Advertise on ITWeb         Wed, 22 Nov, 03:57:13 AM
Speaker
Presentation
Media
Jon Tullett
A guide to ITWeb Security Summit 2015
SecuritySummit2015/Jon-Charl.mp3
SecuritySummit2015/Jon%20Tullett.jpg
A guide to ITWeb Security Summit 2015
Jon Tullett, senior editor: news analysis, ITWeb
Charl van der Walt
A guide to ITWeb Security Summit 2015
SecuritySummit2015/Jon-Charl.mp3
SecuritySummit2015/Charl%20van%20der%20Walt.jpg
A guide to ITWeb Security Summit 2015
Charl van der Walt, co-founder and managing director, SensePost
William (Bill) Binney
Unveiling the intelligence agencies
SecuritySummit2015/William%20Binney.mp3
SecuritySummit2015/William%20Binney.jpg
Unveiling the intelligence agencies
William (Bill) Binney, former NSA director
Roger Dingledine
Tor - Defence at scale against the world`s toughest adversaries
SecuritySummit2015/Roger%20Dingledine.mp3
SecuritySummit2015/Roger%20Dingledine.jpg
Tor - Defence at scale against the world`s toughest adversaries
Roger Dingledine, president, director and co-founder of The Tor Project
Patrick Gray
What`s shaping the infosec agenda?
SecuritySummit2015/Patrick%20Gray.mp3
SecuritySummit2015/Patrick%20Gray.jpg
What`s shaping the infosec agenda? 2015 and beyond
Patrick Gray, host, Risky Business
Vernon Fryer
Cyber hunting
SecuritySummit2015/Vernon%20Fryer.mp3
SecuritySummit2015/Vernon%20Fryer.jpg
Cyber hunting - knowing the lay of the land and where attackers hide
Vernon Fryer, Chief Technology Security Officer, Vodacom
Paulo Ferreira
Enterprise mobility security considerations
SecuritySummit2015/Paulo%20Ferreira.mp3
SecuritySummit2015/Paulo%20Ferreira.jpg
Enterprise mobility security considerations - can IT ensure protection while providing choice?
Paulo Ferreira, director: enterprise mobility, Samsung Mobile South Africa
Kris Budnik
TRACK1 - Getting down to business with information security
SecuritySummit2015/Kris%20Budnik.mp3
SecuritySummit2015/Kris%20Budnik.jpg
Getting down to business with information security
Kris Budnik, MD, Slva Information Security
Steve Jump
TRACK1 - A cyber threat dashboard for the board
SecuritySummit2015/Steve%20Jump.mp3
SecuritySummit2015/Steve%20Jump.jpg
A cyber threat dashboard for the board - communicating a practical security risk view to exco and the board
Steve Jump, head: corporate information security governance, Telkom
Jock Forrester
TRACK1 - Case study, Standard Bank
SecuritySummit2015/Jock%20Forrester.mp3
SecuritySummit2015/Jock%20Forrester.jpg
Case study: Standard Bank - security and DevOps, a dummies guide
Jock Forrester, head: IT cyber security and penetration testing, Group IT: IT security, Standard Bank
Professor Basie von Solms
TRACK1 - The African Union Convention on cyber security
SecuritySummit2015/Basie%20von%20Solms.mp3
SecuritySummit2015/Basie%20von%20Solms.jpg
The African Union Convention on cyber security - a cyber wake-up call for South Africa
Professor Basie von Solms, director: Centre for Cyber Security, University of Johannesburg
Michael Ossmann
TRACK2 - The NSA Playset
SecuritySummit2015/Michael%20Ossmann.mp3
SecuritySummit2015/Michael%20Ossmann.jpg
International keynote: The NSA Playset – why you should have the spooks’ tools in your arsenal
Michael Ossmann, founder of Great Scott Gadgets
Jeremy Brown
TRACK2 - Cloud device insecurity
SecuritySummit2015/Jeremy%20Brown.mp3
SecuritySummit2015/Jeremy%20Brown.jpg
Cloud device insecurity
Jeremy Brown, independent security researcher
Pete Shoard
TRACK2 - Intelligence - consumed by the many, gathered by the few
SecuritySummit2015/Pete%20Shoard.mp3
SecuritySummit2015/Pete%20Shoard.jpg
Intelligence - consumed by the many, gathered by the few
Pete Shoard, head: cloud service product development, SecureData
Dominic White
TRACK2 - Everything you know about wireless security is wrong
SecuritySummit2015/Dominic%20White.mp3
SecuritySummit2015/Dominic%20White.jpg
Everything you know about wireless security is wrong
Dominic White, CTO, Sensepost
Mohamed Khan
TRACK3 - Practical application of data analysis in information security
SecuritySummit2015/Mohamed%20Khan%20-%20Justin%20Williams.mp3
SecuritySummit2015/Mohamed%20Khan.jpg
Practical application of data analysis in information security
Mohamed Khan, senior analyst, Transnet
Kevin McKerr
TRACK3 - Business at the speed of crime
SecuritySummit2015/Kevin%20McKerr-.mp3
SecuritySummit2015/Kevin%20McKerr.jpg
Business at the speed of crime - are you keeping up?
Kevin McKerr, security sales leader, IBM South Africa
Craig Moir
TRACK3 - The six-step data privacy protection plan
SecuritySummit2015/Craig%20Moir.mp3
SecuritySummit2015/Craig%20Moir.jpg
The six-step data privacy protection plan
Craig Moir, managing director, MyDBA
  to ITWeb's daily newsletter.

 

Advertisement


Top news

..

ITWeb Security Summit 2018
JHB 21 - 25 May | Vodacom World, Midrand
CPT 28 & 29 May | One&Only, Cape Town
Showcase your product, service or solution at the definitive event for the cyber security professional
This is southern Africa's largest information security event on the calendar – everyone that's anyone in the IT security space will be there!
Wynand Smit

CONTACT CENTRES

Culture of change