Advertise on ITWeb         Tue, 26 Sep, 03:46:48 AM
Speaker
Presentation
Media
Jon Tullett
A guide to ITWeb Security Summit 2015
SecuritySummit2015/Jon-Charl.mp3
SecuritySummit2015/Jon%20Tullett.jpg
A guide to ITWeb Security Summit 2015
Jon Tullett, senior editor: news analysis, ITWeb
Charl van der Walt
A guide to ITWeb Security Summit 2015
SecuritySummit2015/Jon-Charl.mp3
SecuritySummit2015/Charl%20van%20der%20Walt.jpg
A guide to ITWeb Security Summit 2015
Charl van der Walt, co-founder and managing director, SensePost
William (Bill) Binney
Unveiling the intelligence agencies
SecuritySummit2015/William%20Binney.mp3
SecuritySummit2015/William%20Binney.jpg
Unveiling the intelligence agencies
William (Bill) Binney, former NSA director
Roger Dingledine
Tor - Defence at scale against the world`s toughest adversaries
SecuritySummit2015/Roger%20Dingledine.mp3
SecuritySummit2015/Roger%20Dingledine.jpg
Tor - Defence at scale against the world`s toughest adversaries
Roger Dingledine, president, director and co-founder of The Tor Project
Patrick Gray
What`s shaping the infosec agenda?
SecuritySummit2015/Patrick%20Gray.mp3
SecuritySummit2015/Patrick%20Gray.jpg
What`s shaping the infosec agenda? 2015 and beyond
Patrick Gray, host, Risky Business
Vernon Fryer
Cyber hunting
SecuritySummit2015/Vernon%20Fryer.mp3
SecuritySummit2015/Vernon%20Fryer.jpg
Cyber hunting - knowing the lay of the land and where attackers hide
Vernon Fryer, Chief Technology Security Officer, Vodacom
Paulo Ferreira
Enterprise mobility security considerations
SecuritySummit2015/Paulo%20Ferreira.mp3
SecuritySummit2015/Paulo%20Ferreira.jpg
Enterprise mobility security considerations - can IT ensure protection while providing choice?
Paulo Ferreira, director: enterprise mobility, Samsung Mobile South Africa
Kris Budnik
TRACK1 - Getting down to business with information security
SecuritySummit2015/Kris%20Budnik.mp3
SecuritySummit2015/Kris%20Budnik.jpg
Getting down to business with information security
Kris Budnik, MD, Slva Information Security
Steve Jump
TRACK1 - A cyber threat dashboard for the board
SecuritySummit2015/Steve%20Jump.mp3
SecuritySummit2015/Steve%20Jump.jpg
A cyber threat dashboard for the board - communicating a practical security risk view to exco and the board
Steve Jump, head: corporate information security governance, Telkom
Jock Forrester
TRACK1 - Case study, Standard Bank
SecuritySummit2015/Jock%20Forrester.mp3
SecuritySummit2015/Jock%20Forrester.jpg
Case study: Standard Bank - security and DevOps, a dummies guide
Jock Forrester, head: IT cyber security and penetration testing, Group IT: IT security, Standard Bank
Professor Basie von Solms
TRACK1 - The African Union Convention on cyber security
SecuritySummit2015/Basie%20von%20Solms.mp3
SecuritySummit2015/Basie%20von%20Solms.jpg
The African Union Convention on cyber security - a cyber wake-up call for South Africa
Professor Basie von Solms, director: Centre for Cyber Security, University of Johannesburg
Michael Ossmann
TRACK2 - The NSA Playset
SecuritySummit2015/Michael%20Ossmann.mp3
SecuritySummit2015/Michael%20Ossmann.jpg
International keynote: The NSA Playset – why you should have the spooks’ tools in your arsenal
Michael Ossmann, founder of Great Scott Gadgets
Jeremy Brown
TRACK2 - Cloud device insecurity
SecuritySummit2015/Jeremy%20Brown.mp3
SecuritySummit2015/Jeremy%20Brown.jpg
Cloud device insecurity
Jeremy Brown, independent security researcher
Pete Shoard
TRACK2 - Intelligence - consumed by the many, gathered by the few
SecuritySummit2015/Pete%20Shoard.mp3
SecuritySummit2015/Pete%20Shoard.jpg
Intelligence - consumed by the many, gathered by the few
Pete Shoard, head: cloud service product development, SecureData
Dominic White
TRACK2 - Everything you know about wireless security is wrong
SecuritySummit2015/Dominic%20White.mp3
SecuritySummit2015/Dominic%20White.jpg
Everything you know about wireless security is wrong
Dominic White, CTO, Sensepost
Mohamed Khan
TRACK3 - Practical application of data analysis in information security
SecuritySummit2015/Mohamed%20Khan%20-%20Justin%20Williams.mp3
SecuritySummit2015/Mohamed%20Khan.jpg
Practical application of data analysis in information security
Mohamed Khan, senior analyst, Transnet
Kevin McKerr
TRACK3 - Business at the speed of crime
SecuritySummit2015/Kevin%20McKerr-.mp3
SecuritySummit2015/Kevin%20McKerr.jpg
Business at the speed of crime - are you keeping up?
Kevin McKerr, security sales leader, IBM South Africa
Craig Moir
TRACK3 - The six-step data privacy protection plan
SecuritySummit2015/Craig%20Moir.mp3
SecuritySummit2015/Craig%20Moir.jpg
The six-step data privacy protection plan
Craig Moir, managing director, MyDBA
  to ITWeb's daily newsletter.

 

Advertisement


Top news

..

7 - 8 November | Focus Rooms, Sunninghill
Digital Economy Summit 2017
Reshaad Sha, CEO, SqwidNetKey strategies to help South African businesses become future-proof
Reshaad Sha, CEO, SqwidNet
South African business stands at the doorstep of this digital transformation, but needs an approach that prioritises change and partnership to open the country up to digital inclusion and opportunity.
Sagan Pillay

APP ECONOMY

New IOT rules