Dieter Küsel

WEB CACHING

Cache is king

  Advertise on ITWeb         Sun, 25 Jun, 14:20:45 PM

Agendas:

Day one
Day two
Speaker
Presentation
Media
Charl van der Walt and Jon Tullett
A guide to ITWeb Security Summit 2013
SecuritySummit2013/Charl%20van%20der%20Walt%20-%20Jon%20Tullett.mp3
SecuritySummit2013/Charl%20van%20der%20Walt.jpg
A guide to ITWeb Security Summit 2013
Charl van der Walt, co-founder and managing director, SensePost
Jon Tullett, senior editor: news analysis, ITWeb
Misha Glenny
The struggle for the Internet: Web control, crime, commercial espionage, and spying and warfare
SecuritySummit2013/Misha%20Glenny.mp3
SecuritySummit2013/Misha%20Glenny.jpg
The struggle for the Internet: Web control, crime, commercial espionage, and spying and warfare
Misha Glenny, investigative journalist, author and broadcaster
Mike Armistead
An in-depth look at the trends that are emerging in the world of cyber-crime, cyber-security, and the threat landscape. Can we use what we know about our adversaries in order to create a more effective response?
SecuritySummit2013/Mike%20Armistead.mp3
SecuritySummit2013/Mike%20Armistead.jpg
An in-depth look at the trends that are emerging in the world of cyber-crime, cyber-security, and the threat landscape. Can we use what we know about our adversaries in order to create a more effective response?
Mike Armistead, vice president and general manager, Enterprise Security Products, Fortify, Hewlett-Packard
Francisco Artes
Cybercrime kill chain vs. effectiveness of defense layers
SecuritySummit2013/Francisco%20Artes.mp3
SecuritySummit2013/Francisco%20Artes.jpg
Cybercrime Kill Chain vs. effectiveness of Defense Layers
Francisco Artes, research director, NSS Labs
The Grugq
An underground education: Lessons in counterintelligence from history's underworld
SecuritySummit2013/The%20Grugq.mp3
SecuritySummit2013/BLANK.jpg
An underground education: Lessons in counterintelligence from history's underworld
The Grugq
Gordon Love
Bringing Down the House
SecuritySummit2013/Gordon%20Love.mp3
SecuritySummit2013/Gordon%20Love.jpg
Bringing Down the House
Craig Rosewarne
Cyber threat combating initiatives planned for Africa
SecuritySummit2013/Craig%20Rosewarne.mp3
SecuritySummit2013/Craig%20Rosewarne.jpg
Cyber threat combatting initiatives planned for Africa
Craig Rosewarne managing director, Wolfpack and founder and chairman, ISG
Marinus van Aswegen
Rethinking defence strategies
SecuritySummit2013/Marinus%20van%20Aswegen.mp3
SecuritySummit2013/Marinus%20van%20Aswegen.jpg
Rethinking defence strategies
Marinus van Aswegen, security architect, Telic Consulting
Adam Schoeman
Cyber Amber: A zero-interaction honey-pot system with modular intelligence
SecuritySummit2013/Adam%20Schoeman.mp3
SecuritySummit2013/Adam%20Schoeman.jpg
Cyber Amber: A zero-interaction honey-pot system with modular intelligence
Adam Schoeman, information security officer, First National Bank Private Clients
Vernon Fryer
DDoS, the silent thunder
SecuritySummit2013/Vernon%20Fryer.mp3
SecuritySummit2013/Vernon%20Fryer.jpg
DDoS, the silent thunder
Vernon Fryer, chief technology security officer, Vodacom SA
Runa Sandvik
Internet censorship and the Tor Project
SecuritySummit2013/Runa%20Sandvik.mp3
SecuritySummit2013/Runa%20Sandvik.jpg
Internet Censorship and the Tor Project
Runa Sandvik, developer, security researcher, and translation coordinator, The Tor Project
Dominic White and Jeremy du Bruyn
Offence-oriented defence
SecuritySummit2013/Dominic%20White%20-%20Jeremy%20du%20Bruyn.mp3
SecuritySummit2013/Dominic%20White.gif
Offence-oriented defence
Dominic White , chief technology officer, SensePost
Jeremy du Bruyn , senior penetration tester, SensePost

Beza Belayneh
Socially engineered Trojans: How to defend your organisation from targeted attacks with Trojans and social engineering
SecuritySummit2013/Beza%20Belayneh.mp3
SecuritySummit2013/Beza%20Belayneh.jpg
Socially engineered Trojans: How to defend your organisation from targeted attacks with Trojans and social engineering
Beza Belayaeh, chief executive officer and chief information security officer, South African Centre for Information Security
Robert McArdle
Lesson learned from the trenches of targeted attacks
SecuritySummit2013/Robert%20McArdle.jpg
Lesson learned from the trenches of targeted attacks
Robert McArdle, senior advanced threat researcher / manager: Forward Looking Threat Research Team, Trend Micro
Johann van der Merwe
Integrating information security with world-class physical security: What can we learn
SecuritySummit2013/Johann%20van%20der%20Merwe.mp3
SecuritySummit2013/Johann%20van%20der%20Merve.jpg
Integrating information security with world-class physical security: What can we learn
Johann van der Merwe, global head of information security, De Beers Group
Duncan Waugh
The paper peril - thinking outside the hard drive
SecuritySummit2013/Duncan%20Waugh.mp3
SecuritySummit2013/Duncan%20Waugh.jpg
The paper peril - thinking outside the hard drive
Duncan Waugh, managing director, DSSS
Vinod Vasudevan
Enterprise fraud: Are you battle ready?
SecuritySummit2013/Vinod%20Vasudevan.mp3
SecuritySummit2013/Vinod%20Vasudevan.jpg
Enterprise fraud: Are you battle ready?
Vinod Vasudevan, chief operations officer, Paladion
Jason Clark
Transforming your security organisation to be next generation and business enabling
SecuritySummit2013/Jason%20Clark.mp3
SecuritySummit2013/Jason-Clark.jpg
Transforming your security organisation to be next generation and business enabling
Jason Clark, chief information security and strategy officer, Websense
Richard Bejtlich
Formulating an attack-focused security plan
SecuritySummit2013/Richard%20Bejtlich.mp3
SecuritySummit2013/Richard%20Bejtlich.jpg
Formulating an attack-focused security plan
Richard Bejtlich , chief security officer, MANDIANT
Phil Allen
The Board Conversation: Why Identity & Access Governance is a business and not an IT decision
SecuritySummit2013/Phil%20Allen.mp3
SecuritySummit2013/Phil%20Allen.jpg
Why Identity & Access Governance is a business and not an IT decision
Phil Allen, Director , Identity and Access Management, Dell EMEA
Roelof Temmingh
Lessons learned when building and selling security software online - the Maltego story
SecuritySummit2013/Roelof%20Temmingh.mp3
SecuritySummit2013/roelof-temmingh.jpg
Lessons learned when building and selling security software online - the Maltego story
Roelof Temmingh, managing director, Paterva
Doug Depeppe
Executive cyber-risk responsibility: Defense-in-depth, breadth and width for the enterprise
SecuritySummit2013/Doug%20Depeppe.mp3
SecuritySummit2013/Doug%20Depeppe.jpg
Executive cyber-risk responsibility: Defense-in-depth, breadth and width for the enterprise
Doug DepeppeJD, LL.M., director, Cyber-Risk Solutions, The Soufan Group co-founder, Western Cyber Exchange
Daniella Kafouris
Privacy Officers, regulators and reality – The global perspective
SecuritySummit2013/Daniella%20Kafouris.mp3
SecuritySummit2013/Daniella%20Kafouris.jpg
Privacy Officers, regulators and reality – The global perspective
Daniella Kafouris, senior manager and leads data privacy / POPI compliance, Deloitte Risk Advisory
Heinz Kuhn and Maeson Maherry
The benefits of Advanced Electronic Signatures
SecuritySummit2013/Heinz%20Kuhn%20-%20Maeson%20Maherry.mp3
SecuritySummit2013/Heinz%20Kuhn.jpg
The benefits of Advanced Electronic Signatures
Heinz Kuhn , senior manager: legal services, Department of Co-operative Governance and Traditional Affairs
Maeson Maherry , solutions director, LAWtrust
Kayode Adesemow
IT Asset Disposal – A View into a Telco World
SecuritySummit2013/Kayode%20Adesemow.mp3
SecuritySummit2013/Kayode%20Adesemow.jpg
IT Asset Disposal – A View into a Telco World
Kayode Adesemow , information assurance consultant, chartered engineer and project manager
Prof Basie von Solms
An overview of the cyber security legal and regulatory landscape in SA – facts, promises and wishes
SecuritySummit2013/Basie%20von%20Solms.mp3
SecuritySummit2013/Basie%20von%20Solms.jpg
An overview of the cyber security legal and regulatory landscape in SA – facts, promises and wishes
Prof Basie von Solms , research professor, Academy for Computer Science and Software Engineering: University of Johannesburg
Nils
PinPadPwn
SecuritySummit2013/Nils.mp3
SecuritySummit2013/Nils.jpg
PinPadPwn
Nils head: security research, MWR InfoSecurity
Dr Frans Lategan
SHA256 Vulnerabilities exposed by Bitcoin
SecuritySummit2013/Frans%20Lategan.mp3
SecuritySummit2013/Frans%20Lategan.jpg
SHA256 Vulnerabilities exposed by Bitcoin
Dr Frans Lategan , security engineer with Amazon Web Services
Robert Weiss and Ben Gatti
Cryptanalysis of the Enigma
SecuritySummit2013/Robert%20Weiss%20-%20Ben%20Gatti.mp3
SecuritySummit2013/Robert%20Weiss.jpg
Cryptanalysis of the Enigma
Robert Weiss , founder, Password Crackers
Ben Gatti , independent software hacker
Andrew MacPherson
88MPH: Digital tricks to bypass physical security
SecuritySummit2013/Andrew%20MacPherson.mp3
SecuritySummit2013/Andrew%20MacPherson.jpg
88MPH: Digital tricks to bypass physical security
Andrew MacPherson , Operational Manager, Paterva
Alexander Polyakov
Breaking, forensicating and anti-forensicating SAP portal and J2EE Engine
SecuritySummit2013/Alexander%20Polyakov.mp3
SecuritySummit2013/Alexander%20Polyakov.jpg
Breaking, forensicating and anti-forensicating SAP portal and J2EE Engine
Alexander Polyakov , chief technology officer, ERPScan
Yolande Byrd
The role of big data and analytics in forensics and incident response
SecuritySummit2013/Yolande%20Byrd.mp3
SecuritySummit2013/Yolande%20Byrd.jpg
The role of big data and analytics in forensics and incident response
Yolande Byrd , Director, FACTS Consulting
Tony Olivier and Brendan Kotze
Recovery from chaos: a practical look at a real-world example
SecuritySummit2013/Tony%20Olivier%20-%20Brendan%20Kotze.mp3
SecuritySummit2013/Tony%20Olivier.jpg
Recovery from chaos: a practical look at a real-world example
Tony Olivier , managing director, Performanta Consulting & Mobile Security
Brendan Kotze , managing director, Performanta Services
  to ITWeb's daily newsletter.

 

Advertisement


Top news

..

Tuesday, 25 July | Focus Rooms, Sunninghill
ITWeb Data Centre Confex 2017
Dr. Vukosi Marivate, senior data scientists, CSIRData to product: data science in the innovation loop
Dr. Vukosi Marivate, senior data scientist at CSIR, will cover critical stages in the data science process and role of tools to help data scientists and data engineers execute their ideas.
Elaine Bergenthuin

SOFTWARE PATENTS

Why patent?