Saaka joined the National Information Technology Authority-Uganda (NITA-U) as Executive Director. His responsibility is to ensure that NITA-U achieves its mandate: to coordinate, promote and monitor IT development within the context of national, social and economic development of Uganda. Mr Saaka joined NITA-U from Shell International B.V., where he spent 12 years – from July 1998 until July 2010. James’s last assignment in Shell from 2008 to 2010, was Business Services Manager for Strategy Compliance for the Shell Group, under the Group CIO office based in The Hague, in the Netherlands. He started his career in Bank of Uganda as a Systems Analyst from 1993 to 1995. James Saaka graduated from the University of Vladimir Polytechnic Institute, The Soviet Union, with Bachelors in Computer Science in 1988. He obtained a Masters in Computer Science from the same University in 1991. Mr. James Saaka has attended numerous international trainings, conferences and workshops and has given many presentations and key note addresses. Teki Akuetteh Falconer, Data Protection Commission Executive Director, Ghana Teki has worked consistently on research and policy issues affecting information technology and telecommunications law in Ghana.  She also worked on several legal due diligence and transaction advisory services in the ICT sector. Her prior work experience included managing a law firm and practicing law. Between  2008  and 2014, Teki worked as an ICT Legal Expert in the Ministry of Communications under the eGhana Project. Her dedication and commitment led to the development and passage of eleven (11) key legislations for the ICT sector in Ghana between 2008 and 2012. These legislations include the National Communications Authority Act, 2008 (Act 769), the National Information Technology Agency Act, 2008 (Act 771), the Electronic Transactions Act, 2008 (Act 772), the Electronic Communications Act, 2008 ( Act 775), the Electronic Communications Regulations, 2011 (L.I. 1991), The Mobile Number Portability Regulations, 2011 (L.I. 1994),  Subscriber Identity Module Registration Regulations, 2011 (L.I.2006) and the Data Protection Act, 2012 (Act 843). She also taught informative seminars on E-banking at the National Banking College, ICT and Telecom Law at the Ghana Telecom University College and the Ghana School of Law. She was the Secretary to the Ministerial Advisory Board of the Ministry of Communications in 2009 and  has been a  Board Member of the Postal and Courier Services Regulatory Commission from 2010 to date. Teki holds an LLM in Information Technology and Telecommunications Law from the University of Strathclyde, Glasgow – Scotland (2005); Qualifying Certificate in Law from the Ghana School of Law (2003) and a Bachelor of Arts Degree in Law and Political Science from the University of Ghana (2001). Teki loves to cook and bake, entertain guests , travel, exercise and dance. Maletsema Phofu, Eskom, Chief Information Security Advisor, South Africa Maletsema has a software development background and has since moved on to acquire skills and experience in areas of information management, contracts management, business process development and improvement, strategy development and implementation, incident management, IT continuity management, delivery of projects, IT governance, risk and compliance. She is currently working at Eskom Holdings as a Chief Advisor Information Security with primary responsibility of looking after the security operations of the endpoints, threat and vulnerability and the Security Operations Center (SOC). Maletsema has successfully delivered multi-million rand security projects in support of business objectives and received numerous organisational awards. She has always been passionate and in the forefront of the development of change management programmes directed towards up-skilling end users and cyber professionals (in IT and OT). Maletsema holds a BCom (hons) Informatics degree from University of Pretoria, industry related certifications and in the process of completing MCom Informatics. Outside of the profession, Maletsema is a social activist with interest in education and use of technology as tools to restore dignity and self-sufficiency. SPEAKER PROFILES
  • 9. Africa Cyber Security Summit 9 - 10 March, 2016 | Birchwood Hotel OR Tambo Conference Centre, Johannesburg, South Africa Joey Jansen Van Vuuren, Council for Scientific Industrial Research, Research Group Leader Cyber Defence, South Africa Joey Jansen van Vuuren is the Research Group Leader for Cyber Defence for Scientific Research at the CSIR South Africa. She gives the strategic research direction for the research group that is mainly involved in research for the SANDF and Government sectors on Cyber Defence. She is involved more than 20 years in academia and research, 10 years as the HOD for an academic IT department and 7 years as research leader at the CSIR. She joined the CSIR with the focus of the research group on cybersecurity that includes network and mobile security, forensics, social media, and national security. As Cyber threats become extremely important for the RSA with the broadband changes, the focus of her research is around cybersecurity, and government policy and frameworks required ensuring national security. These also include structures to ensure cybersecurity and curriculums for cybersecurity. Her research includes journal papers, conference papers and book chapters on cybersecurity governance. She has been invited as keynote speaker at international conferences, and has presented on several forums including national and international conferences and Cyber awareness programmes in South Africa. She was also involved with the establishment of the Cybersecurity Centre of Innovation for research collaboration, cybersecurity education and a platform for cybersecurity threat exchange. She is also involved in the establishment of a network emulator and simulator testing facility at the CSIR that can support cybersecurity training and exercises as well as new product development in the cyber environment. Apart from the research, she is the Vice President (Academic) of the Higher Education Informations and Communication Technology Association and received several accolades for entrepreneurship, contract excellence and community service over the years. Dave Dodge, South African Institute of Security, South Africa, Chairman Dave is a former police officer with London’s Metropolitan Police (Scotland Yard) who served in uniformed, investigative, training and intelligence fields before retiring as a senior detective after 30 years and having been awarded a number of commendations. His relocation to South Africa saw a move into security risk management in the role of Chief Advisor to Group Security at Eskom, and the achievement of international board certification as a Certified Protection Professional (CPP) and Professional Certified Investigator (CPI) through ASIS International. The Eskom role included conducting operational risk assessments and operational security planning for major events, including the 2010 FIFA World Cup, major infrastructure projects and the development of an enterprise Security Management Framework and Security Operating Model. He also contributed to the development of training for the private security industry in South Africa as a member of a SASSETA Task Team reviewing training material and assisting SAQA with a revision of the national policy for the Recognition of Prior Learning. The transition into the private sector has resulted in Dave being a frequent speaker at international security conferences. In additional to his professional accreditations, Dave holds a Bachelor’s degree in Adult Education andTraining and a Diploma in Security Risk Management. Ritasha Jethva, Nedbank Limited, South Africa, Information Privacy Officer, Ritasha Jethva is currently the Head of Information Privacy and the PAIA Officer at Nedbank, where she is accountable for the rollout of a Group wide and National Privacy programme, spanning all local geographic locations as well as all applicable product and service offerings. She is also the Group’s PAIA Officer, where she facilitates all requests for access to information. She recently obtained her MBA (Cum Laude) in October 2015. Ritasha has approximately 11 years’ experience in Information Technology, Governance, Security, Risk Management, Compliance and Privacy concerns. She is an active member providing a leading role on the Banking Association of South Africa, where she is assisting in steering the practical implications of privacy implementations within SA. She is also currently the Deputy Chair of the NCAC (National Cyber security Advisory Council) for South Africa, reporting to the Minister of Postal andTelecommunications. She obtained her CIPP (Certified Information Privacy Professional) certification in the US after undergoing US training within the privacy space. Previously, Ritasha implemented Privacy across the Absa Group over a period of 3 years under the guidance of Barclays Plc. and followed on to become the COO of the Barclays Africa operation. She also spent approximately a year at Liberty Life, where she provided strategic advisory across the Privacy and Information Security Programme, as well as launched the IT Governance programme for the Group. Prior to these corporate roles, she headed up the Information Privacy, Security Cyber division for Accenture Southern Africa. She also headed up the Information Privacy Cyber Security division whilst at Deloitte, within the Risk Advisory department of Deloitte SA. She has led the implementation of Information Security Management Systems at a multitude of corporate institutions, both locally and globally. She has also consulted on major IT Governance initiatives to organisations in the health, energy, manufacturing, retail and banking sectors. She has also been involved in consulting in the information risk management space, particularly in respect to information and data classification, focussing on the practical implementation of IT focussed Governance, Risk and Compliance practices to facilitate regulatory compliance and privacy requirements for large multinational organisations. Interests: • Watching movies (action, adventure and comedy movies) • Am quite a car fanatic (enjoy high performance sport cars) • Reading books (leadership, spiritual advancement, fiction and non-fiction, etc.) Sean Maritz, Eskom SOC Limited, CIO (Acting), Group Information Technology Sean Maritz is currently acting as the CIO of Eskom Holdings Limited. Eskom is a state owned enterprise and generates approximately 95% of the electricity used in South Africa and approximately 45% of the electricity used in Africa. Eskom generates, transmits and distributes electricity to industrial, mining, commercial, agricultural and residential customers and redistributors. As such the Group IT Division of Eskom is one of the largest IT houses in Africa and amongst its full array of IT Services manages the only fully accredited SAP CoE on the continent. Sean has in excess of 26 years of service in Eskom since graduating and his practical knowledge of the issues facing the utility currently is diverse and based on invaluable practical experience he has obtained in a wide range of roles within IT. Sean has amongst other things spearheaded the introduction of a digitization strategy in Eskom and is positioning IT to partner the Eskom business in its turnaround strategy. Sean is passionate about people and this fact is evident in the manner in which he leads and motivates the human capital within the Group IT Division. Sean consistently conceives, strategizes and develops plans for the IT Division drawing on his strong base of personal knowledge to empower the managers and employees in Group IT to respond with deliverables that support Eskom’s strategic imperatives. Sean is most comfortable when applying new approaches and methodologies to ensure a successful outcome for business. He enjoys exploring areas where there is little or no theory to guide experimentation or application, particularly where new approaches and methodologies need to be developed, and where future lines of outcomes are difficult to determine. Sean consistently demonstrates a strong value system in the transparent manner in which he makes mission critical decisions and is extremely passionate about new technologies and the role they can play in becoming game-changes for both business and people in their personal lives. Mr. Manqoba Mngomezulu, Bring Back My Identity Snr Information Security Specialist and author Manqoba is currently employed by Telkom as a Senior Information Security specialist, among other things on his role, he is responsible for designing, implementing and executing an effective information security awareness programme. He is a visionary and a self-motivated individual. He is also passionate about human development. He has written and published a book about identity theft and protection of personal information, a book aimed at empowering the society about identity theft incidents and the role that societal members can play to protect themselves. The minister of Home Affairs, honorable Malusi Gigaba wrote the foreword of his book. Manqoba has been on different media platforms talking about identity theft and Cybercrime. Media such as Talk702, SAFM, UmhloboWeneneFM, PowerFM, KayaFM, ANN7, SABC1-SHIFT, SABC1-Identity, DRUM Magazine, YOU Magazine, Huisgeenoot Magazine, DailySun Newspaper just to mention a few. He is currently planning National Empowerment Seminars, aimed at raising awareness to the society about identity theft, cybercrime, protection of personal information etc. as this is hugely affecting the societal members. He believes that with the high increase of smart phone usage, Cybercrime should be taught as a subject as from primary school. He holds a BSc honors in Computer Science, SABSA certified and a Business Development certificate from GIBS Niall Moynihan, Cisco, Security Specialist Niall Moynihan is a Security Specialist at Cisco and has been with the company for 18 months after relocating from Australia, where he was focused on security solutions for large financial and retail enterprises. He is responsible for driving customer business transformation using Cisco’s innovations and technology architecture solutions in Content Security, Networking Security and Cyber Security solutions in emerging markets based out of South Africa. Prior to joining Cisco, he worked in Europe, Middle East, Asia, Australia and America, holding positions in engineering, programming, sales, consultancy and management of WebSense, BlueCoat, Check Point and Sun Microsystems. Nick Trim, Darktrace, UK, Managing Director EMEA Nick  Trim has fifteen years’ experience working in operational environments in the UK cyber defense effort. In collaboration with various government departments, he played a critical role in creating cutting-edge operational capabilities to defend against a range of threats to national security, for the protection of critical infrastructure. Nick has worked extensively with partners around the world, and is an expert in human intelligence and social engineering. He has also worked as a cyber consultant, advising large companies on their areas of vulnerability and helping devise their cyber strategy. Nick is the head of Darktrace’s commercial division. He has a Master’s degree in History from Durham University. Shllomi Ezra, Cyberbit, Director of Sales Business Development EMEA Shllomi comes with over 10 years’ experience in the high-tech Telecommunication, Wireless, Voice, Data, Internet, Cyber Intelligence and SW solution Sales. With specialization in matching various technologies to different verticals. Shllomi is currently focused on the EMEA region for Cyberbit, and is responsible for Business development and sales within the territory. Shllomi is a global, driven, and professional sales executive who builds long-lasting client relationships and understands how to develop, advance, deliver large scale project. Prior to joining the team at Cyberbit Shllomi was Sales Director for NICE Systems SPEAKER PROFILES
  • 10. Watchful Software provides advanced persistent security solutions that keep sensitive information safe from security breaches resulting from accidental or malicious disclosure. Watchful was formed to protect an organization’s most critical asset after its people – its information. The company addresses the growing need for protecting sensitive and proprietary information against accidental or malicious theft, leakage, or loss. Leveraging key technologies including advanced encryption algorithms, digital rights management, and eBiometrics, Watchful has developed a suite of solutions that ensure only authorized personnel have access to enterprise systems and information, protecting against potentially massive economic and competitive damage from cyberterrorists and information thieves. Named Technology Pioneer by The World Economic Forum 2015, Darktrace is one of the world’s leading cyber threat defence companies. Its Enterprise Immune System technology detects previously unidentified threats in real time, powered by machine learning and mathematics developed at the University of Cambridge, which analyse the behaviour of every device, user and network within an organisation. Some of the world’s largest corporations rely on Darktrace’s self-learning appliance in sectorsincludingenergyandutilities,financialservices,telecommunications,healthcare,manufacturing, retail and transportation. The company was founded in 2013 by leading machine learning specialists and government intelligence experts, and is headquartered in Cambridge, UK and San Francisco, including offices in Auckland, Boston, Chicago, Dallas, London, Los Angeles, Milan, Mumbai, New York, Paris, Seoul, Singapore, Sydney, Tokyo, Toronto and Washington D.C. ASSOCIATE SPONSOR
  • 11. We in CYBERBIT understand that in order to detect and respond fast and efficiently to advanced threats organizational security has to go through major changes. Detection and response cycles must become optimal and short, leveraging past knowledge and experience, automating processes and capabilities, and allowing the organization to be agile, alert and prompt. That’s what CYBERSHIELD portfolio is all about - securing IP SCADA networks against advanced and targeted threats. CYBERBIT, based on its vast experience and field-proven technologies, leveraging the knowledge of our experienced cyber experts and system engineers, is securing today some of the most critical enterprises and national level infrastructures, where we already Defeat the Unknow.Additionally, CYBERBIT’s Intelligence division is a world leader in providing interception and Intelligence products and solutions to Law Enforcement Agencies (LEA) all over the globe, bringing the cyber dimension intelligence potential to the maximum. CYBERBIT has won the prestigious Frost and Sullivan 2015 award for competitive strategy innovation and leadership in the global cyber intelligence and security markets (Read more) CYBERBIT was honored to be ranked at 45# in Cybersecurity Hot Cyber Security Companies - 500 List of Companies to Watch in 2015 http://cybersecurityventures.com/cybersecurity-500/ CYBERBIT has won the prestigious Frost and Sullivan 2015 award for competitive strategy innovation and leadership in the global cyber intelligence and security markets ASSOCIATE SPONSOR
  • 12. Arbor Networks helps secure the world‘s largest enterprise and service provider networks from DDoS attacksandadvancedthreats.Arboristheworld‘sleadingproviderofDDOSprotectionintheenterprise, carrier and mobile market segments, according to Infonetics Research. Arbor‘s advanced threat solutions deliver complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of malware and malicious insiders. Arbor also delivers market leading analytics for dynamic incident response, historical analysis, visualisation and forensics. Arbor strives to be a „force multiplier,“ making network and security teams the experts. Its goal is to provide a richer picture into networks and more security context – so customers can solve problems faster and reduce the risk to their business. To learn more about Arbor products and services, please visit its Web site atarbornetworks.com. Arbor‘s research, analysis and insight, together with data from the ATLAS global threat intelligence system, can be found at the ATLAS Threat Portal. Networks Unlimited is a value-added distributor, offering the best and latest solutions within the converged technology, data centre, networking, and security landscapes. The company distributes best-of-breed products, including Arbor Networks, Arista, Aruba Networks, CensorNet, Centrify, Fortinet, F5, ProLabs, Riverbed, RSA, SimpliVity andTintri.The product portfolio provides solutions from the edge to the data centre, and addresses key areas such as cloud networking and integration, WAN optimisation, application performance management, application delivery networking, WiFi-, mobile- and networking security, load balancing, data centre in-a-box, and storage for virtual machines. Since its formation in 1994, Networks Unlimited has continually adapted to today‘s progressively competitive and evolving marketplace, and has reaped the benefits by being a leading value-added distributor (VAD) within the sub-Saharan Africa market. ASSOCIATE SPONSOR
  • 13. Cisco (NASDAQ: CSCO) is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. Cisco has shaped the future of the Internet by creating unprecedented value and opportunity for our customers, employees, investors and ecosystem partners and has become the worldwide leader in networking - transforming how people connect, communicate and collaborate. STRATEGIC SECURITY SPONSOR Ubuntu Business Advisory and Consulting (Pty) Ltd together Bowline Security, provide integrated forensic investigation and trusted cyber security solutions to the private and public sector. Our team members are qualified professionals, rich in experience, committed to excellence, and specialize in designing, implementing and maintaining holistic integrated and sustainable programs. We offer a unique technology and services framework for clients to actively prevent, detect and respond to risks, through the implementation of risk management and mitigation measures by: • Defining threats and vulnerabilities • Assessing likelihoods and probabilities • Evaluating scope and magnitude • Considering controls and counter measures UBAC and BOWLINE contribute to servicing our client needs by using our industry knowledge and security-related expertise in: • Digital Forensics; • Security Architecture; • Identity and Access Management; • Cyber Security Operations Center; • Fraud Risk Management Services; • Training and Awareness programs; • Fraud and Corruption Investigations; • Application Code Assessment Services. • Enterprise Security Program Development; and • Security Governance, Risk and Compliance. ASSOCIATE SPONSOR
  • 14. Bitdefenderisaglobalsecuritytechnologycompanythatdeliverssolutionsinmorethan100countries. Since 2001, Bitdefender has consistently produced award-winning business and consumer security technology. Bitdefender is a leading innovator in protecting consumers with breakthrough integrated home cybersecurity products such as Bitdefender Box. Through RD, alliances and partnership teams, Bitdefender has elevated the highest standards of security excellence in both its number-one-ranked technology and its strategic alliances with the world’s leading technology providers. New ways of engaging customers and business operations demand a new approach to protecting critical systems and services. Transforming security to protect the opportunities of digital business is a strategic imperative. Blue Turtle enables this transformation by blending advanced technology and best practice so our customers can meet the challenge of cyber threats. We protect business against cyber attacks, malicious behavior and insider threat. By employing machine learning, big data, and real-time automation technologies we deliver‘end-to-end’security – whether Datacenter or Endpoint, Cloud, Industrial or IoT systems. Cyber-defense needs to be ‘always-on’ and our solutions some of the world’s most innovative security systems are active 24 x 7.Our technology partners are award winning, game changing market leaders such as Darktrace, Fireeye, Forcepoint, ObserveIT, Radware, SentinelOne and Splunk ! Our specialists work with you to understand, prioritize, and manage cyber security in the context of your business, delivering advanced security for tomorrow’s challenges – Today. NETWORKING SOLUTION PROVIDER
  • 15. Cyber Defense Magazine Cyber Defense Magazine is by ethical, honest, passionate information security professionals for IT Security professionals. Our mission is to share cutting edge knowledge, real world stories and awards on the best ideas, products and services in the information technology industry. Vigilance Vigilance is the undisputed leading voice of the global security industry. The depth of our reportage, the brilliance of our analysis of the global security issues and the global influence of our editorials are incomparable.The intellectual and marketing bent ofVigilance are the results of many years of research. Our writers and contributors are key players of the global security industry; no wonder Vigilance is not only the magazine for decision makers and those who are in charge of purchasing budgets in their various organizations across the globe, but the world’s leading security magazine. Because our focus is international, our news has the farthest reach, so also is every advert placed on Vigilance. Vigilance therefore, is your definitive guide to the global security market. MEDIA PARTNERS
  • 16. #ACSS16 Get it on Download on the App Store