Cisco (NASDAQ: CSCO) is the worldwide technology leader that has been making the Internet work since 1984. Our people, products, and partners help society securely connect and seize tomorrow's digital opportunity today. Discover more at newsroom.cisco.com and follow us on Twitter at @Cisco.
Cisco, the Cisco logo, Cisco Systems and Cisco IOS are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. This document is Cisco Public Information.
What’s the worst that can happen in a cyber attack? Plenty, says Pukhraj Singh.
Identity governance platforms will need to evolve to identify and manage not only humans, but the non-human elements in our systems.
Most IT security failures occur because cyber criminals know the psychology of human nature and how to exploit it.
Security is hard because business is hostile to anything that does not bring profit, says the Institute for Security and Open Methodologies.
The response to the breach is more important than the breach, says security researcher Graham Cluley.
Rather than being used in isolation, machine learning must act as another layer to boost security, says Cisco distinguished engineer TK Keanini.
A HUGE THANK YOU TO OUR SPONSORS, PARTNERS, SPEAKERS,
EXHIBITORS & DELEGATES FOR ALL YOUR SUPPORT!
We hope you learned something new, made some valuable new contacts, interacted with your peers and enjoyed the event as much as we did!
We had an amazing two days at this year’s Summit, with hundreds of security professionals attending - C-Level decision makers, those responsible for GRC, information/cyber security and internal audit, developers, consultants, academics and many more. The ITWeb Security Summit continues to be the premier event of its kind in Southern Africa, examining all the latest trends, developments, challenges and opportunities for the information and cyber security community.
Click here to view Day 1 gallery.
Click here to view Day 2 gallery.
Cisco (NASDAQ: CSCO) is the worldwide technology leader that has been making the Internet work since 1984. Our people, products, and partners help society securely connect and seize tomorrow's digital opportunity today. Discover more at newsroom.cisco.com and follow us on Twitter at @Cisco.
Cisco, the Cisco logo, Cisco Systems and Cisco IOS are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. This document is Cisco Public Information.
www.cisco.com
Empowering Africa through innovative IT solutions.
Networks Unlimited is a Value-added Distributor, offering some of Gartner's most highly recognised solutions within the Cybersecurity, Enterprise Systems Management, Cloud, Networking and Storage arena. Our solutions are sold through an extensive, reputable and solution-focused reseller base across 36 countries on the African continent.
www.networksunlimited.africa
Cisco (NASDAQ: CSCO) is the worldwide technology leader that has been making the Internet work since 1984. Our people, products, and partners help society securely connect and seize tomorrow's digital opportunity today. Discover more at newsroom.cisco.com and follow us on Twitter at @Cisco.
Cisco, the Cisco logo, Cisco Systems and Cisco IOS are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. This document is Cisco Public Information.
Please visit: www.cisco.com.
Empowering Africa through innovative IT solutions.
Networks Unlimited is a Value-added Distributor, offering some of Gartner’s most highly recognised solutions within the Cybersecurity, Enterprise Systems Management, Cloud, Networking and Storage arena. Our solutions are sold through an extensive, reputable and solution-focused reseller base across 36 countries on the African continent.
For more information visit: www.networksunlimited.africa
Security at Amazon Web Services is our top priority, which is why millions of global customers trust AWS to power their infrastructure, become more agile, and automate in the cloud.
Visit: aws.amazon.com/security
Axiz
Axiz is SA’s leading information technology value added distributor that focuses on solutions covering edge devices, data centre and cloud. We believe in building ecosystems and transcending technology, with a results-driven focus that enables us to offer tailored solutions to our partners.
www.axiz.com
McAfee
McAfee is the device-to-cloud cybersecurity company providing security solutions with transformation in mind to protect data and stop threats from device to cloud using an open, proactive, and intelligence-driven approach.
www.mcafee.com
Blue Turtle is changing the game in cyber-defence, bringing together innovations in access, intelligence, detection and response, providing security teams with the insight, automation and tools needed to protect the complete digital landscape.
Please visit www.blueturtle.co.za
CrowdStrike is the leader in cloud-delivered endpoint protection. Leveraging artificial intelligence (AI), the CrowdStrike Falcon® platform offers instant visibility and protection across the enterprise and prevents attacks on endpoints on or off the network. CrowdStrike Falcon deploys in minutes to deliver real-time protection and actionable intelligence from Day One. It seamlessly unifies next-generation AV with best-in-class endpoint detection and response, backed by 24/7 managed hunting. Its cloud infrastructure and single-agent architecture take away complexity and add scalability, manageability, and speed.
CrowdStrike Falcon protects customers against all cyber attack types, using sophisticated signatureless AI and Indicator-of-Attack (IoA) based threat prevention to stop known and unknown threats in real time. Powered by the CrowdStrike Threat Graph™, Falcon instantly correlates 1 trillion security events a week from across the globe to immediately prevent and detect threats.
There’s much more to the story of how Falcon has redefined endpoint protection but there’s only one thing to remember about CrowdStrike: We stop breaches.
Visit: www.crowdstrike.com
Forcepoint is the global human-centric cybersecurity company transforming the digital enterprise by continuously adapting security response to the dynamic risk posed by individual users and machines. The Forcepoint Human Point system delivers Risk-Adaptive Protection to continuously ensure trusted use of data and systems. Based in Austin, Texas, Forcepoint protects the human point for thousands of enterprise and government customers in more than 150 countries.
Please visit www.forcepoint.com
At IBM South Africa, we strive to lead in the creation, development and manufacture of the industry's most advanced information technologies, including computer systems, software, networking systems, storage devices and microelectronics. And our worldwide network of IBM solutions and services professionals translates these advanced technologies into business value for our customers. Every organisation is different, every infrastructure, every workload. Demands are also changing, and the infrastructure choices you make will affect your ability to deliver new capabilities. That's why IT must look for a cloud solution that meets your business requirements in the most effective way.
Please visit www.ibm.com
NETSCOUT provides IT and business teams a seamless and consistent level of visibility into the performance, availability and security risks that impede digital agility, regardless of the underlying platform, provider, or location.
Please visit: www.netscout.com.
VMware, a global leader in cloud infrastructure and business mobility, helps customers realise possibilities by accelerating digital transformation. With VMware solutions, organisations are improving business agility by modernising data centres and integrating public clouds, driving innovation with modern apps, creating exceptional experiences by empowering the digital workspace, and safeguarding customer trust by transforming security. The VMware NSX Network Virtualization and Security Platform delivers a completely new operational model for networking that forms the foundation of the Software-Defined Data Centre (SDDC). NSX enables the creation of entire networks in software and embeds them in the hypervisor layer, abstracted from the underlying physical hardware while micro-segmentation and granular security are delivered to the individual workload. With 2016 revenue of $7.09 billion, VMware is headquartered in Palo Alto, CA and has over 500,000 customers and 75,000 partners worldwide.
Please visit: www.vmware.com.
Cloudflare, Inc. (@cloudflare) is on a mission to help build a better Internet. Today the company runs one of the world’s largest networks that powers more than 10 trillion requests per month, which is nearly 10 percent of all Internet requests worldwide. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare have all traffic routed through its intelligent global network, which gets smarter with each new site added. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was recognized by the World Economic Forum as a Technology Pioneer, named the Most Innovative Network & Internet Technology Company for two years running by the Wall Street Journal, and ranked among the world's 50 most innovative companies by Fast Company. Headquartered in San Francisco, CA, Cloudflare has offices in San Jose, CA, Austin, TX, Champaign, IL, New York, NY, Washington, D.C., London, Munich, Beijing, and Singapore.
Please visit www.cloudflare.com
Credence Security
Established in 1999, Credence Security, a PAN-EMEA specialty distributor, is a leader in cybersecurity, forensics, governance, risk and compliance. Credence Security is a pure-play provider of security and forensic solutions, to both public and private sector enterprises across Europe, Middle East, Africa and India, through a select network of specialist resellers.
Learn more at credencesecurity.com
nCipher
nCipher Security, a leader in hardware security modules (HSMs), empowers organizations by delivering trust, integrity and control to business critical information and applications. Our cryptographic solutions secure technologies including cloud, IoT, blockchain and digital payments, and help you meet compliance mandates.
Learn more at www.ncipher.com
Thycotic
The easiest to manage and most readily adopted privilege management solutions, Thycotic’s security tools limit privileged account risk, implement least privilege policies, control applications, and demonstrate compliance. Thycotic makes enterprise privilege management accessible for everyone by eliminating dependency on overly complex security tools and prioritizing productivity, flexibility and control.
Learn more at thycotic.com
Mimecast is a cybersecurity provider that helps thousands of organizations worldwide make email safer, restore trust and bolster cyber resilience. Mimecast’s expanded cloud suite enables organizations to implement a comprehensive cyber resilience strategy. From email and web security, archive and data protection, to awareness training, uptime assurance and more, Mimecast helps organizations stand strong in the face of cyberattacks, human error and technical failure.
Please visit www.mimecast.com
Obscure Technologies is a security centric organisation of people, distributing best in class advanced security brands and their solutions to market through our valued partner community.
Please visit www.obscuretech.net
Prodata
Prodata - Founded in 1992, is a leading Value Added IT Distributor of specialized solutions across Africa and Europe. With sound management, a driven sales team and an excellent administrative support system, Prodata is a master in the distribution field.
Learn more at www.prodata.co.za
Malwarebytes
Malwarebytes proactively protects people and businesses against dangerous threats such as malware, ransomware and exploits that escape detection by traditional antivirus solutions. Malwarebytes completely replaces antivirus solutions to remove the personal obstacles and business interruptions caused by modern cybersecurity threats. More than 10,000 businesses and millions of people trust Malwarebytes innovative machine-learning solutions and global team of researchers to identify emerging threats and to prevent and eradicate malware that antiquated security solutions miss and leave behind. For more information, please visit us at www.malwarebytes.com. Malwarebytes founder and CEO Marcin Kleczynski started the company to create the best disinfection and protection solutions to combat the world's most harmful Internet threats. Marcin was recently named "CEO of the Year" in the Global Excellence awards and has been named to the Forbes 30 Under 30 Rising Stars of Enterprise Technology list and the Silicon Valley Business Journal's 40 Under 40 award, adding those to an Ernst & Young Entrepreneur of the Year Award.
Learn more at www.malwarebytes.com
iStorage
iStorage is the trusted global leader of award-winning, PIN authenticated, hardware encrypted portable data storage devices. iStorage offers the most innovative range of products to securely encrypt, store and protect data to military standards.
Learn more at istorage-uk.com
Safetica
Safetica Technologies delivers data protection solution for business. Safetica DLP (Data Loss Prevention) prevents companies from data breaches, protects them against human error and helps to comply with regulations.
Learn more at www.safetica.com
Untangle
Untangle is an award winning innovator in cybersecurity designed specifically for the below-enterprise market, safeguarding businesses, home offices, nonprofits, schools and governmental organizations with over 40,000 customers around the world.
Learn more at www.untangle.com
Quest
Your technology challenges never stop changing, so neither do we. Whether it’s data explosion, cloud expansion, security threats or something new, Quest will work with you to help you solve your toughest IT challenges. Since 1987, we’ve provided software solutions for the fast paced world of enterprise IT. With Quest, you and your organization can spend less time on IT administration and more time on business innovation.
Quest is a global provider to 130,000 companies across 100 countries, including 95% of the Fortune 500 and 90% of the Global 1000 and have the experience to help you manage and protect your data, take control of your hybrid environments, keep track of all network-connected devices, stay compliant and govern every identity across the enterprise.
We’re Quest – simple solutions for a complex world.
Learn more at www.quest.com
One Identity
One Identity offers a comprehensive family of identity and access management (IAM) solutions designed to solve today’s challenges, and address tomorrow’s as they arise. We help you get identity and access management right.
So how do we do that?
One Identity believes that security is much more than the practice of denial and restriction. That’s why One Identity’s design and integration philosophy is that our solutions must add agility and efficiency to an organization – regardless of size or market – as well as secure its digital assets.
One Identity delivers identity governance, access management, and privileged account management solutions that facilitate and secure your digital transformation. Let us help you get IAM right.
Learn more at www.oneidentity.com
Rapid7 is advancing security to accelerate innovation. Learn how our Insight cloud delivers shared visibility, analytics, and automation at www.rapid7.com.
As the fastest-growing, independent identity and access management (IAM) provider, SailPoint helps hundreds of global organizations securely and effectively deliver and manage user access from any device to data and applications residing in the datacenter, on mobile devices, and in the cloud. The company's innovative product portfolio offers customers an integrated set of core services including identity governance, provisioning, and access management delivered on-premises or from the cloud (IAM-as-a-service).
Please visit www.sailpoint.com
Cybereason, creators of the leading Cyber Defense Platform, gives the advantage back to the defender through a completely new approach to cybersecurity. Cybereason offers endpoint detection and response (EDR), next-generation antivirus (NGAV), and active monitoring services, powered by its cross-machine correlation engine. The Cybereason suite of products provides unmatched visibility, increases analyst efficiency and effectiveness, and reduces security risk. Cybereason is privately held, has raised $189 million from top-tier VCs, and is headquartered in Boston, with offices in London, Sydney, Tel Aviv and Tokyo.
See more at: www.cybereason.com.
LAWtrust (an Etion company) is a specialist cyber security solutions provider that focusses in establishing positive identity, ensuring authenticity and protecting privacy. Solutions include SSL certificates and certificate management systems, FIDO certified strong authentication, digital signature and approval solutions, managed public key infrastructure (PKI), encryption solutions for database and cloud systems, biometric enrolment and matching systems and insider threat prevention with the eDNA platform.
More information on how we can assist can be found at: www.lawtrust.co.za.
Business downtime is over! So too, is high storage costs, siloed data, and difficult access. At Redstor, we’re disrupting the norm and changing everything you know about data storage, backup, and recovery. Our pioneering technology is the first of its kind and provides you with on-demand access to your data from a single control centre (on any device). Simply stream your data in real-time and eradicate business downtime… forever.
See more at: www.redstor.com/en-za.
SmartCrypto your Data Protection and Public Key Infrastructure (PKI) Partner. Offering best in industry solutions and Root Certificate Authority as a Service(R-CAaaS)....simplifying your security needs.
Please visit smartcryptosolutions.com
ManageEngine Software
ManageEngine crafts comprehensive IT management software with a focus on making your job easier. Our 90+ products and free tools cover everything your IT needs, at prices you can afford. From network and device management to security and service desk software, we're bringing IT together for an integrated, overarching approach to optimize your IT.
Learn more at www.manageengine.com
ITR Technology
ITR Technology have been the sole distributers of ManageEngine software in South Africa for over 18 years. With certified support engineers, a dedicated sales and marketing team and a newly constructed ManageEngine training centre, ITR Technology values making a difference in the lives of IT professionals.
itrtech.co.za
Micro Focus
Micro Focus is uniquely positioned to help customers maximise existing software investments and embrace innovation in a world of hybrid IT, from mainframe to mobile to cloud.
Micro Focus is one of the largest pure-play software companies in the world, focused from the ground up on building, selling and supporting software. This focus allows the company to deliver on its mission to put customers at the centre of innovation and deliver high-quality, enterprise-grade scalable software that the Micro Focus teams can be proud of. Micro Focus helps customers bridge the old and the new by maximising the ROI on existing software investments and enabling innovation in the new hybrid model for enterprise IT.
Learn more at www.microfocus.com
EOH
Learn more at www.eoh.co.za
Galix
Founded in 1995 Galix focuses on network communications and information security. The company offers reliable management security solutions, cyber security and consulting services. Moreover, Galix provides audits and offers remediation with regards to PCI DSS compliance and ISO 27001.
Learn more at www.galix.com
Secured Identity Technology
Learn more at www.securedtech.co.za
Nclose is a leading Specialist Cyber Security Solutions Provider. We architect, deploy and manage security solutions aimed at protecting our clients' resources from damage caused by the ever growing number of threats present in the business place.
Please visit www.nclose.com
SensePost is SecureData Europe's independent elite consulting arm, renowned for its expertise, 18 year track record and innovation on the frontlines of cybersecurity.
With team members that include some of the world's most preeminent cybersecurity experts, SensePost has helped governments and blue-chip companies both review and protect their information security and stay ahead of evolving threats. SensePost is also a prolific publisher of leading research articles and tools on cybersecurity which are widely recognised and used throughout the industry and feature regularly at industry conferences including BlackHat and DefCon.
Please visit sensepost.com
SonicWall has been fighting the cybercriminal industry for over 27 years defending small and medium businesses, enterprises and government agencies worldwide. Backed by research from SonicWall Capture Labs, our award-winning, real-time breach detection and prevention solutions secure more than a million networks, and their emails, applications and data, in over 215 countries and territories. These organizations run more effectively and fear less about security. For more information, visit us at the ITWeb Security Summit.
www.SonicWall.com
Follow us on Twitter, LinkedIn, Facebook and Instagram.
Westcon-Comstor Sub-Saharan Africa, a subsidiary of the global WestconGroup Inc., is a leading value-added distributor of cloud, technology and converged communications solutions for the enterprise and SMB markets.
Please visit: za.westcon.com.
Advanced threats via e-mail and other means are more prevalent than ever. A new way of addressing this is needed. Come and see us to hear how e-Purifier provides the most advanced, locally relevant security for your e-mail and let’s start a discussion around how Securicom and ASG can secure your intellectual property end to end.
www.asg.africa.com
www.securicom.co.za
Corr-Serve is an authorised distributor of intelligent IT solutions that extract and interpret data from business for better decision making.
See more at: www.corrserve.co.za.
Credo Technologies, Division of Phinity Risk Solutions International LTD.
We help facilitate the discussion required to articulate each companies specific information security needs, by aligning the required tools to the budget, risk and compliance directives. Our approach is to harness the collective power of technology, partners and experience to deliver tailored solutions.
Visit prsworld.com
CyberIAM specialises in Identity and Access Management. We provide our clients with solutions to mitigate risks and threats from poor Identity Governance through our methodology of Analysis, Plan, Design, Build, Test and Deploy.
Please visit: www.cyberiam.com.
CyberTech is a managed cyber security service provider specializing in security and cryptographic services across Africa and Europe. Our highly-skilled, certified personnel assist clients in their information security transformation journey.
Please visit www.cybertechsa.com
At F5, our mission is based on the fact that businesses depend on apps. Whether it's apps that help connect businesses to their customers or apps that help employees do their jobs—we make sure apps are always available, and secure, anywhere. The world's largest enterprises, service providers, financial and educational institutions, government entities, and consumer brands rely on F5 to stay ahead of security, cloud, and mobility trends.
More information on how we can assist can be found at: www.f5.com.
First Distribution
First Distribution is the leading value-added distributor in Africa. Our offering includes a product portfolio of global leading Datacentre, Cloud, Networking and Security products and services. This embraces hybrid solutions with access to any combination of on premise, private cloud and public cloud end-to-end solutions from multiple vendors. The portfolio, together with highly skilled staff to support and manage vendors with an unrivalled level of expertise, ensures that our partners have the key elements required for success. First Distribution additionally hosts one of the largest technology partner-to-partner networks in Africa allowing partners to extend the reach of their solutions across the continent.
www.firstdistribution.com
Forcepoint
Learn more at www.forcepoint.com
J2 Software is a proudly African security focused technology company that delivers world class managed security services for every business. Using continuous monitoring and the latest solutions to protect you from changing cyber threats. We provide security through real visibility.
Please visit www.j2.co.za
Khipu Networks is a leading provider of Wi-Fi and network security solutions; Ensuring the security, integrity, performance and availability of customer services and networks.
Visit www.khipu-networks.com
The Media, Information and Communication Technologies Sector Education and Training Authority, the “MICT SETA”, was established in terms of the Skills Development Act, 1998 (Act No. 97 of 1998) and plays a pivotal role in achieving South Africa’s skills development and economic growth within the sub-sectors it operates namely; advertising, film and electronic media, electronics, information technology and telecommunications. In partnership with its stakeholders, it addresses skills shortages and development, accelerates bridging the digital divide and improves the employment prospects of previously disadvantaged groups.
Visit: www.mict.org.za
Magix Security
Magix Security delivers comprehensive and trusted Cybercrime Defense and Detection solutions and services to address, manage, and contain the risks of financial losses and reputational damage arising from the misuse of applications, or other IT information assets, by employees and/or third parties.
www.magix.co.za
Checkmarx
Checkmarx is the Software Exposure Platform for the enterprise. Over 1,400 organizations around the globe rely on Checkmarx to measure and manage software risk at the speed of DevOps. Checkmarx serves five of the world's top 10 software vendors, four of the top American banks, and many government organizations and Fortune 500 enterprises, including SAP, Samsung, and Salesforce.com.
Learn more at Checkmarx.com or follow us on Twitter: @checkmarx.
Marsh is one of the Marsh & McLennan Companies, together with Guy Carpenter, Mercer, and Oliver Wyman.
A global leader in insurance broking and innovative risk management solutions, Marsh's 30,000 colleagues advise individual and commercial clients of all sizes in over 130 countries. Marsh is a wholly owned subsidiary of Marsh & McLennan Companies (NYSE: MMC), the leading global professional services firm in the areas of risk, strategy and people. With annual revenue over US$14 billion and nearly 65,000 colleagues worldwide, MMC helps clients navigate an increasingly dynamic and complex environment through four market-leading firms. In addition to Marsh, MMC is the parent company of Guy Carpenter, Mercer, and Oliver Wyman.
Marsh Proprietary Limited is an authorised financial services provider and regulated by the Financial Services Board (FSP Licence: 8414).
Please visit: www.marsh.com.
We create sustainable change in your organisation to enable you to govern and manage your information risk.
Please visit www.mobiusconsulting.co.za
Panda Security is a European based security vendor with a global footprint. Initially focused on the development of antivirus software, the company has since expanded its line of business to advanced cyber-security services with technology for preventing cyber-crime and addressing advanced threats. The Adaptive Defense product family is an Endpoint Detection and Response (EDR) solution that addresses the changed threat landscape with a differentiated approach using machine learning and big data. The company is recognized by Gartner as Europe's sole EDR vendor. In 2006, Jeremy Matthews founded Panda's local office in Cape Town, opening the international vendor's first presence on the African continent.
Please visit www.pandasecurity.com/southafrica/intelligence-platform/
Phinity Risk Solutions (PTY) LTD. Our Integrated Risk Management solutions help our customers mature risk management process and provide the required reporting for effective business support. The easy and intuitive user interface makes it a breeze to manage. Phinity suite can help you manage some of your greatest operational concerns.
Visit prsworld.com
Popcorn Training - a KnowBe4 company create high quality, engaging and effective security awareness videos, games and interactive learning modules.
All content is locally produced and available on KnowBe4's award-winning training and simulated phishing platform.
KnowBe4, whose mission it is to help organisations manage the ongoing problem of social engineering are a leader in the Gartner Magic Quadrant for security awareness.
Please visit popcorntraining.com
Telspace Systems provides security assessment services to organisations in order to make organisations as unattractive to cybercriminals as possible thus reducing their cyber security risk. Our main goal is to provide high quality services to organisations and to add value. Services include Application Assessments (web, mobile and thick), Social Engineering, Attack and Penetration Testing, Infosec Training and Advisory (consulting).
Please visit www.telspace.co.za
Wolfpack are a proudly SA, level 2-BBBEE company serving small to large companies since 2011.
We deliver professional, product independent and business-aligned information risk and cyber threat consulting, training & awareness solutions.
Please visit www.wolfpackrisk.com
Zenith Systems specialises in GDPR/POPIA data discovery, classification and management solutions (Spirion), as well as SIEM and Cyber Deception tools. Meet compliance and Data Security objectives with Zenith Systems.
For more information visit: www.zenithsystems.co.za
CompTIA is the leading provider of vendor-neutral IT Certifications globally. With more than 2,000,000 IT Certifications issued, CompTIA is dedicated to helping Employers and IT Professionals lead the charge in our digitally connected world.
Please visit: certification.comptia.org.
OT-Morpho is now IDEMIA, the global leader in trusted identities for an increasingly digital world. Through Augmented Identity, we empower citizens and consumers alike to interact, pay, connect, travel and vote in ways that are now possible in a connected environment.
For more information visit: www.idemia.com
(ISC)² Gauteng is a chapter of the international non-profit membership association, (ISC)², consisting of certified IT security professionals in Gauteng. (ISC)² offers a portfolio of credentials that are part of a holistic, programmatic approach to security.
Visit: www.isc2chapter-gauteng.co.za
The Institute of Information Technology Professionals South Africa (IITPSA) is South Africa’s industry body for IT professionals, and a SAQA recognised and IP3 accredited professional body.
Visit: www.iitpsa.org.za