Вы находитесь на странице: 1из 3

3rd

Ye
a

Africa 2014

Prevent | Detect | Respond | Recover


Therefore, just as water retains no constant shape,
so in warfare there are no constant conditions.
- Sun Tzu, The Art of War

11 & 12 November 2014


Cyber crime and cyber espionage is now a paralysing reality
to both public and private organisations still lagging
in readiness. Cyber warfare and concerns on the
vulnerability of critical information infrastructure
to cyber attacks is now a major concern.

RE

MENT
E
G
A
AN
COVE

RESPOND

In its 3rd year, drawing on data,


expertise and success from industry
thought leaders, CyberCon Africa 2014
will take you on a tour into the Cyber
Underworld and attempt to map out the
threat and incident management lifecycle. Our
expert speakers will provide guidance on how to
prevent, detect, respond and recover from attacks to
ensure your organisation is better armed to manage this
risk.

The Programme is
Structured on an
Actual Threat
Management
Framework

INCIDE
N
T
M

Whoever is first in the field and awaits the coming of the enemy,
will be fresh for the fight; whoever is second in the field and has
to hasten to battle will arrive exhausted.
- Sun Tzu, The Art of War

Book Online at www.cyberconafrica.org or contact:


Cybercon Project Manager - Tania Diesel
Phone: +27 11 794 7322 / Email: info@cyberconafrica.org

LIGENCE
TEL

PREVENT

DETECT

Research suggests that cyber threat


agents are gearing up for 2015 and
beyond and are becoming faster,
smarter, more daring and organised
than ever before. This calls for
all stakeholders to adopt a new
defence paradigm and implement
new intelligence sharing platforms.
Collaboration now more than ever is
key.

THREA
T IN

Session 2
Establishing a Robust Threat
Intelligence & Talent Management
Capability

Session 1
The Threat Never Sleeps Best Practices in 24/7 Cyber
Security Monitoring

Prevent Session

Session 1
Cyber Underworld - An overview of
Global Threat Groups
(& Guidance to Mitigate Risks)

Detect Session

Day 1 - Threat Intelligemce Programme

High Level Programme Overview

Session 2
Latest Detection Tools & Techniques
to Detect Cyber Intrusions

Incident Management & Response


Techniques
Session 2
Cyber Forensics Response Case Study

Session 1
Law Enforcement & Legal
Framework to Combat Cyber Crime
in Africa
Session 2
Current & Proposed Cyber
Collaboration Initiatives on the
Continent

www.cyberconafrica.org

Respond Session

Session 1

Recover Session

Day 2 - Incident Management Programme

View live cyber security demos during coffee breaks.

Pricing Options - Delegates


Prices
Early Bird Price

Regular Price

R 3650,00

R 4500,00

Early Bird Prices are valid until 12 September 2014

Who should attend


Technology leaders
C-level executives
Cyber Forensic Investigators
Public policy makers
Lawyers
University staff and students
Chief Information Officers (CIOs)
Chief Information Security Officers (CISOs)
Cyber Security Professionals
IT Security Managers
Risk Managers
Human Resource Managers
Forensic Auditors
Forward thinking business owners

Law enforcement
Intelligence agencies
Defence teams
Internal Auditors
Technical and Support Specialists
Systems Integrators
Webmasters
Security Analysts
Business Continuity Managers
CTOs
Chief Architects
Senior IT Program Management
Systems Planners and Analysts
Strategic Planners

View live cyber security demos during coffee breaks.

Bookings and Information:


Prices are inclusive of VAT and excludes
transport / accomodation
Early bird prices are valid until
12 September 2014
Book Online: www.cyberconafrica.org
or contact:
Cybercon Project Team:
Tania Diesel & Lebogang Legare
Phone: +27 11 794 7322
Email: info@cyberconafrica.org

www.cyberconafrica.org

Вам также может понравиться