Aug 30
Ways to convince Your Boss Ways to Save Submit Your Talk

Submit Your Talk

Overview of the event

Cyber security systems and principles are designed to safeguard websites and web applications from attackers seeking to disrupt, delay, alter or redirect the flow of data. These attackers vary in target, motive, levels of organization, and technical capabilities, requiring public and private organizations to adopt ever-increasing measures to prevent cyber attacks.

Governments maintain cyber security measures to protect the integrity of critical infrastructure for financial systems, public health, science, and safety institutions, and defense, aerospace, and intelligence agencies.

Private enterprises use cyber security and online data protection help prevent lost revenues, harm to brand reputation, and potential fines or legal liabilities.

The Conference aims to help achieve cooperative solutions and industry teaming to defend against the ever-growing cyber threat.

Learning outcomes:

Protection , Mitigation, Understanding, Sharing, Gaining, Knowing and Optimizing.

Facts & Figures About The Event

7 Speakers
7 Topics
50 Tickets

Conference Schedule

Cyber Security Summit, Johannesburg

X Topic Abstract

Business Email Phishing is a type of Hack targeting companies that conduct wire transfers. Corporate or publicly available email accounts of employees that conduct financial transactions or are involved with wire transfer payments are either spoofed or compromised through phishing attacks to carry out fraudulent fund transfers.
Will do a live Demo and also give a little talk/training on recognizing phishing emails that can lead to email compromising

X Topic Abstract

Human element and the role it plays
- Technology not being the only consideration
- What is Cyber Resilience/Resiliency
- Building out Cyber Security Strategies

X Topic Abstract

The first thought that comes to my Mind when I think IoT is ‘So many Things to write about, where do I start’, after all, the Internet of Things is about Every Thing that connects to the Internet or a network that collects and exchanges Data.
Let me begin by setting the scene mentioning a few and I stress mentioning a ‘few’ objects/devices/sensors that are considered ‘Things’ in the most talked about subject in IT conferences around the globe today, “IoT”, Biochip tracking devices for animals, wearable device, fridge, motor vehicle, workstation, server, automated blinds, garden sprinkler systems, heart monitoring implants and the list goes on. The IoT allows objects to be sensed or controlled remotely across the network or internet. These objects collect useful and in some cases critical/sensitive data with the help of various existing technologies that they are connected to and then autonomously flow the data between other devices.

Fact 1: Experts estimate that the IoT will consist of about 30 billion objects by 2020 and 50 billion by 2022.
Fact 2: In the recent years we have seen a massive growth in the global cyber threat, there has been a significant rise in exploit of IoT technologies.
Fact 3: IoT is a giant network of connected “things” which also include people. The relationship will be between people-people, people-things and things-things.
IoT Network Security solutions
We have solutions that can assist protect your networks. Technology that can collect, aggregate, monitor and normalise data from IoT devices which provide clean reporting and actionable data that we can use to pro-actively reduce the risk of Cyber Storms. Below just a few solutions that we provide that could make or break your organisation, solutions that could protect the reputation of your brand:
With the IoT comes the challenge of potentially managing hundreds, thousands and in bigger organisations millions of objects/devices/things, creating complex policies and ensuring that the Trusted Security Partner that your organisation selects will have the ability to scale with your business. Choose wisely.

Speaker profile

Mageshen Naidoo is passionate about Cyber Security and a guest speaker at various Cyber Security initiatives around the country
He currently holds 46 Certificates on 12 different Global Leading Security Vendors
Mageshen has Been in the Cyber Security Space for 7 Years
Mageshen consults for various Provincial Government Departments in Gauteng, Limpopo, Free State & Mpumulanga province in South Africa this includes hosting Cyber Security workshops to establish clients AS IS and TO BE security postures
He aims to one day hold a Doctorate in Cyber Security/Information Security and Lecture Cyber Security
Currently the Head of Cyber Security Strategy at Africa's Leading DataCentre Distributor in the Enterprise Space - First Distribution, an Epsidon Technology Holdings Company

X Topic Abstract

Digital identity is becoming a mainstream topic, however not everyone understands the true potential of self-sovereign identity and the associated benefits towards data ownership, security and peer to peer secure connections with verifiable information exchange.

X Topic Abstract

Complexity of systems are increasing day by day. This leads to more and more vulnerabilities in Systems. Attackers use these vulnerabilities to exploit the victim's system. It is better to find out these vulnerabilities in advance before attacker do. The power of Vulnerability assessment is usually underestimated. While Vulnerability Assessment and Penetration Testing can be used as a cyber-defense technology to provide proactive cyber defense.
In this chat we can provide active cyber defense using Vulnerability Assessment and Penetration Testing. We described complete life cycle of Vulnerability Assessment and Penetration Testing on systems or networks and proactive action taken to resolve that vulnerability and stop possible attack. In this chat we will explore prevalent Vulnerability assessment techniques and some famous premium/open source VAPT tools.
We will discuss the complete process of how to use Vulnerability Assessment and Penetration Testing as a powerful Cyber Defense Technology.

Speaker profile

Logan Donoven Naidoo – CEO, Decode Systems; Technology As a highly skilled ICT Security Professional with proven experience in building professional relationships, developing successful strategies, managing projects, implementations, solution design and architecture (but to name a few) enable me to continue excelling as a critical component within customer organizations.
With over 20 years of combined experience in the ICT industry and the Technical arena of a fast-paced and evolving Information Technology sector, I have developed the type of skills that are very effective at satisfying customers, increasing the IT portfolio and developing relationships that strengthen future Business development.
In addition to Security, I have also been an integral part of an industry which understands that each tailored solution is an inherently critical component of a broader strategy for long-term growth, business development and steady gains in technical competency. As a result of this, I enhance sales and service, while generating satisfied customers and delivering a sense of un- mistakable solution quality that sets the pathways to long-term success.

X Topic Abstract

A talk exploring the political, economic, social and organisational drivers behind Internet of Things, the impact that this has had on the security of our world and what it means for us heading into the future. This talk examines the current state of IoT and the vastly expanded attack surface this presents to an attacker. There are factors accelerating and exacerbating this journey meaning that traditional approaches to security such as patch management and authentication no longer make sense.
The talk includes real world stories of exploitation within the Healthcare industry illustrating how IoT connectivity and complexity has opened up new types of impact (such as changing medication dosages, shutting down pacemakers) from cyber-attacks. Lastly, predictions and recommendations on the nature of the change we need are unpacked to address this threat.

Speaker profile

Sean founded Redshift Cyber Security in 2015 with the vision of creating a penetration testing company that bridges the gap between security strategy and discrete vulnerabilities guided by a deep understanding of modern attack techniques. Sean is a seasoned security professional who began his career in the security governance space and evolved into leading several penetration test teams of passionate and exceptional people.
Redshift assists our customers in identifying and mitigating cyber security risk as part of a robust strategy for building resilience. Redshift began as a technology startup and has grown significantly in terms of our expert team, capabilities and market reach. We now service customers in South Africa, the United States, Europe and Africa with customer success stories in financial services, retail, logistics, mining, hospitality and healthcare.
The Redshift team consists of expert penetration testers and cyber security consultants with experience across all industry sectors and in many different technologies. Our team has assisted South African and global organisations in discovering subtle and complex technical weaknesses and translating those into an actionable strategy for building defenses against data breaches and compromise.
At Redshift, we believe that true defense comes from an understanding of attack. This reflects in our approach to research, training of our staff and delivery to our customers, honed by cutting edge research into malware, threat actors and attack techniques.

X Topic Abstract

Different Size Organizations, Different Security Approaches
• Strategic Planning for Cyber Risk: Protecting Data and Meeting Regulatory Requirements
• Security Architecture, Governance & Auditing
• Organizational Maturity in the Age of Cyber and Machine Learning
• How to Overcome Cultural Barriers to Adopt a Cyber Prevention Strategy
• Legal Threat Landscape Risk & Resiliency Cyber Defence Tactics
• How Smart Cyber Communications Planning Keeps You Out of Trouble
• Panic or Prepared? How to be Ready for an IT Compliance Audit

Our Sponsors

Use this opportunity to improve the visibility of your organization

Instant Sponsorship
Avail instant sponsorship at just USD 2000

Instant sponsorship includes
• Branding of your company as Bronze Sponsor – Company's Logo on the event page with cross link to your website.
• One Speaking Slot (45 min -non sales talk).
• 10% discount on registration fee for any delegate from your organization.
• Full day attendance at the event with lunch
• 1 x Roll up stand / Brochure distribution at the event
• Online Interview post of your company's senior executive at our media portal

For Silver, Gold Platinum & Titanium Sponsorship opportunites, please request for Sponsorship Brochure via email at,

Our Sponsors

Media Partners


Marketing Partner

Our Past Sponsors

Media Partner


Our Speakers

Godstime Airohi

Cyber Security Consultant

Air Security

Unathi Mothiba

Security Specialist

Internet Solutions

Mageshen Naidoo

Head of Cyber Security Strategy

First Distribution

Lohan Spies

Head of Cyber Security & Technical Expert

IXO Foundation

Donovan Naidoo

Chief Executive Officer

Decode Information Security Enterprise

Sean Howell

Managing Director

Redshift Cyber Security (Pty) Ltd

Jorge Basilio


Analytix System Auditors

Our Pricing

Group of 3 or more(Early Bird)
ZAR 4000 Till June 16
Group of 3 or more(Standard)
ZAR 4500 Till August 30
Individual(Early Bird)
ZAR 6000 Till July 30
Individual (Standard)
ZAR 7200 Till August 30

To Register Via Eventbrite

Our Testimonial


Who can attend Cyber Security Summit in Johannesburg?

This program should appeal to anyone who has a role regarding personal or confidential information – whether the information is that of a customer, employee, patient, student, job applicant or it is a trade secret or other proprietary information. Highly recommended for:

Board members
Information technology staff
PR departments
In-house and general counsels
Insurance and risk managers
Security Systems Integrators
IT and Cybersecurity Leaders
Integration Engineers
Product Developers and Manufacturers
Senior Technology Business Executives
Security Specifiers and Engineers
Security Consultants
Anyone who is responsible for the cybersecurity of integrated security systems!

Why to attend Cyber Security Summit in Johannesburg?

Following are the three key questions you and your cyber security organization or cyber security department and cyber security center of excellence should be solving for now: How do we as testers and cyber security company evolve and thrive in SMAC & IoT world?
From tooling to skilling and from strategies to fundamental values what needs to change and how? What are solutions and services available in market which I can leverage? Cyber Security Summit 2019 is an attempt to seek and share answers to these basic questions.

What will you learn about?

Learn latest techniques and skills required to test disruptive technologies from industry stalwarts themselves Latest trends, concepts, processes and tools for cyber security in SMAC & IoT Recognize, understand and acknowledge challenges in cyber security emerging technologies. Meet and network with fellow cyber security experts from leading companies.Learn how to adapt and adopt these changes quickly and swiftly within a team and also across the enterprise.

Are there any prerequisites to attend this program?


Do I need to register for the event?

Yes, all conference attendees must register in advance to attend the event.