ITWeb 2014 May 27, 2014 to May 29, 2014, Johannesburg,South Africa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Welcome address Jeremy Maggs N/A
A guide to ITWeb Security Summit 2014 Charl van der Walt , Jon Tullett During this introductory session,Charl and Jon will offer an overview of the theme and direction ...
Surveillance and privacy - a global overview Jacob Appelbaum Independent computer security researcher, hacker and core member of the Tor project In this international ...
When "trust us" isn't enough: Government surveillance in a post-Snowden world Christopher Soghoian Principal technologist and senior policy analyst with the Speech, Privacy and Technology Project at the ...
Next generation security – In what generation will we get it under control? John Mccormack This presentation will address the following: The security issues the information security industry faces today ...
The idiot's guide to destroying a Global 500 Company…for £500 Kevin Kennedy senior director: security product management, Juniper Networks: In a world where brilliant and evasive hacks ...
Cyber resilience calls for strategic action. Now. Antonio Forzieri EMEA cyber security and ISS technology lead: technology sales and services, Symantec Increasing visibility into ...
Cyber insurance - taking the sting out of an information security breach Natalie Coolwijk The evolving cyber landscape is placing organisations, as well as the data that they possess, ...
Current state of the art and future challenges to detect and mitigate cyber risks in a methodical and consistent way Matteo Michelini Mass-malware, targeted attacks, advanced persistent threats, state-sponsored attacks, cybercrime...the threat landscape is rapidly changing and ...
A framework for security operations centres (SOCs) Alapan Arnab , Pierre Jacobs There are a number of frameworks that cover SOC technology components, such as SIEM frameworks, ...
Communicating Information Security Value to business: A Security Framework using words and pictures. Steve Jump In today's competitive world a business faces a multitude of threats every day. Many of ...
Case study: Ensuring data privacy and protection in Software as a Service platform at Ooba Dominique Dhotman The South African home loan origination industry is a fiercely contested, 15-year-old market made up ...
PoPI Panel Q&A: Will you be ready? Dianne Stigling , Ritasha Jethva , Francis Cronjé Dianne Stigling, Ritasha Jethva and Francis Cronjé, together with legal experts, unpacks the legiislation, outlines ...
The legal obligation to report of IT security compromises David Taylor Privacy legislation, stock exchange rules, and contract and common law all place obligations on companies ...
Excuse me…your phone is leaking Nader Henein So you’ve just purchased a brand new shinny smartphone and almost immediately you’ve put your ...
Failures of the infosec community - an in-depth insight Charlie Miller In this international keynote, Charlie Miller will: Contrast different kinds of attacks and targets, from ...
Snowden Revelations: What do they mean for South Africa? Haroon Meer 2013 was undoubtably the year of the Snowden revelations. From the first leaks in June ...
The relationship between corruption and cybercrime Jason Jordaan Corruption is commonplace in South Africa, and has become part of the national psyche, however ...
Cyber Counterintelligence - what is it and what lessons has recent history taught us? Sh Von Solms , Petrus Duvenage It is widely accepted that conventional cyber security measures no longer offer adequate protection in ...
Hacking cars via the CAN bus Chris Valasek , Charlie Miller Miller and Valasek will: Describe the architecture of the network bus present in most modern ...
The state of cyber security within South Africa - an SAPS perspective Brigadier Pieterse N/A
Security in an interconnected world - why security strategies fail Maiendra Moodley Referencing case studies from the financial services, public sector, telecommunications, law enforcement and IT sectors, ...
Role of the CISO in enhancing information security governance Andrew Mpofu The presentation aims to outline the discipline in information security governance that the role of ...
Security research for CIOs – enhancing proactive security strategies Greg Sinclair With reports of network breaches and data losses consistently making the news, it's clear that ...
Distributed Denial of Service (DDoS) attack tools: simple and complex contemporary and historical threats Mark Campbell The DDoS threat to enterprises and network providers is obviously more severe from professionally coded ...
Refactor & revolt: spelunking the depths of universal mobile attack surfaces Josh m0nk Thomas Josh Thomas will cover the following: - Where bugs come from - a history of ...
RAT-a-tat-tat – hacking malware servers Jeremy Du Bruyn The availability and use of remote access trojans/tools (RATs) appears to be on the rise. ...