Threat2019 2019 Sept. 26, 2019 to Sept. 27, 2019, Johannesburg, South Africa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Cyber Security: A National Imperative Melissa E. Hathaway N/A
Dispelling Top Cloud Security Myths Zubin Chagpar Customers care deeply about privacy and data security. Customers need ownership and control over their ...
SMALL-SCALE CYBERSECURITY: DEVELOPING CYBERSECURITY RESILIENCE WITHIN PROVINCIAL AND LOCAL GOVERNMENT Given Masombuka The South African government’s pursuit of widespread Internet access and the increasing use of and ...
RANKING CYBERCRIMES BASED ON THEIR IMPACT TO ORGANISATIONS’ WELFARE: AN AFRICAN PERSPECTIVE Lubua And Pretorius This study determined cybercrimes highly reported to impact organisations across the world through online media. ...
Cybersecurity Collaboration Susan Potgieter N/A
National Cybersecurity in light of Foreign Technology Dependence Given Shingange Foreign cyber technology dependence, especially in developing countries, presents an identified risk to its cybersecurity ...
CYBER-SECURITY EDUCATION AND TRAINING TO BUILD A CYBER-RESILIENT SOUTH AFRICA Van Ramluckan As cyber-security incidents become more prevalent, the need for skilled employees and management becomes more ...
THE IMPACT OF CYBERCRIME AND CYBERSECURITY BILL ON SOUTH AFRICAN NATIONAL CYBERSECURITY: AN INSTITUTIONAL THEORY ANALYTIC PERSPECTIVE Dr. Jackie Phahlamohlaka Our aim in this paper is to analyse the possible impact of the Cybercrimes and ...
Keynote Lecture Prof. Michael Goldsmith , Emilar Gandhi , Mr. Danny Myburgh N/A
ON WOMEN, CYBER-FEMINISM AND INFORMATION SECURITY: ASSESSING SECURITY THREATS BY GENDER Jide Oyebisi Njenga The continued rise in information security threats has created a sustained risk to the competitiveness ...
A GENDER-BASED ANALYSIS OF ONLINE SOCIAL ENGINEERING AWARENESS AMONG UNIVERSITY STUDENTS Ngwane And Maharaj Background: Students are potential victims of cybercrime attacks due to their dominant online presence. This ...
KEY COMPONENTS FOR A CYBERSECURITY RESILIENCE MATURITY MEASUREMENT (CRMM) FRAMEWORK Uche And Abrahams This extended abstract presents a brief review of our ongoing work to design a cybersecurity ...
Keynote Lecture: “Finthreat”, fee-fi-fo-fum – the scent of digitisation! Dr. Arif Ismail Fintech has received much attention recently. Tightly coupled with the revolution to produce alternate financial ...
USING BLOCKCHAIN ASSOCIATED TECHNOLOGIES TO CREATE A SUPPLEMENTARY TOOL FOR WEB-ARCHIVING Devilliers And Calitz The impermanence of URL citations and the inability to verify whether a given document is ...
SECURING INFORMATION AMONG TRADING PARTNERS: THE ROLE OF NON-TECHNICAL MEASURES Ajayi And Maharaj The need for information in enhancing the flow of material and funds among trading partners ...
The interface between Cyber Security and Data Protection Sizwe Snail Abstract: Legal writers have omitted to investigate and analyse the important Inter-relations between Cyber Security ...
Keynote Lecture: Assessing National Cyber Readiness Francesca Spidalieri N/A
PROPOSING A FRAMEWORK FOR IMPLEMENTATION OF CYBERSECURITY IN AFRICA Van Vuuren South Africa is one of the African nations with the highest internet access rate. Despite ...
PROVING IT’S THE DATA THAT IS BIASED, NOT THE ALGORITHM THROUGH THE RECENT ‘SQUATTER CAMPS IN SOUTH AFRICA’ CASE STUDY. Vam Celik In the recent past, some South African internet users may have questioned the reliability of ...
Keynote Lecture: Threat Hunting and Cyberwarfare Andrew Chester N/A
AN INTELLIGENT MALWARE DETECTION USING A NEURAL NETWORK ENSEMBLE BASED ON A HYBRID SEARCH MECHANISM Akandwanaho And Kooblal Cyber threats have become increasingly dynamic and complex due to the fusion of technologies, networks ...
TOWARDS CYBER INCIDENT RESPONSE STRATEGIC PLANNING Veerasamy With technological advancements and changing environmental conditions, organisations are continually faced with growing uncertainties. Being ...