August 7, 2025

Cybersecurity Summit: Africa (Virtual)

9:00 AM - 12:30 PM SAST

Event Overview​

As digital transformation accelerates, with over 500 million internet users and increasing cloud adoption, the region has become a prime target for cybercriminals. Organizations across banking, telecom, healthcare, energy, and government sectors face an alarming surge in ransomware, phishing, data breaches, and supply chain attacks, leading to billions in economic losses and operational disruptions. Africa’s cybersecurity landscape is complex and evolving, driven by rapid digitalization, regulatory developments, and emerging threats. Ransomware groups and state-sponsored actors are targeting critical infrastructure, exploiting weak security frameworks, outdated systems, and low cybersecurity awareness.

The Cybersecurity Summit: Africa 2025 is the premier event for enterprise security leaders, policymakers, and technology pioneers committed to strengthening Africa’s cyber resilience. This summit will bring together top cybersecurity experts to explore AI-driven threat detection, cloud security, cyber threat intelligence sharing, social engineering defenses, and evolving regulatory frameworks. Attendees will gain actionable insights, best practices, and strategic roadmaps to navigate Africa’s dynamic threat landscape, mitigate risks, and fortify their cybersecurity infrastructure for the future.

Corradino Corradi

General Manager: Information Security Strategy, Architecture and Technical Excellence, MTN

Dr. Bharat Soni

Chief Information Security Officer, GTBank Plc.

Renaldo J

Group Head of Cybersecurity, Globeleq

Advisors

Guiding Our Summit With Industry Expertise

Our Summit Advisory Committee comprises industry visionaries whose guidance ensures the conference programs remain relevant, cutting-edge, and aligned with the most pressing cybersecurity challenges and opportunities – enabling attendees to apply the insights and learnings to their daily work.

Abdul-Hakeem Ajijola

Chair, African Union Cyber Security Experts Group

Preeta Bhagattjee

Director and Head of Technology & Innovation, Werksmans Attorneys

Simon Nare

Head of Information Security, TransUnion Africa

Sithembile Songo

Group Head, Information Security, Eskom

Varsha Sewlal

Executive Legal and Deputy Information Officer, Railway Safety Regulator

Galeboe Mogotsi

CISO, University of the Witwatersrand

Ntombothando Sigabi

Information Security and Risk Manager, Western Cape Blood Services

Mojalefa Mofammere

Network and Security Manager, Assupol

Bernard Chadenga

Founder & CEO, The Cimplicity Institute

Past Speakers

Thought Leaders on Stage Leading Deep-Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats.

Agenda Highlights

  • The Enemy Within- Tackling Insider Risks
  • AI vs AI: How AI Can be Used to Fight Against AI Attacks
  • Managing Vendor Risks Beyond the Contract
  • Cloud Security with Zero Trust
  • Smart Cloud Strategies: Balancing Cost Reduction with Peak Performance

Agenda

Opening Remarks

Note: The 2025 line-up will be announced soon. Stay tuned for updates.

Managing Vendor Risks Beyond the Contract

As high-profile breaches involving vendors become more common, enterprises must develop a continuous, risk-based approach to vendor management — focusing on real-time monitoring, access governance, compliance auditing, and incident response readiness. This session will explore how organizations can move beyond checklist-based vendor onboarding to build dynamic, proactive vendor risk management programs that safeguard sensitive data, critical operations, and regulatory compliance across complex supply chains.

The session will cover:  

  • What red flags can one look for during vendor onboarding to mitigate fraud risk
  • What tools or techniques must be used to detect fraudulent activity post-onboarding
  • How can organizations operationalize continuous vendor risk assessment without creating administrative burden

  

Abdul-Hakeem Ajijola, Chair, African Union Cyber Security Experts Group

Note: The 2025 line-up will be announced soon. Stay tuned for updates.

Panel: Fighting Fire with Fire: Defending Against AI with Advanced Intelligence

But can defensive AI truly outsmart offensive AI, or are we entering an arms race with unpredictable consequences? This session explores the evolving landscape of AI-powered cybersecurity, weighing the opportunities and risks of using machine intelligence to detect, defend and respond in real time.

Key takeaways include:

  • Examining how offensive AI is transforming the threat landscape through automation, obfuscation and scale;

  • Exploring how defensive AI can be deployed to accelerate detection, reduce response time and anticipate attack patterns;

  • Discussing the strategic, ethical and operational implications of an AI vs. AI security paradigm, and what it means for enterprise defense planning.

Preeta Bhagattjee, Director and Head of Technology & Innovation, Werksmans Attorneys
Nadia Veeran-Patel, Information Security Officer (CISO), LRMG

Note: The 2025 line-up will be announced soon. Stay tuned for updates.

The Enemy Within- Tackling Insider Risks

Insider incidents can lead to devastating breaches, financial losses, and reputational damage, often bypassing traditional security defenses.

This session will explore how enterprises can proactively detect, mitigate, and manage insider threats by leveraging behavior analytics, identity-based security, zero trust frameworks, and strong governance models. Security leaders will share strategies to build a culture of trust and vigilance while balancing employee privacy and organizational protection.  

The session will provide insights into real-world applications and best practices for deploying comprehensive IAM systems.  

This session will discuss:

  • Leveraging AI and UEBA for early detection
  • Key indicators to monitor to detect insider threats
  • Addressing issues related to abuse of power or excessive permissions

Simon Nare, Head of Information Security, TransUnion Africa

Note: The 2025 line-up will be announced soon. Stay tuned for updates.

Note: The 2025 line-up will be announced soon. Stay tuned for updates.

Fireside: AI in Zero Trust: Hope, Hype and Hidden Gaps

CISOs see AI as a “basket of opportunities but plenty of “vendor blind spots.” As the conversation shifts from generative to agentic AI, it’s clear this emerging technology holds tremendous potential to ease zero trust fatigue, but only when guided by business context, quality data and human oversight

This session will include:

  • How CISOs can cut through the vendor hype around AI
  • Why AI-Driven Zero Trust Fails Without Architecture Alignment
  • Where Should CISOs Draw the Line Between AI Autonomy and Oversight
  •  

Sithembile Songo, Group Head, Information Security, Eskom
Varsha Sewlal, Executive Legal and Deputy Information Officer, Railway Safety Regulator

Note: The 2025 line-up will be announced soon. Stay tuned for updates.

Note: The 2025 line-up will be announced soon. Stay tuned for updates.

Panel: Smart Cloud Strategies: Balancing Cost Reduction with Peak Performance

Enterprises must move beyond basic lift-and-shift migrations to smart, strategic cloud architectures that balance cost efficiency, cybersecurity resilience, and high availability. This session will dive into how African organizations can adopt cloud cost governance, intelligent workload placement, security-first cloud strategies, and AI-driven optimization tools to achieve maximum value. You will learn actionable insights on aligning cloud spending with business outcomes while ensuring peak operational performance and regulatory compliance.

The session will cover: 

  • Multi-Cloud and Hybrid cloud strategies: managing performance and spend  
  • Negotiating smart contracts with cloud service providers
  • Implementing FinOps (Cloud Financial Operations) for cost visibility and control

Dr Sylvia Sathekge, Partner and Chief Information Officer, SNG Grant Thornton
Tunde Dada, Group CIO/BCM, inq. digital

Note: The 2025 line-up will be announced soon. Stay tuned for updates.

Panel: Data Monitoring Best Practices In the Age of Automation

Automated monitoring tools have greatly improved process efficiency, but CISOs must find ways to combine human skills and machine learning abilities to eliminate risks. This session will delve on the importance of dark web monitoring, open-source intelligence and real-time analysis on preventing cyberthreats.  

This session will include:  

  • Right-sizing the SoC based on real-time challenges
  • Evaluating the effectiveness of automated monitoring tools
  • Updating incident response plans based on available tools and resources.

Galeboe Mogotsi, CISO, University of the Witwatersrand
Ntombothando Sigabi, Information Security and Risk Manager, Western Cape Blood Services
Mojalefa Mofammere, Network and Security Manager, Assupol

Networking & Exhibition Break

Note: The 2025 line-up will be announced soon. Stay tuned for updates.

Staying in Step With Advancements in Multi-Factor Authentication

However, malicious cybercriminals have found ways to exploit weaknesses in certain MFA types, such as phone and SMS-based authentication, to infiltrate devices. There is now a need for organizations to switch to stronger MFA controls, such as biometric authentication, adaptive authentication using AI and blockchain-driven identity management to secure corporate accounts.

This session will cover:

  • The role of behavioral analytics in identity management;
  • Can pattern anomaly analysis using AI help make MFA more secure and user-friend?
  • Are organizations using blockchain technology to secure MFA credentials and authentication events?

Corradino Corradi, General Manager: Information Security Strategy, Architecture and Technical Excellence, MTN
Ishaaq Jacobs, Chief Cyber Security Officer, Sasol
Bernard Chadenga, Founder & CEO, The Cimplicity Institute

.

Fireside Chat: Cybersecurity Resilience and Risk Management in the Financial Sector: Bridging the Gap Between Expertise and Strategy

However, effective cybersecurity resilience necessitates a strategic alignment between cybersecurity experts and senior management. In a heavily regulated industry, what are the best ways to achieve compliance while ensuring the effectiveness of risk management strategies?

The session will cover:

  • How to ensure cyber resilience on a regional level;
  • The role of education and training in building cyber resilience;
  • The need for collaboration between government and private sectors.

Closing Comments

The event will be simulive on October 4, 2023 (9:00 am – 2:00 pm) and available on demand until the end of Day 2, October 5, 2023.

Our Partner

Don’t miss your chance to attend this dynamic impactful event

@ISMG_News

#ISMGSummits

Register

RSVP here to attend our events. 

CPE Credits

ISMG Summits offer Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

The Summit Experience

Upcoming ISMG Events

June 24, 2025

Zero Data at Rest: A New Chapter in Mobile Security Strategy

June 24, 2025

Agentic AI and the Access Trust Gap

June 25, 2025

The Critical Role of the SOC in Modern Defense

July 3, 2025

Agentic AI: The Next Revolution in Intelligent Automation

August 19-20

Virtual Summit: Cybersecurity Implications of AI, Global

Upcoming ISMG Events

June 24, 2025

Zero Data at Rest: A New Chapter in Mobile Security Strategy

June 24, 2025

Agentic AI and the Access Trust Gap

June 25, 2025

The Critical Role of the SOC in Modern Defense