VIRTUAL PRESS OFFICESTM   (011) 807 3294   itnews@itweb.co.za | Advertise on ITWeb   Sun, 21 Dec, 07:30:39 AM
You are here Home

ITWeb Security Summit 2012

Programme - Tuesday, 15 May: Conference (Day 1)

Conference Day 1 - 15 May Conference Day 2 - 16 May Workshops - 17 May SANS Training - 17 & 18  May
   
07h30 - 08h30 Arrival and registration
   
08h30 - 08h40
Welcome address and housekeeping by chair

Chris Gibbons

Anchor of The Mid Day Report on 702
   
08h40 - 0910
Putting the 2012 ITWeb Security Summit in context

Charl van der Walt,
Co-Founder and Managing Director at SensePost

   
09h00 - 13h20

Plenary session - What do you trust?
In the wake of recent IT security breaches and compromises, the question has to be asked: who do you trust? The 7th Annual ITWeb Security Summit kicks off with a look at what we can still trust when it comes to information security.

   

Keynote

A State of Dynamic Risk: Containment and Victory in a World of Advanced Threats

 
Eddie Schwartz
CISO at RSA
The Security Division of EMC
 

Keynote

Moxie Marlinspike

The demise of SSL & Internet Trust



Moxie Marlinspike
Whitehat hacker and security researcher and fellow of the Institute for Disruptive Studies
 
10h40 - 11h20 Tea break
   

Keynote

Haroon Meer

Information Security: The things we dont say...

Haroon Meer
Founder of Thinkst

 

Keynote

Raj Samani

Cybercriminals and social engineering: understanding and overcoming these attacks


Raj Samani
VP Chief Technology Officer EMEA
McAfee International Ltd
 

Keynote

Strong Security in a vulnerable world - Discussing principles to protect against current threats and attacks



Gabi Reish

Head of Product Management
Check Point Software Technologies
 
13h20 - 14h20 Lunch
   
14h20 - 17h15 Track 1 - The Changing Landscape (Chair - Craig Rosewarne, ISG)
  This track looks at emerging threats and how these are driving necessary paradigm shifts. The speakers will describe the current security landscape and assess what is working and what isn't.
14h00 - 17h15 Track 2 - Mobility (Chair - Jon Tullett, Editor: News analysis, ITWeb)
  With increased mobility, come increased and varied threats. This track is packed with information about malware, spyware and tactics. It provides an analysis of key vulnerabilities and different attack scenarios. It addresses the possibilities and risks of mobility in Africa.
14h00 - 17h15 Track 3 - Enterprise Resource Planning (Chair - Dominic White, Senior Consultant, SensePost)
  This track presents the three most important presentations on SAP insecurity from last year and combines them into one session for the first time. If you’re running SAP, you’ll want to be in this track.
   
 

Track 1 - The Changing Landscape
Chair - Craig Rosewarne, ISG

 

Search Engine Poisoning: Why Business Should Care?

  Pieter Blaauw, Security Consultant at Performanta
 

An analysis of the recent 2012 Security Survey (conducted by ITWeb in partnership with RSA, The Security Division of EMC), the latest Microsoft Security Intelligence Report, and the WolfPack report, applied to a South African context

  Craig Rosewarne, MD at Wolfpack and founder and chairman at Information Security Group of Africa and Dr Khomotso Kganyago, Chief Security Advisor at Microsoft South Africa
 

Making the case for the professionalisation of the technical Information Assurance industry and the need for international standards in this important area

  Ian Glover, President of the Council of Registered Ethical Security Testers (CREST)
 

Incident Case Analysis - where they went wrong

  Steve Armstrong, SANS Certified Instructor
   
 

Track 2 - Mobility

Chair - Jon Tullett, Editor: News analysis, ITWeb

 

What's the deal with Mobile and Africa

  Charl van der Walt, co-Founder and Managing Director at SensePost

Mobile Security - Breaking out of the box

Christiaan Brand, CTO at Entersekt
 

At the tone of the beep, leave your spyware

  Bennie Labuschagne, Director of Cyber Forensics at Cyanre
 

Pilfering information from the masses

  Tyrone Erasmus, security consultant at MWR InfoSecurity
   
 

Track 3 - Enterprise Resource Planning
Chair - Dominic White, Senior Consultant, SensePost

 

Cyber-Attacks on SAP & ERP systems: Is Our Business-Critical Infrastructure Exposed?

  Juan Pablo Perez Etchegoyen, CTO at Onapsis, Inc:
 

SAP (in)security: Scrubbing SAP clean with SOAP

  Chris John Riley, Penetration Tester, Security Analyst and Security Researcher
 

Systems Applications Proxy Pwnage

  Ian de Villiers, Associate at SensePost
 

SAP security presentation

  Marnius van Aswegen, security architect at Telic Consulting
   
17h00 - 17h15 Close with Chair / Speaker Panel
17h15 - 19h15 Cocktails and networking sponsored by Event Sponsor - Performanta
Conference Day 1 - 15 May Conference Day 2 - 16 May Workshops - 17 May SANS Training - 17 & 18  May

EVENT SPONSOR

in partnership with

DIAMOND SPONSOR

PLATINUM SPONSOR

SILVER SPONSOR

BRONZE SPONSORS


in partnership with
COFFEE BAR SPONSOR

DISPLAY SPONSORS


in partnership with

in partnership with
  

SPONSOR

distributor of

ENDORSED BY


 

 

Home
Agenda
Conference Day 1 - 15 May
Conference Day 2 - 16 May
Workshops - 17 May
SANS Training - 17 & 18 May
Speakers
About our sponsors | Floorplan
Delegate attractions
Programme committee
Contacts
Venue


Download the conference PDF

EVENT SPONSOR
in partnership with
 

DIAMOND SPONSOR


SECURITY SUMMIT IN THE NEWS
Infosec needs an injection of honesty
10 Apr 2012 - Fresh approaches are urgently needed in the IT security space, says Haroon Meer, founder of Thinkst.

 

Social engineering gets broader target
2 Apr 2012 - The Internet and social media are facilitating wider-ranging social engineering campaigns than ever before, says Raj Samani, VP and CTO of McAfee.
Bitcoin: a mobile money alternative
By Gareth van Zyl, Editor, ITWeb Africa
26 Mar 2012 -
The virtual currency could take off in Africa, just like payment systems such as M-Pesa.
The right to bear (electronic) arms
By Jon Tullett, Editor: News analysis
22 Mar 2012 -
International cyber warfare is a reality today, as governments engage with one another in espionage and sabotage.
Pwn2Own: the real story behind browser hacks
By Jon Tullett, Editor: News analysis
13 Mar 2012 - The annual Pwn2Own competition highlights vulnerabilities in software. How concerned should you really be?
SANS IT security training in SA for the first time
13 Mar 2012 - The globally respected SANS Institute will deliver its IT security professionals' training in South Africa for the first time, when it participates in the annual ITWeb Security Summit, in Sandton, in May.
Click here to visit our Virtual Press Office

WHO SHOULD ATTEND?
Those charged with developing and implementing their organisation's information security programmes, including:
CEOs/Managing Directors
- CIOs, CISOs and CFOs
- Chief security, risk, compliance, process and technology officers
Senior Business Executives whose jobs include enterprise security responsibilities
Senior Business Executives whose jobs include critical infrastructure protection
Information Security Managers and Directors
Information Security Staff
Network and Systems Security Administrators
Enterprise Security Architects
Business Continuity Managers
Data Security Professionals
IT Auditors
IT/MIS Staff
Internet Security Managers
Systems Planners and Analysts
Security Analysts
Systems Administrators
Software and Application Developers
Engineers
Technical and Support Specialists
Systems Integrators
Web Masters
Strategic Planners

TWITTER
Follow us on twitter and tweet about your thoughts around this event, #itwebsec

SPONSORSHIP OPPORTUNITIES
If you have an IT security solution, product or technology, then ITWeb Security Summit is the platform for you! Join the ranks of the IS elite at the ITWeb Security Summit 2012 and reap the marketing rewards and investment returns. Contact Debbie Visser at debbiev@itweb.co.za or call (011) 807-3294
Sponsorship opportunities

MEDIA PARTNERS

Tweet about the ITWeb Security Summit
Muggie van Staden

CLOUD COMPUTING

Cloud nine