Forgot Login?  

Johannesburg Chapter, March 2018 - Agenda




Date: Thursday, 15th March 2018

 Venue: Montecasino Conference Room, Fourways

 Location: Johannesburg, South Africa

Attendees  Feedback


 Time: 8:00 - 8:30

Welcome Remarks & House Keeping

 Time: 8:30 - 8:45

 Session Leader: Jon Hamlet -  18 Years Experience Security Professional & Senior Country Manager South Africa - Symantec

Alliance Media Group

Session 1 - Open Forum

 Time: 8:45 - 9:30

 Session Leader: Russell Nel - Head of Information Governance - Stanlib

 Session Title: PoPI - Strategizing for a Compliant Future


  • What are the best practices in the preparation of the roadmap for compliance? (Progress Made, next steps)
  • Resourcing effectively for streamlining compliant processes (reporting lines, draft duties, role of the GDPR Privacy Officer)
  • Mapping PoPI to GDPR

Qualys full color horizontal rgb

Session 2 - Open Forum

 Time: 9:30 - 10:15

 Session Leader: 

Darron Gibbard CISM, CISSP - Managing Director Northern Europe & CTSO - Qualys

 Session Title: How Intelligent is your Threat Intelligence?


Join our interactive session to share and discuss methods and best practices to improve security analytics and intelligence

Networking Break

Time: 10:15 - 10:30

Alliance Media Group

Session 3

 Time: 10:35 - 11:20

 Session Leader: 

Julian Ramiah - Group CISO - Liberty Holdings Limited

 Session Title: Are you the Weakest Link?


A common misconception about Cyber Criminals is that they only use complex techniques and technical tools to hack networks or humans. This is not true.  Cyber Criminals have realised that the easiest way to steal data or compromise security defences is by tricking or social engineering people.

Humans are considered the weakest link in the cyber security chain because of unintentional slip-ups that may lead to an incident. Cyber Criminals entice users using phishing attacks to lure their victims into disclosing personal information. 

Information Security is all about preserving C.I.A (Confidentiality, Integrity and Availability).

Protecting your personal and corporate information assets can only be as strong as its weakest link. While technology controls will safeguard and ensure a level of resilience against cyber-attacks, the silver bullet remains your most prized assets….your people. However Cyber Criminals persist to target the human end points instead of focusing their time and resources to create advanced and expensive cyber-attacks.

 Do not be the weakest link!


ibmpos blurgb

Session 4 - Open Forum

 Time: 11:25 - 12:10

 Session Leader: Lushen Padayachi - Associate Partner: Security Services - IBM

 Session Title: Hacked - A South African Security Perspective

With the ever evolving technology landscape, it is now more challenging to manage cyber threats and data breaches. This session will provide a perspective of security threats in South Africa and insight on how to manage the chaos.


Networking Lunch

Time: 12:10 - 13:00

Location: Punchinellos

GK Logo

Session 5

 Time: 13:00 - 13:45

 Session Leader: 

Mixo Ngoveni - Founder - Geekulcha

Tiyani Nghonyama - COO - Geekulcha

 Session Title: Security Skills Shortage: Upskill and Empower


Going through a Design Thinking process. Like minded individuals into a room and following a process to help better understand the problem before reaching an ideal solution.

The role players involved can come from multiple disciplines and, not only from a security background.

Key Takeaways:

A Solution to Help SA with our current skills and job shortage.


ibmpos blurgb

Session 6

 Time: 13:45 - 14:30

 Session Leader: Ashraf Abdelaazim - MEA Region Leader: Resilient Incident Response - IBM

 Session Title: The Role of Orchestration in Incident Response and Security Operations

Networking Break

Time: 14:30 - 14:45

Alliance Media Group

Session 7

 Time: 14:45 - 15:30

 Session Leader: Jon Hamlet - 18 Years Experience Security Professional & Senior Country Manager South Africa - Symantec

 Session Title: What are the emerging threats and how do we address them?


In general Cyber Threat Actors have one objective and that’s to generate revenue through malicious and fraudulent activities. Ransomware has been on the rise and cryptocurrencies have introduced additional revenue streams that Threat Actors can explore and exploit… the question is, “How do we protect ourselves”?

Closing Remarks & the Next Steps

 Session Leader: Leigh Thomas - Founder & Director - CISO Alliances


Specialists in creating

aligned networking platforms

Alliance - A union formed for mutual benefit

Copyright © 2017 - 2018