12 -14 august 2020 - cover magazine · 2020. 7. 8. · contacts. this makes them more vulnerable to...

8
Participating Partners: An event by: [email protected] | Tel: 011 7911 535 | 14 Cherry Drive, Robin Hills 2194 | Johannesburg | South Africa 12 th -14 th August 2020 Emperor’s Palace Resort, Johannesburg, South Africa

Upload: others

Post on 15-Feb-2021

1 views

Category:

Documents


0 download

TRANSCRIPT

  • Participating Partners: An event by:

    [email protected] | Tel: 011 7911 535 |14 Cherry Drive, Robin Hills 2194 | Johannesburg | South Africa

    12th-14th August 2020Emperor’s Palace Resort, Johannesburg, South Africa

  • Who should attend?

    OVERVIEW

    Ransomware is one of the biggest threats in today’s security landscape; it has been on the scene for more than a decade and, as it continues to prove successful for cyber criminals, more high-profile business targets fall victim on an almost daily basis. Ransomware is always evolving. Attackers are getting more sophisticated in how they infect systems, avoid detection and foil decryption efforts.Local governments tend to communicate with a wide variety of businesses and individuals, with many of them being one time contacts. This makes them more vulnerable to attacks, as their employees don’t know most of the contacts with whom they communicate in person.On the 24th of October 2019, the City of Joburg announced that their network had been breached by hackers, this was later

    found out to be a Ransomware attack. The hackers report-edly demand the payment of 4.0 bitcoins by October 28 at 17:00 hours, failing which they will upload all the data on to the internet. Cities have become targets as they have run vast networks of connected technology that are difficult to update, manage and patch effectively. The same goes for all govern-ment departments, especially those in the rural areas.This 2-day summit will bring together cybersecurity experts, city administrators, government administrators, researchers, con-sultants, corporate and academics to discuss and map the way forward on how municipalities and government departments can invest on cybersecurity to avoid wasting funds on trying to solve threats and ransomware.The summit will look at bills, Ransomware, phishing and malwares amongst other topics.

    Highlights• Mauritius Cyber Security Strategy 2014-2019 (Case

    Study)• Legislation- SA’s proposed Cybercrimes and

    Cybersecurity Bill• Passwords, Malware, Malicious Software & Spyware• Know Your Employee –Background Screening• Protecting Your Website against Attackers• Cyber Attacks on South African Municipalities: Ex

    pensive Lessons to be learnt

    Ransomware 101: Understanding Cyber Security’s biggest Threat• Educating Executives on Cybersecurity• Email Security 3.0-From Perimeter to Pervasive

    • Why Cybersecurity must be Number One Concern forNational, Provincial and Local Government: Whatmore can we do?

    • Information Security Officers/Analyst/Interns

    • Cyber Security Officers/Mangers/Analysts/In

    terns/Consultants

    • Lead Architects Information Security

    • Chief Technology Officers/Managers/Directors

    • Cyber Resiliency Managers

    • Forensic Heads

    • Mayors

    • Built Engineers

    • IT Auditors

    • Privacy Professionals

    • Board Members

    • Scrum Masters

    • IT Architects

    • Chief Executive Officers

    • CISO

    • Asset Managers

    • MEC’S

    • Municipal Directors & Managers

    • IT Directors & Managers

    • Municipal & Government Information Officers

    • Network Managers

    • Researchers/Academics/Students

    • Media & Telecommunications

    • Corporate Communications Officers/Managers

    • Partners

    • Technology Security Managers

    • Chief Information Officers

    • Information Risk Managers/Officers/Interns

    • Risk Assurance Managers

    • IT Security Officers

    • Network & Server Engineers

    • Infrastructure & Information Security

    Managers

    • Systems Administrators

  • and works with local and municipal government and private

    entities to help them improve and manage their information

    security posture by developing a customized Cyber Risk Loss

    Control Program. The programs are designed to identify cyber

    vulnerabilities, risks and provide actionable recommendations

    based on best practices and international standards. Romero

    currently works with various Joint Insurance Funds/Government

    Risk Pools and is currently the Technology Risk Services Director

    for 64 municipalities in New Jersey. He is an ISO 27001 auditor

    and has performed over 250 cyber risk assessments throughout

    the state.Romerois currently pursuing his Certified Government

    Chief Information Officer (CGCIO) certification at Rutgers

    University.

    • Municipal Cybersecurity Directors/Deputies

    • Heads of Forensics

    • Members of the Anti Corruption Unit

    • Cybersecurity Hubs

    • Heads of IT

    • Heads of Networks & Infrastructure

    • Department of Telecommunications Directors

    • Risk Control Officers

    • Network Security Managers

    • External & Internal Auditors

    Kindly note that bookings for the workshop are separate from

    the summit tickets. Contact the sales team on +27 11 791 1535

    7th May – Summit Day 108:00 -08:30 Registrations08:30 -09:00 Key Note Address

    Major General Shadrack SibiyaHead of Forensics

    City of Johannesburg

    Who should attend?

    DAY 1

    PRE-SUMMIT WORKSHOP- MUNICIPAL CYBER SECURITY 101 (30 SEATS ONLY)

    6th May - Pre-Summit Workshop- Municipal Cyber Securi-ty 101 (30 seats only)

    08:30 -09:00 Registrations09:00 Workshop Starts10:30-11:00 Tea/Coffee Break13:00 – 14:00 Lunch Break15:00 -15:30 Tea/Coffee Break16:30 End of the Workshop

    One Day -WorkshopMunicipal Cyber Security 101: Covering the Bases- Building

    a Cyber Security Foundation for Municipal Governments• Covering the bases

    • Password management and access control

    • Backup and encryption

    • Malware and social engineering attacks

    • Cyber security awareness education

    • Contingency planning: Incident response, disaster

    recovery and business continuity

    • Vendor risk management

    • Patching and other “technical controls”

    FacilitatorLou Romero

    Technology Risk Ser-vices Director / Manag-ing Partner

    Secure Data Consulting

    Services (New Jersey,

    USA)

    Lou Romero has 40

    years of IT experience

  • 11:00 – 11:30 Protecting Your Website against Attackers • One does not simply login to my website – how toprotect your admin and user logins through strong passwordrules, multi-factor authentication, and brute force protec-tion.• No encryption? I also like to live dangerously – howto protect your website from hackers (and spying govern-ments) with SSL, plus how to protect sensitive data (such asyour website login) in your emails.• If you liked it you shoulda put a patch on it – whyregularly updating your website software with the latestupdates and security patches is one of the most importantsecurity steps you can take.• Baby got backup – the simple truth is, sometime stuffgoes wrong. When that happens, having a good backupplan can save your ass.• Another brick in the wall – a web application firewallis a proven way to stop hackers before they even accessyour site. You can setup your own (see OWASP WAF rules)or you can take the easy (and potentially more secure)route – use a cloud-based WAF.

    Presenter

    Nikolai KaufmannPartner Growth ManagerSSL Store

    11:30 -12:00 Email Security 3.0-From Perimeter to Pervasive

    • Zone 1 –Perimeter• Zone 2 –Inside the Perimeter• Zone 3-Beyond the Email Perimeter-Pervasiveness• Beyond the Zones-API Driven Security Ecosystem

    Integration

    Presenter

    Thomas MangwiroBusiness Development ManagerMimecast South Africa

    DAY 1

    09:00 -09:45 Ransomware 101: Understanding Cyber Security’s biggest Threat

    • What is Ransomware and how does it

    affect us

    • How does Ransomware spread?

    • How to protect ourselves from Ransom

    ware attacks

    Presenter

    Simeon TassevManaging DirectorGalix Networking (Pty) Ltd

    09:45 – 10:30 Passwords, Malware, Malicious Software & Spyware

    • The human factor involved in passwords, digital device

    usage (including IOT) and falling victim to malware

    attacks/data breaches and the effect that personal

    behaviour has on cyber security in an organisation.

    • Best practices for password management and digital

    behaviour within an organisation and the necessary

    measures to put in place for preventing

    security breaches.

    • Educating users on effective password usage and

    the identification and avoidance of

    malware, malicious software & spyware (including

    phishing and spearphishing/impersonation attacks).

    Determining the extent of compromised credentials.

    • Prevention is better than cure: Techniques to evaluate

    key vulnerabilities and the required software,

    tools and methods, including efficient patch manage

    ment, to harden attack surfaces for improved security.

    Presenter

    Grant ChapmanManaging Director

    Cybervision

    10:30-11:00 Tea/Coffee Break

  • Guy GolanChief Executive Officer

    Perfomanta Group

    14:30-15:00 Managed Security Services • Security assessments

    • On-going monitoring and maintenance

    • Employee and Infrastructure Monitoring

    • Policy Reporting & Enforcement

    Presenter

    John McLoughlinChief Executive Officer

    J2 Software

    15:00-15:30 Cyber Security for Non-Technical Employees• Cyber Security for modern SA Municipalities

    • Cyber Security – where to start

    • Governing Cyber Security in an age of cyber chaos

    PresenterCharl UeckermannCEO

    AVeS Cyber Security

    DAY 1

    12:00 12:30 Managing Third Party Security in Critical Infra-structure

    • Identify Function

    • Protect Function

    • Detect Function

    • Respond Function

    Presenter

    Simba ChiwanzaCybersecurity Consultant

    Wolfpack Information Risk Spyware

    12:30 – 13:00 Internet of Things & Cyber Security • Internet of things – What is the Internet of Things

    • The Rise in Exploit of Internet of Things technologies

    • The digital storm

    • Internet of Things Cyber Security Solutions

    Presenter

    Mageshen NaidooHead of Cybersecurity

    First Distribution

    13:00 -14:00 Lunch Break14:00- 14:30 Why Cybersecurity must be Number One Con-cern for National, Provincial and Local Government: What more can we do?

    • Let’s understand who is attacking who and for what?

    • Private sector’s security posture vs. government’s

    posture

    • Ability to attract talent in government

    • Speed in government

    Presenter

  • 08:30 -09:00 Registrations09:00 -10:00 Governance, Risk & Compliance

    • The importance and benefits of practising good

    governance

    • The use of technology as a tick-box on how to ensure

    POPI compliance

    • The analysing, automating, managing and auditing of

    business processes to better understand, identify and

    assess risks

    • Future and trends of security within information re

    cords management.

    Presenter

    Maeson MaherryChief Solutions Officer

    LAWtrust

    10:00 -10:30 Coffee/Tea Break

    10:30 – 11:00 Educating Executive on Cybersecurity• Understanding why cyber criminals are targeting you• Insider threats• Germ theory• Getting IT support• Avoiding phishing attacks• Stopping malicious code• Avoid identity theft and financial cyber-theft• Avoiding cyber-attacks while traveling• Security and the cloud• Contract “firewalls”• Third-party cyber risk management

    Presenter

    Andrew ChesterCISOUkuvuma Security

    Solutions

    DAY 1 DAY 2

    15:30-16:00 Legislation- SA’s proposed Cybercrimes and Cybersecurity BillTechnology has become an indispensable part of modern life-it

    has significantly changed the way people communicate and do

    business. In a world and country where technology is dynamic in

    nature and is continuously evolving, South Africa has struggled

    to keep up with these developments and in regulating cyber se-

    curity and cybercrimes. Fatima will delve on the Bill and what

    it aims to achieve in

    regulating cyber security.

    Presenter

    Fatima Ameer-MiaDirector: Media, Tech-

    nology & Telecommuni-

    cations

    Cliffe Dekker Hofmeyr

    16:00-16:30 Cybersecurity Experience Centre and Acade-my-How Municipalities can benefit?

    Addressing the Skills Shortage

    Cybercrime is now the fourth most reported economic crime in

    South Africa, with our economy reportedly losing R1 billion each

    year due to online criminal activities. Being breached is the

    new normal. Security is a business priority, with many execu-

    tives feeling overwhelmed by the defender environment and

    citing certification and talent as two of the biggest constraints

    to adopting advanced products and solutions. The academy

    aims to address the skills shortages in the cybersecurity sector.

    The Cybersecurity Experience Centre and Academy has been

    doing that since 2017 and Karen will explain on how munici-

    palities and government

    departments can benefit

    from the Academy.

    Presenter

    Karen SharpeDirector of Learning

    NIL Learning Africa

    16:30-19:00 Networking Cocktail Party 8th May-Summit

  • DAY 2 DAY 2 Conti.......

    Maeson MaherryChief Solutions Officer

    LAWtrust

    12:00-12:30 The state of cybersecurity across African busi-nesses

    • Data: the new gold

    • Cybercrime and the rise of data

    • Accessing and protecting data

    • Discovering you’re at risk-and protecting against it

    • Multi-cloud strategies; the good, the bad and the

    ugly

    Presenter

    Hendrik FourieSales Specialist-Cyber

    Security

    First Distribution

    12:30 -13:30 Lunch Break

    13:30 -14:00 Q & A (All Presenters Present Day 1 & 2)

    14:00 End of Summit

    11:00 -12:00 Panel DiscussionsCyber Attacks on South African Municipalities: Expensive Lessons Learnt

    Panelists

    Major General Shadrack SibiyaHead of Forensics

    City of Johannesburg

    Hylton BrandRisk Officer

    City of Cape Town

    Hendrik FourieSales Specialist-Cyber

    Security

    First Distribution

  • REGISTRATION FORM AFRICA MINING LAWS, POLICIES & REGULATION FORUM 2020 26th -27th of March 2020 | Sandton Sun Hotel, Johannesburg, South Africa PLEASE WRITE IN BLOCK LETTERS Authorising Person:

    Signature: By completing & signing this form, the authorizing signatory accepts the terms and conditions as stated on the registration form Note: Please provide information as you wish it to appear on the name tag and certificate Delegate Attendance Information:

    CANCELLATION NOTICE By signing and returning the registration form, the authorizing signatory on behalf of the stated company is subject to the following terms and conditions. Delegate Cancellations: All cancellations must be received in writing and are subject to the following conditions: Charge of 50% of the registration fee, plus R899 (+ VAT) administrative charge will be made for cancellations received in writing at least 14 working days prior to the event. For any cancellations received less than 7 working days before the date of the event, the full fee will be payable, and no refunds will be given except credit notes. If a registered delegate does not cancel and fails to attend the Training, it will be treated as a cancellation and no refund or credit note will be issued.

    Substitutions Delegate Substitution: Substitution is welcome at any time with no additional charges. Please notify Federated Management Institute in writing of any such changes at least 4 days before the event. Please note that the speakers and topics are confirmed at the time of publishing. However, circumstances beyond the control of the organizers may necessitate substitutions, alterations or cancellations of the speakers and/or topics. As such Federated Management Institute reserves the right to alter or modify the advertised speakers and/or topics if necessary. Any substitutions or alternations will be updated and sent to you as soon as possible.

    FUNDS TRANSFER Please state your full names clearly on the money transfer. Please note, bank charges are for your OWN account and this should be stipulated to your bank. Please advise your bank that the charges should be included in your deposit amount. Payments must be made within 5 working days after receipt of invoice unless agreed upon prior to the confirmation of booking.

    Please be informed that full payments must be received prior to the event. Only fully

    paid up delegates will attend the event unless agreed otherwise with Federated Management institute. A copy of the bank deposit receipt should accompany your

    registration form and must be emailed or faxed.

    BANKING DETAILS: Branch name: Eastgate Branch

    Branch Code: 250455 Account name: Federated Management Institute Account number: 62734093347 Swift Code: FIRNZAJJ950

    EARLY BIRD BY 31/01/20

    Title First Name Surname Designation ID/Passport # e-mail Mobile

    First Name Surname

    Designation

    Company Name Company Vat Number

    Telephone Number Fax Number

    Postal Address Postal Code

    e-mail Address Purchase Order Number

    Person Dealing with Accounts Account Contact

    STANDARD

    R 8 450.00

    REGISTRATION FEES EX VAT

    10% off R 7 605.00

    AFRICA MUNICIPAL & LOCAL GOVERNMENT CYBERSECURITY SUMMIT 2020

    REGISTRATION FORM

    12th -14thAugust 2020 | Emperor’s Palace Resort, Johannesburg, South Africa

    Email: [email protected]

    REGISTRATION RATES EX VATSTANDARD CONTACT EVENT2-Day Conference onlyGovernment R4990.00Corporate R5450.00Consultants R5990.00Workshop+ 2 Day Conference R7990.00

    LIVE WEBINAR2-Day Conference onlyGovernment R2990.00Corporate R3450.00Consultants R3990.00Workshop+ 2 Day Conference R5990.00