Event Overview

Africa has experienced a significant surge in internet usage, with over 500 million users recorded. With the evolving digital landscape, the region faces a growing array of cybersecurity challenges. In 2023, ransomware attacks in Africa increased by 50%, with the financial and healthcare industries being the most targeted. Phishing attempts also soared. African industries faced significant losses due to cyber incidents, with the banking sector alone incurring an estimated $1 billion in damages from cyberattacks in the past year. While AI presents substantial opportunities for enhancing cybersecurity capabilities, it also poses formidable challenges. Cybercriminals’ exploitation of AI technologies exacerbates existing vulnerabilities and underscores the need for comprehensive cybersecurity strategies.

Governments across Africa are taking proactive steps to enhance cybersecurity. Nigeria introduced the Nigeria Data Protection Regulation, while Kenya made strides with the Computer Misuse and Cybercrimes Act. Future regulatory initiatives include the African Union’s efforts to develop a continent-wide cybersecurity framework to harmonize regulations and improve cross-border collaboration.

Join the Cybersecurity Summit: Africa summit to explore these trends. The summit will bring together industry visionaries and thought leaders who will delve into topics including third-party security, the rise in social engineering attacks, cloud defense strategies, and cross-border cybersecurity cooperation, among others.

Speaker

Abdul-Hakeem Ajijola

Chair, African Union Cyber Security Experts Group

Speaker

Preeta Bhagattjee

Director and Head of Technology & Innovation, Werksmans Attorneys

Speaker

Simon Nare

Head of Information Security, TransUnion Africa

Speaker

Sithembile Songo

Group Head, Information Security, Eskom

Speaker

Varsha Sewlal

Executive Legal and Deputy Information Officer, Railway Safety Regulator

Speaker

Galeboe Mogotsi

CISO, University of the Witwatersrand

Speaker

Ntombothando Sigabi

Information Security and Risk Manager, Western Cape Blood Services

Speaker

Mojalefa Mofammere

Network and Security Manager, Assupol

Speaker

Bernard Chadenga

Founder & CEO, The Cimplicity Institute

Speakers

Thought Leaders on Stage Leading Deep-Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats.

Agenda Highlights

  • Enhancing Your Security Posture
  • Third Party Risk Management
  • Cyber Governance
  • 5G Network Security and Business Opportunities
  • Zero Trust

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats

Agenda

09:30 am – 9:50 AM SAST

Abdul-Hakeem Ajijola

Chair, African Union Cyber Security Experts Group

Keynote: Navigating the Digital Future: Advancing Technology and Ensuring Cybersecurity

As we embrace technological advancements, cybersecurity becomes a crucial pillar in safeguarding these innovations.

The keynote will explore the road map to the digital revolution, highlighting the intersection of technology advancement and cybersecurity. It will address the latest technological trends and the measures needed to protect digital assets. The speaker will also highlight the role of the government in fostering a secure digital environment and the collaborative efforts needed between public and private sectors.

The session will cover:

  • Latest technological advancements driving digital revolution;
  • Current regulations impacting technology and cybersecurity;
  • How CIOs and CISOs can collaborate to drive digital transformation while ensuring cybersecurity.

Abdul-Hakeem Ajijola, Chair, African Union Cyber Security Experts Group

9:50 am – 10:10 am SAST

Preeta Bhagattjee

Director and Head of Technology & Innovation, Werksmans Attorneys

Nadia Veeran-Patel

Information Security Officer (CISO), LRMG

Navigating Complex Regulations in Emerging Technology: The Role of CISOs

In an era where cyberthreats like ransomware, financial crime, and the rapid adoption of AI technologies dominate the risk landscape, CISOs must navigate a complex web of regulations. Balancing security priorities with regulatory compliance has become a critical challenge for organizations across industries.

How can CISOs ensure that their strategies align with evolving legal frameworks while safeguarding their businesses?

This fireside chat will discuss the implications of various regulations on ransomware defense, the prevention of financial crime, and the ethical and legal considerations surrounding the use of AI in cybersecurity.

The session will cover:

  • Key regulatory frameworks governing ransomware response and mitigation;
  • Compliance strategies for preventing financial crime in the digital age;
  • Ethical and legal implications of integrating AI into cybersecurity practices.

Preeta Bhagattjee, Director and Head of Technology & Innovation, Werksmans Attorneys

Nadia Veeran-Patel, Information Security Officer (CISO), LRMG

10:10 AM - 10:30 AM SAST

Simon Nare

Head of Information Security, TransUnion Africa

Securing the Digital Front Door With Comprehensive IAM Policies

In an era of escalating data breaches and cyberthreats, identity access management remains a cornerstone of robust cybersecurity.

Although not a new concept, implementing an effective IAM strategy continues to be challenging to many organizations. How can organizations manage the critical facets of IAM, including user authentication, access control and identity governance?

The session will provide insights into real-world applications and best practices for deploying comprehensive IAM systems.

The session will cover:

  • Strategies for secure user authentication and access control;
  • The role of identity governance in IAM;
  • Integrating IAM with existing security frameworks.

Simon Nare, Head of Information Security, TransUnion Africa

Networking & Exhibition Break

11:00 AM - 11:10 AM SAST

10:45 AM - 11:05 AM SAST

Sithembile Songo

Group Head, Information Security, Eskom

Varsha Sewlal

Executive Legal and Deputy Information Officer, Railway Safety Regulator

Fireside Chat: Harnessing AI for Cutting-Edge Threat Detection and Cyber Defense

Leveraging AI capabilities allows organizations to identify and mitigate sophisticated cyberthreats while seamlessly integrating these advanced technologies within existing security frameworks.

This transformative approach not only offers actionable intelligence but also enhances overall security resilience.

The discussion will cover the integration challenges, practical applications and strategies for using AI to improve cybersecurity defenses, providing CIOs and CISOs with the insights needed to stay ahead.

The session will cover:

  • The role of AI in detecting sophisticated cyberthreats;
  • Integration of AI with traditional cybersecurity measures;
  • Real-world AI applications and success stories.

Sithembile Songo, Group Head, Information Security, Eskom

Varsha Sewlal, Executive Legal and Deputy Information Officer, Railway Safety Regulator

11:05 AM - 11:35 AM SAST

Dr Sylvia Sathekge

Partner and Chief Information Officer, SNG Grant Thornton

Tunde Dada

Group CIO/BCM, inq. digital

CIO vs. CISO Debate: IT Outage Preparedness: Strategies and Best Practices for Business Resilience

The recent CrowdStrike outage has highlighted the need for robust preparedness and response strategies for businesses.

What are the best practices for preventing and managing outages – IT-related or otherwise?

The speakers will discuss strategies for building resilient IT infrastructure, ensuring business continuity and minimizing downtime during disruptions.

The session will cover:

  • Key takeaways from the CrowdStrike outage and lessons learned;
  • Using advanced monitoring tools to detect early signs of potential outages;
  • Key principles for creating a resilient IT infrastructure.

Dr Sylvia Sathekge, Partner and Chief Information Officer, SNG Grant Thornton

Tunde Dada, Group CIO/BCM, inq. digital

11:35 AM - 11:55 AM SAST

Galeboe Mogotsi

CISO, University of the Witwatersrand

Ntombothando Sigabi

Information Security and Risk Manager, Western Cape Blood Services

Mojalefa Mofammere

Network and Security Manager, Assupol

Panel: Phishing Defense: Combating Social Engineering Attacks

According to recent research, phishing incidents in Africa have surged by over 40% in the past year, with financial losses exceeding $2 billion.

The increasing sophistication of phishing techniques, coupled with the region’s rapid digital transformation and the rise of AI, has made organizations more vulnerable than ever.

The speakers will discuss the latest tactics employed by cybercriminals and their impact on businesses and individuals.

The session will cover:

  • The role of social engineering in successful phishing campaigns;
  • Effective mitigation strategies to combat phishing;
  • The importance of regional and international cooperation in combating phishing attacks.

Galeboe Mogotsi, CISO, University of the Witwatersrand

Ntombothando Sigabi, Information Security and Risk Manager, Western Cape Blood Services

Mojalefa Mofammere, Network and Security Manager, Assupol

11:55 AM - 12:25 PM SAST

Corradino Corradi

General Manager: Information Security Strategy, Architecture and Technical Excellence, MTN

Ishaaq Jacobs

Chief Cyber Security Officer, Sasol

Bernard Chadenga

Founder & CEO, The Cimplicity Institute

Panel: Future-Proof Cloud Security: Leadership Strategies for Emerging Threats

Cloud security is evolving rapidly, and security leaders must stay ahead of emerging threats.

In this session, panelists will discuss the challenges and strategies for future-proofing cloud security, the latest advancements in cloud security technologies, the importance of continuous monitoring, and leadership strategies for adapting to regulatory changes and evolving threats.

The session will cover:

  • Incident response and recovery planning for cloud environments;
  • Vendor risk management in cloud security;
  • Implementing zero trust architecture in cloud environments.

Corradino Corradi, General Manager: Information Security Strategy, Architecture and Technical Excellence, MTN

Ishaaq Jacobs, Chief Cyber Security Officer, Sasol

Bernard Chadenga, Founder & CEO, The Cimplicity Institute

Frequently Asked questions


Yes, you’ll need to fill out our registration form to gain access to the event. Please fill in the registration form with some basic information to get started.
The information you provide upon registration will only be used to establish you as a user on the platform and to create your login credentials. It will not be used for any other purposes.
Yes, the vFairs platform is compatible with any computer or mobile device and any browser.
Yes, this event is completely free to attend. We encourage you to login and have a look around at your convenience.
The event will be on demand indefinitely, however we may make updates and changes to the platform periodically. Make sure to keep checking back in to see our newest features in action!