WebSecuritySummit 2020 Aug. 25, 2020 to Aug. 28, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
KEYNOTE: The impact of Covid 19 on cybersecurity Charl van der Walt How has the threat landscape changed since the crisis started? What type of threats are ...
KEYNOTE: Security as a business enabler: Making the business case for security Jo Stewart-rattray The hardest thing a chief information security officer ever has to do is to convince ...
KEYNOTE: The need for unified security Tormod Ree In this presentation Tormod will take an in-depth look at the current security issues we ...
KEYNOTE: Stopping ‘living off the land’ attackers in their tracks Roland Daccache According to the latest CrowdStrike threat report, more than 50% of modern attacks are file-less ...
KEYNOTE: Lessons from failure: How cyber security professionals can learn from analytic mistakes in other fields George Beebe One of the most difficult challenges that cyber security professionals face is to anticipate and ...
CASE STUDY: A board conversation on cyber security risk management Itumeleng Makgati For years, cyber security was an issue that boards of directors took for granted; we ...
PANEL DISCUSSION: How do you create a culture shift towards embracing security in your organisation? Robin Barnwell , Blaise Ntwali , Patrick Ryan , Mdu Zakwe N/A
Carpe diem – Seizing the security advantage! How to benefit from the ongoing transformation of security’s role in the workplace Steve Jump If you overhear someone talking about how they plan to address digitisation in their business, ...
Cybersecurity incident response – development, adoption, simulation Angela Plessis In this talk Angela Henry and Raymond du Plessis will present on developing an effective ...
Update on data privacy legislation in SA: When will PoPIA come into effect? Sizwe Snail What is the latest status of POPIA? When is it expected to become fully operational?What ...
Comparing the pros and cons of data protection and privacy legislation and the need for a global response Susi Du Preez Privacy law refers to the laws that deal with the regulation, storing, and using of ...
Reimagining your threat landscape in order to provide a business relevant view on your information risks Emmerentia Du Plooy So often our threat landscapes are informed by the best threat intelligence we can put ...
Data privacy and ethics Yvette Du Toit N/A
Adapting effective cyber security strategies in today’s age of radical digital transformation Yassin Watlal As organisations pivot to the cloud, and remote work moves from a novelty to the ...
Make your SOC work smarter, not harder Dimitris Vergos The volume and complexities of today’s security incidents can tax even the largest security teams. ...
Phase III: Advanced persistent threats and returning to the office Sam Curry For most, regardless of geography, the question of returning to the office has arisen. Some ...
Is Secure Remote Access like the emperor’s new clothes? Charl van der Walt Enterprise businesses equip staff with mobile devices such as laptops and smart phones to perform ...
Leveraging your existing technology investments to improve your security and reduce your risk Paul Grapendaal N/A
The art of polymorphic phishing attacks – are you ready to respond? Kamel Tamimi As businesses adjust to having their employees work from home, they are also working hard ...
Security synergy – bringing together EDR and NTA Nithen Matthews Moving away from a siloed approach to cyber security and towards a holistic, comprehensive strategy ...
Password models in the real world Petrus Potgieter The ideal password selection method is to generate a random string that is so long ...
FortiAnalyzer Praven Pillay The challenges of complex and fragmented infrastructures continue to enable a rise in cyber events ...
Citrix Intelligent Workspace Anthony Khangale We’re living in the day and age of apps, apps and more apps. When a ...
Protecting your sensitive information Ashley Maduray Learn how Microsoft solutions help users discover, classify and protect sensitive information wherever it lives ...
Strengthen your cyber security posture with Log360 UEBA (user and entity behaviour analytics) Harish Sekar Log360 uses machine learning to detect behaviour anomalies, strengthening your defences against insider threats and ...
Office 365 Security Controls – Nclose Microsoft Cloud Security Managed Service Martin Potgieter Microsoft offers many tools to help you secure your Office 365 environment. The Nclose Microsoft ...
KEYNOTE: International keynote address: How to fix the humans: Cyber security and human factors Suelette Dreyfus You’ve built the biggest, strongest cyber security wall ever. Then your organisation’s staff unlocks the ...
KEYNOTE: News from the kingdom and tales from the colonies Uri Rivner Major attacks have rocked the online shores of the UK and US! In the UK, ...
Best practice in threat intelligence collaboration and sharing Jason Jordaan When one looks at critical attacks in the physical world, such as the Japanese attack ...
PANEL DISCUSSION: What is needed to encourage more local collaboration in threat intelligence? Kiru Louw N/A
KEYNOTE: Alliance power for cyber security Dr Kenneth Geers Cyber security, like global warming or the coronavirus pandemic, is an international problem that requires ...
Pushing the SOC left for the love of AppSec and the sake of containers O'shea Bowens As a defender, we've seen the landscape change over the past few years. A shift ...
CASE STUDY BDO: South Africa’s journey to EDR, advanced endpoint security and machine visibility Nico Stevens Ensuring your organisation can stand up to inevitable and increasingly sophisticated cyber attacks is critical. ...
Open source software and the implications for security Deon Venter N/A
CASE STUDY: How leading financial company uses SIEM for management, reporting and real time alerts Hendrik Sekar How to overcome IT security challenges in the financial services industryHow financial services company DirectTransact ...
Endpoint detection and response; Preparing your organisation for a cyber attack Warren Erasmus Most modern-day cyber attacks start with an endpoint compromise. Deployment of an endpoint detection agent ...
Incident Response bloopers: When IR goes wrong Veronica Schmitt In the digital age, we are moving more progressively to an interconnected world. This leads ...
Case study: Living through a Data Breach Cyril Baloyi N/A
Effective vulnerability management Kudakwashe Charandura The rise of cyber attacks requires greater focus and investment into cyber security. A common ...
Insider threats, why you should care Ran Pugach Examining the importance of insider risk and how human-centric cyber security with video support can ...
The role of SIEM in POPIA Harish Sekar How to orchestrate SOAR and leverage artificial intelligence to protect an organisation.The importance of Hybrid ...
Other people’s platforms: defeating online fraud outside your virtual jurisdiction Dr Sam Small With a low-cost barrier to entry, online fraudulent activity and digital risks across the Internet ...
How to approach business continuity in terms of the current security threat landscape and the challenges from Covid-19 Chris Toerien We live with a rapidly changing Internet that is constantly under threat from malicious entities ...
Cloud migration; exchanging old practices for comprehensive solutions Paul Williams N/A
Ensuring business continuity by securing your remote workforce Yassin Watlal The traditional on-premises security perimeter has dissolved and legacy security stacks are unable to secure ...
Splunk Attack Range – Keeping up with evolving security threats Herman Lourens The Splunk Attack Range framework allows the use of adversarial simulation engines – along with ...
An overview of Cybereason Mobile – Protecting Android & iOS endpoints in an increasingly perimeter-less environment Roberto Arico With the recent launch of Cybereason Mobile, we wanted to invite you to learn more ...
Harness EDR telemetry to gain control and insight Matthew Stevens A growing number of businesses are implementing EDR technology, but they aren't necessarily taking advantage ...
Routopsy: Routing Protocol Vulnerability Analysis and Exploitation Szymon Kemp In this demonstration, Tyron Kemp and Szymon Ziolkowski will be showcasing Routopsy, a new open ...
Witness a live DDOS attack being mitigated with Magic Transit Vincent Barida Starting a test attack against Cloudflare’s own network. During this session, Cloudflare will showcase how ...
KEYNOTE: Cyber security governance – why is it important? Tichaona Zororo Cyber security governance has never been more critical before than it is today. The new ...
PANEL DISCUSSION: Fireside chat: Addressing the security skills shortage in SA ¬ the trend towards promoting security education and upskilling internally Robin Bucchianeri N/A
KEYNOTE: Quantum reckoning: The coming day when quantum computers break cryptography Roger A. Grimes Quantum computing is getting ready to break all traditional public key crypto, like RSA and ...
Cyber everywhere. Ready or not, it’s here – the future of cyber survey 2019 Eric Mc Gee As the world becomes smaller, cyber is getting bigger. With every new connected device, digital ...
A guide for securing blockchain deployments Gerhard Cronje Blockchain technology and the emergence of financial technology (FinTech) has aimed to transform the way ...
AI, machine learning and automation: How can they be used to enhance cyber security? Prof. Ketcha AI, machine learning and automation are not new to cyber security. In fact, they form ...
IOT security: Do I need a firewall for my light bulb? Brett Pretorius The fourth industrial revolution is marked by the introduction of ‘smart’ technology, with Gartner predicting ...
AI/Automation/IoT – No Trust? No Business Robert Brine The trust formula: AI plus ethicsQuality or quantity data shapes delivery?Transparency as a trust-building measureWho’s ...
Building an integrated cyber security capability in complex business environments: A double-edged sword Dr Jabu Mtsweni Cyber security is a complex arena affecting almost every other technological domain. However, a one-size-fits-all ...
Gone phishing during a global pandemic: The reputational impact of cyber breaches Marina Bidoli COVID-19 has been a gift for cyber attackers, who have wasted no time in exploiting ...
The convergence of physical security with infosec/cyber security Kris Budnik The debate around the inevitable convergence between physical and logical security has been around for ...
Managing third-party cyber security risks Venisha Nayagar Nearly 50 years ago, Warren Buffett warned his young son, Howard: “It takes 20 years ...
Trust in an untrusted world – considerations for Zero Trust Andre Deventer We’ve seen an ever-increasing move to cloud computing over a number of years, but are ...
Creating value and building brand trust by securing consumer digital identities: how business leaders achieve this Marius Whittaker The most common denominator in your digital transformation strategy is Digital Identities. Serving as the ...
The importance of a holistic security strategy Colin Erasmus This session will examine how to implement a holistic security strategy and will include topics ...
Prevention of file-based attacks on critical networks: Lessons from the Garmin ransomware incident Oren T Dvoskin Financial services, public utilities and manufacturing companies are seeing an increase in attacks on their ...
How to create and secure digital identities of all users: customers, suppliers and employees Richard Craig Watch how we assist companies to ensure safe online access across all systems using technology ...
How to leverage human sensors to detect and remediate phishing attacks in minutes Kamel Tamimi Cyber attackers, more than ever, are finding creative ways to evade perimeter controls to make ...