Aug 30
Ways to convince Your Boss Ways to Save Submit Your Talk

Submit Your Talk

Overview of the event

Cyber security systems and principles are designed to safeguard websites and web applications from attackers seeking to disrupt, delay, alter or redirect the flow of data. These attackers vary in target, motive, levels of organization, and technical capabilities, requiring public and private organizations to adopt ever-increasing measures to prevent cyber attacks.

Governments maintain cyber security measures to protect the integrity of critical infrastructure for financial systems, public health, science, and safety institutions, and defense, aerospace, and intelligence agencies.

Private enterprises use cyber security and online data protection help prevent lost revenues, harm to brand reputation, and potential fines or legal liabilities.

The Conference aims to help achieve cooperative solutions and industry teaming to defend against the ever-growing cyber threat.

Learning outcomes:

Protection , Mitigation, Understanding, Sharing, Gaining, Knowing and Optimizing.

Facts & Figures About The Event

7 Speakers
7 Topics
50 Tickets

Conference Schedule

Cyber Security Summit, Johannesburg

X Topic Abstract

The availability of powerful computing capabilities and emerging technologies such as machine learning, robotic process automation, big data and artificial intelligence provides cyber professionals with the tools needed to combat malicious actors more effectively. We need to spread the net as wide as possible, and collect as much as we can so we create the means to be able to detect as many indicators of compromise, not just on the network, but on all endpoints, including operating technology (OT) and internet of things (IoT), applications, cloud services, files and data; digital foot-printing information; everywhere we can. In other words, create more noise. We should then deploy technologies such as machine learning and artificial intelligence (AI) to detect any anomalous behaviour and alert on detecting these. That way, we detect attacks as early as possible.
But we need to do more, as the noise will create the need for more resources to deal with the amount of incidents we are detecting by monitoring everything. We must deploy automated responses for the known attacks, and only escalate unfamiliar behaviour to human analysts, that can be investigate and analyse unfamiliar incidents to determine if they are potential attacks. The automation technologies should assist by enriching the unfamiliar incidents with as much information as possible so that analysts can determine the root cause quickly and effectively and devise effective containment, eradication and remediation responses to the attacks.
All the tools and technologies will go a long way in protecting us, but we must also assume the worst; we will be attacked and the attackers may be successful in breaching our defences. We need to spend time before attacks and damage happen to devise effective response strategies. The tools that assist us in responding to cyber incidents can also assist us in structuring our response to breaches by guiding our public relations, legal and law enforcement responses.
So, let’s use our new tools and make as much noise as we can to get better at detecting and preventing attacks on our prised digital assets, enabling us to embrace the digital revolution with confidence.

X Topic Abstract

Human element and the role it plays
- Technology not being the only consideration
- What is Cyber Resilience/Resiliency
- Building out Cyber Security Strategies

X Topic Abstract

Business Email Phishing is a type of Hack targeting companies that conduct wire transfers. Corporate or publicly available email accounts of employees that conduct financial transactions or are involved with wire transfer payments are either spoofed or compromised through phishing attacks to carry out fraudulent fund transfers.
Will do a live Demo and also give a little talk/training on recognizing phishing emails that can lead to email compromising

X Topic Abstract

The first thought that comes to my Mind when I think IoT is ‘So many Things to write about, where do I start’, after all, the Internet of Things is about Every Thing that connects to the Internet or a network that collects and exchanges Data.
Let me begin by setting the scene mentioning a few and I stress mentioning a ‘few’ objects/devices/sensors that are considered ‘Things’ in the most talked about subject in IT conferences around the globe today, “IoT”, Biochip tracking devices for animals, wearable device, fridge, motor vehicle, workstation, server, automated blinds, garden sprinkler systems, heart monitoring implants and the list goes on. The IoT allows objects to be sensed or controlled remotely across the network or internet. These objects collect useful and in some cases critical/sensitive data with the help of various existing technologies that they are connected to and then autonomously flow the data between other devices.

Fact 1: Experts estimate that the IoT will consist of about 30 billion objects by 2020 and 50 billion by 2022.
Fact 2: In the recent years we have seen a massive growth in the global cyber threat, there has been a significant rise in exploit of IoT technologies.
Fact 3: IoT is a giant network of connected “things” which also include people. The relationship will be between people-people, people-things and things-things.
IoT Network Security solutions
We have solutions that can assist protect your networks. Technology that can collect, aggregate, monitor and normalise data from IoT devices which provide clean reporting and actionable data that we can use to pro-actively reduce the risk of Cyber Storms. Below just a few solutions that we provide that could make or break your organisation, solutions that could protect the reputation of your brand:
With the IoT comes the challenge of potentially managing hundreds, thousands and in bigger organisations millions of objects/devices/things, creating complex policies and ensuring that the Trusted Security Partner that your organisation selects will have the ability to scale with your business. Choose wisely.

Speaker profile

Mageshen Naidoo is passionate about Cyber Security and a guest speaker at various Cyber Security initiatives around the country
He currently holds 46 Certificates on 12 different Global Leading Security Vendors
Mageshen has Been in the Cyber Security Space for 7 Years
Mageshen consults for various Provincial Government Departments in Gauteng, Limpopo, Free State & Mpumulanga province in South Africa this includes hosting Cyber Security workshops to establish clients AS IS and TO BE security postures
He aims to one day hold a Doctorate in Cyber Security/Information Security and Lecture Cyber Security
Currently the Head of Cyber Security Strategy at Africa's Leading DataCentre Distributor in the Enterprise Space - First Distribution, an Epsidon Technology Holdings Company

X Topic Abstract

Understanding the nature of the business, culture and technology drivers.
Knowing the type of risks faced by the organisation including regulatory
Knowing how receptive the culture is to security.
Getting to grips with risks and controls, embedment, sustainability.
One size does not fit all – customised the security strategy to manage exposures.
Good understanding of frameworks, regulations , vendors and adoption.
Training and Awareness approaches.
Keep the frameworks and strategy relevant to keep up with emerging threats and enforce maturity.
Adopt an agile approach in a digital context, scalability and resourcing.

X Topic Abstract

Digital identity is becoming a mainstream topic, however not everyone understands the true potential of self-sovereign identity and the associated benefits towards data ownership, security and peer to peer secure connections with verifiable information exchange.

X Topic Abstract

Complexity of systems are increasing day by day. This leads to more and more vulnerabilities in Systems. Attackers use these vulnerabilities to exploit the victim's system. It is better to find out these vulnerabilities in advance before attacker do. The power of Vulnerability assessment is usually underestimated. While Vulnerability Assessment and Penetration Testing can be used as a cyber-defense technology to provide proactive cyber defense.
In this chat we can provide active cyber defense using Vulnerability Assessment and Penetration Testing. We described complete life cycle of Vulnerability Assessment and Penetration Testing on systems or networks and proactive action taken to resolve that vulnerability and stop possible attack. In this chat we will explore prevalent Vulnerability assessment techniques and some famous premium/open source VAPT tools.
We will discuss the complete process of how to use Vulnerability Assessment and Penetration Testing as a powerful Cyber Defense Technology.

Speaker profile

Logan Donoven Naidoo – CEO, Decode Systems; Technology As a highly skilled ICT Security Professional with proven experience in building professional relationships, developing successful strategies, managing projects, implementations, solution design and architecture (but to name a few) enable me to continue excelling as a critical component within customer organizations.
With over 20 years of combined experience in the ICT industry and the Technical arena of a fast-paced and evolving Information Technology sector, I have developed the type of skills that are very effective at satisfying customers, increasing the IT portfolio and developing relationships that strengthen future Business development.
In addition to Security, I have also been an integral part of an industry which understands that each tailored solution is an inherently critical component of a broader strategy for long-term growth, business development and steady gains in technical competency. As a result of this, I enhance sales and service, while generating satisfied customers and delivering a sense of un- mistakable solution quality that sets the pathways to long-term success.

X Topic Abstract

Systems perspective on hacking and its relationship with "best" practices. Contextualizing so-called “critical” findings from a pen test into actual risk exposure and guiding the senior management on the course of good security posture. Framing the tacit actions associated with compliance, frameworks and governance into concrete "useful" next steps.

Speaker profile

The cornerstone of a connected world is being able to trust the information. Since we live in an increasingly connected world dependent on technology and technological innovation to further the ends of humanity, Information Assurance is achieved through experts in governance, compliance, people and technology. Johan is a professionally registered engineer, certified security specialist, senior lead cybersecurity manager for Infosec systems in terms of ISO 27000, and Cobit 5 implementer. He has led multiple teams ranging in size from 3 to 40 in achieving technological excellence, loves hacking, is passionate about people and has the experience to back it up. He has worked on missile guidance systems as well as directing his own blockchain company, and now has the privilege of being part of the SensePost team making the world a safer, more trusted place. His current role has three primary components, that of CISO, Technical PreSales and CyberAdvocate.

X Topic Abstract

A talk exploring the political, economic, social and organisational drivers behind Internet of Things, the impact that this has had on the security of our world and what it means for us heading into the future. This talk examines the current state of IoT and the vastly expanded attack surface this presents to an attacker. There are factors accelerating and exacerbating this journey meaning that traditional approaches to security such as patch management and authentication no longer make sense.
The talk includes real world stories of exploitation within the Healthcare industry illustrating how IoT connectivity and complexity has opened up new types of impact (such as changing medication dosages, shutting down pacemakers) from cyber-attacks. Lastly, predictions and recommendations on the nature of the change we need are unpacked to address this threat.

Speaker profile

Sean founded Redshift Cyber Security in 2015 with the vision of creating a penetration testing company that bridges the gap between security strategy and discrete vulnerabilities guided by a deep understanding of modern attack techniques. Sean is a seasoned security professional who began his career in the security governance space and evolved into leading several penetration test teams of passionate and exceptional people.
Redshift assists our customers in identifying and mitigating cyber security risk as part of a robust strategy for building resilience. Redshift began as a technology startup and has grown significantly in terms of our expert team, capabilities and market reach. We now service customers in South Africa, the United States, Europe and Africa with customer success stories in financial services, retail, logistics, mining, hospitality and healthcare.
The Redshift team consists of expert penetration testers and cyber security consultants with experience across all industry sectors and in many different technologies. Our team has assisted South African and global organisations in discovering subtle and complex technical weaknesses and translating those into an actionable strategy for building defenses against data breaches and compromise.
At Redshift, we believe that true defense comes from an understanding of attack. This reflects in our approach to research, training of our staff and delivery to our customers, honed by cutting edge research into malware, threat actors and attack techniques.

X Topic Abstract

Different Size Organizations, Different Security Approaches
• Strategic Planning for Cyber Risk: Protecting Data and Meeting Regulatory Requirements
• Security Architecture, Governance & Auditing
• Organizational Maturity in the Age of Cyber and Machine Learning
• How to Overcome Cultural Barriers to Adopt a Cyber Prevention Strategy
• Legal Threat Landscape Risk & Resiliency Cyber Defence Tactics
• How Smart Cyber Communications Planning Keeps You Out of Trouble
• Panic or Prepared? How to be Ready for an IT Compliance Audit

Speaker profile

My experience ranges over a period of over 30 years in the IT , from IT Operations to Senior Development manager I am an experienced professional with more than 30 years IT & consultancy experience. Experience ranges from IT operations, Software Development, System Software Analyst, IT Operations specialist, Database Administrator over multiple database platforms, Firewall Administration, ICT Governance, Cybersecurity Strategy and Information Security Management.
I have covered multiple industries throughout my career namely: Tertiary, Insurance, Financial, Motor, Logistics, Scientific, Mining & retail. Over the last 12 years, have focused on IT Governance, Information Security, specifically in the financial sector where I have assisted multiple banks with their annual compliance reporting
I have an PCI Professional, COBIT practitioner, ISO 27001 Lead Auditor Qualification, ISO 27005 Risk Lead Manager, PECB certified Trainer. place very high emphasis on detail, making use of industry best practices when it comes to methods applied I am currently the founder and director of a Company called Analytix Systems Auditors, specific focus on Cybersecurity & Information security Governance.

Membership of Professional Associations
- IS Audit and Control Association (ISACA)
- SADC Banking Association
- PCI SSC (Payment Card Industry Security Standards Council)

Other Training:
- Payment Card Industry (PCI) Professional
- ISO 27001 Foundation Certificate
- ISO 27001 Lead Auditor
- ISO 27005 Lead Risk Manager
- COBIT 5 Foundation Certificate
- COBIT 5 Implementation Certificate

Our Sponsors

Use this opportunity to improve the visibility of your organization

Instant Sponsorship
Avail instant sponsorship at just USD 2000

Instant sponsorship includes
• Branding of your company as Bronze Sponsor – Company's Logo on the event page with cross link to your website.
• One Speaking Slot (45 min -non sales talk).
• 10% discount on registration fee for any delegate from your organization.
• Full day attendance at the event with lunch
• 1 x Roll up stand / Brochure distribution at the event
• Online Interview post of your company's senior executive at our media portal

For Silver, Gold Platinum & Titanium Sponsorship opportunites, please request for Sponsorship Brochure via email at,

Our Sponsors

Media Partners


Association partner

Digital Marketing Partner

Marketing Partner

Promotional & Media Partners

Our Past Sponsors

Media Partner


Our Speakers

Godstime Airohi

Cyber Security Consultant

Air Security

Unathi Mothiba

Security Specialist

Internet Solutions

Mageshen Naidoo

Head of Cyber Security Strategy

First Distribution

Lohan Spies

Head of Cyber Security & Technical Expert

IXO Foundation

Donovan Naidoo

Chief Executive Officer

Decode Information Security Enterprise

Sean Howell

Managing Director

Redshift Cyber Security (Pty) Ltd

Jorge Basilio


Analytix System Auditors

Johan van der Merwe



Venisha Nayagar

Director : Information Security and Risk Management


Eric Mc Gee

Associate Director

Deloitte Risk Advisory

Our Pricing

Group of 3 or more(Early Bird)
ZAR 4000 Till June 16
Group of 3 or more(Standard)
ZAR 4500 Till August 30
Individual(Early Bird)
ZAR 6000 Till July 30
Individual (Standard)
ZAR 7200 Till August 30

To Register Via Eventbrite

Our Testimonial


Who can attend Cyber Security Summit in Johannesburg?

This program should appeal to anyone who has a role regarding personal or confidential information – whether the information is that of a customer, employee, patient, student, job applicant or it is a trade secret or other proprietary information. Highly recommended for:

Board members
Information technology staff
PR departments
In-house and general counsels
Insurance and risk managers
Security Systems Integrators
IT and Cybersecurity Leaders
Integration Engineers
Product Developers and Manufacturers
Senior Technology Business Executives
Security Specifiers and Engineers
Security Consultants
Anyone who is responsible for the cybersecurity of integrated security systems!

Why to attend Cyber Security Summit in Johannesburg?

Following are the three key questions you and your cyber security organization or cyber security department and cyber security center of excellence should be solving for now: How do we as testers and cyber security company evolve and thrive in SMAC & IoT world?
From tooling to skilling and from strategies to fundamental values what needs to change and how? What are solutions and services available in market which I can leverage? Cyber Security Summit 2019 is an attempt to seek and share answers to these basic questions.

What will you learn about?

Learn latest techniques and skills required to test disruptive technologies from industry stalwarts themselves Latest trends, concepts, processes and tools for cyber security in SMAC & IoT Recognize, understand and acknowledge challenges in cyber security emerging technologies. Meet and network with fellow cyber security experts from leading companies.Learn how to adapt and adopt these changes quickly and swiftly within a team and also across the enterprise.

Are there any prerequisites to attend this program?


Do I need to register for the event?

Yes, all conference attendees must register in advance to attend the event.