Johannesburg Chapter – September 2018

Use Case Partners

Chapter Overview

Date: Thursday, 13th of September 2018

Time: 8.00 am – 3.30 pm

Venue: The Westcliff

Location: Gauteng, South Africa

Overall Theme: Delving into Security, Where are the Lessons?

Areas of focus:

Benchmarking Strategy for Learning:

  • People
  • Process
  • Technology

This Alliance Chapter will focus on building a decision making and decision influencing community focused on impacting the ICT and Cyber Security division of enterprises and upper mid-market organisations from the Gauteng province in South Africa.

  • 800

    Registration

  • 830

    Welcome Remarks & House Keeping

     Session Leader: Jayson O’Reilly – Managing Director – @Vance Cyber Security

    Description:

    Housekeeping, purpose driver and format reminder

  • 845

    Session 1 - Open Forum

    Session Leader: Jacques Théron – Financial Sector Cybersecurity Liaison Cyber and Information Security Unit – South African Reserve Bank (SARB)

    Session Title: Increasing Collaboration between the Info/ Cyber Security Community

    Description:

    Cyberattacks have increased in frequency and sophistication, presenting significant challenges, not only to the financial industry, but also to all network enabled and connected organisations that must defend and protect their data and information against ever improving and capable threat actors. The primary purpose of threat intelligence is helping organisations understand the risks of the most common and severe external threats, such as zero-day threats, advance persistent threats (APT) and exploits. Therefore, the increasing use of sophisticated malware is making it difficult for organisations to identify the true intent behind the attack campaign, which in turn makes defending against and preventing those attacks a challenge. Thus, an organisation’s thereat intelligence sharing and collaboration goals and objectives should advance its overall cybersecurity strategy and help an organisation more effectively manage cyber-related risk prevention and mitigation.

    Key Takeaways:

    By collaboration and threat intelligence sharing organisations can leverage the collective knowledge, experience, and capabilities of the sharing community to gain a more complete understanding of the threats. Collaboration and threat intelligence sharing will:

    1. Improved situational awareness
    2. Improved security posture
    3. Lead to greater defensive agility
    4. Improved cyber threat knowledge
  • 930

    Session 2 - Open Forum

    Session Leader:

    Matt Deyette – Chief Customer Officer – Gemini Data Inc.

    Soufyen Ben Harzallah – Regional Sales Manager – Emerging Markets – Gemini Data Inc.

    Session Title:

    Effectively Leveraging Machine Data across Security, ITOps and Business Analytics

  • 1015

    Networking Break

  • 1030

    Session 3 - Open Forum

    Session Leader: Oscar Stark, Divisional Director – Liberty Holdings

    Session Title: Innovation and information security – making your security staff organisational innovators

    Description:

    Globally all organisations face similar challenges – fast pace of change, growing levels of complexity in doing business and having the relevant skills. These realities impacting the information security capabilities of organisations, often not appreciated by the organisation. The way that many organisations are going about dealing with these global realities are to train their people in innovation skills. This equip people to solve problems in this dynamic environment, thus increasing the ability to navigate this landscape successfully.  This approach is however not applied to the skilling of most information security teams, raising the question as to why not?  Are we missing a trick in dealing with the global skills demand for information security?

    Key Takeaways:

    • Appreciate some the global realities impacting organisations
    • Understand what innovation represent and what are the skills associated with it
    • Appreciate an example of where innovation techniques have been applied in the information security environment
  • 1115

    Session 4 - Open Forum

    Session Leader: Jon Hamlet – Senior Country Manager – Symantec

  • 1200

    Networking Lunch

  • 1300

    Session 5 - Open Forum

    Session Leader:

    Leigh Thomas – Director & Founder – CISO Alliances

    Russell Nel – Head of Information Governance – Stanlib

    Session Title: Breach Reporting – What factors do you consider?

    Description:

    Unfortunately, breach reporting strategies and processes are commonly being developed due the threat levels we are experiencing.

    Within this session and as a collective we will develop a roadmap of factors to consider as well as communication styles for each of these factors;

    1. Vendors/ Third Party Companies

    2. Consumer/ Customer

    3. Regulators

    4. Internal (ExCo/ Board/ Workforce)

    5. Response Team

  • 1500

    Closing Remarks, Lessons Learnt & Next Steps

    Session Leader: Leigh Thomas – Founder and Director – CISO Alliances