WebSecuritySummit 2020 Aug. 25, 2020 to Aug. 28, 2020, Virtual, Virtual
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
KEYNOTE: The impact of Covid 19 on cybersecurity | Charl van der Walt | How has the threat landscape changed since the crisis started? What type of threats are ... | |
KEYNOTE: Security as a business enabler: Making the business case for security | Jo Stewart-rattray | The hardest thing a chief information security officer ever has to do is to convince ... | |
KEYNOTE: The need for unified security | Tormod Ree | In this presentation Tormod will take an in-depth look at the current security issues we ... | |
KEYNOTE: Stopping ‘living off the land’ attackers in their tracks | Roland Daccache | According to the latest CrowdStrike threat report, more than 50% of modern attacks are file-less ... | |
KEYNOTE: Lessons from failure: How cyber security professionals can learn from analytic mistakes in other fields | George Beebe | One of the most difficult challenges that cyber security professionals face is to anticipate and ... | |
CASE STUDY: A board conversation on cyber security risk management | Itumeleng Makgati | For years, cyber security was an issue that boards of directors took for granted; we ... | |
PANEL DISCUSSION: How do you create a culture shift towards embracing security in your organisation? | Robin Barnwell , Blaise Ntwali , Patrick Ryan , Mdu Zakwe | N/A | |
Carpe diem – Seizing the security advantage! How to benefit from the ongoing transformation of security’s role in the workplace | Steve Jump | If you overhear someone talking about how they plan to address digitisation in their business, ... | |
Cybersecurity incident response – development, adoption, simulation | Angela Plessis | In this talk Angela Henry and Raymond du Plessis will present on developing an effective ... | |
Update on data privacy legislation in SA: When will PoPIA come into effect? | Sizwe Snail | What is the latest status of POPIA? When is it expected to become fully operational?What ... | |
Comparing the pros and cons of data protection and privacy legislation and the need for a global response | Susi Du Preez | Privacy law refers to the laws that deal with the regulation, storing, and using of ... | |
Reimagining your threat landscape in order to provide a business relevant view on your information risks | Emmerentia Du Plooy | So often our threat landscapes are informed by the best threat intelligence we can put ... | |
Data privacy and ethics | Yvette Du Toit | N/A | |
Adapting effective cyber security strategies in today’s age of radical digital transformation | Yassin Watlal | As organisations pivot to the cloud, and remote work moves from a novelty to the ... | |
Make your SOC work smarter, not harder | Dimitris Vergos | The volume and complexities of today’s security incidents can tax even the largest security teams. ... | |
Phase III: Advanced persistent threats and returning to the office | Sam Curry | For most, regardless of geography, the question of returning to the office has arisen. Some ... | |
Is Secure Remote Access like the emperor’s new clothes? | Charl van der Walt | Enterprise businesses equip staff with mobile devices such as laptops and smart phones to perform ... | |
Leveraging your existing technology investments to improve your security and reduce your risk | Paul Grapendaal | N/A | |
The art of polymorphic phishing attacks – are you ready to respond? | Kamel Tamimi | As businesses adjust to having their employees work from home, they are also working hard ... | |
Security synergy – bringing together EDR and NTA | Nithen Matthews | Moving away from a siloed approach to cyber security and towards a holistic, comprehensive strategy ... | |
Password models in the real world | Petrus Potgieter | The ideal password selection method is to generate a random string that is so long ... | |
FortiAnalyzer | Praven Pillay | The challenges of complex and fragmented infrastructures continue to enable a rise in cyber events ... | |
Citrix Intelligent Workspace | Anthony Khangale | We’re living in the day and age of apps, apps and more apps. When a ... | |
Protecting your sensitive information | Ashley Maduray | Learn how Microsoft solutions help users discover, classify and protect sensitive information wherever it lives ... | |
Strengthen your cyber security posture with Log360 UEBA (user and entity behaviour analytics) | Harish Sekar | Log360 uses machine learning to detect behaviour anomalies, strengthening your defences against insider threats and ... | |
Office 365 Security Controls – Nclose Microsoft Cloud Security Managed Service | Martin Potgieter | Microsoft offers many tools to help you secure your Office 365 environment. The Nclose Microsoft ... | |
KEYNOTE: International keynote address: How to fix the humans: Cyber security and human factors | Suelette Dreyfus | You’ve built the biggest, strongest cyber security wall ever. Then your organisation’s staff unlocks the ... | |
KEYNOTE: News from the kingdom and tales from the colonies | Uri Rivner | Major attacks have rocked the online shores of the UK and US! In the UK, ... | |
Best practice in threat intelligence collaboration and sharing | Jason Jordaan | When one looks at critical attacks in the physical world, such as the Japanese attack ... | |
PANEL DISCUSSION: What is needed to encourage more local collaboration in threat intelligence? | Kiru Louw | N/A | |
KEYNOTE: Alliance power for cyber security | Dr Kenneth Geers | Cyber security, like global warming or the coronavirus pandemic, is an international problem that requires ... | |
Pushing the SOC left for the love of AppSec and the sake of containers | O'shea Bowens | As a defender, we've seen the landscape change over the past few years. A shift ... | |
CASE STUDY BDO: South Africa’s journey to EDR, advanced endpoint security and machine visibility | Nico Stevens | Ensuring your organisation can stand up to inevitable and increasingly sophisticated cyber attacks is critical. ... | |
Open source software and the implications for security | Deon Venter | N/A | |
CASE STUDY: How leading financial company uses SIEM for management, reporting and real time alerts | Hendrik Sekar | How to overcome IT security challenges in the financial services industryHow financial services company DirectTransact ... | |
Endpoint detection and response; Preparing your organisation for a cyber attack | Warren Erasmus | Most modern-day cyber attacks start with an endpoint compromise. Deployment of an endpoint detection agent ... | |
Incident Response bloopers: When IR goes wrong | Veronica Schmitt | In the digital age, we are moving more progressively to an interconnected world. This leads ... | |
Case study: Living through a Data Breach | Cyril Baloyi | N/A | |
Effective vulnerability management | Kudakwashe Charandura | The rise of cyber attacks requires greater focus and investment into cyber security. A common ... | |
Insider threats, why you should care | Ran Pugach | Examining the importance of insider risk and how human-centric cyber security with video support can ... | |
The role of SIEM in POPIA | Harish Sekar | How to orchestrate SOAR and leverage artificial intelligence to protect an organisation.The importance of Hybrid ... | |
Other people’s platforms: defeating online fraud outside your virtual jurisdiction | Dr Sam Small | With a low-cost barrier to entry, online fraudulent activity and digital risks across the Internet ... | |
How to approach business continuity in terms of the current security threat landscape and the challenges from Covid-19 | Chris Toerien | We live with a rapidly changing Internet that is constantly under threat from malicious entities ... | |
Cloud migration; exchanging old practices for comprehensive solutions | Paul Williams | N/A | |
Ensuring business continuity by securing your remote workforce | Yassin Watlal | The traditional on-premises security perimeter has dissolved and legacy security stacks are unable to secure ... | |
Splunk Attack Range – Keeping up with evolving security threats | Herman Lourens | The Splunk Attack Range framework allows the use of adversarial simulation engines – along with ... | |
An overview of Cybereason Mobile – Protecting Android & iOS endpoints in an increasingly perimeter-less environment | Roberto Arico | With the recent launch of Cybereason Mobile, we wanted to invite you to learn more ... | |
Harness EDR telemetry to gain control and insight | Matthew Stevens | A growing number of businesses are implementing EDR technology, but they aren't necessarily taking advantage ... | |
Routopsy: Routing Protocol Vulnerability Analysis and Exploitation | Szymon Kemp | In this demonstration, Tyron Kemp and Szymon Ziolkowski will be showcasing Routopsy, a new open ... | |
Witness a live DDOS attack being mitigated with Magic Transit | Vincent Barida | Starting a test attack against Cloudflare’s own network. During this session, Cloudflare will showcase how ... | |
KEYNOTE: Cyber security governance – why is it important? | Tichaona Zororo | Cyber security governance has never been more critical before than it is today. The new ... | |
PANEL DISCUSSION: Fireside chat: Addressing the security skills shortage in SA ¬ the trend towards promoting security education and upskilling internally | Robin Bucchianeri | N/A | |
KEYNOTE: Quantum reckoning: The coming day when quantum computers break cryptography | Roger A. Grimes | Quantum computing is getting ready to break all traditional public key crypto, like RSA and ... | |
Cyber everywhere. Ready or not, it’s here – the future of cyber survey 2019 | Eric Mc Gee | As the world becomes smaller, cyber is getting bigger. With every new connected device, digital ... | |
A guide for securing blockchain deployments | Gerhard Cronje | Blockchain technology and the emergence of financial technology (FinTech) has aimed to transform the way ... | |
AI, machine learning and automation: How can they be used to enhance cyber security? | Prof. Ketcha | AI, machine learning and automation are not new to cyber security. In fact, they form ... | |
IOT security: Do I need a firewall for my light bulb? | Brett Pretorius | The fourth industrial revolution is marked by the introduction of ‘smart’ technology, with Gartner predicting ... | |
AI/Automation/IoT – No Trust? No Business | Robert Brine | The trust formula: AI plus ethicsQuality or quantity data shapes delivery?Transparency as a trust-building measureWho’s ... | |
Building an integrated cyber security capability in complex business environments: A double-edged sword | Dr Jabu Mtsweni | Cyber security is a complex arena affecting almost every other technological domain. However, a one-size-fits-all ... | |
Gone phishing during a global pandemic: The reputational impact of cyber breaches | Marina Bidoli | COVID-19 has been a gift for cyber attackers, who have wasted no time in exploiting ... | |
The convergence of physical security with infosec/cyber security | Kris Budnik | The debate around the inevitable convergence between physical and logical security has been around for ... | |
Managing third-party cyber security risks | Venisha Nayagar | Nearly 50 years ago, Warren Buffett warned his young son, Howard: “It takes 20 years ... | |
Trust in an untrusted world – considerations for Zero Trust | Andre Deventer | We’ve seen an ever-increasing move to cloud computing over a number of years, but are ... | |
Creating value and building brand trust by securing consumer digital identities: how business leaders achieve this | Marius Whittaker | The most common denominator in your digital transformation strategy is Digital Identities. Serving as the ... | |
The importance of a holistic security strategy | Colin Erasmus | This session will examine how to implement a holistic security strategy and will include topics ... | |
Prevention of file-based attacks on critical networks: Lessons from the Garmin ransomware incident | Oren T Dvoskin | Financial services, public utilities and manufacturing companies are seeing an increase in attacks on their ... | |
How to create and secure digital identities of all users: customers, suppliers and employees | Richard Craig | Watch how we assist companies to ensure safe online access across all systems using technology ... | |
How to leverage human sensors to detect and remediate phishing attacks in minutes | Kamel Tamimi | Cyber attackers, more than ever, are finding creative ways to evade perimeter controls to make ... |