IDC Security Roadshow Elevating the Security of the Future Enterprise

In-Person Event | The Maslow Hotel, Sandton | August 18, 2022

Overview

Today’s security leaders are examining cybersecurity through a strategic-, business-, and industry-focused lens. Efficient and effective security across the entire enterprise is a necessity at a time when networks are evaporating, endpoints are proliferating, and relentless adversaries are continually adapting their tactics, techniques, and procedures.

Organizations across South Africa are increasingly looking to enable comprehensive threat detection and response, all while elevating their level of cybersecurity maturity. Indeed, in a recent IDC survey of CIOs across the country, 45% of the respondents revealed that they are now embedding security into the planning, initiation, and assessment phases of all new business initiatives.

Against a backdrop of ever-increasing security complexity, this event will explain why visibility and control over application security is now vital for organizational survival. Industry experts will explore transformative technologies, dissect the ever-growing threat landscape, and examine the increasingly sophisticated nature of cyberattacks, all while discussing other real challenges to the security of the future enterprise.

The South Africa edition of the IDC Security Roadshow 2022 will explore the latest developments in the region's security market, take an in-depth look at some of today’s hottest security-related topics, address the challenges organizations are facing in a rapidly changing threat landscape, and provide expert strategic guidance for the security professionals in attendance.


Agenda

Time Event & Speakers

Early Bird Gift – first 50 qualified attendees will receive an exclusive pen set

8:00

Registration and Welcome Tea/Coffee

9:25

Welcome Address

Andries Lombaard

Country Manager, IDC South Africa
9:30

IDC Keynote: Elevating the Security of the Future Enterprise

Shilpi Handa

Associate Research Director

Digital transformation has become a major disruptor of how companies operate today, and its importance is only growing with time. As companies increasingly turn toward technology to drive and innovate their business models, they become more vulnerable to cyberattacks from hackers and other malicious actors who are now innovating their attack vectors in parallel. Recent research has revealed that developing security and resilience excellence — through establishing security operations and enhancing security skills and processes — is the biggest strategic investment planned by 58% of CIOs and CISOs over the coming two years. While striving for greater efficiency, agility, and speed is a major priority, the lack of skills needed to navigate the constantly evolving cybersecurity landscape presents its challenges, and finding the right balance sets apart successful and well thought out cybersecurity strategies.

9:50

Defense in Concert: Evolving Your SecOps Strategy

Muhammed Mayet

Security Architect, Secureworks

Without the right integration between security technologies, you cannot gain the necessary context to act against today’s threats. So, how can you get a holistic view of your security infrastructure? And how can the right blend of people, processes, strategies, and technologies help maximize your overall defense? This session will explore how a "defense-in-concert" approach to security can make all the difference when outmaneuvering today's threat actors. It will explain why additional security layers do not necessarily equate to a stronger defense, present guidance on how to gain better visibility, context, and collaboration across your entire IT ecosystem, and examine all the ways to modernize your security operations and improve threat detection and response.

10:04

Ask Questions and Stand a Chance to Win a Mont Blanc Gift, Sponsored by Secureworks

10:05

Developing a Holistic Cybersecurity Architecture for a Growing Attack Surface

Heino Gevers

Senior Customer Success Director, Mimecast

With the acceleration of digital innovation, industrial digitization and new working styles, the digital attack surface has expanded exponentially. Enterprises are in a race to lower risk and increase their protection of people, communications, and data. Heino Gevers explores how a robust cyber resilience strategy design should balance optimising control, delivering business value and ensuring the defensibility of a strategy to boards, customers and regulators when attacks occur. 

10:19

Ask Questions and Stand a Chance to Win an Exciting Gift

10:20

Zero Trust approach in securing your data

Ashley Maduray

Technical Solutions Specialist, Microsoft

While employees in Hybrid work environment will be thinking about how to stay in touch with colleagues, partners and customers many may not be thinking about cyberattacks. Protecting data is one of the primary responsibilities of security and compliance teams. Come join me where i will be discussing how to Secure data with a Zero Trust approach.    

10:35

Zumba & Healthy Bites Break

10:40

Panel Discussion: Implementing a Successful Zero Trust Strategy

Samresh Ramjith

Head of Cyber Security Risk Technology, ABSA

Mthoko Mncwabe

CIO, ACSA

Norbit Williams

Director/CIO, Department of Small Business Development

Zero trust involves protecting the IT environment from the broadest to the most granular to support the trust needed for digital transformation. The key to a trusted enterprise is developing a distributed integrity strategy that drives real-time decision making, continuous measurement of security and compliance, and granular access control with an architecture that supports automated security features.

11:10

Networking Tea & Coffee Break

11:40

Parallel Tracks (Parallel Sessions)

Track A: The Evolution of Cyber-resilience in the New Threat Landscape (Venue: Vertex)

11:40 - 11:40

Session Chairperson

Mark Walker

Associate Vice President, Sub-Saharan Africa, IDC
11:40 - 11:55

The Evolution of Cyber-resilience in the New Threat Landscape

Itumeleng Makgati

Group CISO, Standard Bank
11:55 - 12:10

Defending Against Malware: The Rules Have Changed

Alexander Trekin

Senior Regional Sales Director, Precisely
12:09 - 12:10

Ask Questions and Stand a Chance to Win an Exciting Gift

12:10 - 12:25

Scale of the Threat and Last Line of Defense

Ian Engelbrecht

System Engineering Manager, Veeam
12:24 - 12:25

Ask Questions and Stand a Chance to Win a Carrol Boyes Gift, Sponsored by Veeam

12:25 - 12:40

Is your data safe? The why & how of building a data-first security program

Louis Dekock

Business Development, Varonis Systems
12:39 - 12:40

Ask Questions and Stand a Chance to Win an Exciting Gift

12:40 - 12:45

Mega Raffle Draw!

12:45 - 12:50

Summary & Close

Track B: Exploring an AI-Augmented Future of Cybersecurity (Venue: Zenith)

11:40 - 11:55

Exploring an AI-Augmented Future of Cybersecurity

Ayanda Peta

CISO, African Rainbow Minerals
11:40 - 11:40

Session Chairperson

Jonathan Tullett

Senior Research Manager, IT Services
11:55 - 12:10

Extended Detection and Response - Demystifying Common Myths About XDR

Ozair Rashid

Sales Engineering Lead, (META), SentinelOne
12:09 - 12:10

Ask Questions and Stand a Chance to Win an Exciting Gift

12:10 - 12:25

Keeping Up with the Demands of Cloud Security and Compliance

Gary Peel

Business Development Manager, Fortinet
12:24 - 12:25

Ask Questions and Stand a Chance to Win an Exciting Gift

12:25 - 12:40

Keeping Up with the Demands of Cloud Security & Compliance

Jonathan Tullett

Senior Research Manager, IT Services
12:40 - 12:45

Mega Raffle Draw!

12:45 - 12:50

Summary & Close

Track C: Rearchitecting Cyber Security Operations for Enhanced Cyber Recovery (Venue: Auditorium)

11:40 - 11:41

Session Chairperson

Keoikantse Marungwana

Senior Research & Consulting Manager
11:40 - 11:55

Breaking the Silos of Visibility for an Effective Cybersecurity Posture

Sizwe Gwala

Head of Data Governance, ABSA Bank (South Africa)
11:55 - 12:10

How to Recover from a Ransomware Attack: Cyber-Recovery Services

Hakan Dincel

Regional Manager, GlassHouse
12:09 - 12:10

Ask Questions and Stand a Chance to Win an Exciting Gift

12:10 - 12:40

Panel Discussion: In a Transformed Future of Work, How Can Organizations Step Up Their Security Strategies?

Keoikantse Marungwana

Senior Research and Consulting Manager, IDC

Neda Smith

Divisional Director: IT, City Lodge Hotel Group

Warren Hero

Chief Information & Digital Officer, Webber Wentzel

Megaree Naraidoo

CIO, AVBOB
12:40 - 12:45

Mega Raffle Draw!

13:25 - 13:30

Summary & Close

Track A: The Evolution of Cyber-resilience in the New Threat Landscape (Venue: Vertex)
11:40 - 11:40

Session Chairperson

11:40 - 11:55

The Evolution of Cyber-resilience in the New Threat Landscape

11:55 - 12:10

Defending Against Malware: The Rules Have Changed

12:09 - 12:10

Ask Questions and Stand a Chance to Win an Exciting Gift

12:10 - 12:25

Scale of the Threat and Last Line of Defense

12:24 - 12:25

Ask Questions and Stand a Chance to Win a Carrol Boyes Gift, Sponsored by Veeam

12:25 - 12:40

Is your data safe? The why & how of building a data-first security program

12:39 - 12:40

Ask Questions and Stand a Chance to Win an Exciting Gift

12:40 - 12:45

Mega Raffle Draw!

12:45 - 12:50

Summary & Close

Track B: Exploring an AI-Augmented Future of Cybersecurity (Venue: Zenith)
11:40 - 11:55

Exploring an AI-Augmented Future of Cybersecurity

11:40 - 11:40

Session Chairperson

11:55 - 12:10

Extended Detection and Response - Demystifying Common Myths About XDR

12:09 - 12:10

Ask Questions and Stand a Chance to Win an Exciting Gift

12:10 - 12:25

Keeping Up with the Demands of Cloud Security and Compliance

12:24 - 12:25

Ask Questions and Stand a Chance to Win an Exciting Gift

12:25 - 12:40

Keeping Up with the Demands of Cloud Security & Compliance

12:40 - 12:45

Mega Raffle Draw!

12:45 - 12:50

Summary & Close

Track C: Rearchitecting Cyber Security Operations for Enhanced Cyber Recovery (Venue: Auditorium)
11:40 - 11:41

Session Chairperson

11:40 - 11:55

Breaking the Silos of Visibility for an Effective Cybersecurity Posture

11:55 - 12:10

How to Recover from a Ransomware Attack: Cyber-Recovery Services

12:09 - 12:10

Ask Questions and Stand a Chance to Win an Exciting Gift

12:10 - 12:40

Panel Discussion: In a Transformed Future of Work, How Can Organizations Step Up Their Security Strategies?

12:40 - 12:45

Mega Raffle Draw!

13:25 - 13:30

Summary & Close

12:50

Networking Lunch Break Venue: Lacuna Restaurant

Location

The Maslow Hotel, 6 Sandown Valley Crescent, Sandton

Partners

Platinum Partner
Platinum Partner
Platinum Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner
Exhibit Partner
Exhibit Partner
Exhibit Partner
Exhibit Partner
Exhibit Partner
Charity Partner

Become a Partner

General Information

 

 

 

  

The Maslow Hotel, 6 Sandown Valley Crescent, Sandton

 

 

 

 

 

Thursday, August 18, 2022

 

 

 

 

09:30 AM (SAST) 

 Language
English

Registration Fee
Free of Charge : For End Users (not IT + Consultant companies)

Contact

For More Information, contact: Lizelle Jones - Senior Conference Manager

Mobile: +27 73 404 3099 | Email: ljones@idc.com

Knowledge Hub

Contact Us

Vineshia Petersen

Senior Conference Manager

Lydia Botha

Senior Sales Manager, IDC Soufth Africa

About IDC

58 Years | 1300 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,300 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit www.idc.com.