Johannesburg Chapter – September 2017

Use Case Partners

Chapter Overview

Date: Friday 22nd of September 2017

Time: 8.00 am – 5.00 pm

Venue: Fire & Ice!, Melros Arch

Location: Gauteng, South Africa

Overall Theme: Delving into Security, Where are the Lessons?

Areas of focus:

Benchmarking Strategy for Learning:

  • People
  • Process
  • Technology

This Alliance Chapter will focus on building a decision making and decision influencing community focused on impacting the ICT and Cyber Security division of enterprises and upper mid-market organisations from the Gauteng province in South Africa.

  • 800


  • 845

    Welcome Remarks & House Keeping

    Session Title: The CISO Alliances and their purpose

    Session Leader: Leigh Thomas – Founder & Director – Alliance Media Group

  • 905

    Session 1 - Opening Keynote

    Session Leaders: 

    Abdul Baba – Group IT Director – TBWA

    Session Title: Cybersecurity vs. Network Security vs. Information Security


    We are in a time where businesses are more digitally advanced than ever, and as technology improves, organizations’ security postures must be enhanced as well. Failure to do so could result in a costly data breach, as we’ve seen happen with many businesses. However; before you can start developing a security program for your organization, it’s critical that you understand the different types of security and how they all work together.

    • What is Information Security?
    • What is Cybersecurity?
    • What is Network Security?

    Key Takeaways:

    • Determine how to align security strategies with your business objectives and goals – Governance.
    • Define the roles, responsibilities and accountabilities of each person to ensure that you are meeting compliance.
    • The importance to provide your employees with the necessary training and technology to strengthen your organization’s human firewall and mitigate the possibility of a cyberattack.
    • The role of network security to protect the organization’s IT infrastructure from all types of cyber threats
  • 950

    Session 2 - Open Forum

    Session Leader: 

    Manoj Puri – Head of Engineering Services – Barclays Africa Group Limited

    Session Title: Staying Stable within the Enterprise


    1. Role of Production Stability in the new world of security threats
    2. Change Management and Security Change Management (URGENCY vs planned)
    3. Resilience and its thought process with the new normal of secrutiy.
  • 1050

    Networking Break

  • 1100

    Session 3 - IBM South Africa

    Session Leader:

    Sheldon Hand – BU Leader, Security – IBM South Africa

    Clement Monakhisi – Senior Security Consultant – IBM South Africa

    Session Title:

  • 1200

    Networking Lunch

  • 1240

    Session 4 - Darktrace Limited

    Session Leader:

    Francis Masuabi, Cyber Technology Specialist, Darktrace Limited

    Eleanor Weaver, Commercial Director MEA, Darktrace Limited

    Session Title: A New Era of Cyber Threats: Real World Threat Scenarios


    Francis will take a content rich approach to presenting, offering in depth case study information and real life scenarios. It will open the floor to discussion on the current cyber threat landscape, and the means with which attacks can be prevented or slowed.

    In particular, it will reveal how the Enterprise Immune System, the world’s most advanced machine learning technology, has enabled a fundamental shift in the way organizations defend themselves, amid a new era of sophisticated and pervasive cyber-threats.

    Key Takeaways:

    • How new machine learning and mathematics are automating advanced cyber defense
    • Why 100% network visibility allows you to detect threats as they happen, or before they happen
    • How smart prioritization and visualization of threats allows for better resource allocation and lower risk
    • Real-world examples of unknown threats detected by ‘immune system’ technology
  • 1345

    Session 5 - Open Forum

    Session Leader: 

    Kenneth Kayser – Vice President for Open Innovation – Barclays Africa Group Limited

    Session Title: Innovation – The next wave of advancements, the secure way


    Whilst the Information Security Executive is fortunate to have to secure the existing processes, what about the next wave of Innovative solutions?

    The unknown which surrounds the technology led business focuses, will not only harbor risk for the business but the InfoSec executive, they will have the role of ensuring this implimentation is a secure one to avoid as many costly mistakes as possible.

    1. The role of the InfoSec Executive in IoT
    2. The role of the InfoSec Executive in AI
    3. The role of the InfoSec Executive in Blockchain
  • 1445

    Networking Break

  • 1500

    Session 6 - Symantec

    Session Leader: 

    Jon Hamlet – Senior Country Manager, South Africa – Symantec

    Gareth Hawkins – Pre-Sales Manager – Symantec

    Session Title: 

    The Inevitable Cyber Attack: From Observation to Remedial Action and minimizing “Dwell Time” In-between


    As cyber threats and attacks against organizations continually demonstrate increased sophistication and complexity so the importance of gaining true visibility and control across all key control points proportionately increases. Once an organization has been breached the most important tool in the Security Operation Center workbench becomes their incident response capability and the maturity thereof will determine the mean time to remediation.

    Key Takeaways:

    – What a typical SOC Service Catalog consists of
    – The importance of true end to end visibility of key control points from Endpoint to Cloud
    – How technology can be used to minimize “dwell time” during incident response efforts

  • 1600

    Session 7 - Open Forum & Lessons Learnt

    Session Leader: 

    Master of Ceremonies – Abdul Baba – Group IT Director – TBWA

    Session Title: 

    To move forward, we must conclude on the learnings of the day.