Cybersecurity Summit: Africa

August 7, 2025 | Virtual

Event Overview

As digital transformation accelerates, with over 500 million internet users and increasing cloud adoption, the region has become a prime target for cybercriminals. Organizations across banking, telecom, healthcare, energy, and government sectors face an alarming surge in ransomware, phishing, data breaches, and supply chain attacks, leading to billions in economic losses and operational disruptions. Africa’s cybersecurity landscape is complex and evolving, driven by rapid digitalization, regulatory developments, and emerging threats. Ransomware groups and state-sponsored actors are targeting critical infrastructure, exploiting weak security frameworks, outdated systems, and low cybersecurity awareness.

The Cybersecurity Summit: Africa 2025 is the premier event for enterprise security leaders, policymakers, and technology pioneers committed to strengthening Africa’s cyber resilience. This summit will bring together top cybersecurity experts to explore AI-driven threat detection, cloud security, cyber threat intelligence sharing, social engineering defenses, and evolving regulatory frameworks. Attendees will gain actionable insights, best practices, and strategic roadmaps to navigate Africa’s dynamic threat landscape, mitigate risks, and fortify their cybersecurity infrastructure for the future.

Advisors

Guiding Our Summit With Industry Expertise

Corradino Corradi

General Manager of Information Security Strategy, Architecture and Technical Excellence, MTN

Dr. Bharath Soni

CISO and DPO, GT Bank

Renaldo Jack

Group Head of Cybersecurity, Globeleq

Renaldo J

Group Head of Cybersecurity, Globeleq

Our Summit Advisory Committee comprises industry visionaries whose guidance ensures the conference programs remain relevant, cutting-edge, and aligned with the most pressing cybersecurity challenges and opportunities – enabling attendees to apply the insights and learnings to their daily work.

Deidre Marais

CISO, Western Cape Government and ISC2 Cape Town Chapter Advisory Board Member

Dr. Bharath Soni

CISO and DPO, GT Bank

Anna Collard

Senior Vice President of Content Strategy and Evangelist, KnowB4 Africa

Tunde Dada

Group CIO/BCM, inq. digital Group

Renaldo Jack

Group Head of Security, Globeleq

Mojalefa Moffamere

Network,Security and Telephony Manager, Assupol

Grant Hughes

CISO, GWV Group

Hanniel Jafaru

Founder and Executive Director, HTC Academy

Femi Olofintila M

Cyber risk, compliance and data privacy SME, Reliance Home Comfort

Speakers

Thought Leaders on Stage Leading Deep-Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats.

Agenda Highlights

  • The Enemy Within- Tackling Insider Risks
  • AI vs AI: How AI Can be Used to Fight Against AI Attacks
  • Managing Vendor Risks Beyond the Contract
  • Cloud Security with Zero Trust
  • Smart Cloud Strategies: Balancing Cost Reduction with Peak Performance

Agenda

Opening Remarks

09:00 am – 9:20 AM SAST

Keynote: AI, Automation and the Future of Cybersecurity Careers in Africa

From automating detection and response to generating sophisticated attacks, AI is both a powerful tool and a formidable disruptor. For African enterprises and governments, this transformation raises urgent questions: Will automation deepen the cybersecurity talent gap? Which roles are most at risk of being augmented or eliminated? How can regulation, policy and upskilling ensure that the workforce evolves alongside the technology? This keynote will address strategies to future-proof careers, build sustainable talent pipelines and balance innovation with responsible governance.

This session will cover:

  • How AI-driven tools are changing the skills mix and redefining cybersecurity roles across African industries;
  • Strategies for upskilling, re-skilling and developing talent to thrive in an AI-augmented security environment;
  • Why African regulators and industry leaders must collaborate to create frameworks that protect both security and livelihoods.

Deidre Marais

CISO, Western Cape Government, and ISC2 Cape Town Chapter Advisory Board Member

Kirsty Kelly

Group CISO, CFC, EMEA

Hemant Baidwan

CISO, U.S. Department of Homeland Security

Deidre Marais

CISO, Western Cape Government, and ISC2 Cape Town Chapter Advisory Board Member

Keynote: AI, Automation and the Future of Cybersecurity Careers in Africa

From automating detection and response to generating sophisticated attacks, AI is both a powerful tool and a formidable disruptor. For African enterprises and governments, this transformation raises urgent questions: Will automation deepen the cybersecurity talent gap? Which roles are most at risk of being augmented or eliminated? How can regulation, policy and upskilling ensure that the workforce evolves alongside the technology? This keynote will address strategies to future-proof careers, build sustainable talent pipelines and balance innovation with responsible governance.

This session will cover:

  • How AI-driven tools are changing the skills mix and redefining cybersecurity roles across African industries;
  • Strategies for upskilling, re-skilling and developing talent to thrive in an AI-augmented security environment;
  • Why African regulators and industry leaders must collaborate to create frameworks that protect both security and livelihoods.

Deidre Marais, CISO, Western Cape Government, and ISC2 Cape Town Chapter Advisory Board Member

Mojalefa Moffamere

Network,Security and Telephony Manager, Assupol

Corradino Corradi

General Manager, Information Security Strategy, Architecture and Technical Excellence, MTN

Fireside Chat: Fighting Fire with Fire: Defending Against AI With Advanced Intelligence

But can defensive AI truly outsmart offensive AI, or are we entering an arms race with unpredictable consequences? This session will explore the evolving landscape of AI-powered cybersecurity, weighing the opportunities and risks of using machine intelligence to detect, defend and respond in real time.

This session will cover:

  • Examining how offensive AI is transforming the threat landscape through automation, obfuscation and scale;
  • Exploring how defensive AI can be deployed to accelerate detection, reduce response time and anticipate attack patterns;
  • The strategic, ethical and operational implications of an AI vs. AI security paradigm, and what it means for enterprise defense planning.

Mojalefa Moffamere, Network,Security and Telephony Manager, Assupol
Corradino Corradi, General Manager, Information Security Strategy, Architecture and Technical Excellence, MTN

Anna Collard

Senior Vice President of Content Strategy and Evangelist, KnowBe4 Africa

Attention Is the New Perimeter: Strengthening Security Culture With Cognitive Resilience

As threat actors exploit our attention and emotions, it’s time we reframe our human defense strategies.

This session introduces a modern, science-based approach to security culture: one that moves beyond awareness into actionable resilience. Drawing from cyber psychology and behavioral science, we’ll explore how cultivating digital mindfulness can interrupt habitual mistakes, improve decision-making and foster a more vigilant workforce.

Rather than blaming users, the session introduces a constructive and empowering model to build cognitive resilience – treating attention as the new perimeter in your layered defense strategy.

This session will cover:

  • Embedding cognitive resilience into your security culture;
  • Applying security-in-depth thinking to the human layer;
  • Why attention hygiene is becoming as critical as password hygiene.

Anna Collard, Senior Vice President of Content Strategy and Evangelist, KnowBe4 Africa

10:00 AM - 10:20 AM SAST

Networking break

Dr. Bharath Soni

CISO and DPO, GT Bank

The CISO's Boardroom Playbook: Communicating Cyber Risk to Executives

This session will explore how security leaders can effectively communicate cyber risk in business terms, align cybersecurity KPIs with enterprise goals and build boardroom confidence during periods of economic uncertainty. Attendees will learn how to shift conversations from vulnerabilities and tools to resilience, risk appetite and long-term value creation while securing critical investment in cybersecurity initiatives.

This session will cover:

  • Translating technical risk into business impact for African boards;
  • Aligning cybersecurity KPIs with business objectives;
  • Making the case for investment in cybersecurity during economic volatility.

Bharat Soni, CISO and DPO, GT Bank

Tunde Dada

Group CIO/BCM, inq. digital Group

Securing LLMs in the Enterprise: Managing Risk Without Slowing Innovation

But with new opportunities come new risks: data leakage, prompt injection, unauthorized access and compliance gaps. This session will guide CISOs and IT leaders through the evolving threat landscape of enterprise LLMs, offering practical strategies for securing models, controlling access and aligning deployments with internal policies and regulatory requirements. Whether you’re piloting gen AI or scaling adoption, this session will help you build safely and responsibly.

This session will cover:

  • How prompt injection, model manipulation and data exposure can compromise enterprise LLM deployments;
  • Exploring frameworks for access controls, usage monitoring and internal policy enforcement around gen AI tools;
  • Securing LLM pipelines – from data inputs and APIs to model hosting environments and third-party integrations.

Tunde Dada, Group CIO/BCM, inq. digital Group

Renaldo Jack

Group Head, Cybersecurity, Globeleq, and Grant Hughes, CISO, GVW Group

Grant Hughes

CISO, GVW Group

Fireside chat: AI in Zero Trust: Hope, Hype and Hidden Gaps

CISOs see AI as a “basket of opportunities” with plenty of “vendor blind spots.”

This session will cover:

  • How CISOs can cut through the vendor hype around AI;
  • Why AI-driven zero trust fails without architecture alignment;
  • Where should CISOs draw the line between AI autonomy and oversight.

Renaldo Jack, Group Head, Cybersecurity, Globeleq
Grant Hughes, CISO, GVW Group

Harrison Nnaji

CISO, First Bank of Nigeria

Fighting Bank Fraud at Scale by Building Intelligence-Driven Cyber Defenses

In this session,  Harrison Nnaji, CISO at First Bank of Nigeria, will shares how the bank is rethinking its cybersecurity posture by blending threat intelligence, fraud analytics and inter-industry collaboration to preempt high-velocity, large-scale attacks.

This session will cover:

  • How banks can integrate fraud detection and cyber threat intelligence to proactively disrupt fraud operations;
  • Strategies for mitigating risks from internal actors and psychologically sophisticated attack vectors;
  • Lessons on working with telecoms, regulators and fintechs to build collective defense against fraud syndicates.

Harrison Nnaji, CISO, First Bank of Nigeria

Hanniel Jafaru

Founder and Executive Director of HTC Academy

Managing Vendor Risks Beyond the Contract

As high-profile breaches involving vendors become more common, enterprises must develop a continuous, risk-based approach to vendor management — focusing on real-time monitoring, access governance, compliance auditing, and incident response readiness. This session will explore how organizations can move beyond checklist-based vendor onboarding to build dynamic, proactive vendor risk management programs that safeguard sensitive data, critical operations, and regulatory compliance across complex supply chains.

 

This session will cover:

  • What red flags can one look for during vendor onboarding to mitigate fraud risk
  • What tools or techniques must be used to detect fraudulent activity post-onboarding
  • How can organizations operationalize continuous vendor risk assessment without creating administrative burden

Hanniel Jafaru, Founder and Executive Director of HTC Academy

Femi Olofintila M

Cyber Risk, Compliance and Data Privacy SME, Reliance Home Comfort

Sodiq Bello

CISO and DPO, Lotus Bank

Abumere Igboa

CISO/DPO, Stanbic IBTC PLC

Sodiq Bello

CISO, Lotus Bank

Panel: Future-Proof Cloud Security: Leadership Strategies for Emerging Threats

From supply chain compromises to AI-powered attacks, the cloud security landscape is evolving faster than traditional controls can keep up.

Attendees will explore actionable strategies to build resilient, future-ready cloud security programs, while gaining guidance on aligning security architecture with business priorities, managing risk across infrastructure and fostering a culture of continuous security innovation.

This session will cover:

  • Evolving tactics being used by adversaries to exploit cloud misconfigurations, supply chains and identity systems;
  • How AI-driven detection, automated response and continuous validation can help mitigate sophisticated attacks at scale
  • How to communicate cloud security risks and investments to boards and executives to drive alignment and accountability.

Femi Olofintila M, Cyber Risk, Compliance and Data Privacy SME, Reliance Home Comfort
Sodiq Bello, CISO and DPO, Lotus Bank
Abumere Igboa, CISO and DPO, Stanbic IBTC PLC

12:50 PM - 1:00 PM SAST

Closing Comments

The event will be simulive on August 7, 2025 (9:00 am – 2:00 pm) and available on demand until the end of Day, August 7, 2025.

Our Partner

Register

CPE Credits

ISMG Summits offer Continuing Professional Education Credits. Learn informative and engaging content created specifically for security professionals.

The Summit Experience

Upcoming ISMG Events

August 5, 2025

The Hidden Risks of Agentic AI

August 7-8, 2025

Virtual Cybersecurity Summit: Africa

August 13, 2025

Threat Exposure Management: How Do You Prioritize Vulnerabilities?

August 19-20, 2025

Virtual Summit: Cybersecurity Implications of AI, Global

September 11, 2025

Cybersecurity Summit: London Financial Services

Upcoming ISMG Events

August 5, 2025

The Hidden Risks of Agentic AI

August 7-8, 2025

Virtual Cybersecurity Summit: Africa

August 13, 2025

Threat Exposure Management: How Do You Prioritize Vulnerabilities?