Advertise on ITWeb         Fri, 20 Oct, 01:48:00 AM
Speaker
Presentation
Media
Charl van der Walt
Security Summit
SecuritySummit2012/Charl%20van%20der%20Walt1.mp3
SecuritySummit2012/Charl%20van%20der%20Walt.jpg
Putting the 2012 ITWeb Security Summit in context
Charl van der Walt, co-Founder and Managing Director at SensePost
Eddie Schwartz
A State of Dynamic Risk: Containment and Victory in a World of Advanced Threats
SecuritySummit2012/Eddie%20Schwartz.mp3
SecuritySummit2012/Eddie%20Schwartz.jpg
A State of Dynamic Risk: Containment and Victory in a World of Advanced Threats
Eddie Schwartz, CISO at RSA, The Security Division of EMC
Moxie Marlinspike
The demise of SSL & Internet Trust
SecuritySummit2012/Moxie%20Marlinspike.mp3
SecuritySummit2012/Moxie%20Marlinspike.jpg
The demise of SSL & Internet Trust
Moxie Marlinspike, whitehat hacker and security researcher and fellow of the Institute for Disruptive Studies
Haroon Meer
Information Security: The things we don't say…
SecuritySummit2012/Haroon%20Meer.mp3
SecuritySummit2012/Haroon%20Meer.jpg
Information Security: The things we don't say…
Haroon Meer, Founder/Researcher at thinkst
Raj Samani
Cybercriminals and social engineering: understanding and overcoming these attack
SecuritySummit2012/Raj%20Samani.mp3
SecuritySummit2012/Raj%20Samani.jpg
Cybercriminals and social engineering: understanding and overcoming these attack
Raj Samani, VP Chief Technology Officer EMEA of McAfee International Ltd
Gabi Reish
Strong Security in a vulnerable world
SecuritySummit2012/Gabi%20Reish.mp3
SecuritySummit2012/Gabi%20Reish.jpg
Strong Security in a vulnerable world
Gabi Reish, Head of Product Management at Check Point Software Technologies
Kenneth Geers
Cyber War - Beyond Theory
SecuritySummit2012/Kenneth%20Geers1.mp3
SecuritySummit2012/Kenneth%20Geers.jpg
Cyber War - Beyond Theory
Kenneth Geers, cyber subject matter expert at the NCIS
Charlie Miller
Banned in the USA
SecuritySummit2012/Charlie%20Miller.mp3
SecuritySummit2012/Charlie%20Miller.jpg
Banned in the USA
Charlie Miller, Principal research consultant at Accuvant Labs
Joshua Corman
Where to from here? A look at the world as it is, and an exploration of what is working and what isn't
SecuritySummit2012/Joshua%20Corman.mp3
SecuritySummit2012/Joshua%20Corman.jpg
Where to from here? A look at the world as it is, and an exploration of what is working and what isn't
Joshua Corman, Director of Security Intelligence at Akamai Technologies
Charles Renert
Zero Day is Every Day
SecuritySummit2012/Charles%20Renert.mp3
SecuritySummit2012/Charles%20Renert.jpg
Zero Day is Every Day
Charles Renert, Vice President, Research & Development at Websense
Stella Tembisa Ndabeni
An overview of the South African governments’ cyber security policy and strategy
SecuritySummit2012/Stella%20Tembisa%20Ndabeni.mp3
SecuritySummit2012/Stella%20Tembisa%20Ndabeni.jpg
An overview of the South African governments’ cyber security policy and strategy
Stella Tembisa Ndabeni, MP and Deputy Minister of Communications, Department of Communications
Michael Shema
HTML5 Unbound: A Security & Privacy Drama
SecuritySummit2012/Michael%20Shema.mp3
SecuritySummit2012/Michael%20Shema.jpg
HTML5 Unbound: A Security & Privacy Drama
Michael Shema, Director of Engineering at Qulays
Pieter Blaauw
Why Business Should Care?
SecuritySummit2012/Pieter%20Blaauw.mp3
SecuritySummit2012/Pieter%20Blaauw.jpg
Why Business Should Care?
Pieter Blaauw, Security Consultant at Performanta : Search Engine Poisoning
Craig Rosewarne
An analysis of the recent 2012 Security Survey (conducted by ITWeb in partnership with RSA,the latest Microsoft Security Intelligence Report and WolfPack reports, applied to a South African context
SecuritySummit2012/Craig%20Rosewarne.mp3
SecuritySummit2012/Craig%20Rosewarne.jpg
An analysis of the recent 2012 Security Survey (conducted by ITWeb in partnership with RSA,the latest Microsoft Security Intelligence Report and WolfPack reports, applied to a South African context
Craig Rosewarne, MD at Wolfpack and founder and chairman at Information Security Group of Africa
Dr Khomotso Kganyago
An analysis of the recent 2012 Security Survey (conducted by ITWeb in partnership with RSA,the latest Microsoft Security Intelligence Report and WolfPack reports, applied to a South African context
SecuritySummit2012/Khomotso%20Kgayago.mp3
SecuritySummit2012/Khomotso%20Kganyago.jpg
An analysis of the recent 2012 Security Survey (conducted by ITWeb in partnership with RSA,the latest Microsoft Security Intelligence Report and WolfPack reports, applied to a South African context
Dr Khomotso Kganyago, Chief Security Advisor at Microsoft South Africa
Ian Glover
Making the case for the professionalisation of the technical Information Assurance industry and the need for international standards in this important area
SecuritySummit2012/Ian%20Glover.mp3
SecuritySummit2012/Ian%20Glover.jpg
Making the case for the professionalisation of the technical Information Assurance industry and the need for international standards in this important area
Ian Glover, President of the Council of Registered Ethical Security Testers (CREST)
Steve Armstrong
Incident Case Analysis - where they went wrong.
SecuritySummit2012/Steve%20Armstrong.mp3
SecuritySummit2012/Steve%20Armstrong.jpg
Incident Case Analysis - where they went wrong.
Steve Armstrong, SANS Certified Instructor
Charl van der Walt
What's the deal with Mobile and Africa
SecuritySummit2012/Charl%20van%20der%20Walt2.mp3
SecuritySummit2012/Charl%20van%20der%20Walt.jpg
What's the deal with Mobile and Africa
Charl van der Walt, co-Founder and Managing Director at SensePost
Christiaan Brand
Mobile Security - Breaking out of the box
SecuritySummit2012/Christiaan%20Brand.mp3
SecuritySummit2012/Christiaan%20Brand.jpg
Mobile Security - Breaking out of the box
Christiaan Brand, CTO at Entersekt
Bennie Labuschagne
At the tone of the beep, leave your spyware
SecuritySummit2012/Bennie%20Labuschagne.mp3
SecuritySummit2012/Bennie%20Labuschagne.jpg
At the tone of the beep, leave your spyware
Bennie Labuschagne, Director of Cyber Forensics at Cyanre
Tyrone Erasmus
Pilfering information from the masses
SecuritySummit2012/Tyrone%20Erasmus.mp3
SecuritySummit2012/Tyrone%20Erasmus.jpg
Pilfering information from the masses
Tyrone Erasmus, security consultant at MWR InfoSecurity
Juan Pablo Perez Etchegoyen
Cyber-Attacks on SAP & ERP systems: Is Our Business-Critical Infrastructure Exposed?
SecuritySummit2012/Juan%20Pablo%20Perez%20Etchegoyen.mp3
SecuritySummit2012/Juan%20Pablo%20Perez%20Etchegoyen.jpg
Cyber-Attacks on SAP & ERP systems: Is Our Business-Critical Infrastructure Exposed?
Juan Pablo Perez Etchegoyen, CTO at Onapsis, Inc
Chris John Riley
SAP (in)security: Scrubbing SAP clean with SOAP
SecuritySummit2012/Chris%20John%20Riley.mp3
SecuritySummit2012/Chris%20John%20Riley.jpg
SAP (in)security: Scrubbing SAP clean with SOAP
Chris John Riley, Penetration Tester, Security Analyst and Security Researcher
Ian de Villiers
Systems Applications Proxy Pwnage
SecuritySummit2012/Ian%20de%20Villiers.mp3
SecuritySummit2012/Ian%20de%20Villiers.jpg
Systems Applications Proxy Pwnage
Ian de Villiers, Associate at SensePost
Marinus Van Aswegen
Securing SAP
SecuritySummit2012/Marinus%20Van%20Aswegen.mp3
SecuritySummit2012/Marinus%20Van%20Aswegen.jpg
Securing SAP
Marinus Van Aswegen, security architect at Telic Consulting
Jon Matonis
Cryptography in a World of Digital Currencies
SecuritySummit2012/Jon%20Matonis.mp3
SecuritySummit2012/Jon%20Matonis.jpg
Cryptography in a World of Digital Currencies
Jon Matonis, e-money specialist and Managing Director at the Lydia Group
James Lyne
The tools cyber criminals use against banks
SecuritySummit2012/James%20Lyne.mp3
SecuritySummit2012/James%20Lyne.jpg
The tools cyber criminals use against banks
James Lyne, Technical Director SANS EMEA
Joe Botha
Security considerations for mobile, using Mxit Gust (Geo-fenced mobile payment system) as a case study
SecuritySummit2012/Joe%20Botha%20and%20Theo%20van%20Niekerk.mp3
SecuritySummit2012/Joe%20Botha.jpg
Security considerations for mobile, using Mxit Gust (Geo-fenced mobile payment system) as a case study
Joe Botha, CEO at TrustFabric
Theo van Niekerk
Security considerations for mobile, using Mxit Gust (Geo-fenced mobile payment system) as a case study
SecuritySummit2012/Joe%20Botha%20and%20Theo%20van%20Niekerk.mp3
SecuritySummit2012/Theo%20van%20Niekerk.jpg
Security considerations for mobile, using Mxit Gust (Geo-fenced mobile payment system) as a case study
Theo van Niekerk, Co-founder ThinkSmart
Maeson Maherry
Advanced Electronic Signatures in South African business
SecuritySummit2012/Maeson%20Maherry.mp3
SecuritySummit2012/Maeson%20Maherry.jpg
Advanced Electronic Signatures in South African business
Maeson Maherry, Solutions Director at LAWtrust
Robb Anderson
Something Phishy - Old Mutual’s comical approach to understanding digital identity threats and how users should protect themselves
SecuritySummit2012/Anna%20Collard%20and%20Robb%20Anderson.mp3
SecuritySummit2012/Robb%20Anderson.jpg
Something Phishy - Old Mutual’s comical approach to understanding digital identity threats and how users should protect themselves
Robb Anderson, Risk Officer at Old Mutual
Anna Collard
Something Phishy - Old Mutual’s comical approach to understanding digital identity threats and how users should protect themselves
SecuritySummit2012/Anna%20Collard%20and%20Robb%20Anderson.mp3
SecuritySummit2012/Anna%20Collard.jpg
Something Phishy - Old Mutual’s comical approach to understanding digital identity threats and how users should protect themselves
Anna Collard, Founder, The Best Practice
Michael Mbuthia
A view from the continent: Kenya – a case study from the Co-operative Bank of Kenya
SecuritySummit2012/Michael%20Mbuthia.mp3
SecuritySummit2012/Michael%20Mbuthia.jpg
A view from the continent: Kenya – a case study from the Co-operative Bank of Kenya
Michael Mbuthia, Head of Information Security at Co-operative Bank of Kenya
Mark Eardley
Evolution of corporate cybercrime and the nature and scale of the threats it poses
SecuritySummit2012/Mark%20Eardley.mp3
SecuritySummit2012/Mark%20Eardley.jpg
Evolution of corporate cybercrime and the nature and scale of the threats it poses
Mark Eardley, Channel Manager at SuperVision Biometric Security Solutions
Basie von Solms
National Cyber Security in South Africa: Who is watching over SA's cyber security?
SecuritySummit2012/Basie%20von%20Solms.mp3
SecuritySummit2012/Basie%20von%20Solms.jpg
National Cyber Security in South Africa: Who is watching over SA's cyber security?
Basie von Solms, International Telecommunications Union (ITU)at the University of Johannesburg (UJ) Centre of Excellence for Cyber Security
Kenneth Geers
Ghost in the Shell Revisited
SecuritySummit2012/Kenneth%20Geers2.mp3
SecuritySummit2012/Kenneth%20Geers.jpg
Ghost in the Shell Revisited
Kenneth Geers, cyber subject matter expert at the NCIS
Joshua Corman
A presentation on Anonymous
SecuritySummit2012/Joshua%20Corman2.mp3
SecuritySummit2012/Joshua%20Corman.jpg
Understanding Anonymous
Joshua Corman, Director of Security Intelligence - Akamai Technologies
Bevan Lane
Hacktivism: A history and what we can learn from Hackers
SecuritySummit2012/Bevan%20Lane.mp3
SecuritySummit2012/Bevan%20Lane.jpg
Hacktivism: A history and what we can learn from Hackers
Bevan Lane, Director at Infosec Consulting
  to ITWeb's daily newsletter.

 

Advertisement


Top news

..

http://www.itweb.co.za/events/_BELGRADE_DONE/POPIUpdateII2017/Text%20boxes/POPI2017-Textbox.gif
ITWeb POPI Update II
21 November | Summer Place, Hyde Park
Nerushka Bowan, emerging technology law specialist and LegalTech innovatorEverything you need to know about the EU General Data Protection Regulation (GDPR) v POPIA
Nerushka Bowan, emerging technology law specialist and LegalTech innovator
This talk will give a high-level overview of the GDPR, while emphasising similarities and differences with POPIA.
Masindi Mabogo

DATA MANAGEMENT

Nimble data