12 -14 august 2020 - cover magazine · 2020. 7. 8. · contacts. this makes them more vulnerable to...
TRANSCRIPT
-
Participating Partners: An event by:
[email protected] | Tel: 011 7911 535 |14 Cherry Drive, Robin Hills 2194 | Johannesburg | South Africa
12th-14th August 2020Emperor’s Palace Resort, Johannesburg, South Africa
-
Who should attend?
OVERVIEW
Ransomware is one of the biggest threats in today’s security landscape; it has been on the scene for more than a decade and, as it continues to prove successful for cyber criminals, more high-profile business targets fall victim on an almost daily basis. Ransomware is always evolving. Attackers are getting more sophisticated in how they infect systems, avoid detection and foil decryption efforts.Local governments tend to communicate with a wide variety of businesses and individuals, with many of them being one time contacts. This makes them more vulnerable to attacks, as their employees don’t know most of the contacts with whom they communicate in person.On the 24th of October 2019, the City of Joburg announced that their network had been breached by hackers, this was later
found out to be a Ransomware attack. The hackers report-edly demand the payment of 4.0 bitcoins by October 28 at 17:00 hours, failing which they will upload all the data on to the internet. Cities have become targets as they have run vast networks of connected technology that are difficult to update, manage and patch effectively. The same goes for all govern-ment departments, especially those in the rural areas.This 2-day summit will bring together cybersecurity experts, city administrators, government administrators, researchers, con-sultants, corporate and academics to discuss and map the way forward on how municipalities and government departments can invest on cybersecurity to avoid wasting funds on trying to solve threats and ransomware.The summit will look at bills, Ransomware, phishing and malwares amongst other topics.
Highlights• Mauritius Cyber Security Strategy 2014-2019 (Case
Study)• Legislation- SA’s proposed Cybercrimes and
Cybersecurity Bill• Passwords, Malware, Malicious Software & Spyware• Know Your Employee –Background Screening• Protecting Your Website against Attackers• Cyber Attacks on South African Municipalities: Ex
pensive Lessons to be learnt
Ransomware 101: Understanding Cyber Security’s biggest Threat• Educating Executives on Cybersecurity• Email Security 3.0-From Perimeter to Pervasive
• Why Cybersecurity must be Number One Concern forNational, Provincial and Local Government: Whatmore can we do?
• Information Security Officers/Analyst/Interns
• Cyber Security Officers/Mangers/Analysts/In
terns/Consultants
• Lead Architects Information Security
• Chief Technology Officers/Managers/Directors
• Cyber Resiliency Managers
• Forensic Heads
• Mayors
• Built Engineers
• IT Auditors
• Privacy Professionals
• Board Members
• Scrum Masters
• IT Architects
• Chief Executive Officers
• CISO
• Asset Managers
• MEC’S
• Municipal Directors & Managers
• IT Directors & Managers
• Municipal & Government Information Officers
• Network Managers
• Researchers/Academics/Students
• Media & Telecommunications
• Corporate Communications Officers/Managers
• Partners
• Technology Security Managers
• Chief Information Officers
• Information Risk Managers/Officers/Interns
• Risk Assurance Managers
• IT Security Officers
• Network & Server Engineers
• Infrastructure & Information Security
Managers
• Systems Administrators
-
and works with local and municipal government and private
entities to help them improve and manage their information
security posture by developing a customized Cyber Risk Loss
Control Program. The programs are designed to identify cyber
vulnerabilities, risks and provide actionable recommendations
based on best practices and international standards. Romero
currently works with various Joint Insurance Funds/Government
Risk Pools and is currently the Technology Risk Services Director
for 64 municipalities in New Jersey. He is an ISO 27001 auditor
and has performed over 250 cyber risk assessments throughout
the state.Romerois currently pursuing his Certified Government
Chief Information Officer (CGCIO) certification at Rutgers
University.
• Municipal Cybersecurity Directors/Deputies
• Heads of Forensics
• Members of the Anti Corruption Unit
• Cybersecurity Hubs
• Heads of IT
• Heads of Networks & Infrastructure
• Department of Telecommunications Directors
• Risk Control Officers
• Network Security Managers
• External & Internal Auditors
Kindly note that bookings for the workshop are separate from
the summit tickets. Contact the sales team on +27 11 791 1535
7th May – Summit Day 108:00 -08:30 Registrations08:30 -09:00 Key Note Address
Major General Shadrack SibiyaHead of Forensics
City of Johannesburg
Who should attend?
DAY 1
PRE-SUMMIT WORKSHOP- MUNICIPAL CYBER SECURITY 101 (30 SEATS ONLY)
6th May - Pre-Summit Workshop- Municipal Cyber Securi-ty 101 (30 seats only)
08:30 -09:00 Registrations09:00 Workshop Starts10:30-11:00 Tea/Coffee Break13:00 – 14:00 Lunch Break15:00 -15:30 Tea/Coffee Break16:30 End of the Workshop
One Day -WorkshopMunicipal Cyber Security 101: Covering the Bases- Building
a Cyber Security Foundation for Municipal Governments• Covering the bases
• Password management and access control
• Backup and encryption
• Malware and social engineering attacks
• Cyber security awareness education
• Contingency planning: Incident response, disaster
recovery and business continuity
• Vendor risk management
• Patching and other “technical controls”
FacilitatorLou Romero
Technology Risk Ser-vices Director / Manag-ing Partner
Secure Data Consulting
Services (New Jersey,
USA)
Lou Romero has 40
years of IT experience
-
11:00 – 11:30 Protecting Your Website against Attackers • One does not simply login to my website – how toprotect your admin and user logins through strong passwordrules, multi-factor authentication, and brute force protec-tion.• No encryption? I also like to live dangerously – howto protect your website from hackers (and spying govern-ments) with SSL, plus how to protect sensitive data (such asyour website login) in your emails.• If you liked it you shoulda put a patch on it – whyregularly updating your website software with the latestupdates and security patches is one of the most importantsecurity steps you can take.• Baby got backup – the simple truth is, sometime stuffgoes wrong. When that happens, having a good backupplan can save your ass.• Another brick in the wall – a web application firewallis a proven way to stop hackers before they even accessyour site. You can setup your own (see OWASP WAF rules)or you can take the easy (and potentially more secure)route – use a cloud-based WAF.
Presenter
Nikolai KaufmannPartner Growth ManagerSSL Store
11:30 -12:00 Email Security 3.0-From Perimeter to Pervasive
• Zone 1 –Perimeter• Zone 2 –Inside the Perimeter• Zone 3-Beyond the Email Perimeter-Pervasiveness• Beyond the Zones-API Driven Security Ecosystem
Integration
Presenter
Thomas MangwiroBusiness Development ManagerMimecast South Africa
DAY 1
09:00 -09:45 Ransomware 101: Understanding Cyber Security’s biggest Threat
• What is Ransomware and how does it
affect us
• How does Ransomware spread?
• How to protect ourselves from Ransom
ware attacks
Presenter
Simeon TassevManaging DirectorGalix Networking (Pty) Ltd
09:45 – 10:30 Passwords, Malware, Malicious Software & Spyware
• The human factor involved in passwords, digital device
usage (including IOT) and falling victim to malware
attacks/data breaches and the effect that personal
behaviour has on cyber security in an organisation.
• Best practices for password management and digital
behaviour within an organisation and the necessary
measures to put in place for preventing
security breaches.
• Educating users on effective password usage and
the identification and avoidance of
malware, malicious software & spyware (including
phishing and spearphishing/impersonation attacks).
Determining the extent of compromised credentials.
• Prevention is better than cure: Techniques to evaluate
key vulnerabilities and the required software,
tools and methods, including efficient patch manage
ment, to harden attack surfaces for improved security.
Presenter
Grant ChapmanManaging Director
Cybervision
10:30-11:00 Tea/Coffee Break
-
Guy GolanChief Executive Officer
Perfomanta Group
14:30-15:00 Managed Security Services • Security assessments
• On-going monitoring and maintenance
• Employee and Infrastructure Monitoring
• Policy Reporting & Enforcement
Presenter
John McLoughlinChief Executive Officer
J2 Software
15:00-15:30 Cyber Security for Non-Technical Employees• Cyber Security for modern SA Municipalities
• Cyber Security – where to start
• Governing Cyber Security in an age of cyber chaos
PresenterCharl UeckermannCEO
AVeS Cyber Security
DAY 1
12:00 12:30 Managing Third Party Security in Critical Infra-structure
• Identify Function
• Protect Function
• Detect Function
• Respond Function
Presenter
Simba ChiwanzaCybersecurity Consultant
Wolfpack Information Risk Spyware
12:30 – 13:00 Internet of Things & Cyber Security • Internet of things – What is the Internet of Things
• The Rise in Exploit of Internet of Things technologies
• The digital storm
• Internet of Things Cyber Security Solutions
Presenter
Mageshen NaidooHead of Cybersecurity
First Distribution
13:00 -14:00 Lunch Break14:00- 14:30 Why Cybersecurity must be Number One Con-cern for National, Provincial and Local Government: What more can we do?
• Let’s understand who is attacking who and for what?
• Private sector’s security posture vs. government’s
posture
• Ability to attract talent in government
• Speed in government
Presenter
-
08:30 -09:00 Registrations09:00 -10:00 Governance, Risk & Compliance
• The importance and benefits of practising good
governance
• The use of technology as a tick-box on how to ensure
POPI compliance
• The analysing, automating, managing and auditing of
business processes to better understand, identify and
assess risks
• Future and trends of security within information re
cords management.
Presenter
Maeson MaherryChief Solutions Officer
LAWtrust
10:00 -10:30 Coffee/Tea Break
10:30 – 11:00 Educating Executive on Cybersecurity• Understanding why cyber criminals are targeting you• Insider threats• Germ theory• Getting IT support• Avoiding phishing attacks• Stopping malicious code• Avoid identity theft and financial cyber-theft• Avoiding cyber-attacks while traveling• Security and the cloud• Contract “firewalls”• Third-party cyber risk management
Presenter
Andrew ChesterCISOUkuvuma Security
Solutions
DAY 1 DAY 2
15:30-16:00 Legislation- SA’s proposed Cybercrimes and Cybersecurity BillTechnology has become an indispensable part of modern life-it
has significantly changed the way people communicate and do
business. In a world and country where technology is dynamic in
nature and is continuously evolving, South Africa has struggled
to keep up with these developments and in regulating cyber se-
curity and cybercrimes. Fatima will delve on the Bill and what
it aims to achieve in
regulating cyber security.
Presenter
Fatima Ameer-MiaDirector: Media, Tech-
nology & Telecommuni-
cations
Cliffe Dekker Hofmeyr
16:00-16:30 Cybersecurity Experience Centre and Acade-my-How Municipalities can benefit?
Addressing the Skills Shortage
Cybercrime is now the fourth most reported economic crime in
South Africa, with our economy reportedly losing R1 billion each
year due to online criminal activities. Being breached is the
new normal. Security is a business priority, with many execu-
tives feeling overwhelmed by the defender environment and
citing certification and talent as two of the biggest constraints
to adopting advanced products and solutions. The academy
aims to address the skills shortages in the cybersecurity sector.
The Cybersecurity Experience Centre and Academy has been
doing that since 2017 and Karen will explain on how munici-
palities and government
departments can benefit
from the Academy.
Presenter
Karen SharpeDirector of Learning
NIL Learning Africa
16:30-19:00 Networking Cocktail Party 8th May-Summit
-
DAY 2 DAY 2 Conti.......
Maeson MaherryChief Solutions Officer
LAWtrust
12:00-12:30 The state of cybersecurity across African busi-nesses
• Data: the new gold
• Cybercrime and the rise of data
• Accessing and protecting data
• Discovering you’re at risk-and protecting against it
• Multi-cloud strategies; the good, the bad and the
ugly
Presenter
Hendrik FourieSales Specialist-Cyber
Security
First Distribution
12:30 -13:30 Lunch Break
13:30 -14:00 Q & A (All Presenters Present Day 1 & 2)
14:00 End of Summit
11:00 -12:00 Panel DiscussionsCyber Attacks on South African Municipalities: Expensive Lessons Learnt
Panelists
Major General Shadrack SibiyaHead of Forensics
City of Johannesburg
Hylton BrandRisk Officer
City of Cape Town
Hendrik FourieSales Specialist-Cyber
Security
First Distribution
-
REGISTRATION FORM AFRICA MINING LAWS, POLICIES & REGULATION FORUM 2020 26th -27th of March 2020 | Sandton Sun Hotel, Johannesburg, South Africa PLEASE WRITE IN BLOCK LETTERS Authorising Person:
Signature: By completing & signing this form, the authorizing signatory accepts the terms and conditions as stated on the registration form Note: Please provide information as you wish it to appear on the name tag and certificate Delegate Attendance Information:
CANCELLATION NOTICE By signing and returning the registration form, the authorizing signatory on behalf of the stated company is subject to the following terms and conditions. Delegate Cancellations: All cancellations must be received in writing and are subject to the following conditions: Charge of 50% of the registration fee, plus R899 (+ VAT) administrative charge will be made for cancellations received in writing at least 14 working days prior to the event. For any cancellations received less than 7 working days before the date of the event, the full fee will be payable, and no refunds will be given except credit notes. If a registered delegate does not cancel and fails to attend the Training, it will be treated as a cancellation and no refund or credit note will be issued.
Substitutions Delegate Substitution: Substitution is welcome at any time with no additional charges. Please notify Federated Management Institute in writing of any such changes at least 4 days before the event. Please note that the speakers and topics are confirmed at the time of publishing. However, circumstances beyond the control of the organizers may necessitate substitutions, alterations or cancellations of the speakers and/or topics. As such Federated Management Institute reserves the right to alter or modify the advertised speakers and/or topics if necessary. Any substitutions or alternations will be updated and sent to you as soon as possible.
FUNDS TRANSFER Please state your full names clearly on the money transfer. Please note, bank charges are for your OWN account and this should be stipulated to your bank. Please advise your bank that the charges should be included in your deposit amount. Payments must be made within 5 working days after receipt of invoice unless agreed upon prior to the confirmation of booking.
Please be informed that full payments must be received prior to the event. Only fully
paid up delegates will attend the event unless agreed otherwise with Federated Management institute. A copy of the bank deposit receipt should accompany your
registration form and must be emailed or faxed.
BANKING DETAILS: Branch name: Eastgate Branch
Branch Code: 250455 Account name: Federated Management Institute Account number: 62734093347 Swift Code: FIRNZAJJ950
EARLY BIRD BY 31/01/20
Title First Name Surname Designation ID/Passport # e-mail Mobile
First Name Surname
Designation
Company Name Company Vat Number
Telephone Number Fax Number
Postal Address Postal Code
e-mail Address Purchase Order Number
Person Dealing with Accounts Account Contact
STANDARD
R 8 450.00
REGISTRATION FEES EX VAT
10% off R 7 605.00
AFRICA MUNICIPAL & LOCAL GOVERNMENT CYBERSECURITY SUMMIT 2020
REGISTRATION FORM
12th -14thAugust 2020 | Emperor’s Palace Resort, Johannesburg, South Africa
Email: [email protected]
REGISTRATION RATES EX VATSTANDARD CONTACT EVENT2-Day Conference onlyGovernment R4990.00Corporate R5450.00Consultants R5990.00Workshop+ 2 Day Conference R7990.00
LIVE WEBINAR2-Day Conference onlyGovernment R2990.00Corporate R3450.00Consultants R3990.00Workshop+ 2 Day Conference R5990.00