Information Security Day 1

Background
08:45 remove 09:00
keyboard_arrow_down
Background

Welcome Speech

Thumbnail Nicholas Geza

Welcome Speech by Nicholas Geza

09:00 remove 09:45
keyboard_arrow_down
Background

Post-Quantum Cryptography: Addressing Security in the Quantum Computing Era

Thumbnail Ivan Sabljak

With the advent of quantum computers, traditional cryptographic algorithms may become vulnerable. Post-quantum cryptography focuses on developing algorithms that can withstand attacks from quantum computers, ensuring the continued security of sensitive information.

09:45 remove 10:30
keyboard_arrow_down
Background

Privacy-Preserving Data Sharing and Collaboration in the Cloud

Thumbnail Janine West

Thumbnail Ashleigh Meiring

As organizations increasingly rely on cloud services, ensuring the privacy of shared data becomes paramount. This involves implementing encryption, access controls, and other measures to protect sensitive information while allowing collaborative work in a cloud environment.

10:30 remove 11:00
keyboard_arrow_down
Background

Coffee/ Tea Break

11:00 remove 11:45
keyboard_arrow_down
Background

Incident Response: Lessons learned from the frontlines

Thumbnail Stephen Kreusch

What you will learn: • The common mistakes that organizations make that result in being compromised. • The real-world impact of being breached and the types of actions that compromised organizations are forced into taking. • How to reduce your exposure • How to prepare for a breach to reduce disruption.

11:45 remove 12:30
keyboard_arrow_down
Background

Secure Internet of Things (IoT) Networks: Challenges and Solutions.

Thumbnail Kenneth Matau

IoT devices, being interconnected, present unique security challenges. Ensuring the security of IoT networks involves addressing vulnerabilities in devices, data transmission, and implementing robust authentication and encryption mechanisms.

12:30 remove 13:30
keyboard_arrow_down
Background

Networking Lunch Break

13:30 remove 14:15
keyboard_arrow_down
Background

Explainable Artificial Intelligence for Security and Privacy

Thumbnail Andréa Campbell

As AI becomes more prevalent in security applications, the ability to understand and interpret AI decisions becomes crucial. Explainable AI ensures transparency, helping users comprehend how AI systems arrive at their conclusions, especially in security and privacy contexts.

14:15 remove 15:00
keyboard_arrow_down
Background

Privacy in the Era of Social Media and Online Tracking

Thumbnail Ntombhana Ntsanwisi (IAT)

With the widespread use of social media and online platforms, privacy concerns have become increasingly prominent. Addressing this involves exploring regulatory measures, user education, and technological solutions


NEWSLETTER


    By subscribing to this newsletter, you agree to our Privacy Policy.


    The Professional Development Hub


    Background