February 19, 2025

D H M S

Advanced Information Security Symposium 2025

The Advanced Information Security Symposium 2025 is a one-day event on February 19 that brings together leading experts and industry professionals to discuss the most pressing issues in cybersecurity. The symposium will cover a wide range of topics...
Read more

Background

The Advanced Information Security Symposium 2025 is a one-day event on February 19 that brings together leading experts and industry professionals to discuss the most pressing issues in cybersecurity. The symposium will cover a wide range of topics, from the implementation of Zero Trust Security Architectures to the use of AI-driven technologies for real-time threat detection and response. Attendees will gain insight into how organizations can stay ahead of cybercriminals through innovative approaches like continuous identity verification, behavioral analysis, and advanced incident response techniques.

In addition, the symposium will explore critical issues like ransomware resilience, privacy-first security strategies, and the challenges of securing hybrid cloud environments. Attendees will also delve into the latest developments in biometric security and learn how to enhance authentication while addressing potential risks. With sessions focusing on both technical solutions and human factors, this event will provide actionable strategies for defending against evolving threats in the digital age.

SPEAKERS AND DATES

EVENT SCHEDULE

Enjoy the speeches from the best this industry has to offer!



08:15 remove 08:30
keyboard_arrow_down
Background

Welcome Speech & Event Opening

Thumbnail Faith Sithole

Welcome Speech by Your MC: Faith Sithole; Multi-award Winning Author - Lead: Data Science and Analytics at Sasfin | Woman in Data| Corporate Key Note Speaker| Mentor| Publisher

08:30 remove 09:10
keyboard_arrow_down
Background

Zero Trust Security Architectures: Moving Beyond Perimeter Defense:

Thumbnail Yaron Assabi

This topic explores how organizations can implement zero trust models, which assume that threats are present both inside and outside the network. It covers strategies for securing access to systems, data, and applications using identity verification and continuous monitoring.

09:10 remove 09:50
keyboard_arrow_down
Background

AI-Driven Threat Detection and Response:

Thumbnail Kudakwashe Charandura

AI and machine learning are transforming cybersecurity. This session will focus on how AI can be used to detect advanced threats in real-time, enhance incident response, and reduce false positives in large-scale environments.

09:50 remove 10:15
keyboard_arrow_down
Background

Coffee/ Tea Break

10:15 remove 10:55
keyboard_arrow_down
Background

The Human Factor: Combating Insider Threats:

Thumbnail Norbit Williams

With employees often being the weakest link in security, this session will dive into methods of identifying and mitigating insider threats. It will discuss both malicious insiders and inadvertent mistakes, with a focus on behavioral analysis and training.

10:55 remove 11:35
keyboard_arrow_down
Background

Ransomware Resilience: Strategies for Prevention and Recovery:

Ransomware attacks continue to be a major cybersecurity threat. This session will provide strategies for preventing ransomware attacks, ensuring business continuity, and recovering from an attack with minimal damage.

11:35 remove 12:15
keyboard_arrow_down
Background

Privacy-First Security Approaches in the Age of Data Regulations:

Thumbnail Thav Reddy

With the rise of GDPR, CCPA, and other data privacy regulations, this topic will explore how to build security strategies that prioritize user privacy while meeting legal compliance requirements. Topics include data minimization, encryption, and secure data processing.

12:00 remove 13:00
keyboard_arrow_down
Background

Networking Lunch Break

13:15 remove 13:55
keyboard_arrow_down
Background

Cloud Security in a Hybrid World: Best Practices:

Thumbnail Lee Moodley

As businesses move to hybrid cloud environments, securing data and applications across multiple platforms becomes increasingly complex. This session will cover cloud security best practices, including multi-cloud security strategies and securing remote access.

13:55 remove 14:35
keyboard_arrow_down
Background

Biometric Security: Enhancing Authentication with Advanced Technology:

Thumbnail Kenneth Matau

As biometric technologies such as facial recognition and fingerprint scanning become more prevalent, this topic will explore their role in improving authentication security. It will also cover potential vulnerabilities and ethical concerns in their use.

14:35 remove 15:15
keyboard_arrow_down
Background

Quantum-Resistant Cryptography: Preparing for the Next Generation of Cyber Threats

Thumbnail Michael Horn

As quantum computing advances, traditional cryptographic systems may become vulnerable to quantum-based attacks, posing a significant threat to data security worldwide. This session will focus on quantum-resistant cryptography, exploring the development and adoption of new cryptographic methods that can withstand quantum computing capabilities.


GET TO KNOW THE

EVENT SPEAKERS


Director - Cybersecurity at SNG Grant Thornton | CISA,CISM,CDPSE,CEH,CPTE,CCSK,CCSP,CRCMP,SAP

Kudakwashe Charandura

Head of Centre of Excellence -Internet of Things and Security at MTN

Kenneth Matau

Snr Cloud Solution Architect at Amazon Web Services (AWS)

Lee Moodley

Past Event

PAST SPEAKERS


Chief Information Security Officer at Iosis Laboratories

Ivan Sabljak

Director | Information & Technology Data Privacy and Protection |CIPP/E | CIPM | Fellow of the International Association of Privacy Professionals (IAPP) | IAPP Advisory Board Member | Director at NTT Ltd

Janine West

Vice President Data Privacy and Protection | Data Protection Officer at NTT Ltd.

Ashleigh Meiring

Head of Centre of Excellence -Internet of Things and Security at MTN

Kenneth Matau

Commercial Attorney for Microsoft South Africa - Corporate, External and Legal Affairs (MEA)

Andréa Campbell

Speaker, Strategist, Coach and Mentor at Custodiet Advisory Services | CSO at SLVA Cybersecurity

Steve Jump

Information Security Officer (CISO) at LRMG (Pty) Ltd | Initiator of Journeys to Inspire | Mentor

Nadia Veeran-Patel

Information Security Solutions Advisor at Clyrofor

Loyiso Boyce

Global Cybersecurity Strategist, User-Security-Obsessed, Smart Incident Response & Crisis Expert, Globetrotting Speaker

Tracey Pretorius

CISSP | CFE | CISA | CEH | CC | TOGAF 9 | BCompt | EC- Council Cybersecurity Mentor | ISACA Mentor | Microsoft Innovation in Edu Award Winner (2010), Seasoned Global Cybersecurity Speaker | Currently at The Bidvest Group Limited

Chris Gatsi

Executive at Nedbank || Leading Data Functions and IT transformation programmes for 30years | 2022 Global Top 100 Innovators in Data and Analytics | Gartner Community Advisor | Top 200 Most innovative South African leader

Paul Morley

Director - Cybersecurity at SNG Grant Thornton | CISA,CISM,CDPSE,CEH,CPTE,CCSK,CCSP,CRCMP,SAP

Kudakwashe Charandura

Background

Sponsors

SPONSOR THIS EVENT



SPONSOR THIS EVENT



Past Sponsors

RESERVE YOUR SPOT

BOOK YOUR TICKET

Limited seats available, please book on time to secure your spot.

Location

EVENT TICKET

For Individuals
R 5999
BOOK NOW
Background

NEWSLETTER


    By subscribing to this newsletter, you agree to our Privacy Policy.


    The Professional Development Hub


    Background