3rd Year
Prevent | Detect | Respond | RecoverAfrica 2014
“Whoever is first in the field and awaits the coming of the enemy, will be fresh for the fight; whoever is second in the field and has
to hasten to battle will arrive exhausted.”- Sun Tzu, The Art of War
“Therefore, just as water retains no constant shape, so in warfare there are no constant conditions.”
- Sun Tzu, The Art of War
Book Online at www.cyberconafrica.org or contact: Cybercon Project Manager - Tania Diesel
Phone: +27 11 794 7322 / Email: [email protected]
11 & 12 November 2014 Cyber crime and cyber espionage is now a paralysing reality to both public and private organisations still lagging in readiness. Cyber warfare and concerns on the vulnerability of critical information infrastructure to cyber attacks is now a major concern. Research suggests that cyber threat agents are gearing up for 2015 and beyond and are becoming faster, smarter, more daring and organised than ever before. This calls for all stakeholders to adopt a new defence paradigm and implement new intelligence sharing platforms. Collaboration now more than ever is key. In its 3rd year, drawing on data, expertise and success from industry thought leaders, CyberCon Africa 2014 will take you on a tour into the “Cyber Underworld” and attempt to map out the threat and incident management lifecycle. Our expert speakers will provide guidance on how to prevent, detect, respond and recover from attacks to ensure your organisation is better armed to manage this risk.
THREAT INTELLIGENCE INCIDENT MANAGEM
ENT
PREVENT DETECT RESPOND R
ECOV
ER “The Programme is Structured on an
Actual Threat Management Framework “
Day
1 - T
hrea
t Int
ellig
emce
Pro
gram
me
Session 1Cyber Underworld - An overview of Global Threat Groups (& Guidance to Mitigate Risks)
Session 2 Establishing a Robust Threat Intelligence & Talent Management Capability
Session 1The Threat Never Sleeps - Best Practices in 24/7 Cyber Security Monitoring
Session 2Latest Detection Tools & Techniques to Detect Cyber Intrusions De
tect
Ses
sion
Prev
ent S
essio
n
Day
2 - I
ncid
ent M
anag
emen
t Pro
gram
me Session 1
Incident Management & Response Techniques
Session 2
Cyber Forensics Response Case Study
Reco
ver S
essio
nRe
spon
d Se
ssio
n
High Level Programme Overview
Session 1 Law Enforcement & Legal Framework to Combat Cyber Crime in Africa
Session 2Current & Proposed Cyber Collaboration Initiatives on the Continent
www.cyberconafrica.org
View live cyber security demos during coffee breaks.
Pricing Options - Delegates
Bookings and Information:Prices are inclusive of VAT and excludes transport / accomodation
Early bird prices are valid until 12 September 2014
Book Online: www.cyberconafrica.org or contact:
Cybercon Project Team: Tania Diesel & Lebogang Legare
Phone: +27 11 794 7322Email: [email protected]
Prices
Regular Price R 4500,00
Early Bird Price R 3650,00
Early Bird Prices are valid until 12 September 2014
www.cyberconafrica.org
• Technology leaders• C-level executives• Cyber Forensic Investigators• Public policy makers• Lawyers• University staff and students• Chief Information Officers (CIOs)• Chief Information Security Officers (CISOs)• Cyber Security Professionals• IT Security Managers• Risk Managers• Human Resource Managers• Forensic Auditors• Forward thinking business owners
• Law enforcement• Intelligence agencies• Defence teams• Internal Auditors• Technical and Support Specialists• Systems Integrators• Webmasters• Security Analysts• Business Continuity Managers• CTOs• Chief Architects• Senior IT Program Management• Systems Planners and Analysts• Strategic Planners
Who should attend
View live cyber security demos during coffee breaks.