A series of thirty minute seminars running at 11:25am, 12:00am and 13:30pm of the event will allow delegates to understand complex areas of specific interest.

Debunking cybersecurity myths with real facts.

Charl van der Walt

Most of us are familiar with the story of Achilles, the heroic Greek warrior that survived many great battles during the Trojan War. Legend has it that Achilles gained the power of invincibility as a baby after his mother dipped him in the River Styx held only by his heel. This, ultimately, proved his undoing as it was in that same heel that he was fatally shot with a poisoned arrow. This popular Greek myth provides a useful analogy in the context of enterprise security, as even the greatest security systems and procedures can have their Achilles moment in light of seemingly remote vulnerabilities. Over the course of this talk, we’ll share with you our methods, findings and learnings. We hope this will help you to look at your IT estate in a different way, anticipating the threats that others ignore.





A Live Cyber-Attack Simulation

Pavel Mucha

Get inside the brains of the most sophisticated attackers and see how world-class defenders are using their skills and tools in the most efficient and smartest way. You will witness the attacker’s infiltration and see the malicious operation as it moves across the entire environment. See how many opportunities an attacker has to advance the operation and how many opportunities the defender has to destroy the attack before it reaches its target. 

Detect, investigate & respond to insider threats before damage is done

  • Are you able to successfully avoid data loss surprises as a result of employee departures?
  • 90% of insider data loss, leak and theft goes undetected internally. Are you able to detect and respond to insider threats?
  • Why your IT and security teams need to focus on the employee offboarding workflow in order to protect company IP when employees and contractors quit
Building an Effective Operating Centre

Chris Cheyne

User and system compromise, insider abuse, and policy violations are very real threats that today’s organisations must face if they wish to remain safe. In a bid to demonstrate how to utilise and build an effective Security Operation Centre, Chris addresses these risks.

Your business requires a detection capability that rapidly identifies threat actions, coupled with an incident response proficiency to mitigate threats. Constructing an effective Security Operations Centre to deliver this requires maintaining a balanced ecosystem of people, processes and technology, that supports and endorses a clear vision and ethos.

But building and sustaining this ecosystem is easier said than done. With Chris’s insider guide, and specialist knowledge, learn how to build and run a next generation Security Operation Centre.
Learn about:
People: The anatomy of a high performing SOC team and the attributes of the perfect analyst.
Technology: The essential SOC tools for detection and investigations, what works and what to avoid.
Processes & Orchestration: Building repeatable procedures to provide dependable outputs, 24x7.

Overcoming Today’s Most Pressing Third-Party Risk Management Challenges

Gerard McGowan

Review the drivers and challenges organizations face when managing third-party vendor risk
Identify priorities before, during and after vendor procurement
Takeaway a six-step approach for automating the third-party vendor risk lifecycle
Hear real case studies from privacy experts on how to practically tackle the third-party vendor risk

Defending Yourself Against Digital Risks Beyond Your Control


Your business today operates in an open, digital world, in environments that are beyond control.  The threat landscape is no longer contained within your perimeter.  Bad actors have quickly recognized this and have pivoted the majority of their tactics and efforts to leverage this new world. They no longer target only your networks and data but have extended their targets to your employees, customers, brand and partners  This presentation will explore the breadth of the digital landscape today, highlight some key trends and tactics the bad guys are deploying and provide some recommendations on how you should approach your strategy and tactics to defend yourself against digital risks.

Supported by: