Alliance - A union formed for mutual benefit

CISO Digital Alliances Session Information

Date: Thursday, 15th December 2022

Time: 15:00pm – 16:30pm (MST)

Location:  Invite only by Regional Director – Microsoft Teams

The Alliances chapter is a gathering consists of business risk, information and cyber security leaders who have been highlighted as being able to offer value in terms of content and influence. It is designed to form alliances and to drive progressive change in the business world and beyond.

The content and format is designed to talk together, learn better and experience more. 

Format: Invite only Security Leaders debating pertinent, real life issues through the form of digital open forum.

Chatham House Rule will be applied

Outcomes:

  1. Depth achieved around business objectives where the opportunity of experience within the attendees is leveraged
  2. Benchmarking and verification of thought processes outside of existing networks i.e. the broader CISO Alliances community
  3. Industry progression and unity in impacting the challenges of the common business objectives
  4. Not corporate flag waiving or sales pitches.  We insist, do that elsewhere.

Theme:

Security, protection and governance of virtual financial instruments/digital assets including crypto currency

0Weeks0Days0Hours0Minutes0Seconds

Digital Alliances Chapter Overview

1500

Session Leader: Roshan Gunoo, Senior Technical Architect – Mauritius Network Services

Session Theme Title: Security, protection and governance of virtual financial  instruments/digital assets including crypto currency

Session Overview and Synopsis:

Since 2018 the FSC( Financial Service Commission ) have officially issue a notice acknowledging digital asset , follow an act in 2021. In 2022, the implementation of forensic tool has been initiated to abide to the Minister of financial service and good governance claiming “Mauritius is pursuing its goals of becoming a regional FinTech hub for Africa”

Session Outcomes and Takeaways: 

Managing Moving/migrating from legacy systems  to cloud and impact on information security

Securing data in memory/token based and time based

Managing and securing data in motion

Delayed access/zero trust approaches

Use of concurrence and sandboxes

How do we ensure we have visibility of the data throughout it’s life cycle and then manage risk  and implement appropriate  controls