The definitive event for information security professionals

15 – 19 May 2017

Speakers

Dr Aleksandar Valjarevic, Professional services consultant, LAWtrust Aleksandar Valjarevic (Dr)  Professional services consultant, LAWtrust 17. May - Conference day 2 - Track one – Governance, Legal and Risk
Professional services consultant, LAWtrust
Dr Aleksandar Valjarevic, Professional services consultant, LAWtrust

Dr Aleksandar Valjarevic is a seasoned information security and management professional, concentrating on solutions in the areas of authentication, encryption, electronic ID documents, PKI and biometrics.

Read bio
Andre Joseph, Information security architect, Oracle Pre Sales South Africa Andre Joseph  Information security architect, Oracle Pre Sales South Africa 16. May - Conference day 1 - Track two – Security in the Public Sector
Information security architect, Oracle Pre Sales South Africa
Andre Joseph, Information security architect, Oracle Pre Sales South Africa

Previously a Database technologies lecturer at Oracle University, Andre Joseph is now the Information Security Architect for Oracle Presales in South Africa, looking at advising customers on how to secure their Oracle technology stack.

Read bio
Antonio Forzieri  cyber security practice lead EMEA Symantec 17. May - Conference day 2 - Track two – Best Practice InfoSec
cyber security practice lead EMEA Symantec

At Symantec Antonio Forzieri is responsible for the cyber security offering for EMEA from a technology perspective.

Read bio
Bharadwaj Machiraju, Project leader, OWASP OWTF Bharadwaj Machiraju  Project leader, OWASP OWTF 18. & 19. May - Training - WebSec Training 101
Project leader, OWASP OWTF
Bharadwaj Machiraju, Project leader, OWASP OWTF

Bharadwaj Machiraju project leader for OWASP OWTF, is mostly found either building a Web appsec tool or hunting bugs for fame.

Read bio
Candice Sutherland, Business development underwriter, Hollard Candice Sutherland  Business development underwriter, Hollard 15. May - Workshop 2 - Cyber Security and Liability & 17. May - Conference day 2 - Track one – Governance, Legal and Risk
Business development underwriter, Hollard
Candice Sutherland, Business development underwriter, Hollard

Candice Sutherland is a business development underwriter at Hollard. She is a qualified CAIB (SA), specialising in finance, and has appeared on CliffCentral, eTV and ENCA.

Read bio
Carolynn Chalmers, Corporate governance advisor, Candor Governance Carolynn Chalmers  Corporate governance advisor, Candor Governance 17. May - Conference day 2 - Track one – Governance, Legal and Risk
Corporate governance advisor, Candor Governance
Carolynn Chalmers, Corporate governance advisor, Candor Governance

Carolynn Chalmers holds an MSc from the University of Cape Town; is certified in the governance of enterprise IT; is an IT governance facilitator for the Institute of Directors; and is a member of the IITPSA’s Western Cape committee.

Read bio
Cobus van den Berg, Senior manager, PwC Cobus van den Berg  Senior manager, PwC 17. May - Conference day 2 - Track two – Best Practice InfoSec
Senior manager, PwC
Cobus van den Berg, Senior manager, PwC

After finishing his BSc degree at UFS, Cobus van den Berg started his career at small consulting firms, producing technology architectures, process models, process optimisation and development for the Department of Defence and Grintek (Saab).

Read bio
Darran Rolls, Chief technology officer, SailPoint Darran Rolls  Chief technology officer, SailPoint 17. May - Conference day 2 - Chairman & 17. May - Conference day 2 - Track three – Technical
Chief technology officer, SailPoint
Darran Rolls, Chief technology officer, SailPoint

Darran Rolls directs the continued development and communication of SailPoint's technology strategy and vision.

Read bio
Darron Gibbard, Chief Technical Security Officer , EMEA, Qualys Darron Gibbard  CISM, CISSP, Chief technical security Officer, EMEA, Qualys 17. May - Conference day 2 - Track three – Technical
CISM, CISSP, Chief technical security Officer, EMEA, Qualys
Darron Gibbard, Chief Technical Security Officer , EMEA, Qualys

Before joining Qualys as CTSO, I have spent the last 25+ years working for a variety of payment services, media and telco organisations providing Cyber, IT and Information security thought leadership and subject matter expertise.

Read bio
Darshan Lakha, Executive head – Vodacom group technology security, Vodacom Darshan Lakha  Executive head – Vodacom group technology security, Vodacom 16. May - Conference day 1 - Plenary speaker
Executive head – Vodacom group technology security, Vodacom
Darshan Lakha, Executive head – Vodacom group technology security, Vodacom

Darshan Lakha, executive head – Vodacom Group Technology Security, Vodacom, started at Vodacom in 1996, and has held key positions with Vodacom Technology both in the Enterprise Business and Mobile Network Engineering Groups.

Read bio
Dave Loxton, Partner, Dentons Dave Loxton  Partner, Dentons 17. May - Conference day 2 - Track one – Governance, Legal and Risk
Partner, Dentons
Dave Loxton, Partner, Dentons

David Loxton was previously co-head of forensics at ENSafrica.

Read bio
David Moncur, Technical account manager for enterprise mobility, Samsung Mobile, South Africa David Moncur  Technical account manager for enterprise mobility, Samsung Mobile, South Africa 16. May - Conference day 1 - Track two – Security in the Public Sector
Technical account manager for enterprise mobility, Samsung Mobile, South Africa
David Moncur, Technical account manager for enterprise mobility, Samsung Mobile, South Africa

In his role as technical account manager, David Moncur is responsible for Samsung Mobile SA's presales business-to-business mobility operations - working with network operators, ISVs and system integrators to position Samsung's product portfolio and vertical/horizontal software solutions.

Read bio
Derek Schraader, Risk Advisory Africa leader: Cyber Risk Services, Deloitte Derek Schraader  Risk advisory Africa leader: cyber risk services, Deloitte 17. May - Conference day 2 - Track three – Technical
Risk advisory Africa leader: cyber risk services, Deloitte
Derek Schraader, Risk Advisory Africa leader: Cyber Risk Services, Deloitte

Derek Schraader is the Risk Advisory Africa leader for Cyber Risk Services, based in Deloitte SA, focusing predominantly on: security management, cyber security, information protection, identity and access management, vulnerability management, application integrity, business resilience and resiliency, and disaster risk management.

Read bio
Eleanor Weaver, country manager, Darktrace Eleanor Weaver  country manager, Darktrace 16. May - Conference day 1 - Track three – Technical
country manager, Darktrace
Eleanor Weaver, country manager, Darktrace

Eleanor Weaver is country manager for Africa at Darktrace.

Read bio
Elsa Jordaan, General insurance and dispute resolution lawyer, Norton Rose Fulbright Elsa Jordaan  General insurance and dispute resolution lawyer, Norton Rose Fulbright 17. May - Conference day 2 - Track one – Governance, Legal and Risk
General insurance and dispute resolution lawyer, Norton Rose Fulbright
Elsa Jordaan, General insurance and dispute resolution lawyer, Norton Rose Fulbright

Elsa Jordaan is a general insurance and dispute resolution lawyer at Norton Rose Fulbright. She advises on a range of insurance matters, including professional indemnity, computer crime/cyber liability, aviation, medical malpractice, personal injury and public liability.

Read bio
Francis Alexander, Information security researcher and author, NoSQL Exploitation Framework Francis Alexander  Information security researcher and author, NoSQL Exploitation Framework 18. & 19. May - Training - WebSec Training 101
Information security researcher and author, NoSQL Exploitation Framework
Francis Alexander, Information security researcher and author, NoSQL Exploitation Framework

Francis Alexander, information security researcher and author of the NoSQL Exploitation Framework, has a strong vision of free and open information security education for all.

Read bio
Francis Cronje, Managing director, FrancisCronje (Pty) Ltd Francis Cronje  Managing director, FrancisCronje (Pty) Ltd 16. May - Conference day 1 - Plenary speaker
Managing director, FrancisCronje (Pty) Ltd
Francis Cronje, Managing director, FrancisCronje (Pty) Ltd

Francis Cronjé is the MD at FrancisCronje and is an information governance specialist with a strong legal background and years of practical experience. He advises large entities – ranging from banks and insurance houses to medical administrators – on the powerful impact of POPI and associated information laws.

Read bio
Gareth James, Network and security specialist, VMware sub-Saharan Africa Gareth James  Network and security specialist, VMware sub-Saharan Africa 16. May - Conference day 1 - Track three – Technical
Network and security specialist, VMware sub-Saharan Africa
Gareth James, Network and security specialist, VMware sub-Saharan Africa

Gareth James is a network and security specialist at VMware. In this role, he is directly responsible for accelerating the adoption of VMware's Network & Security solutions in the sub-Saharan African region, a strategic initiative for VMware.

Read bio
Gianni Twigg, Researcher/software engineer within the cyber defence group, Council for Scientific and Industrial Research (CSIR) Gianni Twigg  Researcher/software engineer within the cyber defence group, Council for Scientific and Industrial Research (CSIR) 16. May - Conference day 1 - Track three – Technical
Researcher/software engineer within the cyber defence group, Council for Scientific and Industrial Research (CSIR)
Gianni Twigg, Researcher/software engineer within the cyber defence group, Council for Scientific and Industrial Research (CSIR)

He has research interests and technical expertise in network and server virtualisation, software defined networking, software development, ethical hacking and hardware security testing.

Read bio
Hein Smith  Solutions architect, info|Guardian 15. May - Workshop 1 Ransomware Protection
Solutions architect, info|Guardian

Senior Information security consultant with exceptionally high standards of customer services delivery and proven security software integration across multiple industry verticals.

Read bio
Heloise Pieterse, Senior researcher within the cyber warfare research group, Council for Scientific and Industrial Research Heloise Pieterse  Senior researcher within the cyber warfare research group, Council for Scientific and Industrial Research 16. May - Conference day 1 - Track three – Technical
Senior researcher within the cyber warfare research group, Council for Scientific and Industrial Research
Heloise Pieterse, Senior researcher within the cyber warfare research group, Council for Scientific and Industrial Research

Her core research areas include mobile security, information security and cyber security awareness and the development of software capabilities for mobile devices.

Read bio
Herman Young, group security officer, Investec Herman Young  group security officer, Investec 16. May - Conference day 1 - Track one – Security in Finance
group security officer, Investec
Herman Young, group security officer, Investec

Herman Young has been hacking and defending organisations for over 20 years now.

Read bio
Ivo Vegter, Author, speaker, columnist Ivo Vegter  columnist, speaker, author 16 & 17. May - Conference day 1 & 2 - Chairman
columnist, speaker, author
Ivo Vegter, Author, speaker, columnist

Ivo Vegter is an independent journalist whose flagship column appears weekly in Daily Maverick.

Read bio
Dr Jabu Mtsweni, Research Group leader for Cyber Defence, Council for Industrial and Scientific Research (CSIR)
Dr Jabu Mtsweni  Research Group leader for Cyber Defence, Council for Industrial and Scientific Research (CSIR) 16. May - Conference day 1 - Track three – Technical
Research Group leader for Cyber Defence, Council for Industrial and Scientific Research (CSIR)
Dr Jabu Mtsweni, Research Group leader for Cyber Defence, Council for Industrial and Scientific Research (CSIR)

Dr Jabu Mtsweni has research interest and technical expertise in Internet of services, software and firmware reverse engineering, malware analysis, threat intelligence, Web security and general cyber warfare. He has over 13 years’ academic and industry experience and has published over 38 peer-reviewed conferences and journal papers/articles both in local and international forums.

Read bio
Jacques Louw, Director, MWR Infosecurity Jacques Louw  Director, MWR Infosecurity 16. May - Conference day 1 - Track one – Security in Finance & 17. May - Conference day 2 - Track one – Governance, Legal and Risk
Director, MWR Infosecurity
Jacques Louw, Director, MWR Infosecurity

Jacques Louw heads up the Cyber Defence Practice at MWR Infosecurity.

Read bio
Janine van Niekerk, OMEM CST: IT service design and transition, Old Mutual Life Assurance Company Janine van Niekerk  OMEM CST: IT service design and transition, Old Mutual Life Assurance Company 16. May - Conference day 1 - Track one – Security in Finance
OMEM CST: IT service design and transition, Old Mutual Life Assurance Company
Janine van Niekerk, OMEM CST: IT service design and transition, Old Mutual Life Assurance Company

Janine van Niekerk is a BCom Business Information Systems student with 10 years of information security and compliance experience across multiple disciplines, and currently in IT service management (ITIL certified).

Read bio
Jason Jordaan, Principal forensic scientist and MD, DFIRLABS Jason Jordaan  Principal forensic scientist and MD, DFIRLABS 17. May - Conference day 2 - Plenary speaker
Principal forensic scientist and MD, DFIRLABS
Jason Jordaan, Principal forensic scientist and MD, DFIRLABS

Jason Jordaan is considered a leading authority in the field of digital forensics and cyber crime investigation and prevention, in a forensics career that began in 1991.

Read bio
 Jayson Street  infosec ranger, Pwnie Express 17. May - Conference day 2 - Keynote speaker
infosec ranger, Pwnie Express

Jayson E Street is the author of Dissecting the Hack. He is also the DEFCON Group’s global coordinator.

Read bio
 Jessy Irwin  Security expert 16. May - Conference day 1 - Keynote speaker
Security expert

Jessy Irwin is a security expert who excels in translating complex cybersecurity issues into simple, relatable terms for non-technical audiences.

Read bio
Joey Jansen van Vuuren, Manager of the Cybersecurity Centre of Innovation, CSIR South Africa Joey Jansen van Vuuren  Manager of the Cybersecurity Centre of Innovation, CSIR South Africa 16. May - Conference day 1 - Track two – Security in the Public Sector
Manager of the Cybersecurity Centre of Innovation, CSIR South Africa
Joey Jansen van Vuuren, Manager of the Cybersecurity Centre of Innovation, CSIR South Africa

Joey Jansen van Vuuren spent more than 20 years in academia and research, with 10 years as the HOD for an academic IT department, and seven years as the research group leader for Cyber Defence at the CSIR.

Read bio
Keitumetsi Tsotetsi, consultant, PwC Keitumetsi Tsotetsi  consultant, PwC 17. May - Conference day 2 - Track two – Best Practice InfoSec
consultant, PwC
Keitumetsi Tsotetsi, consultant, PwC

Keitumetsi Tsotetsi is a cyber security risk assurance consultant at PwC. She takes part in cyber maturity assessments and advisory, user awareness programmes, penetration testing and social engineering for industries including financial services, public services, telecommunications, logistics and mining.

Read bio
Kevin Wilson, GM Group IT, Stefanutti Stocks Construction Kevin Wilson  GM Group IT, Stefanutti Stocks Construction 16. May - Conference day 1 - Track three – Technical
GM Group IT, Stefanutti Stocks Construction
Kevin Wilson, GM Group IT, Stefanutti Stocks Construction

Kevin Wilson is GM of Group IT at Stefanutti Stocks Construction.

Read bio
Lauren Beukes, Award-winning, internationally acclaimed best-selling author Lauren Beukes  Award-winning, internationally acclaimed best-selling author. 16. May - Conference day 1 - Keynote speaker
Award-winning, internationally acclaimed best-selling author.
Lauren Beukes, Award-winning, internationally acclaimed best-selling author

Lauren's novels have been translated into 26 languages and are being developed for film and TV.

Read bio
Lisa Emma-Iwuoha, Attorney, Michalsons Lisa Emma-Iwuoha  Attorney, Michalsons 17. May - Conference day 2 - Track one – Governance, Legal and Risk
Attorney, Michalsons
Lisa Emma-Iwuoha, Attorney, Michalsons

Lisa Emma-Iwuoha is a capable and effective attorney and has experience dealing with clients to deliver exactly what they want in an effective manner.

Read bio
Maganathin Marcus Veeraragloo, Chief advisor, information security, Eskom Maganathin Marcus Veeraragloo  Chief advisor, information security, Eskom 16. May - Conference day 1 - Track two – Security in the Public Sector
Chief advisor, information security, Eskom
Maganathin Marcus Veeraragloo, Chief advisor, information security, Eskom

A proactive, analytical and conscientious enterprise architect, enterprise security architect and solutions architect with over 20 years' IT experience in the education (North West University), insurance (Discovery Health), banking (Standard Bank, Central Bank of Nigeria, African Bank in Nigeria, BANKSERV), telecommunications (Cell C), public sector (The Department of Trade and Industry, Small Enterprise Development Agency), energy utility (Eskom), water utility (Rand Water), IT consulting (T-Systems South Africa and ATOS) industries.

Read bio
Maiendra Moodley, Head of Department for Financial Systems and Processes, SITA Maiendra Moodley  Head of Department for Financial Systems and Processes, SITA 16. May - Conference day 1 - Track two – Security in the Public Sector
Head of Department for Financial Systems and Processes, SITA
Maiendra Moodley, Head of Department for Financial Systems and Processes, SITA

Maiendra Moodley graduated from the University of Natal, with a bachelor of commerce degree with majors in business information systems and information systems technology. Subsequently, he read for the advanced business programme and bachelor of technology (management) at Technikon Natal, before studying for his master's in business administration through the University of Wales.

Read bio
Manuel Corregedor, COO, Telspace Systems Manuel Corregedor  Chief operating officer, Telspace Systems 16. May - Conference day 1 - Track one – Security in Finance & 18. & 19. May - Training - Wireless Hacking 101
Chief operating officer, Telspace Systems
Manuel Corregedor, COO, Telspace Systems

Manuel Corregedor is COO at Telspace Systems. He has a passion for information security and, over the years, has gained significant knowledge and experience in both the technical (operational) and management areas of information security.

Read bio
Mark Heyink  Partner, Mark Heyink Information Attorney 16. May - Conference day 1 - Plenary speaker
Partner, Mark Heyink Information Attorney

Mark Heyink holds BA and LLB degrees, a higher diploma in company law and is an admitted attorney, notary and conveyancer of the High Court of South Africa. In addition to his legal qualifications, Heyink has studied information management at the Wits Graduate School of Business, and qualified in 2004 as a Certified Information Security Systems Professional.

Read bio
 Mati Aharoni  Founder, Offensive Security 17. May - Conference day 2 - Keynote speaker
Founder, Offensive Security

Mati Aharoni is an infosec dinosaur with over a decade of active involvement in the infosec community. Aharoni has founded projects like the Kali Linux Open Source distribution, and the Exploit Database, as well as Offensive Security – a leading infosec company well known for its industry-defining security certifications and training.

Read bio
Mthoko Mncwabe, Group CIO, South African Post Office Mthoko Mncwabe  Group CIO, South African Post Office 16. May - Conference day 1 - Track two – Security in the Public Sector
Group CIO, South African Post Office
Mthoko Mncwabe, Group CIO, South African Post Office

Mthoko Mncwabe has over 16 years of experience in the IT industry.

Read bio
Mustafa Al-Bassam,  Information security advisor, Secure Trading and Cognosec Mustafa Al-Bassam  Information security advisor, Secure Trading and Cognosec 17. May - Conference day 2 - Plenary speaker
Information security advisor, Secure Trading and Cognosec
Mustafa Al-Bassam,  Information security advisor, Secure Trading and Cognosec

Mustafa is an information security advisor at London-based Secure Trading and Cognosec, and a doctoral researcher at University College London, with a focus on cryptocurrency and distributed ledger technology.

Read bio
Nithen Naidoo,  CIO and co-founder, Snode Nithen Naidoo  CIO and co-founder, Snode 16. May - Conference day 1 - Track one – Security in Finance
CIO and co-founder, Snode
Nithen Naidoo,  CIO and co-founder, Snode

Nithen Naidoo, CIO and co-founder of Snode, has over 12 years of experience providing cyber security services in numerous countries, including the US, UK, Germany, the UAE, Nigeria, Vietnam and Egypt.

Read bio
Peter Oeschger, Head of IT, The South African Bank of Athens Peter Oeschger  Head of IT, The South African Bank of Athens 16. May - Conference day 1 - Track one – Security in Finance
Head of IT, The South African Bank of Athens
Peter Oeschger, Head of IT, The South African Bank of Athens

Peter Oeschger is the head of IT at The South African Bank of Athens.

Read bio
Peter Tobin, Founding director, Peter Tobin Consultancy Peter Tobin (Dr)  Founding director, Peter Tobin Consultancy 18. & 19. May - Training - Data Privacy & Protection of Personal Information Training
Founding director, Peter Tobin Consultancy
Peter Tobin, Founding director, Peter Tobin Consultancy

Dr Peter Tobin, founding director of Peter Tobin Consultancy, is based in Johannesburg, SA. Dr Tobin has over 30 years of business and management experience across a number of different industries and in a wide range of roles.

Read bio
 Phannuel Malebye  Security officer, Ekurhuleni Metro 16. May - Conference day 1 - Track two – Security in the Public Sector
Security officer, Ekurhuleni Metro

Phannuel (Fani) Malebye started at Ekurhuleni Metro more than 15 years ago as a PC technician, then senior PC technician.

Read bio
Raymond du Plessis, Managing consultant, Mobius Consulting Raymond du Plessis  Managing consultant, Mobius Consulting 17. May - Conference day 2 - Track three – Technical
Managing consultant, Mobius Consulting
Raymond du Plessis, Managing consultant, Mobius Consulting

Raymond du Plessis comes with a broad range of experience in information and cyber security management.

Read bio
Rebekah Brown, Threat intelligence lead, global services, Rapid7 Rebekah Brown  Threat intelligence lead, global services, Rapid7 16. May - Conference day 1 - Keynote speaker
Threat intelligence lead, global services, Rapid7
Rebekah Brown, Threat intelligence lead, global services, Rapid7

Rebekah Brown has spent more than a decade working in the intelligence community; her areas of expertise include cryptologic linguistics, network warfare analysis, network exploitation and vulnerability analysis, and she has served as the Operations Chief of a United States Marine Corps cyber unit, and a U.S. Cyber Command training and exercise lead.

Read bio
Reino Mostert, Senior security analyst, Telspace Systems Reino Mostert  Senior security analyst, Telspace Systems 18. & 19. May - Training - Ethical Hacking 101
Senior security analyst, Telspace Systems
Reino Mostert, Senior security analyst, Telspace Systems

Reino Mostert is a senior security analyst at Telspace Systems, focusing on penetration testing and Web application assessments.

Read bio
Rhys Vincent, Lead security solutions engineer EMEA, Rapid7 Rhys Vincent  Lead security solutions engineer EMEA, Rapid7 16. May - Conference day 1 - Track three – Technical
Lead security solutions engineer EMEA, Rapid7
Rhys Vincent, Lead security solutions engineer EMEA, Rapid7

Since starting his cybersecurity with Sophos in 2006, Rhys has worked both sides of the vendor/consumer fence and as such has a wealth of real-world security practitioner experience.

Read bio
Ritasha Jethva, head of information privacy - PAIA officer, Nedbank Group Ritasha Jethva  Head of information privacy / PAIA officer, Nedbank Group 17. May - Conference day 2 - Track two – Best Practice InfoSec
Head of information privacy / PAIA officer, Nedbank Group
Ritasha Jethva, head of information privacy - PAIA officer, Nedbank Group

Ritasha Jethva is currently the head of Information Privacy and the PAIA officer at Nedbank, where she is accountable for the roll-out of a group-wide and national privacy programme, spanning all local geographic locations as well as all applicable product and service offerings. As the group’s PAIA officer, she facilitates all requests for access to information.

Read bio
Roy Fisher  incident investigator, MWR InfoSecurity 17. May - Conference day 2 - Track one – Governance, Legal and Risk
incident investigator, MWR InfoSecurity

Roy is currently employed by MWR InfoSecurity as a member of the Incident Response and Security Assurance practices. As a member of the incident response team, where he is an incident investigator, he has provided cyber incident response services to MWR’s clients.

Read bio
Ryan van de Coolwijk, Product manager: Cyber, Hollard Ryan van de Coolwijk  Product manager: Cyber, Hollard 15. May - Workshop 2 & 17. May - Conference day 2 - Track one – Governance, Legal and Risk
Product manager: Cyber, Hollard
Ryan van de Coolwijk, Product manager: Cyber, Hollard

Ryan van de Coolwijk started his career in IT in 2002, with over 13 years of experience in IT security and risk management, spanning various industries for organisations of all sizes.

Read bio
Saumil Udayan Shah, CEO, Net-Square Saumil Udayan Shah  CEO, Net-Square 17. May - Conference day 2 - Keynote speaker
CEO, Net-Square
Saumil Udayan Shah, CEO, Net-Square

Saumil Shah is the founder and CEO of Net Square, providing cutting-edge information security services to clients worldwide.

Read bio
Sebastian Strobl, Principal auditor Cognosec GmBH Sebastian Strobl  Principal auditor Cognosec GmBH 17. May - Conference day 2 - Plenary speaker
Principal auditor Cognosec GmBH
Sebastian Strobl, Principal auditor Cognosec GmBH

Sebastian Strobl manages the delivery of Cognosec’s auditing services. He has over 10 years’ practical experience in delivering professional services in the areas of information security, IT governance, compliance, risk management, and information systems auditing.

Read bio
Simphiwe Mayisela, Group Information Security Officer, Internet Solutions Simphiwe Mayisela  Group information security officer, Internet Solutions 17. May - Conference day 2 - Track two – Best Practice InfoSec
Group information security officer, Internet Solutions
Simphiwe Mayisela, Group Information Security Officer, Internet Solutions

Simphiwe Mayisela is a passionate, enthusiastic governance, risk and compliance professional, and a fully engaged member of the information security community.

Read bio
Sizwe Lindelo Snail ka Mtuze, Attorney, Snail Attorneys Sizwe Lindelo Snail ka Mtuze  Attorney, Snail Attorneys 16. May - Conference day 1 - Plenary speaker
Attorney, Snail Attorneys
Sizwe Lindelo Snail ka Mtuze, Attorney, Snail Attorneys

Sizwe Lindelo Snail ka Mtuze holds a Baccalareus Legum (LLB) from the University of Pretoria, with tax law and cyber-law electives. He is a practising attorney with the law firm Snail Attorneys at Law and international co-ordinator of the African Centre for Cyberlaw and Crime Prevention based in Kampala, Uganda.

Read bio
Stieler van Eerden, cyber security specialist, Standard Bank Stieler van Eerden  Cyber security specialist, Standard Bank 16. May - Conference day 1 - Track one – Security in Finance
Cyber security specialist, Standard Bank
Stieler van Eerden, cyber security specialist, Standard Bank

In the year 2000, at the age of 19, Stieler van Eerden gained publicity while working under the handle of ‘aktor’, for breaking into the Web sites of a number of high-profile South African companies, including the Johannesburg Stock Exchange and Computicket (online events booking facility), with the objective of finding employment within the industry and improving the state of information security within SA.

Read bio
Thokozani Miya, Independent Thokozani Miya  Independent 17. May - Conference day 2 - Track one – Governance, Legal and Risk
Independent
Thokozani Miya, Independent

Thokozani Miya started out as an IT specialist and moved into information security three years later.

Read bio
Tichaona Zororo member of ISACA Board of Directors, president of ISACA South Africa Chapter, and an IT advisory executive with EGIT : Enterprise Governance of IT Tichaona Zororo  member of ISACA Board of Directors, president of ISACA South Africa Chapter, and an IT advisory executive with EGIT : Enterprise Governance of IT 17. May - Conference day 2 - Track two – Best Practice InfoSec
member of ISACA Board of Directors, president of ISACA South Africa Chapter, and an IT advisory executive with EGIT : Enterprise Governance of IT
Tichaona Zororo member of ISACA Board of Directors, president of ISACA South Africa Chapter, and an IT advisory executive with EGIT : Enterprise Governance of IT

Tichaona Zororo, CISA, CIA, CISM, CRISC, CRMA, CGEIT, certified COBIT 5 assessor, is a member of the ISACA Board of Directors, president of ISACA South Africa Chapter, and an IT advisory executive with EGIT | Enterprise Governance of IT, an IT advisory firm based in SA. He has vast years of in-depth experience in mainstream IT, IT auditing, IT governance and risk across private and public sectors in Africa, Europe and Asia.

Read bio
Tiyani Nghonyama, COO and CTO, Geekulcha Tiyani Nghonyama  COO & CTO, Geekulcha 16. May - Conference day 1 - Plenary speaker
COO & CTO, Geekulcha
Tiyani Nghonyama, COO and CTO, Geekulcha

Tiyani Nghonyama is COO and CTO of Geekulcha.

Read bio
Tommy Thompson, Lead consultant – OT cybersecurity, NClose Tommy Thompson  Lead consultant – OT cybersecurity, NClose 16. May - Conference day 1 - Chairman & 16. May - Conference day 1 - Track three – Technical
Lead consultant – OT cybersecurity, NClose
Tommy Thompson, Lead consultant – OT cybersecurity, NClose

Tommy Thompson is a passionate IT security professional with close on 15 years’ experience. Starting as a firewall engineer in 2001, Thompson has assisted a variety of companies, in various roles, with their cyber security problems

Read bio
Varun Parikh, Tech lead (security) – Sophos Varun Parikh  Tech lead (security) – Sophos 17. May - Conference day 2 - Track three – Technical
Tech lead (security) – Sophos
Varun Parikh, Tech lead (security) – Sophos

Varun Parikh is tech lead (security) at Sophos. An enthusiastic IT security engineer with the necessary drive and determination to resolve complex issues, Parikh possesses effective organisational skills and excellent working knowledge of networking technologies.

Read bio
Walter Lee,  Evangelist: global safety solutions, NEC Corporation Walter Lee  Evangelist: global safety solutions, NEC Corporation 16. May - Conference day 1 - Plenary speaker
Evangelist: global safety solutions, NEC Corporation
Walter Lee,  Evangelist: global safety solutions, NEC Corporation

Walter Lee is the Evangelist for Global Safety Solutions at NEC.

Read bio
Willem Mouton, Security analyst, SensePost Willem Mouton  Security analyst, SensePost 17. May - Conference day 2 - Track three – Technical
Security analyst, SensePost
Willem Mouton, Security analyst, SensePost

Buoyant, waggish, efficacious in scanning the Internet, indefatigable defender of footprinting, self-made developer with a taste for offensive capabilities, Willem Mouton, security analyst at Sensepost, exists to penetrate most networks and applications with a certain je ne se quoi.

Read bio
Yugan Reddy  CEO, info|Guardian 15. May - Workshop 1 Ransomware Protection
CEO, info|Guardian

Currently CEO InfoGuardian is a leading Information Security Services Provider focused mainly on Security Infrastructure Management.

Read bio
Yusuph Kileo, MD, National Cybersecurity Forum (Tanzania) and board member, Africa ICT Alliance (AfICTA) Yusuph Kileo  MD, National Cybersecurity Forum (Tanzania) and board member, Africa ICT Alliance (AfICTA) 16. May - Conference day 1 - Track two – Security in the Public Sector
MD, National Cybersecurity Forum (Tanzania) and board member, Africa ICT Alliance (AfICTA)
Yusuph Kileo, MD, National Cybersecurity Forum (Tanzania) and board member, Africa ICT Alliance (AfICTA)

After completing his IT essentials course with Cisco certification, Yusuph Kileo continued his studies at Dar Es Salaam Institute of Technology. He was admitted to the Computer Engineering Department, majoring in computer technician studies.

Read bio

Sponsors

Event Sponsor

Diamond Sponsor

Platinum Sponsors

Urban Café Sponsor

Gold Sponsors

Silver Sponsors

Bronze Sponsors

Display Sponsors

Sponsors

Endorsed by

Media Partner