VIRTUAL PRESS OFFICESTM   (011) 807 3294   itnews@itweb.co.za | Advertise on ITWeb   Fri, 28 Nov, 11:27:02 AM
You are here Home
Report back from the ITWeb Security Summit 2013  
 
Start moving on privacy law now
Four-step data supply chain
Cyber forensics meets data analytics
Laws to be aware of
SAP security a must for SA
Ten tips for IT asset disposal
Adversaries winning cyber warfare
For real anonymity, adopt CI
Know your enemy
Web sites used against users
Information security can learn from physical security
SA crying for cyber security leadership
Think like a hacker
Understanding the attacker's 'kill chain'
Fighting fraud with BI
Who's inside your company?
More to fear in 2013

Videos


Local companies can look at international experience to gain an understanding of how the information regulator is likely to deal with issues, says Daniella Kafouris, senior manager and lead data privacy/PPI compliance at Deloitte Risk Advisory.Start moving on privacy law now

By Nicola Mawson, ITWeb deputy news editor.
Johannesburg, 8 May 2013

Companies that have not paid attention to the Protection of Personal Information Bill need to do so now, but there is still a lack of clarity as to how the information regulator, which will be set up, will deal with breaches of the law.

Click here to read the full story


People will always pay more for things they can not do or do not understand, says Roelof Temmingh, MD of Paterva, developer of Maltego.Four-step data supply chain

By Admire Moyo, ITWeb's portals deputy editor..
Johannesburg, 8 May 2013

Startups must protect their investments so that they are not copied and make sure that customers are wowed and spread the word in order to succeed.

So said Roelof Temmingh, MD of Paterva – the developer of Maltego, a locally-developed open source intelligence and forensics application. Temmingh was addressing the ITWeb Security Summit at the Sandton Convention Centre this afternoon.

Click here to read the full story


Data is an integral part of the battle against fraud. Cyber forensics meets data analytics

By Joanne Carew, portals journalist.
Johannesburg, 9 May 2013

Data is an integral part of the battle against fraud.

So says Yolandé Byrd, director of FACTS Consulting, speaking at ITWeb’s 8th annual Security Summit, in Sandton, yesterday.

Data is all around us and can be used in forensic investigations, fraud prevention and incident response, said Byrd during her presentation.

Click here to read full story


There are few legal guidelines that affect the information security sector, but there are interesting developments on the way. Laws to be aware of

By Staff Writer, ITWeb.
Johannesburg, 9 May 2013

There are few legal guidelines that affect the information security sector, but there are interesting developments on the way.

Information security specialist and academic, professor Basie von Solms, from the University of Johannesburg, says pending developments will have a “massive” impact on the sector.

Click here to read full story


The safeguarding of companies’ SAP systems is more crucial than one may think – and more relevant to SA than ever before. SAP security a must for SA

By Staff Writer, ITWeb.
Johannesburg, 9 May 2013

The safeguarding of companies’ SAP systems is more crucial than one may think – and more relevant to SA than ever before.

This is according to Alexander Polyakov, CTO of ERPScan, which specialises in the discovery and resolution of security vulnerabilities across the SAP platform.

Click here to read full story


T asset disposal (ITAD) is an indispensable part of a company’s day-to-day operations, but do organisations actually dispose of their IT assets properly, especially in light of the severe risks involved? Ten tips for IT asset disposal

By Bonnie Tubbs, ITWeb journalist.
Johannesburg, 9 May 2013

IT asset disposal (ITAD) is an indispensable part of a company’s day-to-day operations, but do organisations actually dispose of their IT assets properly, especially in light of the severe risks involved?

This is a question posed by Kayode Adesemow, information assurance consultant, chartered engineer and project manager, speaking at ITWeb’s Security Summit this week. Adesemow says it is a well-known fact that intruders, like flowing water, will explore the weakest opening, much like a chain with the weakest link.

Click here to read full story


At this point in time, the adversaries are clearly winning the cyber war, as they have continued to innovate and evolve.Adversaries winning cyber warfare

By Admire Moyo, ITWeb's portals deputy editor.
Johannesburg, 7 May 2013

At this point in time, the adversaries are clearly winning the cyber war, as they have continued to innovate and evolve.

So said Mike Armistead, VP and GM of enterprise security products, Fortify, at HP, in a keynote address at the 8th annual ITWeb Security Summit, held at the Sandton Convention Centre in Johannesburg.

Click here to read full story


The Grucq, counterintelligence expert.For real anonymity, adopt CI

By Kirsten Doyle, ITWeb portals editor.
Johannesburg, 7 May 2013

Criminals wishing to remain anonymous must adopt counterintelligence (CI) techniques. There are three basic principles they need to worry about in order to remain out of sight.

This is according to The Grucq, whose presentation at the 8th annual ITWeb Security Summit was entitled: "An underground education: lessons in counterintelligence from history’s underworld".

Click here to read full story


Investigative journalist and author, Misha Glenny.Know your enemy

By Kirsten Doyle, ITWeb portals editor.
Johannesburg, 8 May 2013

The Web has created a new and baffling environment: the demand for security versus the desire for freedom.

These were the words of author and investigative journalist Misha Glenny, speaking at the 8th annual ITWeb Security Summit, which kicked off in Sandton this morning.

Click here to read full story


Gordon LoveWeb sites used against users

By Admire Moyo, ITWeb's portals deputy editor.
Johannesburg, 7 May 2013

Our Web sites are being used against us, as Web-based attacks have increased by a third from 2011 to 2012.

This was the word from Gordon Love, Symantec’s regional director for Africa, who was addressing the ITWeb Security Summit at the Sandton Convention Centre, in Johannesburg, on Tuesday.

Click here to read full story


Johann van der MerweInformation security can learn from physical security

By Mariné Jacobs
Johannesburg, 7 May 2013

Physical security can provide a number of guidelines when establishing an information security model, says Johann van der Merwe, global head of information security at De Beers.

“You can get a lot of tips from physical security when you want to get a company’s information security off the ground,” says Van der Merwe.

Click here to read full story


Craig RosewarneSA crying for cyber security leadership

By Joanne Carew, portals journalist.
Johannesburg, 8 May 2013

Economic fraud, denial of service and the theft of confidential information are the main cyber crime concerns for SA.

Speaking at ITWeb’s 8th annual Security Summit, Craig Rosewarne, MD of Wolfpack and founder and chairman of ISG, unpacked the key findings of the 2012/13 SA cyber threat barometer. The report was compiled by Wolfpack, with support from the British High Commission, and comprises extensive research into SA’s readiness to deal with cyber crime.

Click here to read full story


Think like a hacker

By Cathleen O'Grady
Johannesburg, 8 May 2013

Blindly following accepted best practices can open up opportunities for attackers to exploit well-known defences.

This sentiment was driven home by Dominic White, SensePost CTO, and Jeremy du Bruyn, SensePost senior penetration tester, at the 8th annual ITWeb Security Summit, in Sandton, yesterday.

Click here to read full story


T asset disposal (ITAD) is an indispensable part of a company’s day-to-day operations, but do organisations actually dispose of their IT assets properly, especially in light of the severe risks involved? Understanding the attacker's 'kill chain'

By Admire Moyo, ITWeb's portals deputy editor.
Johannesburg, 8 May 2013

In a world where almost everyone has access to and can afford the latest weapon system technology, it is of paramount importance to first look at the changing threat environment, then examine the attacker’s ‘kill chain’.

So said Francisco Artes, research director at NSS Labs, in a keynote address during the ITWeb Security Summit, in Johannesburg, yesterday.

Click here to read full story


Richard BejtlichFighting fraud with BI

By Cathleen O'Grady
Johannesburg, 8 May 2013

Data analytics has an important role to play in combating fraud, said Vinod Vasudevan, Paladion COO, speaking at the 8th ITWeb Security Summit, in Sandton, yesterday.

“The technology behind fraud is making it much easier to execute, and therefore fraud is on the increase – and covers multiple industries, from banking and insurance to telecoms,” he said. What’s more, “one domain is cutting into the other. If you take a cloned SIM card, it becomes a tool to bypass two-factor authentication in banking, so fraud in telecoms leads to banking fraud”.

Click here to read full story


Richard BejtlichWho's inside your company?

By Kirsten Doyle, ITWeb portals editor.
Johannesburg, 8 May 2013

Any security programme should start by finding out who is already inside the company. Once any company reaches a certain size, someone will find a way in.

This is according to Richard Bejtlich, CSO of Mandiant, during his keynote at the ITWeb Security Summit.

Click here to read full story


Social engineering trumps two-factor authentication every time, says security analyst Patrick Gray.More to fear in 2013

By Kirsten Doyle, ITWeb portals editor.
Johannesburg, 8 May 2013

Threats of cyber espionage, cyber theft and hacking were prominent in 2012, and will continue in 2013.

Speaking at the ITWeb Security Summit this week, security analyst and host of the Risky Business security podcast, Patrick Gray, discussed the LinkedIn attack of 2012 as an example of a growing trend of password hacking.

Click here to read full story

IN THE NEWS
Operators monitor for attacks
17 Apr 2013 – Distributed denial of service strikes can cause major traffic headaches for cellphone companies.
Desperately seeking cyber security skills
17 Apr 2013 – Skills training in SA is on par with international standards, but the country does not have enough experts to prevent cyber attacks, says UJ’s Basie von Solms.
Spending needed to thwart attacks
11 Apr 2013 – Most security issues can be contained to some extent, if companies are prepared to invest.
SA fails on forensic readiness
4 Apr 2013 – Forensic readiness is crucial to successful investigations and prosecutions, yet few South African firms are prepared, says Cyanre.
Cyber security risk cannot be eliminated
25 March 2013 – In the past two years, there has been remarkable development and spread in organised hacking of corporates, says expert.
IT-based fraud on the increase
25 March 2013 – The ease with which fraudsters can acquire tools needed to commit fraud and the explosion in data are contributing to the growth, says Paladion.
BYOD - no turning back
20 March 2013 – For most organisations, it's too late to stop BYOD, but it's not too late to manage it, says a security expert.
Formulating an attack-focused security plan
26 Feb 2013 – To successfully formulate an attack-focused plan, start with an assessment to find live attackers on the network, says MANDIANT.
Info security needs new focus
12 Feb 2013 – Information security has to shift beyond perimeter protection to understanding the attacker, says De Beers.
SA progresses in cyber crime fight
8 Feb 2013 – Moves are afoot to get SA’s cyber crime policing up to speed with the rest of the world, says ISG.
Understanding "bad guys" key in cyber warfare
6 Jan 2013 – Offence-oriented defence has become key in the battle against cyber crime, according to a security expert.
For the latest headlines visit our Security Summit news portal
 
EVENT SPONSOR
in partnership with

PLATINUM SPONSOR
GOLD SPONSOR
in partnership with
SILVER SPONSORS

in partnership with
 
BRONZE SPONSORS
                 
in partnership with
in partnership with
COFFEE BAR SPONSOR
DISPLAY SPONSORS
in partnership with             
      
in partnership with
       
SPONSOR
   
ENDORSED BY

                                          



 

Home
About our speakers
About our sponsors
View the post-event video
View picture gallery
Cyber Readiness Challenge

EVENT SPONSOR

in partnership with
Established in 2009, Performanta specializes only in the discipline of Information Security. The company provides technology, services and consulting solutions allowing them to give customers an end to end information security service. Their focus on pragmatic solutions is reflected in their motto: Practical Trust Performanta.

PLATINUM SPONSOR
Symantec protects the world’s information, and is a global leader in security, backup and availability solutions. Our innovative products and services protect people and information in any environment – from the smallest mobile device, to the enterprise data center, to cloud-based systems. Our world-renowned expertise in protecting data, identities and interactions gives our customers confidence in a connected world.
Visit www.symantec.com/en/za/

IN THE NEWS
Unified security management key to rapid response
24 Apr 2013 - Visibility of the entire ecosystem, and immediate access to necessary information, is key to effectively managing information security, says McAfee.
Consolidation: a new infosec imperative
17 Apr 2013 – Addressing multiple security areas with a variety of solutions can result in weak points and areas being overlooked, says McAfee.
Security certificates 'an infosec weak spot'
12 Apr 2013 – Malware with embedded digital security certificates can easily penetrate enterprise systems, says Venafi.
For the latest headlines visit our Security Summit news portal

TWITTER
Follow us on twitter and tweet about your thoughts around this event, #itwebsec

TECHNICAL COMMITTEE
Sensepost is an independent company that provides services in the Information Security Services area. Combining experience and knowledge, SensePost specialises in Information Security Consulting, Training, Security Assessment Services and IT Vulnerability Management.

MEDIA PARTNERS


Tweet about the ITWeb Security Summit
Bonnie Tubbs

OPINION

Face value