3 r d Y e a r
“Therefore, just as water retains no constant shape, so in warfare there are no constant condions.” condions.” - Sun Tzu, The Art of War
11 & 12 November 2014 Cyber crime and cyber espionage is now a paralysing reality to both public and private organisaons sll lagging in readiness. Cyber warfare and concerns on the vulnerability of crical informaon infrastructure infrastructure to cyber aacks is now a major concern. Research suggests that cyber threat agents are gearing up for 2015 and beyond and are becoming faster, smarter, more daring and organised than ever before. This calls for all stakeholders to adopt a new T defence paradigm and implement N new intelligence sharing plaorms. E Collaboraon now more than ever is key.
T H HR E R E A T I EN T N P REV E
N T
E L
L
I
R
E
V O C
E
M R E
G
In its 3rd year, drawing on data, A experse and success from industry thought leaders, CyberCon Africa 2014 will take you on a tour into the “Cyber Underworld” and aempt to map out the threat and incident management lifecycle. Our expert speakers will provide guidance on how to prevent, detect, respond and recover from aacks to ensure your organisaon is beer armed to manage this risk.
G
“The Programme is Structured on an Actual Threat Management Framework “
D R N E S O P
N A M T N E I D N I C
“Whoever is rst in the eld and awaits the coming of the enemy e nemy,, will be fresh for the ght; whoever is second in the eld and has to hasten to bale will arrive exhausted.” - Sun Tzu, The Art of War
Book Online at www.cyberconafrica.org or contact: Cybercon Project Manager - Tania Diesel Phone: +27 11 794 7322 / Email:
[email protected] [email protected]
D
E
T
E
C
T
N
E
C E
High Level Programme Overview
e m m a r g o r P e c m e g i l l e t n I t a e r h T 1 y a D
Session 1
Cyber Underworld - An overview of Global Threat Groups (& Guidance to Migate Risks) Session 2
Establishing a Robust Robust Threat Intelligence & Talent Management Capability
Session 1
n o i s s e S t n e v e r P
n o i s s e S t c e t e D
The Threat Never Sleeps Best Pracces in 24/7 Cyber Security Monitoring Session 2
Latest Detecon Tools & Techniques to Detect Cyber Intrusions
View live cyber security demos during coee breaks.
e m m a r g o r P t n e m e g a n a M t n e d i c n I 2 y a D
Session 1
Incident Management & Response Techniques Session 2
Cyber Forensics Response Case Study
Session 1
Law Enforcement & Legal Framework to Combat Cyber Crime in Africa Session 2
Current & Proposed Cyber Collaboraon Iniaves on the Connent
www.cyberconafrica.org
n o i s s e S d n o p s e R
n o i s s e S r e v o c e R
Pricing Opons - Delegates Prices Early Bird Price
Regular Price
R 3650,00
R 4500,00
Early Bird Prices are valid unl 12 September 2014
Who should aend • Technology leaders • C-level execuves • Cyber Forensic Invesgators • Public policy makers • Lawyers • University sta and students • Chief Informaon Ocers (CIOs) • Chief Informaon Security Ocers (CISOs) • Cyber Security Professionals • IT Security Managers • Risk Managers • Human Resource Managers • Forensic Auditors • Forward thinking business owners
• Law enforcement • Intelligence agencies • Defence teams • Internal Auditors • Technic Technical al and Support Specialists • Systems Integrators • Webmasters • Security Analysts • Business Connuity Managers • CTOs • Chief Architects • Senior IT Program Management • Systems Planners and Analysts • Strategic Planners
View live cyber security demos during coee breaks.
Bookings and Informaon: Prices are inclusive of VA VAT T and excludes transport / accomodaon Early bird prices are valid unl 12 September 2014 Book Online: www.cybercon www.cyberconafrica.org africa.org or contact: Cybercon Project Team: Tania Diesel & Lebogang Legare Phone: +27 11 794 7322 Email:
[email protected]
www.cyberconafrica.org