JOHANNESBURG
21 - 25 May 2018

CAPE TOWN
28 & 29 May 2018

News

Corrie Goosen, Risk X Data Assurance. How long before you know you've been hacked? 23 May 2018 - by Matthew Burbidge
Corrie Goosen, Risk X Data Assurance.
23 May 2018 - by Matthew Burbidge

Most organisations in South Africa are not prepared for a malware attack.

Read the full story
Darron Gibbard, chief technical security officer, EMEA, at Qualys. Home appliances present new risks 23 May 2018 - by Tracy Burrows
Darron Gibbard, chief technical security officer, EMEA, at Qualys.
23 May 2018 - by Tracy Burrows

Technology is changing so rapidly that security risks are being left behind in some areas.

Read the full story
April Wright, senior manager: information security and compliance at Verizon. Mix red, blue and yellow to create secure software 23 May 2018 - by Sibahle Malinga
April Wright, senior manager: information security and compliance at Verizon.
23 May 2018 - by Sibahle Malinga

Verizon's April Wright outlined a new paradigm for integrating developers with offensive and defensive teams to fight software vulnerabilities.

Read the full story
Neil Thacker, CISO for EMEA at Netskope. Automation will take over day-to-day IT security jobs 23 May 2018 - by Paula Gilbert
Neil Thacker, CISO for EMEA at Netskope.
23 May 2018 - by Paula Gilbert

And that is not necessarily a bad thing for cyber security professionals, said Netskope's Neil Thacker.

Read the full story
Bigger than ransomware, crypto-jacking is the new money maker 23 May 2018 - by Netskope
23 May 2018 - by Netskope

Crypto-jacking is the unauthorised use of someone else's computing resources to mine crypto-currency, says Netskope.

Read the full story
John Maynard, vice president and EMEAR lead: cyber security for CISCO. Dealing with sophisticated, organised cyber threats 22 May 2018 - by Regina Pazvakavambwa
John Maynard, vice president and EMEAR lead: cyber security for CISCO.
22 May 2018 - by Regina Pazvakavambwa

To defeat multi-vector and multi-staged attacks, companies need an integrated architectural approach, says Cisco's John Maynard.

Read the full story
Mikko Hypponen, chief research officer, F-Secure. Photo by Devin Armstrong It's your job to secure anything that uses electricity 22 May 2018 - by Kirsten Doyle
Mikko Hypponen, chief research officer, F-Secure. Photo by Devin Armstrong
22 May 2018 - by Kirsten Doyle

Soon, we won't even know that our devices are talking to the manufacturers, says Mikko Hypponen.

Read the full story
Jayson Street, VP of infosec at SphereNY. (Photograph by Devin Armstrong) We are making users scapegoats for our failings 22 May 2018 - by Kirsten Doyle
Jayson Street, VP of infosec at SphereNY. (Photograph by Devin Armstrong)
22 May 2018 - by Kirsten Doyle

You can patch humans: it's called education, says SphereNY's Jason Street.

Read the full story
Nclose to present MDR at ITWeb Security Summit 2018 22 May 2018 - by ITP Communications
22 May 2018 - by ITP Communications

Managed detection and response is a timely entry in a world where signature-based defence is no longer sufficient, the company says.

Read the full story
Nclose brings agentless network access control to ITWeb Security Summit 2018 22 May 2018 - by ITP Communications
22 May 2018 - by ITP Communications

It will be demonstrating the capabilities of its ForeScout CounterACT offering at ITWeb's Security Summit, which is taking place this week.

Read the full story
Nclose turns multi-factor authentication on its head through its partnership with Duo Security 22 May 2018 - by ITP Communications
22 May 2018 - by ITP Communications

Nclose will be presenting Duo's advanced two-factor authentication solution at this week's ITWeb Security Summit.

Read the full story
Gareth James, network and security sales specialist for VMware. CISOs not investing in insider threat defences 21 May 2018 - by Regina Pazvakavambwa
Gareth James, network and security sales specialist for VMware.
21 May 2018 - by Regina Pazvakavambwa

There's a disconnect between what they perceive as their greatest threat and the solutions they invest in, found a survey.

Read the full story
Gus Clarke, head of cyber security, TYMEDigital by CommonWealth Bank SA. SA a testing ground for attacks on banking sector 21 May 2018 - by Kirsten Doyle
Gus Clarke, head of cyber security, TYMEDigital by CommonWealth Bank SA.
21 May 2018 - by Kirsten Doyle

As a relatively advanced player, it is used to assess methods before employing them on more vulnerable entities, says TYMEDigital.

Read the full story
Mimecast Report: legacy e-mail security systems failing to provide sufficient security protection 21 May 2018 - by ITP Communications
21 May 2018 - by ITP Communications

This reveals that legacy e-mail security systems are failing to provide sufficient security protection. Mimecast will be at the ITWeb Security Summit this week.

Read the full story
Mimecast offers cyber resilience for e-mail with new detection, remediation and threat intelligence capabilities 21 May 2018 - by ITP Communications
21 May 2018 - by ITP Communications

Its new detection, remediation and threat intelligence capabilities for e-mail will be showcased at the ITWeb Security Summit, which takes place this week.

Read the full story
Jason Suttie, head: Engineering at Foundery division of Rand Merchant Bank. Security Summit 2018: How to implement DevSecOps 21 May 2018 - by Kirsten Doyle
Jason Suttie, head: Engineering at Foundery division of Rand Merchant Bank.
21 May 2018 - by Kirsten Doyle

RMB's Jason Suttie will cover the steps to implementing DevSecOps

Read the full story
Jason Suttie, head: Engineering at Foundery division of Rand Merchant Bank. Security Summit 2018: How to implement DevSecOps 21 May 2018 - by Kirsten Doyle
Jason Suttie, head: Engineering at Foundery division of Rand Merchant Bank.
21 May 2018 - by Kirsten Doyle

RMB's Jason Suttie will cover the steps to implementing DevSecOps

Read the full story
New CyberArk Marketplace simplifies delivery of privileged access solutions 21 May 2018 - by ITP Communications
21 May 2018 - by ITP Communications

This simplifies the delivery of privileged access solutions.

Read the full story
CyberArk Conjur Enterprise now available on Red Hat OpenShift Container Platform 21 May 2018 - by ITP Communications
21 May 2018 - by ITP Communications

Available on Red Hat OpenShift Container Platform, it can help simplify DevOps secrets management. CyberArk will be at the ITWeb Security Summit this week.

Read the full story
Panda Security outperforms peers with innovative next-gen solutions 21 May 2018 - by Panda Security
21 May 2018 - by Panda Security

It been recognised for its 'best-of-breed' AV and EDR solutions in several recent independent reports.

Read the full story

Sponsors

Event Sponsor

Security Survey and Executive Roundtable Sponsor

Urban Café Sponsor

Gold sponsors

Workshop sponsor

Silver sponsors

Bronze sponsors

Display sponsors

Showcase sponsors

Host sponsor

Sponsors

Endorsed by

Media Partners