Cape Town Chapter – March 2019

Use Case Partners

Date: Wednesday, 6th of March 2019

Time: 8.00 am – 5.00 pm

Venue: Taj Cape Town

Location: Cape Town, South Africa

Overall Theme: Delving into Security, Where are the Lessons?

Areas of focus:

Benchmarking Strategy for Learning:

  • People
  • Process
  • Technology

This Alliance Chapter will focus on building a decision making and decision influencing community focused on impacting the ICT and Cyber Security division of enterprises and upper mid-market organisations from the Western Cape in South Africa.

  • 800


  • 830

    Welcome Remarks & House Keeping

  • 845

    Session 1 - Open Forum

    Session Leader: 

    Leigh Thomas – Director – CISO Alliances

    Session Title: 

    • Update on POPIA.
    • What is being done to protect our national assets from being hacked?  Does the government have concrete plans in place to address this?  Failing infrastructure and poor maintenance seems to indicate otherwise.  Does anyone have insights into this?
    • Security spend and investment: investment vs risk- how much is enough; how do we measure ROI?
    • The CISO role-is it a business role or IT role? Who should the CISO report to?
    • What part of security strategy is unsourced vs outsourced?  How is the security landscape changing?  How does cloud impact this?
    • A dynamic security strategy:  how is it evolving and changing.  How dynamic should it be?  Who are the core Stakeholders?
  • 1030

    Networking Break

  • 1055

    Session 2 - Thought Leadership

    Session Leaders: 

    Abdul Baba – Group IT Director – TBWA

    Session Title: Cybersecurity vs. Network Security vs. Information Security


    We are in a time where businesses are more digitally advanced than ever, and as technology improves, organizations’ security postures must be enhanced as well. Failure to do so could result in a costly data breach, as we’ve seen happen with many businesses. However; before you can start developing a security program for your organization, it’s critical that you understand the different types of security and how they all work together.

    • What is Information Security?
    • What is Cybersecurity?
    • What is Network Security?

    Key Takeaways:

    • Determine how to align security strategies with your business objectives and goals – Governance.
    • Define the roles, responsibilities and accountabilities of each person to ensure that you are meeting compliance.
    • The importance to provide your employees with the necessary training and technology to strengthen your organization’s human firewall and mitigate the possibility of a cyberattack.
    • The role of network security to protect the organization’s IT infrastructure from all types of cyber threats
  • 1140

    Session 3 - Open Forum

    Session Leader: 

    Leigh Thomas – Director – CISO Alliances

    Session Title:

    • Can we mentor and increase the pool of security analysts and ISOs? Find good security staff and more importantly hang onto them.
    • Resourcing, developing and retaining talent. What does the talent pool look like locally? Linking in with the outsource/Insource topic?
    • Governance, and Risk-based security strategies, knowing your Business and what is most important to their success?  There so many overlapping points in data and security strategies.
    • IT governance and risk management; the adoption of this discipline and how companies are approaching it? Do CISOs assume this responsibility or is there another entity that does?
    • Insource/outsource topic. How are companies dealing with establishing universal ICT protocols when mergers and acquisitions happen?
    • Africa operations; are there reliable/skilled ICT partners?
    • Digital Risk Officer. Can we define a job role?
  • 1225

    Networking Lunch

  • 1330

    Session 4 - Conclusion

    Session Leader:

    Leigh Thomas – Director – CISO Alliances

    Session Title: 

    Conclusion from the day, collate, revert, action

  • 1500

    Closing Remarks & Networking