Highlight Topics
- Enhancing Your Security Posture
- Third Party Risk Management
- Cyber Governance
- 5G Network Security and Business Opportunities
- Zero Trust
Cybersecurity leaders say Africa has become a hotbed for cybercrime activities.
In 2022, the region has experienced an increase in DDoS attacks, ransomware attacks, attacks against industrial control systems (ICS), business email compromises, and phishing attacks — the list is endless. The region must take a collaborative defense approach to respond to this new threat environment. The challenge for enterprises has been to ascertain how much risk they are willing to accept to accomplish their mission.
In the hybrid and interconnected world, the noticeable change has been changing consumption patterns of security technologies, which require new ways to deploy frameworks. The enterprise’s success will depend on its endurance to balance offense and defense to mitigate these threats using the right tools, technologies, and best practices. To gain insights into how to establish a secure ecosystem in this dynamic world, attend ISMG’s cybersecurity summit and explore diverse cybersecurity trends from ransomware to supply chain attacks, infrastructure security to automotive cybersecurity, endpoint security featuring AI, connected devices’ challenges, critical infrastructure vulnerabilities, ICS risk, crypto challenges, extended detection and response, cyber insurance, and more.
You can also earn your CPE credits by attending the summit. ISMG’s agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.
Singapore
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats
Does your incident response strategy differ with different attacks? How is your incident response strategy for ransomware attacks different from supply chain attack? Businesses usually build a great incident management procedure with great charts and workflows but execution is a challenge since asset inventory is not up to the mark. Against this backdrop, how does one choose the right playbook?
In this session, you will learn more on:
With the rising integration of artificial intelligence, it has become imperative for businesses to include privacy and digital trust in their security practices. However, the same needs to be driven by policymakers and regulators to ensure that these laws do not hinder trade and businesses. What role does the government play here, and what are some of the best practices followed across the government in Africa?
The session will cover:
The cybersecurity industry is increasingly turning towards artificial intelligence to not only defend against threats but also predict them in advance. Intelligent threat detection, automated incident response, strengthening user authentication are some of the game – changer in the realm of cybersecurity.
The session will also discuss:
Since every vendor poses a security risk, organizations must classify them by risk and track the data they manage. Third-party risks can span from a law firm managing sensitive client information to a flower delivery company. A third-party risk program requires a holistic view on third parties and a way to automate the entire life cycle of supplier engagement. Organizations should classify risk using internal and external data to align it with the organization’s risk appetite.
The session will discuss:
In 2022, the country had 230 million threat detections in total. In second place was Morocco at 71 million. Of the 230 million detected threats in the country, 219 million were e-mail-related threats.
More discussion points will include:
Experts say learning the API attack techniques that hackers use to achieve their targets is critical. If the tactical goal is credential access, the attacker may use brute force attacks or man-in-the-middle attacks as their techniques. As organizations are modernizing their applications and infrastructure as part of their cloud strategy, the use of third-party software and APIs is immense to integrate with older applications and data stores. Protecting your APIs against vulnerabilities and malicious actors looking to gain access to your valuable data is crucial. There is a need to repurpose part of the budget from other layers of the technology stack to API security.
The session will cover:
While the shift to cloud at that time was the need of the hour, two years down the line, it is proving to be costly for many businesses. As a result, many are shifting back to on-prem certain non-critical items. But how must businesses work out their economics in the cloud and what are some mistakes they are making?
The session will cover:
However, effective cybersecurity resilience necessitates a strategic alignment between cybersecurity experts and senior management. In a heavily regulated industry, what are the best ways to achieve compliance while ensuring the effectiveness of risk management strategies?
The session will cover:
@ISMG_News
#ISMGSummits
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats.
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats.
Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.
RSVP here to attend our events. You can select for multiple or individual tickets.
Upcoming ISMG Events
Upcoming ISMG Events