JOHANNESBURG
21 - 25 May 2018

CAPE TOWN
28 & 29 May 2018

News

Case study: Werksmans protected from cyber crime with Panda 9 May 2018 - by ITP Communications
9 May 2018 - by ITP Communications

Panda recommended Adaptive Defense 360, a cloud-based security solution that employs endpoint detection and response technology.

Read the full story
Record-breaking industry support for ITWeb's Security Summit 2018 9 May 2018 - by ITWeb
9 May 2018 - by ITWeb

Sponsorship and exhibitor opportunities at the 13th annual ITWeb Security Summit have sold out.

Read the full story
John Maynard, VP, EMEAR Security at Cisco. Security needs new, architectural approach, urges Cisco 9 May 2018 - by Kirsten Doyle
John Maynard, VP, EMEAR Security at Cisco.
9 May 2018 - by Kirsten Doyle

The architectural approach allows us to 'see it once, protect everywhere', says Cisco's John Maynard.

Read the full story
Panda Security Africa, BDO form strategic partnership to mitigate cyber risk 8 May 2018 - by ITP Communications
8 May 2018 - by ITP Communications

The cyber alliance will enable BDO to offer a managed security service to their clients, using Panda's next-generation EDR solution.

Read the full story
Stewart Bertram Beware of the weak links in your supply chain 4 May 2018 - by Staff Writer
Stewart Bertram
4 May 2018 - by Staff Writer

To defend against targeted attacks, business must address supply chain security, warns Digital Shadows.

Read the full story
Alex Cruz Farmer, product manager: security, at Cloudflare. DDoS attacks: Not 'if' but 'when' 3 May 2018 - by Kirsten Doyle
Alex Cruz Farmer, product manager: security, at Cloudflare.
3 May 2018 - by Kirsten Doyle

DDoS attacks are popular because they are easy to carry out, says Cloudflare.

Read the full story
#SS18HACK - IDEAthon in action. Get ready for #SS18HACK, the ITWeb Security Summit hackathon 3 May 2018 - by Allyson Towle
#SS18HACK - IDEAthon in action.
3 May 2018 - by Allyson Towle

An idea generation and training session for the participants was hosted to equip the young techies with tools and knowledge ahead of the hackathon.

Read the full story
Jayson Street, VP: infosec at SphereNY. Cyber security predominantly a human problem 2 May 2018 - by Kirsten Doyle
Jayson Street, VP: infosec at SphereNY.
2 May 2018 - by Kirsten Doyle

What is needed is changes to the behaviour of the people who interact with the technology, says SphereNY.

Read the full story
International, local experts to present at first Security Summit in Cape Town 2 May 2018 - by ITWeb
2 May 2018 - by ITWeb

The ITWeb Security Summit 2018 will extend to Cape Town on 28 and 29 May, at the One&Only.

Read the full story
Forcepoint's Risk-Adaptive Protection helps maximise data security 30 Apr 2018 - by Forcepoint
30 Apr 2018 - by Forcepoint

The solution delivers next-generation data protection that adaptively shapes and enforces security policies across enterprise endpoints or devices.

Read the full story
SA has challenges that its European counterparts do not. ITWeb, VMware security survey: a first in SA 20 Apr 2018 - by Kirsten Doyle
SA has challenges that its European counterparts do not.
20 Apr 2018 - by Kirsten Doyle

A preview of the results will be revealed at the ITWeb Security Summit 2018 in May.

Read the full story
Cyber-terrorism: more Hollywood fad than genuine fear 19 Apr 2018 - by Rodney Weidemann
19 Apr 2018 - by Rodney Weidemann

While there can be no doubt that cyber-crime and cyber-terrorism are real threats, the dangers they pose are nowhere near what blockbuster films would have you believe.

Read the full story
Ruba Borno: Customers \ Security at the forefront of Cisco partnership drive 18 Apr 2018 - by Chris Tredger
Ruba Borno: Customers \
18 Apr 2018 - by Chris Tredger

Company leverages partnership with ConnectWise to make it easier for partners to move into the managed security services space.

Read the full story
Cyber crooks eye the pharmaceutical industry. Attackers target pharmaceutical companies 18 Apr 2018 - by Staff Writer
Cyber crooks eye the pharmaceutical industry.
18 Apr 2018 - by Staff Writer

PlugX RAT allows cyber criminals to perform various malicious operations on a system without the user's authorisation, says Kaspersky Lab.

Read the full story
Microsoft president Brad Smith. Tech firms vow not to aid govt cyber attacks 18 Apr 2018 - by Reuters
Microsoft president Brad Smith.
18 Apr 2018 - by Reuters

Microsoft, Facebook and more than 30 other tech firms announce a joint pledge not to assist any government in offensive cyber attacks.

Read the full story
Martin Potgieter, co-founder and technical director of NClose. The changing face of cyber defence 16 Apr 2018 - by Kirsten Doyle
Martin Potgieter, co-founder and technical director of NClose.
16 Apr 2018 - by Kirsten Doyle

Defence is changing, with less reliance on vendor-produced "prevention" technologies and a move to defence engineering, says NClose.

Read the full story
Top five cyber attack categories targeting the government sector. White paper: Top five cyber attack categories targeting the government sector 16 Apr 2018 - by IBM South Africa
Top five cyber attack categories targeting the government sector.
16 Apr 2018 - by IBM South Africa

Cyber threats targeting the government sector have become a growing concern, according to IBM X-Force Security Incident Data.

Read the full story
Some local firms say they have no intention of migrating to the cloud. Local firms admit to inadequate data protection 11 Apr 2018 - by Sibahle Malinga
Some local firms say they have no intention of migrating to the cloud.
11 Apr 2018 - by Sibahle Malinga

Over a quarter of local organisations have only a partially defined data protection strategy in place, the recent ITWeb Data Protection Survey has found.

Read the full story
How to build more secure software 10 Apr 2018 - by Kirsten Doyle
10 Apr 2018 - by Kirsten Doyle

By understanding the adversary, developers can help security and be a critical part of the security team, says Verizon.

Read the full story
Gideon Bouwer, cyberlaw and criminal law forensics specialist at Cyber Law Forensics. Electronic handshakes as a cyber security tool 10 Apr 2018 - by Kirsten Doyle
Gideon Bouwer, cyberlaw and criminal law forensics specialist at Cyber Law Forensics.
10 Apr 2018 - by Kirsten Doyle

The handshake process can be used to preserve, protect and encrypt personal information to obtain compliancy, says Cyber Law Forensics.

Read the full story

Sponsors

Event Sponsor

Security Survey and Executive Roundtable Sponsor

Urban Café Sponsor

Gold sponsors

Workshop sponsor

Silver sponsors

Bronze sponsors

Display sponsors

Showcase sponsors

Host sponsor

Sponsors

Endorsed by

Media Partners