October 4-5, 2023

Virtual Cybersecurity Summit: Africa

9:00 AM - 2:00 PM SAST

Event Overview

Cybersecurity leaders say Africa has become a hotbed for cybercrime activities.

In 2022, the region has experienced an increase in DDoS attacks, ransomware attacks, attacks against industrial control systems (ICS), business email compromises, and phishing attacks — the list is endless. The region must take a collaborative defense approach to respond to this new threat environment. The challenge for enterprises has been to ascertain how much risk they are willing to accept to accomplish their mission.

In the hybrid and interconnected world, the noticeable change has been changing consumption patterns of security technologies, which require new ways to deploy frameworks. The enterprise’s success will depend on its endurance to balance offense and defense to mitigate these threats using the right tools, technologies, and best practices. To gain insights into how to establish a secure ecosystem in this dynamic world, attend ISMG’s cybersecurity summit and explore diverse cybersecurity trends from ransomware to supply chain attacks, infrastructure security to automotive cybersecurity, endpoint security featuring AI, connected devices’ challenges, critical infrastructure vulnerabilities, ICS risk, crypto challenges, extended detection and response, cyber insurance, and more.

You can also earn your CPE credits by attending the summit. ISMG’s agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.

Venue

Singapore

Singapore

Highlight Topics

  • Enhancing Your Security Posture
  • Third Party Risk Management
  • Cyber Governance
  • 5G Network Security and Business Opportunities
  • Zero Trust

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Agenda

Name

Designation, Company

Nastassja van den Heever

CISO, FNB South Africa

Plenary: Refining Incident Response Playbook on Malicious Attack Pattern: Key Essentials

Does your incident response strategy differ with different attacks? How is your incident response strategy for ransomware attacks different from supply chain attack?  Businesses usually build a great incident management procedure with great charts and workflows but execution is a challenge since asset inventory is not up to the mark. Against this backdrop, how does one choose the right playbook? 

In this session, you will learn more on: 

  • The importance of assessments and associating with partners 
  • Components of cyber resilience playbook 
  • Building a robust incident response plan 

Babatunde Bambigboye

Head Legal Enforcement Regulations, NDPC

Keynote: Navigating Data Privacy in the Age of AI: Government Policies and Practices

With the rising integration of artificial intelligence, it has become imperative for businesses to include privacy and digital trust in their security practices. However, the same needs to be driven by policymakers and regulators to ensure that these laws do not hinder trade and businesses. What role does the government play here, and what are some of the best practices followed across the government in Africa? 

The session will cover: 

  • Privacy implications on cross-border transfer of data; 
  • How various governments in Africa are ensuring privacy; 
  • Can there be a unified privacy law for Africa?

Unathi Thosago

Group CTO, Adcorp Group

Tunde Dada

Group Head IT/BCM, inq. Digital

Fireside Chat: Harnessing AI for Advanced Cybersecurity Prediction

The cybersecurity industry is increasingly turning towards artificial intelligence to not only defend against threats but also predict them in advance. Intelligent threat detection, automated incident response, strengthening user authentication are some of the game – changer in the realm of cybersecurity.

The session will also discuss:    

  • The various case studies on how AI has helped improve internal security posture.
  • Is AI a Friend or Foe? 
  • The cybersecurity AI roadmap

Networking & Exhibition Break

Tim Theuri

Executive Head of Cybersecurity, M-PESA Africa

Bernard Munyaradzi Chadenga

Chief Digital Protection Officer, CGI Konsult

Two-way street: Fortifying Your Supply Chain: Mastering Third-Party Risk Management

Since every vendor poses a security risk, organizations must classify them by risk and track the data they manage. Third-party risks can span from a law firm managing sensitive client information to a flower delivery company. A third-party risk program requires a holistic view on third parties and a way to automate the entire life cycle of supplier engagement. Organizations should classify risk using internal and external data to align it with the organization’s risk appetite.

The session will discuss:  

  • The importance of classification, onboarding and continuous monitoring in third-party risk management; 
  • The benefits of widespread automation in lieu of manual methods 
  • Why every security tool needs to adopt AI methodologies 

Nomaphelo Baloyi

Regional Security Lead, Africa; Mastercard

Exclusive: How to Save Yourself from Different Types of Phishing

In 2022, the country had 230 million threat detections in total. In second place was Morocco at 71 million. Of the 230 million detected threats in the country, 219 million were e-mail-related threats.  

More discussion points will include:  

  • Email as an attack vector and why BEC scams are still so successful 
  • The rise of email platform attacks that bypass the inbox 
  • And how to defend against both types with new technologies 

Kevin Mitchell

CIO - Commercial, FNB South Africa

Griffith Ehebha

Chief Risk Officer (CRO) , Interswitch Group

Fireside Chat: API Security: The New Security Battleground for CISOs

Experts say learning the API attack techniques that hackers use to achieve their targets is critical.  If the tactical goal is credential access, the attacker may use brute force attacks or man-in-the-middle attacks as their techniques. As organizations are modernizing their applications and infrastructure as part of their cloud strategy, the use of third-party software and APIs is immense to integrate with older applications and data stores. Protecting your APIs against vulnerabilities and malicious actors looking to gain access to your valuable data is crucial. There is a need to repurpose part of the budget from other layers of the technology stack to API security. 

The session will cover:  

  • Managing API attack surface; 
  • Understanding and quantifying top API risks;  
  • Who owns API security in the organization and what to look for in an API security solution.

Networking & Exhibition Break

Chinenye Chizea

Consulting Security Architect, WB/FGN Digital Identification for Development (ID4D) project

Lineo Racoco

Group CISO, Coca-Cola Beverages Africa

Panel Discussion: Establishing a Cyber Secure Cloud: Working out the Economics

While the shift to cloud at that time was the need of the hour, two years down the line, it is proving to be costly for many businesses. As a result, many are shifting back to on-prem certain non-critical items. But how must businesses work out their economics in the cloud and what are some mistakes they are making? 

The session will cover: 

  • How to balance cost and user experience on the cloud? 
  • Does microservices help in the long run? 
  • Common mistakes made on the cloud. 

Kenneth Palliam

President ISACA, South Africa Chapter

Dr David Isiavwe

President & chairman board of trustees, Information Security Society of Africa, Nigeria (ISSAN); General Manager, Ecobank Nigeria Ltd

Fireside Chat: Cybersecurity Resilience and Risk Management in the Financial Sector: Bridging the Gap Between Expertise and Strategy

However, effective cybersecurity resilience necessitates a strategic alignment between cybersecurity experts and senior management. In a heavily regulated industry, what are the best ways to achieve compliance while ensuring the effectiveness of risk management strategies?

The session will cover:

  • How to ensure cyber resilience on a regional level;
  • The role of education and training in building cyber resilience;
  • The need for collaboration between government and private sectors.

Closing Comments

The event will be simulive on October 4, 2023 (9:00 am – 2:00 pm) and available on demand until the end of Day 2, October 5, 2023.

Association

Don’t miss your chance to attend this dynamic impactful event

@ISMG_News

#ISMGSummits

Nastassja van den Heever

CISO, FNB South Africa

Nomaphelo Baloyi

Regional Security Lead, Africa; Mastercard

Unathi Thosago

Group CTO, Adcorp Group

Babatunde Bambigboye

Head Legal Enforcement Regulations, NDPC

Tim Theuri

Executive Head of Cybersecurity, M-PESA Africa

Bernard Munyaradzi Chadenga

Chief Digital Protection Officer, CGI Konsult

Lineo Racoco

Group CISO, Coca-Cola Beverages Africa

Kevin Mitchell

CIO - Commercial, FNB South Africa

Griffith Ehebha

Chief Risk Officer(CRO), Interswitch Group

Kenneth Palliam

President ISACA, South Africa Chapter

Dr David Isiavwe

President & chairman board of trustees, Information Security Society of Africa, Nigeria (ISSAN); General Manager, Ecobank Nigeria Ltd

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats.

Advisors

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats.

Tunde Dada

Group Head IT/BCM, inq. Digital

Dr. (h.c) Bharat Soni

CISO, DPO, GT Bank Plc.

Chinenye Chizea

Consulting Security Architect, World Bank and Federal Government of Nigeria

Robert Brine

Cyber & Intelligence Solutions, Mastercard

The Summit Experience

CPE Credits

Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

Register

RSVP here to attend our events. You can select for multiple or individual tickets. 

Upcoming ISMG Events

Decemebr 5-6, 2024

Virtual IoT/OT Summit

December 10, 2024

State of Identity: Protecting Identities in the Modern Climate

December 10, 2024

Transformez vos Opérations avec l'IA Générative Avancée d'Elastic et Google Cloud Paris

december 12, 2024

Revolutionizing AppSec with Multi-AI Agent Approach

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

Upcoming ISMG Events

Decemebr 5-6, 2024

Virtual IoT/OT Summit

December 10, 2024

State of Identity: Protecting Identities in the Modern Climate

December 10, 2024

Transformez vos Opérations avec l'IA Générative Avancée d'Elastic et Google Cloud Paris