Africa Summit
Virtual Summit October 12 - 13, 2022
This virtual summit's agenda will cover Zero Trust, IAM, Ransomware, Privacy, Fraud, Payments, IoT, Cryptocurrency, End Point Protection, Cloud Security and more.
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.
Ahmed Mokdad
Associate
Covington & Burling
Mokdad is an associate at Convington and Burling. he has a depth of experience assisting clients across various sectors navigate and mitigate a broad spectrum of regulatory and compliance risks, with a focus on data protection and information security matters.
Itumeleng Makgati
Group Executive- Information Security
A leading banking group
Makgati is group executive - information security, for a leading bank in South Aftica. She has close to two decades of expertise gathered in service of the financial Services, metals and mining, petrochemicals and public services industries.
Geetha Nandikotkur
Managing Editor & Conference Chair, Asia & Middle East
ISMG
Harrison Nnaji
CISO
FirstBank Nigeria
Nnaji is CISO FirstBank, Nigeria. He is an accomplished data and information security strategist and practitioner with more than 15 years of solid experience in the conception, engineering, design, delivery, operation and optimization of cyber, data and information security capabilities,...
Suparna Goswami
Associate Editor
ISMG
View Agenda
Keynote: Cybersecurity 2022: Evolving a New Enterprise Security Strategy to Tackle the Changing Threat Landscape

The past two years has resulted in increased digitization across sectors, with the enterprise cybersecurity leaders suddenly finding themselves tasked with defending their largest-ever attack surface. The trend has led to data proliferation, and organizations struggle to handle the sheer volume of data in this new regime. What are the threats to watch and technologies to embrace during the pandemic and beyond, particularly when the abundance of valuable information has captured subversive elements' attention? At the same time, cybercriminals have breached networks and compromised millions of records, not only causing revenue losses but impacting brand reputation? Enterprises consider this decade as the decade of digital trust as the country's top leadership emphasizes cybersecurity to have a tremendous impact on the nation's society and economics.

This session will discuss:

  • Key priorities for 2022—identity and access management, cloud, data protection, and regulations
  • A collaborative approach to building skills and techniques to achieve "future-proof" enterprise security
  • How will fraud and cybersecurity evolve in coming years?
  • 09:15 AM
  • 09:44 AM
Plenary Session: Insider Threat: What Can Enterprises Do to Mitigate Heightened Risk from Insider Threat

Various reports suggests that 24% of all security breaches that occur at financial institutions come from insiders. Workers in this critical sector have access to valuable customer data. This access makes them a lucrative targets for bad actors. Some insiders are malicious. Many are just careless. And others are compromised by outside attackers who gain access to sensitive data, systems and resources. It’s no wonder that insider threats are such a challenging threat vector. What can FIs do differently to tackle the problem?

The session will further discuss:

  • How concepts of zero trust can help fight insider threat
  • What new technologies are FIs leveraging in other markets
  • How to predict insider fraud
  • 09:45 AM
  • 10:14 AM
Demystifying South Africa's Protection of Personal Information Act (POPIA)

Cyberattacks in African countries, especially in the key financial centers of South Africa and Kenya have risen drastically this year. The Protection of Personal Information Act, or POPIA, which entered fully into force in July 2021, promotes the protection of personal information processed by public and private bodies, and introduces significant obligations regarding reporting and notification of data breach incidents. What are leading corporates doing to implement their POPIA compliance programs, and what are the priorities for South Africa's Information Regulator?

The session will discuss:

  • Practical implementation steps that companies are taking to address POPIA compliance
  • Priorities for South Africa's Information Regulator
  • Best practices for data breach response
  • 10:15 AM
  • 10:44 AM

This virtual summit's agenda will cover Zero Trust, IAM, Ransomware, Privacy, Fraud, Payments, IoT, Cryptocurrency, End Point Protection, Cloud Security and more.
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.

Ahmed Mokdad
Associate
Covington & Burling
Mokdad is an associate at Convington and Burling. he has a depth of experience assisting clients across various sectors navigate and mitigate a broad spectrum of regulatory and compliance risks, with a focus on data protection and information security matters.
Itumeleng Makgati
Group Executive- Information Security
A leading banking group
Makgati is group executive - information security, for a leading bank in South Aftica. She has close to two decades of expertise gathered in service of the financial Services, metals and mining, petrochemicals and public services industries.
Geetha Nandikotkur
Managing Editor & Conference Chair, Asia & Middle East
ISMG
Harrison Nnaji
CISO
FirstBank Nigeria
Nnaji is CISO FirstBank, Nigeria. He is an accomplished data and information security strategist and practitioner with more than 15 years of solid experience in the conception, engineering, design, delivery, operation and optimization of cyber, data and information security capabilities,...
Suparna Goswami
Associate Editor
ISMG

View Agenda
Keynote: Cybersecurity 2022: Evolving a New Enterprise Security Strategy to Tackle the Changing Threat Landscape

The past two years has resulted in increased digitization across sectors, with the enterprise cybersecurity leaders suddenly finding themselves tasked with defending their largest-ever attack surface. The trend has led to data proliferation, and organizations struggle to handle the sheer volume of data in this new regime. What are the threats to watch and technologies to embrace during the pandemic and beyond, particularly when the abundance of valuable information has captured subversive elements' attention? At the same time, cybercriminals have breached networks and compromised millions of records, not only causing revenue losses but impacting brand reputation? Enterprises consider this decade as the decade of digital trust as the country's top leadership emphasizes cybersecurity to have a tremendous impact on the nation's society and economics.

This session will discuss:

  • Key priorities for 2022—identity and access management, cloud, data protection, and regulations
  • A collaborative approach to building skills and techniques to achieve "future-proof" enterprise security
  • How will fraud and cybersecurity evolve in coming years?
  • 09:15 AM
  • 09:44 AM
Plenary Session: Insider Threat: What Can Enterprises Do to Mitigate Heightened Risk from Insider Threat

Various reports suggests that 24% of all security breaches that occur at financial institutions come from insiders. Workers in this critical sector have access to valuable customer data. This access makes them a lucrative targets for bad actors. Some insiders are malicious. Many are just careless. And others are compromised by outside attackers who gain access to sensitive data, systems and resources. It’s no wonder that insider threats are such a challenging threat vector. What can FIs do differently to tackle the problem?

The session will further discuss:

  • How concepts of zero trust can help fight insider threat
  • What new technologies are FIs leveraging in other markets
  • How to predict insider fraud
  • 09:45 AM
  • 10:14 AM
Demystifying South Africa's Protection of Personal Information Act (POPIA)

Cyberattacks in African countries, especially in the key financial centers of South Africa and Kenya have risen drastically this year. The Protection of Personal Information Act, or POPIA, which entered fully into force in July 2021, promotes the protection of personal information processed by public and private bodies, and introduces significant obligations regarding reporting and notification of data breach incidents. What are leading corporates doing to implement their POPIA compliance programs, and what are the priorities for South Africa's Information Regulator?

The session will discuss:

  • Practical implementation steps that companies are taking to address POPIA compliance
  • Priorities for South Africa's Information Regulator
  • Best practices for data breach response
  • 10:15 AM
  • 10:44 AM

Speaker Interviews

October 12 - 13, 2022

Africa Summit