COVID – 19: See the latest assessments and care options, plus temporary visitor restrictions


-667Days -5Hours -52Minutes -19Seconds

CONFERENCE AGENDA
28 - 29 JUNE 2022

8:00 - 9:00

9:00 - 9:20

STRENGTHENING AFRICA’S DIGITAL ECOSYSTEM: IMPLEMENTING EFFECTIVE CYBERSECURITY FRAMEWORK

  • Safeguarding the primary assets: Critical infrastructure and data
  • Building a tamper-proof digital eco-system to prevent cyber threats
  • Establishing legal frameworks that are key to regulate the use of cyberspace

ABDUL HAKEEM AJIJOLA

Chair
African Union Cyber Security Expert Group

9:20 - 9:40

PROMOTING COLLECTIVE CYBER DIPLOMACY TO BUILD A STRONG CONSENSUS FOR CYBER STABILITY

  • Integrating cyber diplomacy into the bureaucratic structure to overcome the novel threats posed by cyber criminals
  • Global Connexion: Cyber diplomacy is not only a necessity but also an opportunity
  • Implementing sound strategic policy to strengthen and establish clear cyber norms

DR. KATHERINE GETAO

Retired Public Servant & Former CEO
ICT Authority, Kenya

9:40 - 10:00

BEHAVIOUR DESIGN PRINCIPLES FOR EFFECTIVE SECURITY AWARENESS

  • Mapping BJ Fogg’s Design Behaviour principles to security awareness and culture programs.
  • Insights from KnowBe4’s latest African research survey findings.
  • Ways to practically build an awareness programme combatting the most prominent cyber threats such as social engineering and cyber extortion attacks.

ANNA COLLARD

SVP of Content Strategy and Evangelist
KnowBe4

10:00 - 10:20

MIGRATING TO THE CLOUD?

Your security tools and observability tools could be leaving your hybrid cloud vulnerable, find out how to resolve this with Deep Observability.

  • How to gain reliable access to network data in a hybrid infrastructure without network interruption?
  • How to transform and deliver the right data to the right tools at the right time?
  • Exploring insights for improved application performance to enhance security posture and boost operational agility and control costs to an organization
  • Uncovering hidden threats in an encrypted traffic and delivering exact traffic designed distinctly for each tool.

VIJAY BABBER

Senior Channel Manager MEA
Gigamon

10:20 - 11:00 PANEL DISCUSSION

EVOLVING CYBER LANDSCAPE: BUILDING A SECURE DIGITAL FUTURE FOR AN ORGANIZATIONAL EXCELLENCE

  • Addressing the need to educate employees on cyber vulnerabilities and advocate sound cyber security practice and policies
  • Reliable cybersecurity solution: Unlocking the best in-class security technology to protect business organizations from evolving threats.
  • Discussing the importance of early and frequent patching which should be any businesses first line of defense

CYRUS KAMAU

CIO
National Commission for Science, Technology and Innovation (NACOSTI) Kenya

AMENYO LOTSU

CISO
ARB Apex Bank Ghana

KABUTHIA RIUNGE

CISO
KCB Bank, Kenya

THELMA KGANAKGA

CISO
Equity Bank, Kenya

11:00 - 11:30

11:30 - 11:50

DISCUSSING THE IMPORTANCE OF CYBERSECURITY FOR NATIONAL RESILIENCE

  • Adopt and adapt to modern structures and regulations to a have an enhanced visibility
  • Enabling a digital identity ecosystem to foster the national economy
  • Implementing proactive monitoring measures to minimize loss and ensure continuous productivity

TIMOTHY WERE

Deputy Director ICT
Ministry of ICT, Innovation & Youth Affairs, Kenya

11:50 - 12:10

AMAZING SECURITY AND PHENOMENAL CLIENT EXPERIENCES. CREATING DIGITAL JOURNEYS THAT MATTER

The pandemic has accelerated digital adoption especially on mobile, dramatically increasing the landscape for financial institutions. Remote onboarding is no longer an option but a necessity and safeguarding your customer against fraud begins at the point of enrolment.

Customer experience has always been key in the non-digital world and now the digital world demands an even higher standard. Join Uniken for an engaging session on how to deal with these challenges in a quick, secure, economical, and dramatically increase your customer satisfaction.

BIMAL GANDHI

CEO
Uniken

12:10 - 12:30

KEEPING CYBERSECURITY AT THE FOREFRONT OF AFRICA’S DIGITAL BUSINESS

  • Integrating cybersecurity into government initiatives to prevent and respond to cyber attacks
  • Establishing cybersecurity policy and multi-agency collaboration framework to enhance cyber resilience
  • Promoting responsible societal cybersecurity culture to assure data protection and online privacy

SOLOMON SOKA

Deputy Director General
Information Network Security Administration (INSA)

12:30 - 12:50

PRACTICAL APPLICATION OF CYBER THREAT INTELLIGENCE IN TODAY’S EVOLVING CYBER DEFENCE STRATEGIES

  • Learning how Cyber Threat Intelligence can bridge gaps in modern active cyber defence
  • How to build an effective CTI program and improve the current cybersecurity defences?
  • Exploring Cyber Threat Intelligence feeds, frameworks, integration, and sources for an organisation

JOHN OMBAGI

Head Cyber Operations (Africa)
Plena Solutions

12:50 - 13:00

REGAIN CONTROL OF YOUR ACCESS WITH COMPREHENSIVE CYBERSECURITY

Today, every user working in an organization at some point in their workday will need a certain privilege to perform a specific task. However, privileges are an important entry point to both internal and external threats. The challenge is therefore to provide the right access at the right time to the right user with the right level of privilege. This requires controlling, managing, and securing all access and identities of all users in an organization, whether machine or human, from employees to external suppliers or subcontractors

KUMARAN NAIR

Sales Rep South Africa
Wallix

13:00 - 14:00

14:00 - 14:40 PANEL DISCUSSION

ADDRESSING THE RISE IN NEED TO SECURE ONLINE PRIVACY – STRENGTHENING THE DIGITAL JOURNEY

  • With data being the source of competitive advantage, how to achieve data privacy?
  • Ensuring productivity and continuity by leveraging comprehensive security
  • Enacting strict guidelines and policies to maximize online privacy

SAMUEL KIBACIA

Head of ICT
Royal Media House, Kenya

TIMOTHY WERE

Deputy Director
Ministry of ICT, Innovation and Youth Affairs, Kenya

FREDRICK ENDEKI

Head of ICT
Ministry of Health, KMTC, Kenya
Machakos Campus

JOEL CHERUS

Director
National Treasury, Kenya

ANAKLET KOROS

Head of Risk - Kenya
AIG

14:40 - 15:00

DevSecOps: EXPLORING THE POTENTIAL OF EARLY PREPAREDNESS TO MITIGATE CYBER CRIME

  • Developer first approach – Does “shifting left” assure the quality of the software application and system health?
  • Enabling a sequential testing protocol to harden the security into the process
  • Is fail-fast policy the best policy of staying ahead of security issues rather than a reactive policy?

ISHAAQ JACOBS

CISO
Sasol

15:00 - 15:20

EXPLORING THE POTENTIAL OF ZERO TRUST NETWORK TO ELEVATE CYBER ETIQUETTE

  • Elaborating the “Never Trust, Always Verify” security model
  • Identity system: How to address the most critical unit for a zero-trust security posture?
  • How to secure the cloud-based workloads as they serve as potential targets to malicious actors?

PHILIP AIWEKHOE

CISO / Data Protection Officer
NPF Microfinance Bank PLC

15:20 - 15:40

CYBER-HYGIENE AND DATA COMPLIANCE – TACKLING THE KNOWN UNKNOWNS

  • How to employ a sound cyber hygiene routine with the varying risks of vulnerabilities?
  • How to ensure the protection of sensitive data from unauthorized use? Is data compliance the key solution in managing the data throughout its lifecycle?
  • Powering an organization with various data protection strategies to overcome the compliance regulation challenges

GEORGE KISAKA

Head of Risk & Compliance
Airtel

16:00 - 16:30

16:30 - 18:30

9:00 - 9:20

EMBRACING A CULTURE OF PERSONAL DATA PROTECTION IN AFRICA

  • Challenges in building a sustainable security culture in Africa
  • Addressing the importance of flexibility in security culture which makes it easy to adopt at different verticals in an organization
  • Aligning organizational determinants of culture and individual determinants of culture to manifest a cyber secure conscious behavior

IMMACULATE KASSAIT

Data Commissioner
Office of the Data Protection Commissioner, Kenya

9:20 - 9:40

IMPLEMENTING PRIVACY PROTECTION IN A BUSINESS

  • Monitoring legislation
  • Developing and implementing strategy and governance framework
  • Ensuring compliance within a business

WYCLIFFE MABWA

Assurance & Managed Service Lead
Huawei

9:40 - 10:00

POWERING THE CONFLUENCE OF CYBER POLICING – THE RISING NEED TO PREVENT & DISRUPT CYBERCRIME

  • Addressing the emerging challenges due to the advent of the global nature of internet
  • With the absence of border in cyberspace, what is the role taken up by the police in combating the cyber threat
  • Enabling a comprehensive approach to fight against cybercrime and promoting the establishment of international common standards for guardianship

DEAN WATKINSON

Cyber Specialised Officer
INTERPOL

10:00 - 10:20

DEVELOPING AND IMPLEMENTING A ROBUST CYBER SECURITY STRATEGY

  • The world is digitizing and at the core of this digital transformation is security, so your security strategy must support this.
  • Gone are the days where security was just running silo in IT, it has become a business imperative
  • Prioritizing your security focus areas, given the digitization and the evolving threat landscape

THELMA KGANAKGA

Group CISO
Equity Bank (K) Limited

10:20 - 11:00 PANEL DISCUSSION

WOMEN IN CYBERSPACE: DYNAMIC POWER BALANCE IN SECURING THE DIGITAL FUTURE

  • How to lead, manage, and develop a secure infrastructure while creating an inclusive experience?
  • How to leverage the emerging trends of the industry 4.0 without tampering the security structure of an enterprise?
  • Next Gen Women in Tech – Pacing up to the ever-evolving nature of cybertech

DR. KATHERINE GETAO

Retired Public Servant & Former CEO
ICT Authority, Kenya

LAURA TEMESI

Head Cyber Partnerships and Communication
Standard Chartered Kenya

MARY MBUGUA

Group Head of Risk
Jubilee Insurance

EMMA NGUTE

ICT Director
Kitui County

11:00 - 11:30

11:30 - 11:50

ETHICAL HACKING: INCORPORATING A FIERCE CYBER DEFENSE MECHANISM

  • Is “Hack for good” a solid step toward building a safe cyber space?
  • Leveraging the mindset of a hacker to identify and correct vulnerabilities within networks
  • Promoting early identification of blind spots in an organizational network to enhance cyber resiliency

ZECHARIAH AKINPELU

CISO
Unity Bank

11:50 - 12:10

ENHANCING CYBER CAPACITY BUILDING IN AFRICA: CHALLENGES & OPPORTUNITIES

  • Prioritisation of Cyber Capacity Building (CCB) is essential in enhancing Cybersecurity and Digital Resilience
  • Further collaboration and coordination on CCB among AU members states is critical
  • There is increased need for further investment, more innovation, up skilling and sustainability to fully achieve Africa’s’ digital transformation agenda

Dr MARTIN KOYABE

Senior Manager and Technical Lead
AU-GFCE

12:10 - 12:30

FUTURE OF MONEY – CYBERSECURITY THREATS TO CENTRAL BANK DIGITAL CURRENCIES (CBDCS)

  • Addressing the role of cybersecurity and cryptography in the birth of CBDCs
  • What are the security considerations and risks that need to be factored for CBDCs?
  • Exploring the future of cyber enabled CBDCs in the global landscape

TIM THEURI

Executive Head of Cybersecurity
M-PESA Africa
(Subsidiary of Safaricom Plc)

12:30 - 12:50

ASSURING AN AGILE BUT ROBUST SECURITY STRATEGY FOR QUICK RECOVERY FROM CYBER ATTACKS

  • Employing a company-wide recovery plan which serves as a lifesaver for different attack scenarios
  • Creating a cyber vault as a backup system by crypto locking the vault storage
  • Analyzing the security gaps in the network and taking prompt measures to bridge and strengthen the system

TOM MBOYA

Head of ICT
Unga Holdings

12:50 - 13:10

SOCIAL ENGINEERING ATTACKS - BRINGING THIS RAMPANT THREAT UNDER CONTROL

  • Securing the passwords- Being vigilant and enabling multifactor authentication to ensure account protection
  • How to strengthen the most common attack layer – Workforce?
  • How to detect and identify the extent of the attack to significantly decrease the associated risk and lost productivity?

MAKALE BENSON

Head of ICT, Service Operations
I&M Bank, Kenya

13:10 - 14:10

14:10 - 14:50 PANEL DISCUSSION

PROTECTING CRITICAL BUSINESS ASPECTS FROM THE AGGRESSIVE GROWTH OF RANSOMWARE ATTACKS

  • Addressing the vulnerabilities in the system that allows the attackers penetrate successfully
  • How to use deception-based model to identify the earliest attack stage?
  • Ensuring the use of standard practices to wipe ransomware and reimage the system

PHILIP AIWEKHOE

CISO / Data Protection Officer
NPF Microfinance Bank PLC

SOLOMON SOKA

Deputy Director General
INSA, Ethiopia

CSE ABBAH SAMBO USMAN

Head of Advance Fee Fraud Section
Economic and Financial Crimes Commission

DAVID KITONGA

Head of Infosec
Jamii Telecommunications Ltd, Kenya

14:50 - 15:10

CYBERSECURITY AWARENESS CAMPAIGNS: WHY THEY FAIL TO CHANGE BEHAVIOUR

  • Understanding the complexities of human nature
  • Elaborating the psychological models of behaviour
  • Discussing various persuasive techniques to change attitudes, behaviours, values and beliefs

KABUTHIA RIUNGE

CISO
KCB Bank PLC

15:10 - 15:30

POWERING THE SECURITY POSTURE OF AN ORGANIZATION AGAINST THE EMINENT THREAT

  • Shifting from fragmented tools to end-to-end security posture strategies for protection from threats and vulnerabilities
  • Aligning the security requirements of an organization with the goals and objectives of the business
  • Is automation the one stop solution to prevent hackers from infiltrating the network?

CLIVE WERE

Head of Information Security
Metropol Corporation Limited

15:30 - 15:50

DIGITAL FORENSICS – ITS ROLE IN THE FIGHT AGAINST CORRUPTION

  • The Process of Digital Forensics
  • Purpose and Benefits of Digital Forensics
  • Digital Forensics and Evidence Collection

CHRISTINE OMBAKA

Investigations
Ethics and Anti-Corruption Commission

15:50 - 16:30

VISIT TO THE NETWORKING LOUNGE

GOLD SPONSOR

SILVER SPONSOR

EXHIBITOR

GOLD SPONSOR

EXHIBITOR

EXHIBITOR

LUNCH SPONSOR

GOLD SPONSOR

GOLD SPONSOR

GOLD SPONSOR

EXHIBITOR

EXHIBITOR

AWARDS REGISTRATION

Fill in this form to receive more information about IndoSec 2022.

#CyFrica

MEDIA ENQUIRY

#CyFrica

SPONSORSHIP ENQUIRY

#CyFrica

GENERAL ENQUIRY