16
Africa Cyber Security Summit 9 th - 10 th March, 2016 Birchwood Hotel & OR Tambo Conference Centre, Johannesburg, South Africa Organised by Visit Our Website: www.fleming.events

DBAD16_Magazine_LR

Embed Size (px)

Citation preview

AfricaCyber Security

Summit9th - 10th March, 2016

Birchwood Hotel & OR Tambo Conference Centre, Johannesburg, South Africa

Organised by

Visit Our Website: www.fleming.events

Dear Participant,

On behalf of Fleming. we would like to welcome you to “ Africa Cyber Security Summit”.

We have carefully selected leading industry experts to speak at this event, giving you the opportunity to hear first-hand experiences from industry leaders and share solutions for overcoming the latest challenges in the field.

Through presentations & interactive panel discussions, we are bringing together industry experts and thought leaders to address and discuss the rapidly changing business environment in the fieald of Cyber Security in Africa

We hope that your participation at this Fleming. summit is just the beginning of our business relationship and that we will have the opportunity to make a continuing contribution to your company’s profitability and success.

If you would like to offer any comments related to the content or format of the program, or would like to contribute to a future platform we would be very pleased to hear from you. To that end, we ask that you kindly fill up and return the Conference Evaluation Form.

Thank you for attending and hope to see you again.

Best regards,

Joseph Vipin Rajan Conference Producer Fleming.

Alphy NanganiConference Coordinator Fleming.

Africa Cyber Security Summit9th - 10th March, 2016 | Birchwood Hotel & OR Tambo Conference Centre, Johannesburg, South Africa

Administrative details for your perusal:-

1. If there are any changes to the conference program, you will find the updated version in your documentation folder or it will reflect on the board next to the registration desk.

2. The conference will take place on the 9th and 10th of March 2016 in Marco Polo

3. Exhibition & Coffee Breaks will be held in Heathrow. If you have any special dietary requirements, kindly inform our Registration Desk during the first coffee break. Lunch will be served at Restaurant - Clovers Green.

4. Name tags have been provided to help attendees identify fellow delegates. That apart, the name tags will also assist the conference production team to easily identify attendees when delivering messages.

5. Kindly adhere to specified break durations considering the program schedule of the day. The Chairperson shall try his/her best to begin all sessions on the scheduled time.

6. Kindly wait until the end of each presentation for the Question & Answer (Q&A) session, the Chairperson shall give an opportunity to raise the questions. Also please introduce yourself and the organization you represent prior to raising a query.

7. Kindly keep your cell phones on silent mode or switched off when the sessions are in progress.

8. Kindly do not forget to fill in the Conference Evaluation Form and return the same to the Conference Coordinator Alphy Nangani at the Registration Desk. Your valuable feedback will be of great help to evaluate and enhance our upcoming events.

If you have any queries before, after or during the conference, the Fleming. Team would be more than happy to assist you with whatever concerns you might have. Your valuable feedback will be of great help to evaluate and enhance our upcoming events.

Fleming. recognizes the intellectual property rights of speakers over the transcribed material. No reproduction of any part may take place without the written permission of relevant speaker. The presentations are not for sale and have no commercial value.

Africa Cyber Security Summit9th - 10th March, 2016 | Birchwood Hotel & OR Tambo Conference Centre, Johannesburg, South Africa

Event Chair:

Dave Dodge, Chairman South African Institute of Security, South Africa

Dave Dodge is a Senior Partner with the Temi Group. He comes from a policing background, having been

a police officer with the Metropolitan Police, London (Scotland Yard) for over 30 years. During this career,

he served in operational and support roles in uniformed, investigative and intelligence fields, which saw

him awarded a number of commendations.  He retired as a senior detective in the Department of Strategy,

Modernisation and Performance. His relocation to South Africa saw a move into the security risk management

in the role of consultant and Chief Advisor to Group Security at Eskom, and recent board certification as a

Certified Protection Professional (CPP).Dave has also made significant contributions to the development of

security training in South Africa as a member of a Safety and Security Sector Education and Training Authority

(SASSETA) Task Team and a South African Qualifications Authority (SAQA) Reference Group. He is an active

member of various national and international security organisations, including the US Overseas Security

Advisory Council (OSAC) and the World Institute of Nuclear Security (WINS) in addition to being the Vice-

Chairman of the Board of Governors of the South African Institute of Security (SAIS) and Assistant Regional

Vice-President for ASIS International (ASIS) in Southern and Eastern Africa.

Africa Cyber Security Summit9 - 10 March, 2016 | Birchwood Hotel & OR Tambo Conference Centre, Johannesburg, South Africa

Associate Sponsor

Media Partners

Strategic Security Sponsor Networking Solution Provider

Supported ByEndorsed By

Africa Cyber Security Summit9 - 10 March, 2016 | Birchwood Hotel & OR Tambo Conference Centre, Johannesburg, South Africa

9th March, 2016 DAY 1

8:00 Registration and Coffee

8:50 Welcome by Fleming.

8:55 Opening Remarks from the Chairperson Dave Dodge, South African Institute of Security, South Africa Chairman

9:00 Cybercrime: A reality in South Africa

Brigadier NT Pieterse, South African Police Service Section Head: Electronic Crime Unit, South Africa

9:30 Understanding the touch-points between privacy & cyber security:

• Gettingtogripswithwhereprivacy&cybersecuritycometogether

• Understandingwhatthesetouchpointsmeanfromaregulatoryand corporate perspective

Ritasha Jethva, Nedbank Limited Information Privacy Officer

10:00 The Rising Cases of Cyber Crime: “A challenge for LEAs and Industry”

• Thepaperwillamongstotherthingsidentifiedsomeofthe current trends of cyber threats affecting businesses, government and individuals.

• Itwillalsolookatevolutionofcybercrimesresultingintoonlinecyber criminal markets putting sophisticated attack tools into the hands of more low-level attackers with case studies.

• ThepaperwillalsolookathowoverdependentofGovernment,Agencies and Ministries and Business in technology without the requisite security controls give birth to the rising wave of cybercrime.

Abdulkarim Chukkol, Economic and Financial Crimes Commission, Head, Advance Fee Fraud and Cybercrimes Section, Nigeria

10:30 Coffee Break & Networking

11:00 Lack of Technical Know-how in terms of Cyber Security

• Inabilitytomonitoranddefendnationalnetworks• MakingAfricancountriesvulnerabletocyberespionage• Africancountriesvulnerableincidencesofcyber

terrorismJames Saaka, National Information Technology Authority-Uganda (NITA-U), Executive Director, Uganda

11:30 Security for the Digital Economy

• Thecurrentsecuritylandscape• Cisco’sVisionforSecurity:Before,DuringandAfteranattackNiall Moynihan, Cisco, Security Specialist

12:00 Inside the Threats to Cyber Security, their consequences, vulnerabilities and, mitigation measures

• Therisksassociatedwithinsiderthreats• Individualmotivations,behaviorsandindicators• Organisationalfactorsleadingtoinsideracts• MitigationmeasurestoreducetherisksDave Dodge, South African Institute of Security, South Africa Chairman

12:30 Networking Lunch

13:30 Making The African Internet Ecosystem More Secure and Resilient.

• Introduction• AfricaThreatLandscape• TheneedforRegionalCooperationJacques Houngbo, AfricaCERT, Instructor, ICT Specialist

13:45 MASTERCLASS : Cyber Maturity Assessment approach to:

• Createopportunitytoreflectoncurrentsituation• Giveinsightinpotentialcybersecurityissuesandopportunities

or rooms for improvement• RaiseawarenessandcallforactionNgeje Nganate, AfricaCERT, Southern Africa Representative

14:10 What is the need for Cyber Insurance

• Individualawarenesstowards“CyberInsurance”• Responsibilityfacedbyacompanyintermsofahackingactivity

or any other threatThokozani Miya, Vodacom, Head, Principal Specialist - Security

14:45 Networking Tea/Coffee Break

15:15 The Enterprise Immune System: Using Machine Learning to Detect ‘Unknown Unknown’ Threats

• Learnwhy‘immunesystem’technologiesrepresentafundamental innovation for cyber defence

• Discoverhowtoapplymachinelearningandmathematicstodetect advanced, internal threats

• Understandhowtogain100%networkvisibilitytoinvestigateemerging anomalies in real time

• Hearreal-worldEnterpriseImmuneSystemcasestudiesNick Trim, Darktrace, UK, Managing Director EMEA

15:45 TRIO ROUNDTABLE

Delegates will be split into three teams to have independent discussions on their respective tracks, brainstorm and arrive at conclusions. Format to be followed: • 5minutesforintroduction`• 30minutesfortopicdiscussion• 10minutesfortheroundtableleaderofeachgrouptoshare

the conclusionsROUNDTABLE 1: Lack of Technical Know-how in terms of Cyber SecurityModerator: Abdulkarim Chukkol, Economic and Financial Crimes Commission, Head, Advance Fee Fraud and Cybercrimes Section, NigeriaROUNDTABLE 2: IT Security Budget - Well Spent or Never Spent?Moderator: Sean Maritz, Eskom, Chief Information Officer, South AfricaROUNDTABLE 3: Is Your Organization Cyber Insured?Moderator: Thokozani Miya, Vodacom, Head, Principal Specialist - Security

16:30 Detection of APT Attacks

• Cybertrainer• CyberShieldAnalysis&Detection(AnD)forSCADANetworks• CyberShieldAnalysis&Detection(AnD)forIPNetworks• CyberShieldMitigation&Response(MnR)• CyberShieldforMobileShllomi Ezra, Cyberbit, Isreal, Sales Director EMEA

16:45 Closing Remarks and from the Event Chairperson Summarizing the Day‘s takeaways Dave Dodge, South African Institute of Security, South Africa Chairman

Africa Cyber Security Summit9 - 10 March, 2016 | Birchwood Hotel & OR Tambo Conference Centre, Johannesburg, South Africa

8:00 Registration and Coffee

8:50 Welcome by Fleming.

8:55 Opening Remarks from the Chairperson Dave Dodge, South African Institute of Security, South Africa Chairman

9:00 IT Security Budget - Well Spent or Never Spent?

• ITSecurityHead‘skeyroleingainingandspendingsecuritybudget

• Effectiveutilisationofthecyberbudget

• Returnonsecurityinvestment(ROSI)

Sean Maritz, CIO, Group Information Technology, Eskom SOC Limited

9:30 The South African Cybersecurity Environment:

• Wherearewe?

• Proposedactionstoreducethetreat.

Joey Jansen Van Vuuren, Council for Scientific & Industrial Research, Research Group Leader Cyber Defense, South Africa

10:00 Cyberspace challenges in South Africa:

• Empowerthemanonthestreet

• Ordinarysocietalmembersarethemostvulnerable

• Cultivatingasecuritymindsetatprimaryschools

• Governmentandprivatesector’scommitment

Manqoba Mngomezulu, Telkom,SeniorInfoSecuritySpecialist&Author, South Africa

10:30 Coffee Break & Networking

11:00 PANEL DISCUSSION - Cyber Crime 2.0

• Cybercrimecasesaredoublingeveryyear–Whatisthepotential problem?

• Despitetheresearchforoveradecade,cybercrimestilltopsthechart of a threat

Panelists:

Abdulkarim Chukkol, Economic and Financial Crimes Commission, Head, Advance Fee Fraud and Cybercrimes Section, Nigeria

Ahamad Shah, FirstRand Group, Head CISO Team, South Africa

Maletsema Phofu, Eskom, Chief Information Security Advisor, South Africa

Moderator :-

Dave Dodge, South African Institute of Security, South Africa Chairman

11:45 Developing an IT Security Infrastructure Landscape –Role of Data Protection

• Developinganindustry-widetechnologyinfrastructure

• AvoidingpitfallstoITOperations

Teki Akuetteh Falconer, Data Protection Commission Executive Director, Ghana

12:20 Developing cybersecurity skills for organisational resilience

• Workforcechallengesandtheevolutionofcyberskillrequirements

• Trainingprofessionalstodealwithdaytodaycyberthreats

• Enhancingcyberknowledgeintheorganisation

Maletsema Phofu, Eskom Chief Information Security Advisor, South Africa

13:00 Networking Lunch

14:00 BREAK OUT SESSION: Road map to an effective cyberspace

Delegates will be split into three teams to have independent discussions on their respective tracks, brainstorm and arrive at conclusions. Format to be followed:

• 5minutesforintroduction

• 30minutesfortopicdiscussion

•10minutesfortheroundtableleaderofeachgrouptosharetheconclusions

• Initiativestakenbythecontinenttoovercomecyberbankingthreats

Jacques Houngbo, AfricaCERT, Instructor, ICT Specialist

• Buildingatruly‚effective‘Security

Joey Jansen Van Vuuren, Council for Scientific & Industrial Research, Research Group Leader Cyber Defence, South Africa

• EnablingtheRiskteamthatwouldreducetheriskstoalargeextent

Ngeje Nganate, AfricaCERT, Southern Africa Representative

14:45 Focus session on wireless security

• Thetruthaboutwirelesssecurity

• Howsecureisyourdata

• Shortcutsforaachievingawatertightwirelesssecurity

Ahamad Shah, FirstRand Group, Head CISO Team, South Africa

15:15 Networking Tea/Coffee Break

15:45 Book a Prize - “Bring Back My Identity”

6Signedcopiesofthebook“BringBackMyIdentity”byManqobaMngomezulu would be handed out to delegates who can answer to the questions laid out by speakers at the summit. The question would be asked by the Chairperson and the Delegates are requested to answer to these using the Sli.do Application.

The top 3 answers would be reviewed and the best answer would beawardedthesignedcopyofthebook“BringBackMyIdentity”bythe author Manqoba Mngomezulu, himself

16:15 Closing Remarks from the Event Chairperson Dave Dodge, South African Institute of Security, South Africa Chairman

10th March, 2016 DAY 2

Africa Cyber Security Summit9 - 10 March, 2016 | Birchwood Hotel & OR Tambo Conference Centre, Johannesburg, South Africa

Abdulkarim Chukkol, Economic and Financial Crimes Commission (EFCC) Nigeria, Head, Advance Fee Fraud and Cybercrime SectionAbdulkarim Chukkol is a Deputy Chief Detective Superintendent who currently heads the Lagos Office of the Advance Fee Fraud and CybercrimeSectionofNigeria’sEconomic&FinancialCrimesCommission.He holds a Post Graduate Certificate in Criminal Justice Education. He

graduated from the University of Maiduguri (2000) and University of Virginia (2011). He also had professional training at the Nigeria Police Academy and FBI National Academy, Quantico VA, United States. He also holds post graduate diploma in Cybersecurity and Spectrum Management from the United States Telecommunication Training Institute, Washington DC, United States. Mr. Chukkol is a versatile fraud investigator who has been involved in several multinational operations and participated in several anti-cybercrime frauddisruptiveactivitiesattheCommissionincludingOperations‘Octopus’, Operations‘StopPayment’,Operations‘Cyberstorm1’ andOperations‘Apollo’ leading to arrest andsuccessful prosecution of fraudsters/ cybercriminals. He represents the Commission at the International Mass-Marketing Coordinating Group, which consists of law enforcement, regulatory, and consumer protection agencies from seven countries, including Australia, Belgium, Canada, the Netherlands, the United Kingdom and the United States. He has supervised the prosecution of 212 Advance Fee Fraud and Cybercrime related cases at various High Courts all over Nigeria between June 2012- December 2014. 69 of the cases were successfully convicted, including the extradition of 2 fugitives to the United States. He is a certified fraud examiner and an active member of the International Association of Computer Investigative Specialist. Mr. Chukkol is also member and Nigeria contact person of the G8 24/7 High Tech Crime Network and has contributed immensely in the fight against Transnational Crimes in Nigeria and abroad. He is married with three children.

Jacques Houngbo, AfricaCERT, Instructor, ICT SpecialistICT Specialist and Information Security expert, Jacques Houngbo has extensive experience assessing IT systems and processes, IT Strategy Development& ProgrammeManagement.Heuses towork for diverseclients: government, private companies and international organizations. He is more and more engaged in the field of cybersecurity. As such, Jacques Houngbo is member of AfricaCERT where he is in charge of

Development Program and also serves as Instructor. Jacques Houngbo is CEH (Certified Ethical Hacker) and ECSA (EC Council Certified Security Analyst).

Ngeje Nganate, AfricaCERT, Southern Africa RepresentativeMr. Ngeje Nganate is the current AfricaCERT Representative for Southern Africa .He is currently based in Gaborone, Botswana. As an AfricaCERT representativefortheSouthernAfricaregion,Mr.NgejeNganate’sworkincludes raising cyber security awareness, conducting workshops and seminars, conducting security audits and assessments and organizing cyber security training for the Southern Africa region. Prior to joining

AfricaCERT, Mr Ngeje Nganate worked as an Information Security Analyst from 2011 to 2013 at the International Multilateral Partnership Against Cyber Threats (IMPACT). IMPACT is an International cyber security organization headquartered in Cyberjaya, Malaysia. At IMPACT, Ngeje Nganate was involved in the establishment of Computer Emergency Response Teams in the African continent. He was involved as a project manager for the establishment of the Computer Incident Response Teams (CIRT) in the Republics of Zambia (cirt.zm) and Burkina Faso (cirt.bf ) .He was also part of the team that conducted CIRT readiness assessments for Ghana, Ivory Coast, Burundi, Tanzania and Kenya and Niger. Mr. Ngeje Nganate is a candidate for a Master of Science (Computer Science) at the Botswana International University of Science and Technology (BIUST).He graduated with a Bachelor of Information Technology (HONS) degree from Multimedia University (MMU) in Cyberjaya, Malaysia. He is an EC-Council Certified Ethical Hacker (C|EH), a Cisco Certified Network Associate (CCNA) and an IBM Certified Academic Associate in IBM DB2 database. Mr. Ngeje Nganate is also a recipient of various certificates of training in the field of cyber security includingCERTimplementationandestablishment.“AMoreSecureAfricanCyberSpace”isoneofMr.NgejeNganate’sgoalsandhebelievesenoughcybersecurityawarenessandcapacity building are key to the realization of that goal.

Brigadier NT Pieterse, South African Police Service Section Head: Electronic Crime Unit, South AfricaBrigadier Pieterse joined the South African Police Service on 1 December 1979 and have been assigned to the Division: Detective Service from 1983, where he performed his duties within a number of specialised environments, inclusive of the Stock Theft- ; Murder and Robbery- and Crime Intelligence Units. During 1987 he received his Commission rank,

and has since served in a number of managerial positions within the South African Police Service. During 1992 to 2001 Brig Pieterse furthered his career within the Commercial Crime establishment, having being assigned to a number of commander positions, also “seconded” to the Department of Justice’s Investigative Directorate: Serious EconomicOffences (IDSEO). For the period 2001 to 2009 he served as a member of the Directorate for Special Operations (DSO Scorpions), where he held the position of Chief Investigating Officer (CIO). From 2009 to date Brig Pieterse again became part of Commercial Crime within the South African Police Service, where he is currently performing his duties as the National Section Head: Electronic Crime Unit. Brig Pieterse has extensive exposure to the investigation of cybercrime, specifically in as far as it relates to the broader financial/banking platform.

Thokozani Miya, Vodacom, Head, Principal Specialist -Security, South AfricaThokozaniMiyaisaPrincipalSpecialist–CloudSecurityServicesatoneof the biggest telecommunication company, Vodacom Business. He has been in the information security sector for over 16 years and over 19 years in Information Technology. He started out as an IT Specialist and moved into Information Security 3 years later. He has worked in different sectors

and industries holding different roles that includes; Information Technology Specialist, Information Security Specialist and Information Security Architect. Thokozani holds various Information Technology, Information Security and business leadership certifications which he accrued in his career journey. His entrepreneurial passion and attitude has helped him to acquire business acumen skills through freelancing and contracting in the field of Information Security. This has given him an edge to grow to more senior business roles driving strategy for Information Security for customers and business alike. Thokozani belongs to the Johannesburg Toastmaster Club. He likes to read business books and security articles. He loves Mountain Biking and is working towards completing his PPL (Private Pilot License).

James Saaka (MSc. Comp. Sc), Executive Director, National Information Technology Authority-Uganda (NITA-U)In August 2010, James Saaka joined the National Information Technology Authority-Uganda (NITA-U) as Executive Director. His responsibility is to ensure that NITA-U achieves its mandate: to coordinate, promote and monitor IT development within the context of national, social and economic development of Uganda. Mr Saaka joined NITA-U from Shell

InternationalB.V.,wherehespent12years– fromJuly1998until July2010.James’s lastassignment in Shell from 2008 to 2010, was Business Services Manager for Strategy &Compliance for the Shell Group, under the Group CIO office based in The Hague, in the Netherlands. He started his career in Bank of Uganda as a Systems Analyst from 1993 to 1995. James Saaka graduated from the University of Vladimir Polytechnic Institute, The Soviet Union, with Bachelors in Computer Science in 1988. He obtained a Masters in Computer Science from the same University in 1991. Mr. James Saaka has attended numerous international trainings, conferences and workshops and has given many presentations and key note addresses.

Teki Akuetteh Falconer, Data Protection Commission Executive Director, GhanaTeki has worked consistently on research and policy issues affecting information technology and telecommunications law in Ghana.  She also worked on several legal due diligence and transaction advisory services in the ICT sector. Her prior work experience included managing a law firm and practicing law. Between  2008  and 2014, Teki worked as an ICT

Legal Expert in the Ministry of Communications under the eGhana Project. Her dedication and commitment led to the development and passage of eleven (11) key legislations for the ICT sector in Ghana between 2008 and 2012. These legislations include the National Communications Authority Act, 2008 (Act 769), the National Information Technology Agency Act, 2008 (Act 771), the Electronic Transactions Act, 2008 (Act 772), the Electronic Communications Act, 2008 ( Act 775), the Electronic Communications Regulations, 2011 (L.I. 1991), The Mobile Number Portability Regulations, 2011 (L.I. 1994),  Subscriber Identity Module Registration Regulations, 2011 (L.I.2006) and the Data Protection Act, 2012 (Act 843). She also taught informative seminars on E-banking at the National Banking College, ICT and Telecom Law at the Ghana Telecom University College and the Ghana School of Law. She was the Secretary to the Ministerial Advisory Board of the Ministry of Communications in 2009 and  has been a  Board Member of the Postal and Courier Services Regulatory Commission from 2010 to date. Teki holds an LLM in Information Technology and Telecommunications Law from the University of Strathclyde, Glasgow – Scotland(2005); Qualifying Certificate in Law from the Ghana School of Law (2003) and a Bachelor of Arts Degree in Law and Political Science from the University of Ghana (2001). Teki loves to cook and bake, entertain guests , travel, exercise and dance.

Maletsema Phofu, Eskom, Chief Information Security Advisor, South AfricaMaletsema has a software development background and has since moved on to acquire skills and experience in areas of information management, contracts management, business process development and improvement, strategy development and implementation, incident management, IT continuity management, delivery of projects, IT

governance, risk and compliance. She is currently working at Eskom Holdings as a Chief Advisor Information Security with primary responsibility of looking after the security operations of the endpoints, threat and vulnerability and the Security Operations Center (SOC). Maletsema has successfully delivered multi-million rand security projects in support of business objectives and received numerous organisational awards. She has always been passionate and in the forefront of the development of change management programmes directed towards up-skilling end users and cyber professionals (in IT and OT). Maletsema holds a BCom (hons) Informatics degree from University of Pretoria, industry related certifications and in the process of completing MCom Informatics. Outside of the profession, Maletsema is a social activist with interest in education and use of technology as tools to restore dignity and self-sufficiency.

SPEAKER PROFILES

Africa Cyber Security Summit9 - 10 March, 2016 | Birchwood Hotel & OR Tambo Conference Centre, Johannesburg, South Africa

Joey Jansen Van Vuuren, Council for Scientific & Industrial Research, Research Group Leader Cyber Defence, South AfricaJoey Jansen van Vuuren is the Research Group Leader for Cyber Defence for Scientific Research at the CSIR South Africa.  She gives the strategic research direction for the research group that is mainly involved in research for the SANDF and Government sectors on Cyber Defence.

She is involved more than 20 years in academia and research, 10 years as the HOD for an academic IT department and 7 years as research leader at the CSIR. She joined the CSIR with the focus of the research group on cybersecurity that includes network and mobile security, forensics, social media, and national security. As Cyber threats become extremely important for the RSA with the broadband changes, the focus of her research is around cybersecurity, and government policy and frameworks required ensuring national security. These also include structures to ensure cybersecurity and curriculums for cybersecurity. Her research includes journal papers, conference papers and book chapters on cybersecurity governance. She has been invited as keynote speaker at international conferences, and has presented on several forums including national and international conferences and Cyber awareness programmes in South Africa. She was also involved with the establishment of the Cybersecurity Centre of Innovation for research collaboration, cybersecurity education and a platform for cybersecurity threat exchange. She is also involved in the establishment of a network emulator and simulator testing facility at the CSIR that can support cybersecurity training and exercises as well as new product development in the cyber environment. Apart from the research, she is the Vice President (Academic) of the Higher Education Informations and Communication Technology Association and received several accolades for entrepreneurship, contract excellence and community service over the years.

Dave Dodge, South African Institute of Security, South Africa, ChairmanDaveisaformerpoliceofficerwithLondon’sMetropolitanPolice(ScotlandYard) who served in uniformed, investigative, training and intelligence fields before retiring as a senior detective after 30 years and having been awarded a number of commendations. His relocation to South Africa saw a move into security risk management in the role of Chief Advisor

to Group Security at Eskom, and the achievement of international board certification as a Certified Protection Professional (CPP) and Professional Certified Investigator (CPI) through ASIS International. The Eskom role included conducting operational risk assessments and operational security planning for major events, including the 2010 FIFA World Cup, major infrastructure projects and the development of an enterprise Security Management Framework and Security Operating Model. He also contributed to the development of training for the private security industry in South Africa as a member of a SASSETA Task Team reviewing training material and assisting SAQA with a revision of the national policy for the Recognition of Prior Learning. The transition into the private sector has resulted in Dave being a frequent speaker at international security conferences. In additional to his professionalaccreditations,DaveholdsaBachelor’sdegreeinAdultEducationandTrainingand a Diploma in Security Risk Management.

Ritasha Jethva, Nedbank Limited, South Africa, Information Privacy Officer,

Ritasha Jethva is currently the Head of Information Privacy and the PAIA Officer at Nedbank, where she is accountable for the rollout of a Group wide and National Privacy programme, spanning all local geographic locations as well as all applicable product and service offerings. She is also the Group’s PAIA Officer, where she facilitates all requests for

access to information. She recently obtained her MBA (Cum Laude) in October 2015. Ritashahas approximately 11 years’ experience in InformationTechnology,Governance,Security, Risk Management, Compliance and Privacy concerns. She is an active member providing a leading role on the Banking Association of South Africa, where she is assisting in steering the practical implications of privacy implementations within SA. She is also currently the Deputy Chair of the NCAC (National Cyber security Advisory Council) for South Africa, reporting to the Minister of Postal and Telecommunications. She obtained her CIPP (Certified Information Privacy Professional) certification in the US after undergoing US training within the privacy space. Previously, Ritasha implemented Privacy across the Absa Group over a period of 3 years under the guidance of Barclays Plc. and followed on to become the COO of the Barclays Africa operation. She also spent approximately a year at Liberty Life, where she provided strategic advisory across the Privacy and Information Security Programme, as well as launched the IT Governance programme for the Group. Prior to these corporate roles, sheheadedup the InformationPrivacy, Security&Cyberdivision for Accenture Southern Africa. She also headed up the Information Privacy &Cyber Security division whilst at Deloitte, within the Risk Advisory department of Deloitte SA. She has led the implementation of Information Security Management Systems at a multitude of corporate institutions, both locally and globally. She has also consulted on major IT Governance initiatives to organisations in the health, energy, manufacturing, retail and banking sectors. She has also been involved in consulting in the information risk management space, particularly in respect to information and data classification, focussing on the practical implementation of IT focussed Governance, Risk and Compliance practices to facilitate regulatory compliance and privacy requirements for large multinational organisations.

Interests:• Watchingmovies(action,adventureandcomedymovies)• Amquiteacarfanatic(enjoyhighperformancesportcars)• Readingbooks(leadership,spiritualadvancement,fictionandnon-fiction,etc.)

Sean Maritz, Eskom SOC Limited, CIO (Acting), Group Information TechnologySean Maritz is currently acting as the CIO of Eskom Holdings Limited. Eskom is a state owned enterprise and generates approximately 95%of the electricity used in South Africa and approximately 45% of theelectricity used in Africa. Eskom generates, transmits and distributes electricity to industrial, mining, commercial, agricultural and residential

customers and redistributors. As such the Group IT Division of Eskom is one of the largest IT houses in Africa and amongst its full array of IT Services manages the only fully accredited SAP CoE on the continent. Sean has in excess of 26 years of service in Eskom since graduating and his practical knowledge of the issues facing the utility currently is diverse and based on invaluable practical experience he has obtained in a wide range of roles within IT. Sean has amongst other things spearheaded the introduction of a digitization strategy in Eskom and is positioning IT to partner the Eskom business in its turnaround strategy. Sean is passionate about people and this fact is evident in the manner in which he leads and motivates the human capital within the Group IT Division. Sean consistently conceives, strategizes and develops plans for the IT Division drawing on his strong base of personal knowledge to empower the managers and employees in Group IT to respondwithdeliverables thatsupportEskom’sstrategic imperatives.Sean ismostcomfortable when applying new approaches and methodologies to ensure a successful outcome for business. He enjoys exploring areas where there is little or no theory to guide experimentation or application, particularly where new approaches and methodologies need to be developed, and where future lines of outcomes are difficult to determine. Sean consistently demonstrates a strong value system in the transparent manner in which he makes mission critical decisions and is extremely passionate about new technologies and the role they can play in becoming game-changes for both business and people in their personal lives.

Mr. Manqoba Mngomezulu, Bring Back My Identity Snr Information Security Specialist and authorManqoba is currently employed by Telkom as a Senior Information Security specialist, among other things on his role, he is responsible for designing, implementing and executing an effective information security awareness programme. He is a visionary and a self-motivated individual. He is also passionate about human development. He has

written and published a book about identity theft and protection of personal information, a book aimed at empowering the society about identity theft incidents and the role that societal members can play to protect themselves. The minister of Home Affairs, honorable Malusi Gigaba wrote the foreword of his book. Manqoba has been on different media platforms talking about identity theft and Cybercrime. Media such as Talk702, SAFM, UmhloboWeneneFM, PowerFM, KayaFM, ANN7, SABC1-SHIFT, SABC1-Identity, DRUM Magazine, YOU Magazine, Huisgeenoot Magazine, DailySun Newspaper just to mention a few. He is currently planning National Empowerment Seminars, aimed at raising awareness to the society about identity theft, cybercrime, protection of personal information etc. as this is hugely affecting the societal members. He believes that with the high increase of smart phone usage, Cybercrime should be taught as a subject as from primary school. He holds a BSc honors in Computer Science, SABSA certified and a Business Development certificate from GIBS

Niall Moynihan, Cisco, Security SpecialistNiall Moynihan is a Security Specialist at Cisco and has been with the company for 18 months after relocating from Australia, where he was focused on security solutions for large financial and retail enterprises. He isresponsiblefordrivingcustomerbusinesstransformationusingCisco’sinnovations and technology architecture solutions in Content Security, Networking Security and Cyber Security solutions in emerging markets

based out of South Africa. Prior to joining Cisco, he worked in Europe, Middle East, Asia, Australia and America, holding positions in engineering, programming, sales, consultancy and management of WebSense, BlueCoat, Check Point and Sun Microsystems.

Nick Trim, Darktrace, UK, Managing Director EMEANick  Trim has fifteen years’ experience working in operationalenvironments in the UK cyber defense effort. In collaboration with various government departments, he played a critical role in creating cutting-edge operational capabilities to defend against a range of threats to national security, for the protection of critical infrastructure. Nick has worked extensively with partners around the world, and is an expert

in human intelligence and social engineering. He has also worked as a cyber consultant, advising large companies on their areas of vulnerability and helping devise their cyber strategy.NickistheheadofDarktrace’scommercialdivision.HehasaMaster’sdegreeinHistory from Durham University.

Shllomi Ezra, Cyberbit, DirectorofSales&BusinessDevelopment EMEAShllomi comes with over 10 years’ experience in the high-techTelecommunication,Wireless,Voice,Data, Internet,Cyber& Intelligenceand SW solution Sales. With specialization in matching various technologies to different verticals. Shllomi is currently focused on the EMEA region for Cyberbit, and is responsible for Business development

and sales within the territory. Shllomi is a global, driven, and professional sales executive who builds long-lasting client relationships and understands how to develop, advance, deliver large scale project. Prior to joining the team at Cyberbit Shllomi was Sales Director for NICE Systems

SPEAKER PROFILES

Watchful Software provides advanced persistent security solutions that keep sensitive information safe from security breaches resulting from accidental or malicious disclosure. Watchful was formed to protectanorganization’smostcriticalassetafteritspeople–itsinformation.Thecompanyaddressesthe growing need for protecting sensitive and proprietary information against accidental or malicious theft, leakage, or loss. Leveraging key technologies including advanced encryption algorithms, digital rights management, and eBiometrics, Watchful has developed a suite of solutions that ensure only authorized personnel have access to enterprise systems and information, protecting against potentially massive economic and competitive damage from cyberterrorists and information thieves.

Named Technology Pioneer by The World Economic Forum 2015, Darktrace is one of the world’sleading cyber threat defence companies. Its Enterprise Immune System technology detects previously unidentified threats in real time, powered by machine learning and mathematics developed at the University of Cambridge, which analyse the behaviour of every device, user and network within an organisation.Someof theworld’s largest corporations relyonDarktrace’s self-learningappliance insectors including energy and utilities, financial services, telecommunications, healthcare, manufacturing, retail and transportation. The company was founded in 2013 by leading machine learning specialists and government intelligence experts, and is headquartered in Cambridge, UK and San Francisco, including offices in Auckland, Boston, Chicago, Dallas, London, Los Angeles, Milan, Mumbai, New York, Paris, Seoul, Singapore, Sydney, Tokyo, Toronto and Washington D.C.

ASSOCIATE SPONSOR

We in CYBERBIT understand that in order to detect and respond fast and efficiently to advanced threats

organizational security has to go through major changes. Detection and response cycles must become

optimal and short, leveraging past knowledge and experience, automating processes and capabilities,

andallowingtheorganizationtobeagile,alertandprompt.That’swhatCYBERSHIELDportfolioisall

about-securingIP&SCADAnetworksagainstadvancedandtargetedthreats.CYBERBIT,basedonits

vast experience and field-proven technologies, leveraging the knowledge of our experienced cyber

experts and system engineers, is securing today some of the most critical enterprises and national

level infrastructures, where we already Defeat the Unknow.Additionally, CYBERBIT’s Intelligence

division is a world leader in providing interception and Intelligence products and solutions to Law

Enforcement Agencies (LEA) all over the globe, bringing the cyber dimension intelligence potential

to the maximum. CYBERBIT has won the prestigious Frost and Sullivan 2015 award for competitive

strategy innovation and leadership in the global cyber intelligence and security markets (Read more)

CYBERBIT was honored to be ranked at 45# in Cybersecurity Hot Cyber Security Companies - 500 List of

Companies to Watch in 2015 http://cybersecurityventures.com/cybersecurity-500/ CYBERBIT has won

the prestigious Frost and Sullivan 2015 award for competitive strategy innovation and leadership in the

global cyber intelligence and security markets

ASSOCIATE SPONSOR

Arbor Networkshelpssecuretheworld‘slargestenterpriseandserviceprovidernetworksfromDDoSattacksandadvancedthreats.Arboristheworld‘sleadingproviderofDDOSprotectionintheenterprise,carrier and mobile market segments, according to Infonetics Research. Arbor‘s advanced threatsolutions deliver complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of malware and malicious insiders. Arbor also delivers market leading analytics for dynamic incident response, historical analysis, visualisation and forensics.Arborstrivestobea„forcemultiplier,“makingnetworkandsecurityteamstheexperts. Itsgoalistoprovidearicherpictureintonetworksandmoresecuritycontext–socustomerscansolveproblems faster and reduce the risk to their business. To learn more about Arbor products and services, pleasevisititsWebsiteatarbornetworks.com.Arbor‘sresearch,analysisandinsight,togetherwithdatafrom the ATLAS global threat intelligence system, can be found at the ATLAS Threat Portal.

Networks Unlimited is a value-added distributor, offering the best and latest solutions within the converged technology, data centre, networking, and security landscapes. The company distributes best-of-breed products, including Arbor Networks, Arista, Aruba Networks, CensorNet, Centrify, Fortinet, F5, ProLabs, Riverbed, RSA, SimpliVity and Tintri. The product portfolio provides solutions from the edge to the data centre, and addresses key areas such as cloud networking and integration, WAN optimisation, application performance management, application delivery networking, WiFi-, mobile- and networking security, load balancing, data centre in-a-box, and storage for virtual machines. Since itsformationin1994,NetworksUnlimitedhascontinuallyadaptedtotoday‘sprogressivelycompetitiveand evolving marketplace, and has reaped the benefits by being a leading value-added distributor (VAD) within the sub-Saharan Africa market.

ASSOCIATE SPONSOR

Cisco (NASDAQ: CSCO) is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. Cisco has shaped the future of the Internet by creating unprecedented value and opportunity for our customers, employees, investors and ecosystem partners and has become the worldwide leader in networking - transforming how people connect, communicate and collaborate.

STRATEGIC SECURITY SPONSOR

Ubuntu Business Advisory and Consulting (Pty) Ltd together Bowline Security, provide integrated forensic investigation and trusted cyber security solutions to the private and public sector. Our team members are qualified professionals, rich in experience, committed to excellence, and specialize in designing, implementing and maintaining holistic integrated and sustainable programs. We offer a unique technology and services framework for clients to actively prevent, detect and respond to risks, throughtheimplementationofriskmanagementandmitigationmeasuresby:•Definingthreatsandvulnerabilities•Assessinglikelihoodsandprobabilities•Evaluatingscopeandmagnitude•Consideringcontrols and counter measures UBAC and BOWLINE contribute to servicing our client needs by using our industryknowledgeandsecurity-relatedexpertise in: •DigitalForensics; •SecurityArchitecture;• Identity and Access Management; • Cyber Security Operations Center; • Fraud Risk ManagementServices;•TrainingandAwarenessprograms;•FraudandCorruptionInvestigations;•ApplicationCodeAssessmentServices.•EnterpriseSecurityProgramDevelopment;and•SecurityGovernance,RiskandCompliance.

ASSOCIATE SPONSOR

Bitdefender is a global security technology company that delivers solutions in more than 100 countries. Since 2001, Bitdefender has consistently produced award-winning business and consumer security technology. Bitdefender is a leading innovator in protecting consumers with breakthrough integrated homecybersecurityproductssuchasBitdefenderBox.ThroughR&D,alliancesandpartnershipteams,Bitdefender has elevated the highest standards of security excellence in both its number-one-ranked technologyanditsstrategicallianceswiththeworld’sleadingtechnologyproviders.

New ways of engaging customers and business operations demand a new approach to protecting critical systems and services. Transforming security to protect the opportunities of digital business is a strategic imperative. Blue Turtle enables this transformation by blending advanced technology and best practice so our customers can meet the challenge of cyber threats. We protect business against cyber attacks, malicious behavior and insider threat. By employing machine learning, big data, and real-timeautomationtechnologieswedeliver‘end-to-end’security–whetherDatacenterorEndpoint,Cloud,IndustrialorIoTsystems.Cyber-defenseneedstobe‘always-on’andoursolutionssomeoftheworld’smostinnovativesecuritysystemsareactive24x7.Ourtechnologypartnersareawardwinning,game changing market leaders such as Darktrace, Fireeye, Forcepoint, ObserveIT, Radware, SentinelOne and Splunk ! Our specialists work with you to understand, prioritize, and manage cyber security in the contextofyourbusiness,deliveringadvancedsecurityfortomorrow’schallenges–Today.

NETWORKING SOLUTION PROVIDER

Cyber Defense MagazineCyber Defense Magazine is by ethical, honest, passionate information security professionals for IT Security professionals. Our mission is to share cutting edge knowledge, real world stories and awards on the best ideas, products and services in the information technology industry.

VigilanceVigilance is the undisputed leading voice of the global security industry. The depth of our reportage, the brilliance of our analysis of the global security issues and the global influence of our editorials are incomparable. The intellectual and marketing bent of Vigilance are the results of many years of research. Our writers and contributors are key players of the global security industry; no wonder Vigilance is not only the magazine for decision makers and those who are in charge of purchasing budgets in their variousorganizationsacrosstheglobe,buttheworld’sleadingsecuritymagazine.Becauseourfocusis international, our news has the farthest reach, so also is every advert placed on Vigilance. Vigilance therefore, is your definitive guide to the global security market.

MEDIA PARTNERS

#ACSS16

Get it on

Download on the

App Store