<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2540529&fmt=gif"/>

About

Agenda

Opportunities

ITWeb Events

Agenda

Plenary

07:30

Arrival, registration, networking and exhibition visit

09:00

Opening remarks from the chair

09:10

International keynote address: Global breaches, local rules: navigating the next generation of cyber threats

Sunitha Chalam, Partner and Head of Singapore, Brunswick Group

As cyberattacks grow more destructive and regulations tighten worldwide, organisations face a new dilemma: global breaches unfolding under local rules and within local operating contexts. Drawing on insights from crises across Asia and beyond, this keynote examines how shifting threat motives, AI-driven attacks and divergent regulatory regimes are redefining cyber resilience.

09:50

International keynote address: How to hack a South African bank in 20 minutes

Glenn Wilkinson, CEO & Co-Founder, Agger Labs

Picture this:You arrive at work, coffee in hand, only to find your screen frozen with a ransom note: “Pay up millions of Rand in Bitcoin, or your data vanishes forever.”

It's not a distant nightmare. It's happening every day. In 2026, the risks have never been higher. We've seen major organisations brought to a standstill by ransomware attacks that began with something as simple as a phone call to IT support. These incidents have led to suspended services, lost customer trust and significant financial losses. More than 80 percent of reported incidents on the continent involve cyber extortion. High digital growth and uneven security maturity make countries like South Africa attractive targets. Groups like OPERA1ER have pulled off multi-country heists, and Interpol’s Serengeti 2.0 operation arrested more than a thousand cybercriminals across 18 African nations. Even that barely slowed things down.

Ransomware crews are not choosing victims by geography. They scan for exposed systems, weak controls and misconfigurations, then strike wherever they find an opening. Africa’s fast growing digital economy simply gives them more opportunities to land.

In this keynote, Glenn will break down how a ransomware attack actually unfolds, from the first foothold to the final detonation. You will also see a live demo that shows how quickly attackers can move once they gain access to a single machine. Most importantly, we focus on resilience - practical steps, simple changes and the habits that stop attacks early. Africa’s digital future is moving fast. With the right preparation, organisations can stay ahead of the chaos.

10:30

Reserved for Event Sponsor

11:10

Morning refreshments, networking and exhibition visit

11:40

Keynote address: US geopolitics and the implications for technology sovereignty and cyber security

12:20

Fireside chat: Going behind the scenes with leading CISOs

Kerissa Varma, President, Women in Cybersecurity Southern Africa

Chris Vermeulen, group information security officer, Sanlam

In this session, our panel of CISOs will discuss the specific challenges that they are dealing with that other roles in security don't see or get involved in, including:

  • How do they communicate the level of risk to their boards?
  • What techniques do they use when negotiating for budget?
  • How do they demonstrate the ROI and other tangible benefits from large security investments?

13:00

Lunch, networking and exhibition visit

Track One: Cyber Security Trends

14:00

How are deepfake-enabled identity threats being used and how can we counteract their disruptive influence?

Renaldo Jack, Group head of cyber security, Globeleq

  • How are deepfakes being used in cyber attacks and social engineering campaigns and in which industry sectors/spheres of public life?
  • Identifying current and emerging solutions for detecting and mitigating deepfakes
  • What can government and the private sector do to educate society on how to identify deepfakes and resist the temptation to believe emotionally appealing but false information?

14:35

The evolving cyber security workforce: how AI is impacting skills, staffing and strategic workforce planning

Dale Simons, founder, MiDO Group

  • What kind of skills are companies looking for in terms of cyber security professionals? Why are emotional intelligence and cognitive diversity more important than ever?
  • How to assess whether your cyber security team has the right skills
    Workforce management – how do you determine how many security personnel you need?
  • How is AI influencing the market for cyber security professionals? Are we seeing an impact on the number of entry-level positions?
  • To what extent does AI help to resolve the security skills shortage?
  • Examining the emerging trend of hybrid teams with the rise of AI copilots

15:10

Panel discussion: Digital wounds: the dialogue

Rene Mattheus, Attorney, RH Heydenrych & Associates

Duncan Rae, Group CISO, Pepkor

Wayne Kruger, Partner, Synchronicity Change Management

This panel examines the profound psychological impacts of cyber-attacks, from chronic stress to physical health deterioration, highlighting the human cost of digital threats. We also explore the link to organisational preparedness. This discussion will look at cybersecurity, legal and human perspectives to propose interdisciplinary solutions for mitigating the human and organisational impact of cyber-attacks. For CISOs, legal professionals, and cybersecurity experts aiming to prioritize well-being in digital defence.

16:15

Awareness - finding the sweet spot in training employees to be cyber aware

Thabiso Serake, Head of Technical Operations and Cyber Security, Pay@

  • Why 'awareness' often fails
  • Finding the sweet spot – the ideal balance
  • Practical strategies for engagement
  • Conclusion: the path forward

16:50

Mitigating the risks posed by third parties/supply chain partners

17:25

Closing remarks from the chair

17:30

End of conference

Track Two: Industry Insights

14:00

Reclaiming the soul of InfoSec

Duncan Rae, Group CISO, Pepkor

What we’re doing in cyber security isn’t working. 2025 has been one of the most devastating years in history when it comes to high-profile cyber incidents around the world. We’re losing ground fast and it’s time we start asking ourselves the hard questions. This honest and open session is aimed at both the young and eager who are just starting out in InfoSec, as well as the battle-worn veterans who are tired of fighting the same losing battles. We’re going to question the “sacred texts” of our industry, the frameworks and best practices we follow out of routine and fear. This is a call and encouragement to the cyber heretics, the ones brave enough to break away from the script and try something different. The goal is to inspire the next generation to think differently, hopefully do it better and remind the more experienced why we’re really here. If you’re ready to trade common practice for best practice and dogma for truth, come join the conversation. It’s time to take back the soul of InfoSec.

14:35

Panel discussion: How to assess what cyber security solutions you really need

15:10

The cyber resilience imperative: why security alone is no longer enough

Grant Hughes, CISO, GVW Group; president, ISC2 Cape Town Chapter

  • Understand why resilience - not just protection - is now the defining goal of cybersecurity
  • Explore the critical shift from traditional cybersecurity to adaptive cyber resilience
  • Identify common challenges that prevent organizations from building true resilience
  • Discover the seven pillars that underpin a robust cyber resilience strategy
  • Learn how effective governance turns resilience from a concept into a sustainable capability

15:45

Afternoon refreshments, networking and exhibition visit

16:15

Understanding how to implement a zero-trust architecture

16:50

How are security teams managing the ever-increasing risks presented by IIoT/IoT/ OT?

Faseeg Osman, CISO, Nascent Group

  • What factors are driving the increasingly vast attack surface presented by IIoT, IoT and OT devices and systems?
  • How mature is security in IIoT, IoT and OT devices? Or are weak security protocols and passwords still the norm?
  • Should you adopt an IT or engineering approach when it comes to managing IIoT, IoT, OT security?
  • What tools and techniques are security teams using to protect IIoT, IoT and OT devices on their networks?

17:25

Closing remarks from the chair

17:30

End of conference

Track Three: Cyber security trends

14:00

The cyber security survivability onion

Barney De Villiers, Director of security, Stitch

The cyber security survivability onion is a military-inspired framework that helps cyber security leaders prioritise defensive investments. Each layer increases in cost and complexity, guiding teams to build lean, resilient and rational security postures. Rather than beginning with costly tools, the framework emphasises simple, high-impact fundamentals and uses successive layers as fallbacks when outer layers fail or are not viable options for the business objectives of organisations.

14:35

Tackling Africa’s cybercrime challenges: understanding the threat, its consequences and collaborative solutions

15:10

Panel discussion: Addressing the challenges within your cyber security GRC programme

Winston Hayden, Independent management consultant and advisor

  • What are the biggest challenges in executing your cyber security GRC programme?
  • How do we address these challenges?
  • To what extent do the outcomes of your cyber security GRC programme reflect your cyber security posture?
  • Does your cyber security GRC programme meet stakeholder expectations?
  • Measuring the effectiveness of your cyber security GRC programme

15:45

Afternoon refreshments, networking and exhibition visit

16:15

Modernising the past: strategies for securing and transforming legacy IT systems

August Bhila, Founder & Chief Executive, CYBAUG

Many organisations still depend on legacy IT systems that are difficult to secure, expensive to maintain and incompatible with modern architectures. This session will focus on pragmatic strategies for reducing risk and enhancing resilience in legacy environments. Attendees will gain insight into prioritising system modernisation, applying layered security approaches and aligning risk mitigation with broader digital transformation initiatives.

  • Identifying and addressing vulnerabilities within legacy systems
  • Balancing cost, security and business continuity during system modernisation
  • Roadmaps for transitioning from legacy infrastructure to secure, scalable platforms

16:50

Strategies for countering the growth of online scams

17:25

Closing remarks from the chair

17:30

End of conference