Advertise on ITWeb         Wed, 22 Nov, 03:57:16 AM
Speaker
Presentation
Media
Jason Jordaan
Exposing the enemy - organised cyber crime
SecuritySummit2015/Jason%20Jordaan.mp3
SecuritySummit2015/Jason%20Jordaan.jpg
Exposing the enemy - organised cyber crime
Jason Jordaan, founder and principal forensic scientist, DFIRLABS
Abdulkarim Chukkol
Fighting Cybercrime in Africa
SecuritySummit2015/Abdulkarim%20Chukkol.mp3
SecuritySummit2015/Abdulkarim%20Chukkol.jpg
Fighting Cybercrime in Africa - the Nigerian perspective
Abdulkarim Chukkol, head of the Advance Fee Fraud and Cyber Crime Section for the Economic and Financial Crimes Commission, Nigeria
Yusuph Kileo
Pan African security initiatives
SecuritySummit2015/Yusuph%20Kileo.mp3
SecuritySummit2015/Yusuph%20Kileo.jpg
Pan African security initiatives - how to interface with initiatives on the continent, with a specific focus on Tanzania
Yusuph Kileo, cyber security and digital forensics investigation expert
Antonio Forzieri
Attackers and defenders
SecuritySummit2015/Antonio%20Forzieri.mp3
SecuritySummit2015/Antonio%20Forzieri.jpg
Attackers and defenders: the never-ending story
Antonio Forzieri, EMEA cyber security and ISS technology lead: technology sales and services, Symantec
Maiendra Moodley
TRACK1 - The privacy paradox
SecuritySummit2015/Maiendra%20Moodley.mp3
SecuritySummit2015/Maiendra%20Moodley.jpg
The privacy paradox: implications for security practitioners
Maiendra Moodley, divisional head (GM) for Financial Systems and Processes, State
Ignus Swart
TRACK1 - South Africa's national ICT infrastructure
SecuritySummit2015/Ignus%20Swart.mp3
SecuritySummit2015/Ignus%20Swart.jpg
South Africa's national ICT infrastructure - how vulnerable is it? A research-based investigation
Ignus Swart, senior information security specialist: cyber defence unit, CSIR
Maeson Maherry
TRACK1 - Case study, Digital identities on the national ID card
SecuritySummit2015/Maeson%20Maherry.mp3
SecuritySummit2015/Maeson%20Maherry.jpg
Case study: Digital identities on the national ID card
Maeson Maherry, solutions director, LAWTrust
Danny Myburgh
TRACK2 - Digital forensics
SecuritySummit2015/Danny%20Myburgh.mp3
SecuritySummit2015/Danny%20Myburgh.jpg
Digital forensics - how to make the charges stick
Danny Myburgh, founder and MD, Cyanre
Barry Irwin
TRACK2 - Case study, NTP amplification attacks
SecuritySummit2015/Barry%20Irwin.mp3
SecuritySummit2015/Barry%20Irwin.jpg
Case study: NTP amplification attacks from the view of the network reflectors
Prof Barry Irwin, founder and head, Security and Networks Research Group, Rhodes University
Tyrone Erasmus
TRACK2 - Becoming the adversary
SecuritySummit2015/Tyrone%20Erasmus.mp3
SecuritySummit2015/Tyrone%20Erasmus.jpg
Becoming the adversary
Tyrone Erasmus, managing consultant, MWR InfoSecurity South Africa
Reino Mostert
TRACK3 - Hacked - why we all fail at information security
SecuritySummit2015/Reino%20Mostert.mp3
SecuritySummit2015/Reino%20Mostert.jpg
Hacked - why we all fail at information security
Reino Mostert, security analyst, Telspace
Ed Macnair
TRACK3 - Cloud apps control
SecuritySummit2015/Ed%20MacNair.mp3
SecuritySummit2015/Ed%20MacNair.jpg
Cloud apps control - going beyond secure web gateway
Ed Macnair, CEO, CensorNet
Raymond du Plessis
TRACK3 - How to ensure the successful implementation of a new information security solution
SecuritySummit2015/Raymond%20du%20Plessis.mp3
SecuritySummit2015/Raymond%20du%20Plessis.jpg
How to ensure the successful implementation of a new information security solution
Raymond du Plessis, managing consultant, Mobius
  to ITWeb's daily newsletter.

 

Advertisement


Top news

..

http://www.itweb.co.za/events/_BELGRADE_DONE/POPIUpdateII2017/Text%20boxes/POPI2017-Textbox.gif
ITWeb POPI Update II
21 November | Summer Place, Hyde Park
http://www.itweb.co.za/images/stories/Events/!speakers/Christelle-Bure.jpgWhere do you start? A detailed look at the POPI implementation
Christelle Bure, director - implementation and people development, Metatrans Business Services
The first thing you have to acknowledge is that if you are in business, you need to be POPIA compliant.
Wynand Smit

CONTACT CENTRES

Culture of change