A series of thirty minute seminars running at 11:25am, 12:00am and 13:30pm of the event will allow delegates to understand complex areas of specific interest.

Debunking cybersecurity myths with real facts.

Charl van der Walt

Most of us are familiar with the story of Achilles, the heroic Greek warrior that survived many great battles during the Trojan War. Legend has it that Achilles gained the power of invincibility as a baby after his mother dipped him in the River Styx held only by his heel. This, ultimately, proved his undoing as it was in that same heel that he was fatally shot with a poisoned arrow. This popular Greek myth provides a useful analogy in the context of enterprise security, as even the greatest security systems and procedures can have their Achilles moment in light of seemingly remote vulnerabilities. Over the course of this talk, we’ll share with you our methods, findings and learnings. We hope this will help you to look at your IT estate in a different way, anticipating the threats that others ignore.





A Live Cyber-Attack Simulation

Pavel Mucha

Get inside the brains of the most sophisticated attackers and see how world-class defenders are using their skills and tools in the most efficient and smartest way. You will witness the attacker’s infiltration and see the malicious operation as it moves across the entire environment. See how many opportunities an attacker has to advance the operation and how many opportunities the defender has to destroy the attack before it reaches its target. 

Why DLP has Failed Insider Threat

Insider threat is a large and, as yet, unsolved problem. Organisations don’t know what data they have, where their data is, who has access to different types of data, when data leaves the organisation and exactly what data is leaving the organisation. What’s more - security teams are strapped for both talent and for time. Approaching the insider threat problem can be incredibly hard and daunting, especially for fast-paced and highly innovative companies. We will discuss the challenges faced and how to approach this concern in a world of collaboration and mobility.
What you will takeaway from this session:
• Insider threats are on the rise. Learn how fast detection and response can be an ally
• >50% of breaches are due to insiders. If legacy DLP has failed, learn what promise the Next-Gen of DLP brings
• Employees are leaving organisations all the time and taking data with them. How should you tackle this reality
• The quest to solve insider threat has led us everywhere but fundamentally focussing on the DATA

Building an Effective Operating Centre

Chris Cheyne

User and system compromise, insider abuse, and policy violations are very real threats that today’s organisations must face if they wish to remain safe. In a bid to demonstrate how to utilise and build an effective Security Operation Centre, Chris addresses these risks.

Your business requires a detection capability that rapidly identifies threat actions, coupled with an incident response proficiency to mitigate threats. Constructing an effective Security Operations Centre to deliver this requires maintaining a balanced ecosystem of people, processes and technology, that supports and endorses a clear vision and ethos.

But building and sustaining this ecosystem is easier said than done. With Chris’s insider guide, and specialist knowledge, learn how to build and run a next generation Security Operation Centre.
Learn about:
People: The anatomy of a high performing SOC team and the attributes of the perfect analyst.
Technology: The essential SOC tools for detection and investigations, what works and what to avoid.
Processes & Orchestration: Building repeatable procedures to provide dependable outputs, 24x7.

Overcoming Today’s Most Pressing Third-Party Risk Management Challenges

Gerard McGowan

Review the drivers and challenges organizations face when managing third-party vendor risk
Identify priorities before, during and after vendor procurement
Takeaway a six-step approach for automating the third-party vendor risk lifecycle
Hear real case studies from privacy experts on how to practically tackle the third-party vendor risk

Defending Yourself Against Digital Risks Beyond Your Control


Your business today operates in an open, digital world, in environments that are beyond control.  The threat landscape is no longer contained within your perimeter.  Bad actors have quickly recognized this and have pivoted the majority of their tactics and efforts to leverage this new world. They no longer target only your networks and data but have extended their targets to your employees, customers, brand and partners  This presentation will explore the breadth of the digital landscape today, highlight some key trends and tactics the bad guys are deploying and provide some recommendations on how you should approach your strategy and tactics to defend yourself against digital risks.

Supported by: