Mimecast is a cybersecurity provider that helps thousands of organizations worldwide make email safer, restore trust and bolster cyber resilience. Mimecast’s expanded cloud suite enables organizations to implement a comprehensive cyber resilience strategy. From email and web security, archive and data protection, to awareness training, uptime assurance and more, Mimecast helps organizations stand strong in the face of cyberattacks, human error and technical failure.
Charl van der Walt is the original founder of SensePost - a pen testing company in South Africa and in the UK - where he still sits on the board. He has acted in various roles there, including CEO for about five years. After they sold SensePost to SecureData, he took a diverse role within the group that includes leading its research unit, directing security strategy and leading the "Security Intelligence Unit," which (amongst other things) runs a significant Managed SIEM and Threat Hunting (MDR) Operation. He has spoken on a variety of occasions over the duration of his career, including Black Hat, HITB, Defcon, NATA CCDCOE, BSides and 44Con.
Ljupcho Joshevski is the Head for Cybersecurity Architectures at Cisco Systems with over 18 years' experience in the IT industry. He manages a highly talented and specialized group of cybersecurity consulting systems engineers covering Cisco Systems' Middle East and Africa theatre. Ljupcho and his team are responsible for addressing the most complex security challenges customers face in today's dynamic cybersecurity world using Cisco's latest innovations and leadership in security.
In his most recent roles, Ljupcho was based in Vienna, Austria and led the cybersecurity teams for Central Europe, Germany and RCIS. Prior to that he was based in Canada and led the team of systems engineers focusing on Canada's energy vertical while he also led the IoT/IoE technical leadership for Canada. Ljupcho joined Cisco Systems in 2006 as a Regional Systems Engineer covering service providers, enterprise and public-sector customers in South Eastern Europe. Prior to Cisco Systems, Ljupcho spent 4 years in Cosmofon, CosmOTE's Mobile Service Provider in Macedonia. He holds a Master's degree in Business Administration and Bachelor's degree in Business Administration and Information Technology from the University of Central Oklahoma.
Pete Herzog is the co-founder and on the Board of Directors of ISECOM, researching and creating new solutions to complex security problems. As Managing Director of this non-profit research organisation, he manages the research of all projects including the two most recognized: OSSTMM and Hacker Highschool. He manages communications and sharing with the ISECOM community of over 10,000 participants, making interviews, articles and overseeing content for all ISECOM's public and private interactions. He created and now oversees maintenance of the ISECOM certifications for security testing and analysis, trust analysis and professional hacking. He also leads ISECOM's consulting and analysis engagements for private research initiatives and is a frequent trainer and presenter at security conferences and internal seminars for corporations.
Pukhraj Singh is a cyber intelligence analyst with 14 years of experience. He played an instrumental role in the setting up of the cyber defence operations centre of the Indian government. Pukhraj was laterally inducted into the government from the private sector after the 26/11 terror attacks. It was a multi-disciplinary tenure ranging from geopolitical doctrine formulation – eventually approved by the prime minister – to the very brass-tacks of cyber operations. Later, he spent some time at Aadhaar, India's flagship biometric ID project as its first cybersecurity manager. Pukhraj also had very brief stints in the private sector, working with Symantec's DeepSight – industry's first threat intelligence team – and innovative American, Canadian, and Israeli firms. He has spoken at a variety of national security fora and hacking conferences. Pukhraj's writings have appeared in leading Indian journals and newspapers.
Mimecast is a cybersecurity provider that helps thousands of organizations worldwide make email safer, restore trust and bolster cyber resilience. Mimecast’s expanded cloud suite enables organizations to implement a comprehensive cyber resilience strategy. From email and web security, archive and data protection, to awareness training, uptime assurance and more, Mimecast helps organizations stand strong in the face of cyberattacks, human error and technical failure.
Please visit www.mimecast.com
Axiz
Axiz is SA’s leading information technology value added distributor that focuses on solutions covering edge devices, data centre and cloud. We believe in building ecosystems and transcending technology, with a results-driven focus that enables us to offer tailored solutions to our partners.
www.axiz.com
McAfee
McAfee is the device-to-cloud cybersecurity company providing security solutions with transformation in mind to protect data and stop threats from device to cloud using an open, proactive, and intelligence-driven approach.
www.mcafee.com
DRS
Dynamic Recovery Services - experts in ICT services and solutions. We enable cyber resilience through innovation in information security, IT risk management and IT governance. We provide an array of security services from the creation of security strategy to the daily operation of point security products. We partner with market-leading technology providers to ensure the best supply of infrastructure, enabling us to deliver professional services and ensure that all of our products are effectively implemented and operate efficiently in the business environment.
www.drs.co.za
Palo Alto Networks
Learn more at www.paloaltonetworks.com
Forcepoint is the global human-centric cybersecurity company transforming the digital enterprise by continuously adapting security response to the dynamic risk posed by individual users and machines. The Forcepoint Human Point system delivers Risk-Adaptive Protection to continuously ensure trusted use of data and systems. Based in Austin, Texas, Forcepoint protects the human point for thousands of enterprise and government customers in more than 150 countries.
Please visit www.forcepoint.com
NETSCOUT provides IT and business teams a seamless and consistent level of visibility into the performance, availability and security risks that impede digital agility, regardless of the underlying platform, provider, or location.
Please visit: www.netscout.com.
Empowering Africa through innovative IT solutions.
Networks Unlimited is a Value-added Distributor, offering some of Gartner’s most highly recognised solutions within the Cybersecurity, Enterprise Systems Management, Cloud, Networking and Storage arena. Our solutions are sold through an extensive, reputable and solution-focused reseller base across 36 countries on the African continent.
For more information visit: www.networksunlimited.africa
Advanced threats via e-mail and other means are more prevalent than ever. A new way of addressing this is needed. Come and see us to hear how e-Purifier provides the most advanced, locally relevant security for your e-mail and let’s start a discussion around how Securicom and ASG can secure your intellectual property end to end.
www.asg.africa.com
www.securicom.co.za
Corr-Serve is an authorised distributor of intelligent IT solutions that extract and interpret data from business for better decision making.
See more at: www.corrserve.co.za.
J2 Software is a proudly African security focused technology company that delivers world class managed security services for every business. Using continuous monitoring and the latest solutions to protect you from changing cyber threats. We provide security through real visibility.
Please visit www.j2.co.za
LAWtrust (an Etion company) is a specialist cyber security solutions provider that focusses in establishing positive identity, ensuring authenticity and protecting privacy. Solutions include SSL certificates and certificate management systems, FIDO certified strong authentication, digital signature and approval solutions, managed public key infrastructure (PKI), encryption solutions for database and cloud systems, biometric enrolment and matching systems and insider threat prevention with the eDNA platform.
More information on how we can assist can be found at: www.lawtrust.co.za.
Magix Security
Magix Security delivers comprehensive and trusted Cybercrime Defense and Detection solutions and services to address, manage, and contain the risks of financial losses and reputational damage arising from the misuse of applications, or other IT information assets, by employees and/or third parties.
www.magix.co.za
Checkmarx
Checkmarx is the Software Exposure Platform for the enterprise. Over 1,400 organizations around the globe rely on Checkmarx to measure and manage software risk at the speed of DevOps. Checkmarx serves five of the world's top 10 software vendors, four of the top American banks, and many government organizations and Fortune 500 enterprises, including SAP, Samsung, and Salesforce.com.
Learn more at Checkmarx.com or follow us on Twitter: @checkmarx.
We create sustainable change in your organisation to enable you to govern and manage your information risk.
Please visit www.mobiusconsulting.co.za
Nclose is a leading Specialist Cyber Security Solutions Provider. We architect, deploy and manage security solutions aimed at protecting our clients' resources from damage caused by the ever growing number of threats present in the business place.
Please visit www.nclose.com
Obscure Technologies is a security centric organisation of people, distributing best in class advanced security brands and their solutions to market through our valued partner community.
Please visit www.obscuretech.net
Panda Security is a European based security vendor with a global footprint. Initially focused on the development of antivirus software, the company has since expanded its line of business to advanced cyber-security services with technology for preventing cyber-crime and addressing advanced threats. The Adaptive Defense product family is an Endpoint Detection and Response (EDR) solution that addresses the changed threat landscape with a differentiated approach using machine learning and big data. The company is recognized by Gartner as Europe's sole EDR vendor. In 2006, Jeremy Matthews founded Panda's local office in Cape Town, opening the international vendor's first presence on the African continent.
Please visit www.pandasecurity.com/southafrica/intelligence-platform/
Popcorn Training - a KnowBe4 company create high quality, engaging and effective security awareness videos, games and interactive learning modules.
All content is locally produced and available on KnowBe4's award-winning training and simulated phishing platform.
KnowBe4, whose mission it is to help organisations manage the ongoing problem of social engineering are a leader in the Gartner Magic Quadrant for security awareness.
Please visit popcorntraining.com
Business downtime is over! So too, is high storage costs, siloed data, and difficult access. At Redstor, we’re disrupting the norm and changing everything you know about data storage, backup, and recovery. Our pioneering technology is the first of its kind and provides you with on-demand access to your data from a single control centre (on any device). Simply stream your data in real-time and eradicate business downtime… forever.
See more at: www.redstor.com/en-za.
As the fastest-growing, independent identity and access management (IAM) provider, SailPoint helps hundreds of global organizations securely and effectively deliver and manage user access from any device to data and applications residing in the datacenter, on mobile devices, and in the cloud. The company's innovative product portfolio offers customers an integrated set of core services including identity governance, provisioning, and access management delivered on-premises or from the cloud (IAM-as-a-service).
Please visit www.sailpoint.com
OT-Morpho is now IDEMIA, the global leader in trusted identities for an increasingly digital world. Through Augmented Identity, we empower citizens and consumers alike to interact, pay, connect, travel and vote in ways that are now possible in a connected environment.
For more information visit: www.idemia.com
(ISC)² Gauteng is a chapter of the international non-profit membership association, (ISC)², consisting of certified IT security professionals in Gauteng. (ISC)² offers a portfolio of credentials that are part of a holistic, programmatic approach to security.
Visit: www.isc2chapter-gauteng.co.za
The Institute of Information Technology Professionals South Africa (IITPSA) is South Africa’s industry body for IT professionals, and a SAQA recognised and IP3 accredited professional body.
Visit: www.iitpsa.org.za
Follow the ITWeb Events community to engage with your peers, read our editorial pieces and newsletters and more.
Follow our Twitter Group @ITWeb_Events and post your thoughts and opinion using the Twitter handle
#ITWebSS2019
RT @drluyt: Hearing from Trishana Ramluckan and Brett van Niekerk of @UKZN at #ITWebSS2019 about how insurers refused to payout for the d…