<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2540529&fmt=gif"/>

About

Agenda

Opportunities

ITWeb Events

Agenda

Plenary

07:30

Arrival, registration, networking and exhibition visit

09:00

Opening remarks from the chair

09:10

International keynote address: Global breaches, local rules: navigating the next generation of cyber threats

Sunitha Chalam, Partner and Head of Singapore, Brunswick Group

As cyberattacks grow more destructive and regulations tighten worldwide, organisations face a new dilemma: global breaches unfolding under local rules and within local operating contexts. Drawing on insights from crises across Asia and beyond, this keynote examines how shifting threat motives, AI-driven attacks and divergent regulatory regimes are redefining cyber resilience.

09:50

International keynote address: How to hack a South African bank in 20 minutes

Glenn Wilkinson, CEO & Co-Founder, Agger Labs

Picture this:You arrive at work, coffee in hand, only to find your screen frozen with a ransom note: “Pay up millions of Rand in Bitcoin, or your data vanishes forever.”

It's not a distant nightmare. It's happening every day. In 2026, the risks have never been higher. We've seen major organisations brought to a standstill by ransomware attacks that began with something as simple as a phone call to IT support. These incidents have led to suspended services, lost customer trust and significant financial losses. More than 80 percent of reported incidents on the continent involve cyber extortion. High digital growth and uneven security maturity make countries like South Africa attractive targets. Groups like OPERA1ER have pulled off multi-country heists, and Interpol’s Serengeti 2.0 operation arrested more than a thousand cybercriminals across 18 African nations. Even that barely slowed things down.

Ransomware crews are not choosing victims by geography. They scan for exposed systems, weak controls and misconfigurations, then strike wherever they find an opening. Africa’s fast growing digital economy simply gives them more opportunities to land.

In this keynote, Glenn will break down how a ransomware attack actually unfolds, from the first foothold to the final detonation. You will also see a live demo that shows how quickly attackers can move once they gain access to a single machine. Most importantly, we focus on resilience - practical steps, simple changes and the habits that stop attacks early. Africa’s digital future is moving fast. With the right preparation, organisations can stay ahead of the chaos.

10:30

Reserved for Event Sponsor

11:10

Morning refreshments, networking and exhibition visit

11:40

Keynote address: US geopolitics and the implications for technology sovereignty and cyber security

12:20

Fireside chat: Going behind the scenes with leading CISOs

Kerissa Varma, President, Women in Cybersecurity Southern Africa

Chris Vermeulen, group information security officer, Sanlam

In this session, our panel of CISOs will discuss the specific challenges that they are dealing with that other roles in security don't see or get involved in, including:

  • How do they communicate the level of risk to their boards?
  • What techniques do they use when negotiating for budget?
  • How do they demonstrate the ROI and other tangible benefits from large security investments?

13:00

Lunch, networking and exhibition visit

Track One: Cyber Security Trends

14:00

How are deepfake-enabled identity threats being used and how can we counteract their disruptive influence?

Renaldo Jack, Group head of cyber security, Globeleq

  • How are deepfakes being used in cyber attacks and social engineering campaigns and in which industry sectors/spheres of public life?
  • Identifying current and emerging solutions for detecting and mitigating deepfakes
  • What can government and the private sector do to educate society on how to identify deepfakes and resist the temptation to believe emotionally appealing but false information?

14:35

The evolving cyber security workforce: how AI is impacting skills, staffing and strategic workforce planning

Dale Simons, founder, MiDO Group

  • What kind of skills are companies looking for in terms of cyber security professionals? Why are emotional intelligence and cognitive diversity more important than ever?
  • How to assess whether your cyber security team has the right skills
    Workforce management – how do you determine how many security personnel you need?
  • How is AI influencing the market for cyber security professionals? Are we seeing an impact on the number of entry-level positions?
  • To what extent does AI help to resolve the security skills shortage?
  • Examining the emerging trend of hybrid teams with the rise of AI copilots

15:10

Panel discussion: Digital wounds: the dialogue

Rene Mattheus, Attorney, RH Heydenrych & Associates

Duncan Rae, Group CISO, Pepkor

Wayne Kruger, Partner, Synchronicity Change Management

Lukas van der Merwe, Associate director, cyber security sales and client development, Cybercom

This panel examines the profound psychological impacts of cyber-attacks, from chronic stress to physical health deterioration, highlighting the human cost of digital threats. We also explore the link to organisational preparedness. This discussion will look at cybersecurity, legal and human perspectives to propose interdisciplinary solutions for mitigating the human and organisational impact of cyber-attacks. For CISOs, legal professionals, and cybersecurity experts aiming to prioritize well-being in digital defence.

16:15

Awareness - finding the sweet spot in training employees to be cyber aware

Thabiso Serake, Head of Technical Operations and Cyber Security, Pay@

  • Why 'awareness' often fails
  • Finding the sweet spot – the ideal balance
  • Practical strategies for engagement
  • Conclusion: the path forward

16:50

Mitigating the risks posed by third parties/supply chain partners

17:25

Closing remarks from the chair

17:30

End of conference

Track Two: Industry Insights

14:00

Reclaiming the soul of InfoSec

Duncan Rae, Group CISO, Pepkor

What we’re doing in cyber security isn’t working. 2025 has been one of the most devastating years in history when it comes to high-profile cyber incidents around the world. We’re losing ground fast and it’s time we start asking ourselves the hard questions. This honest and open session is aimed at both the young and eager who are just starting out in InfoSec, as well as the battle-worn veterans who are tired of fighting the same losing battles. We’re going to question the “sacred texts” of our industry, the frameworks and best practices we follow out of routine and fear. This is a call and encouragement to the cyber heretics, the ones brave enough to break away from the script and try something different. The goal is to inspire the next generation to think differently, hopefully do it better and remind the more experienced why we’re really here. If you’re ready to trade common practice for best practice and dogma for truth, come join the conversation. It’s time to take back the soul of InfoSec.

14:35

Panel discussion: How to assess what cyber security solutions you really need

15:10

The cyber resilience imperative: why security alone is no longer enough

Grant Hughes, Group CISO, Nascent Group; president, ISC2 Cape Town Chapter

  • Understand why resilience - not just protection - is now the defining goal of cybersecurity
  • Explore the critical shift from traditional cybersecurity to adaptive cyber resilience
  • Identify common challenges that prevent organizations from building true resilience
  • Discover the seven pillars that underpin a robust cyber resilience strategy
  • Learn how effective governance turns resilience from a concept into a sustainable capability

15:45

Afternoon refreshments, networking and exhibition visit

16:15

Leadership Cybersafety Framework (LCSF): engineering a culture of security and strategic control

Dr Machiniba Sylvia Sathekge, CIO, National Health Laboratory Service

Technology alone cannot secure an enterprise, only a synchronised organisation can. This session introduces the Leadership Cybersafety Framework (LCSF). This is a groundbreaking synthesis of the McKinsey 7-S model and Kaspersky’s four-dimensional security culture perspectives. While traditional security focuses on the "patch," LCSF focuses on the "personnel and process." We will break down the organisation into seven internal elements - from shared values to staff skills - and filter them through Kaspersky’s lenses of organisational level, personal level, expertise and security assurance. Delegates will learn how to move beyond reactive fire-fighting to "engineering a culture of security." The session will provide a holistic roadmap for leaders to align their leadership style with robust security processes, ensuring that resilience becomes part of the of the company’s DNA.

16:50

Strategies for countering the growth of online scams

  • What are the key trends in online scams over the last 12 months?
  • How quickly are the volume and sophistication of online scams growing?
  • How can cyber awareness amongst the digitally vulnerable be improved?
  • What other mitigation strategies can organisations and individuals adopt to protect themselves?
  • How can collaboration between law enforcement, regulators and industry be increased to detect/prevent online scams?

17:25

Closing remarks from the chair

17:30

End of conference

Track Three: Next generation cyber security

14:00

The cyber security survivability onion

Barney De Villiers, Director of security, Stitch

The cyber security survivability onion is a military-inspired framework that helps cyber security leaders prioritise defensive investments. Each layer increases in cost and complexity, guiding teams to build lean, resilient and rational security postures. Rather than beginning with costly tools, the framework emphasises simple, high-impact fundamentals and uses successive layers as fallbacks when outer layers fail or are not viable options for the business objectives of organisations.

14:35

Trust, identity and proof in the age of autonomous AI (in an agentic world)

Samantha Rule, CISO, NinetyOne

AI is rapidly moving from answering questions to taking actions - planning multi-step tasks, calling tools and APIs and increasingly triggering high-impact operations such as privileged changes or financial transactions. In this agentic world, “a valid login” or “an approved API key” is no longer enough to establish trust. The result is a new class of risk: agent impersonation, shadow AI, over-permissioned automation and autonomous actions with an outsized blast radius. In this session, Samantha will present a practical framework for rebuilding trust by treating AI agents as first-class security principals. You’ll learn a simple “five proofs” model - identity, authority, intent, provenance and accountability - and how to apply it using real-world patterns: scoped capabilities, just-in-time access, policy gates for irreversible actions (payments, supplier changes, privilege escalation), safe tool layers and audit-grade “flight recorder” logging. You’ll leave with a clear blueprint and a 30-day checklist to govern agents safely, reduce fraud and misuse and enable autonomous AI without slowing the business down.

15:10

Panel discussion: Addressing the challenges within your cyber security GRC programme

Winston Hayden, Independent management consultant and advisor

  • What are the biggest challenges in executing your cyber security GRC programme?
  • How do we address these challenges?
  • To what extent do the outcomes of your cyber security GRC programme reflect your cyber security posture?
  • Does your cyber security GRC programme meet stakeholder expectations?
  • Measuring the effectiveness of your cyber security GRC programme

15:45

Afternoon refreshments, networking and exhibition visit

16:15

Modernising the past: strategies for securing and transforming legacy IT systems

August Bhila, Founder & Chief Executive, CYBAUG

Many organisations still depend on legacy IT systems that are difficult to secure, expensive to maintain and incompatible with modern architectures. This session will focus on pragmatic strategies for reducing risk and enhancing resilience in legacy environments. Attendees will gain insight into prioritising system modernisation, applying layered security approaches and aligning risk mitigation with broader digital transformation initiatives.

  • Identifying and addressing vulnerabilities within legacy systems
  • Balancing cost, security and business continuity during system modernisation
  • Roadmaps for transitioning from legacy infrastructure to secure, scalable platforms

16:50

How are security teams managing the ever-increasing risks presented by IIoT/IoT/ OT?

Faseeg Osman, Chief executive - cyber security, The Nascent Group Cyber

  • What factors are driving the increasingly vast attack surface presented by IIoT, IoT and OT devices and systems?
  • How mature is security in IIoT, IoT and OT devices? Or are weak security protocols and passwords still the norm?
  • Should you adopt an IT or engineering approach when it comes to managing IIoT, IoT, OT security?
  • What tools and techniques are security teams using to protect IIoT, IoT and OT devices on their networks?

17:25

Closing remarks from the chair

17:30

End of conference