Advanced Information Security Symposium 2025 Day 1

Background
08:15 remove 08:30
keyboard_arrow_down
Background

Welcome Speech & Event Opening

Thumbnail Faith Sithole

Welcome Speech by Your MC: Faith Sithole; Multi-award Winning Author - Lead: Data Science and Analytics at Sasfin | Woman in Data| Corporate Key Note Speaker| Mentor| Publisher

08:30 remove 09:10
keyboard_arrow_down
Background

Zero Trust Security Architectures: Moving Beyond Perimeter Defense:

Thumbnail Yaron Assabi

This topic explores how organizations can implement zero trust models, which assume that threats are present both inside and outside the network. It covers strategies for securing access to systems, data, and applications using identity verification and continuous monitoring.

09:10 remove 09:50
keyboard_arrow_down
Background

AI-Driven Threat Detection and Response:

Thumbnail Kudakwashe Charandura

AI and machine learning are transforming cybersecurity. This session will focus on how AI can be used to detect advanced threats in real-time, enhance incident response, and reduce false positives in large-scale environments.

09:50 remove 10:15
keyboard_arrow_down
Background

Coffee/ Tea Break

10:15 remove 10:55
keyboard_arrow_down
Background

The Human Factor: Combating Insider Threats:

Thumbnail Norbit Williams

With employees often being the weakest link in security, this session will dive into methods of identifying and mitigating insider threats. It will discuss both malicious insiders and inadvertent mistakes, with a focus on behavioral analysis and training.

10:55 remove 11:35
keyboard_arrow_down
Background

Ransomware Resilience: Strategies for Prevention and Recovery:

Ransomware attacks continue to be a major cybersecurity threat. This session will provide strategies for preventing ransomware attacks, ensuring business continuity, and recovering from an attack with minimal damage.

11:35 remove 12:15
keyboard_arrow_down
Background

Privacy-First Security Approaches in the Age of Data Regulations:

Thumbnail Thav Reddy

With the rise of GDPR, CCPA, and other data privacy regulations, this topic will explore how to build security strategies that prioritize user privacy while meeting legal compliance requirements. Topics include data minimization, encryption, and secure data processing.

12:00 remove 13:00
keyboard_arrow_down
Background

Networking Lunch Break

13:15 remove 13:55
keyboard_arrow_down
Background

Cloud Security in a Hybrid World: Best Practices:

Thumbnail Lee Moodley

As businesses move to hybrid cloud environments, securing data and applications across multiple platforms becomes increasingly complex. This session will cover cloud security best practices, including multi-cloud security strategies and securing remote access.

13:55 remove 14:35
keyboard_arrow_down
Background

Biometric Security: Enhancing Authentication with Advanced Technology:

Thumbnail Kenneth Matau

As biometric technologies such as facial recognition and fingerprint scanning become more prevalent, this topic will explore their role in improving authentication security. It will also cover potential vulnerabilities and ethical concerns in their use.

14:35 remove 15:15
keyboard_arrow_down
Background

Quantum-Resistant Cryptography: Preparing for the Next Generation of Cyber Threats

Thumbnail Michael Horn

As quantum computing advances, traditional cryptographic systems may become vulnerable to quantum-based attacks, posing a significant threat to data security worldwide. This session will focus on quantum-resistant cryptography, exploring the development and adoption of new cryptographic methods that can withstand quantum computing capabilities.


NEWSLETTER


    By subscribing to this newsletter, you agree to our Privacy Policy.


    The Professional Development Hub


    Background