Cybercon 2014 Brochure Delegates

3
3rd Year “Whoever is first in the field and awaits the coming of the enemy, will be fresh for the fight; whoever is second in the field and has to hasten to bale will arrive exhausted.” - Sun Tzu, The Art of War “Therefore, just as water retains no constant shape, so in warfare there are no constant condions.” - Sun Tzu, The Art of War Book Online at www.cyberconafrica.org or contact: Cybercon Project Manager - Tania Diesel Phone: +27 11 794 7322 / Email: [email protected] 11 & 12 November 2014 Cyber crime and cyber espionage is now a paralysing reality to both public and private organisaons sll lagging in readiness. Cyber warfare and concerns on the vulnerability of crical informaon infrastructure to cyber aacks is now a major concern. Research suggests that cyber threat agents are gearing up for 2015 and beyond and are becoming faster, smarter, more daring and organised than ever before. This calls for all stakeholders to adopt a new defence paradigm and implement new intelligence sharing plaorms. Collaboraon now more than ever is key. In its 3rd year, drawing on data, experse and success from industry thought leaders, CyberCon Africa 2014 will take you on a tour into the “Cyber Underworld” and aempt to map out the threat and incident management lifecycle. Our expert speakers will provide guidance on how to prevent, detect, respond and recover from aacks to ensure your organisaon is beer armed to manage this risk. T H R E A T I N T EL L I G E N C E I N CI D E N T M A N A G E M E N T P R E V E N T D E T E C T R E S P ON D R E C O V E R “The Programme is Structured on an Actual Threat Management Framework “

description

Brochure for the cybercon 2014.

Transcript of Cybercon 2014 Brochure Delegates

Page 1: Cybercon 2014 Brochure Delegates

3rd Year

Prevent | Detect | Respond | RecoverAfrica 2014

“Whoever is first in the field and awaits the coming of the enemy, will be fresh for the fight; whoever is second in the field and has

to hasten to battle will arrive exhausted.”- Sun Tzu, The Art of War

“Therefore, just as water retains no constant shape, so in warfare there are no constant conditions.”

- Sun Tzu, The Art of War

Book Online at www.cyberconafrica.org or contact: Cybercon Project Manager - Tania Diesel

Phone: +27 11 794 7322 / Email: [email protected]

11 & 12 November 2014 Cyber crime and cyber espionage is now a paralysing reality to both public and private organisations still lagging in readiness. Cyber warfare and concerns on the vulnerability of critical information infrastructure to cyber attacks is now a major concern. Research suggests that cyber threat agents are gearing up for 2015 and beyond and are becoming faster, smarter, more daring and organised than ever before. This calls for all stakeholders to adopt a new defence paradigm and implement new intelligence sharing platforms. Collaboration now more than ever is key. In its 3rd year, drawing on data, expertise and success from industry thought leaders, CyberCon Africa 2014 will take you on a tour into the “Cyber Underworld” and attempt to map out the threat and incident management lifecycle. Our expert speakers will provide guidance on how to prevent, detect, respond and recover from attacks to ensure your organisation is better armed to manage this risk.

THREAT INTELLIGENCE INCIDENT MANAGEM

ENT

PREVENT DETECT RESPOND R

ECOV

ER “The Programme is Structured on an

Actual Threat Management Framework “

Page 2: Cybercon 2014 Brochure Delegates

Day

1 - T

hrea

t Int

ellig

emce

Pro

gram

me

Session 1Cyber Underworld - An overview of Global Threat Groups (& Guidance to Mitigate Risks)

Session 2 Establishing a Robust Threat Intelligence & Talent Management Capability

Session 1The Threat Never Sleeps - Best Practices in 24/7 Cyber Security Monitoring

Session 2Latest Detection Tools & Techniques to Detect Cyber Intrusions De

tect

Ses

sion

Prev

ent S

essio

n

Day

2 - I

ncid

ent M

anag

emen

t Pro

gram

me Session 1

Incident Management & Response Techniques

Session 2

Cyber Forensics Response Case Study

Reco

ver S

essio

nRe

spon

d Se

ssio

n

High Level Programme Overview

Session 1 Law Enforcement & Legal Framework to Combat Cyber Crime in Africa

Session 2Current & Proposed Cyber Collaboration Initiatives on the Continent

www.cyberconafrica.org

View live cyber security demos during coffee breaks.

Page 3: Cybercon 2014 Brochure Delegates

Pricing Options - Delegates

Bookings and Information:Prices are inclusive of VAT and excludes transport / accomodation

Early bird prices are valid until 12 September 2014

Book Online: www.cyberconafrica.org or contact:

Cybercon Project Team: Tania Diesel & Lebogang Legare

Phone: +27 11 794 7322Email: [email protected]

Prices

Regular Price R 4500,00

Early Bird Price R 3650,00

Early Bird Prices are valid until 12 September 2014

www.cyberconafrica.org

• Technology leaders• C-level executives• Cyber Forensic Investigators• Public policy makers• Lawyers• University staff and students• Chief Information Officers (CIOs)• Chief Information Security Officers (CISOs)• Cyber Security Professionals• IT Security Managers• Risk Managers• Human Resource Managers• Forensic Auditors• Forward thinking business owners

• Law enforcement• Intelligence agencies• Defence teams• Internal Auditors• Technical and Support Specialists• Systems Integrators• Webmasters• Security Analysts• Business Continuity Managers• CTOs• Chief Architects• Senior IT Program Management• Systems Planners and Analysts• Strategic Planners

Who should attend

View live cyber security demos during coffee breaks.