Johannesburg Chapter – March 2018

Use Case Partners

Chapter Overview

Date: Thursday, 15th of March 2018

Time: 8.00 am – 3.30 pm

Venue: Montecasino, Fourways

Location: Gauteng, South Africa

Overall Theme: Delving into Security, Where are the Lessons?

Areas of focus:

Benchmarking Strategy for Learning:

  • People
  • Process
  • Technology

This Alliance Chapter will focus on building a decision making and decision influencing community focused on impacting the ICT and Cyber Security division of enterprises and upper mid-market organisations from the Gauteng province in South Africa.

  • 800

    Registration

  • 830

    Welcome Remarks & House Keeping

    Session Leader: Jon Hamlet –  18 Years Experience Security Professional & Senior Country Manager South Africa – Symantec

  • 845

    Session 1 - Open Forum

    Session Leader: Russell Nel – Head of Information Governance – Stanlib

    Session Title: PoPI – Strategizing for a Compliant Future

    Description:

    • What are the best practices in the preparation of the roadmap for compliance? (Progress Made, next steps)
    • Resourcing effectively for streamlining compliant processes (reporting lines, draft duties, role of the GDPR Privacy Officer)
    • Mapping PoPI to GDPR
  • 930

    Session 2 - Open Forum

    Session Leader: 

    Darron Gibbard CISM, CISSP – Managing Director Northern Europe & CTSO – Qualys

    Session Title: How Intelligent is your Threat Intelligence?

    Description:

    Join our interactive session to share and discuss methods and best practices to improve security analytics and intelligence

  • 1015

    Networking Break

  • 1035

    Session 3

    Session Leader: 

    Julian Ramiah – Group CISO – Liberty Holdings Limited

    Session Title: Are you the Weakest Link?

    Description:

    A common misconception about Cyber Criminals is that they only use complex techniques and technical tools to hack networks or humans. This is not true.  Cyber Criminals have realised that the easiest way to steal data or compromise security defences is by tricking or social engineering people.

    Humans are considered the weakest link in the cyber security chain because of unintentional slip-ups that may lead to an incident. Cyber Criminals entice users using phishing attacks to lure their victims into disclosing personal information.

    Information Security is all about preserving C.I.A (Confidentiality, Integrity and Availability).

    Protecting your personal and corporate information assets can only be as strong as its weakest link. While technology controls will safeguard and ensure a level of resilience against cyber-attacks, the silver bullet remains your most prized assets….your people. However Cyber Criminals persist to target the human end points instead of focusing their time and resources to create advanced and expensive cyber-attacks.

    Do not be the weakest link!

  • 1125

    Session 4 - Open Forum

    Session Leader: Lushen Padayachi – Associate Partner: Security Services – IBM

    Session Title: Hacked – A South African Security Perspective

    Description:
    With the ever evolving technology landscape, it is now more challenging to manage cyber threats and data breaches. This session will provide a perspective of security threats in South Africa and insight on how to manage the chaos.
  • 1210

    Networking Lunch

  • 1300

    Session 5

    Session Leader:

    Mixo Ngoveni – Founder – Geekulcha

    Tiyani Nghonyama – COO – Geekulcha

    Session Title: Security Skills Shortage: Upskill and Empower

    Description:

    Going through a Design Thinking process. Like minded individuals into a room and following a process to help better understand the problem before reaching an ideal solution.

    The role players involved can come from multiple disciplines and, not only from a security background.

    Key Takeaways:

    A Solution to Help SA with our current skills and job shortage.

  • 1345

    Session 6

    Session Leader: Ashraf Abdelaazim – MEA Region Leader: Resilient Incident Response – IBM

    Session Title: The Role of Orchestration in Incident Response and Security Operations

  • 1430

    Networking Break

  • 1445

    Session 7

    Session Leader: Jon Hamlet – 18 Years Experience Security Professional & Senior Country Manager South Africa – Symantec

    Session Title: What are the emerging threats and how do we address them?

    Description:

    In general Cyber Threat Actors have one objective and that’s to generate revenue through malicious and fraudulent activities. Ransomware has been on the rise and cryptocurrencies have introduced additional revenue streams that Threat Actors can explore and exploit… the question is, “How do we protect ourselves”?

  • 1530

    Closing Remarks & the Next Steps