Ava’s vision is to help organizations monitor, understand, and act on threats across both cyber and physical domains. The company offers insider threat detection cybersecurity solutions and security solutions to protect people, assets, and data. Security professionals leverage embedded machine learning to recognize and investigate patterns and respond quickly.
CrowdStrike is the leader in cloud-delivered endpoint protection. Leveraging artificial intelligence (AI), the CrowdStrike Falcon® platform offers instant visibility and protection across the enterprise and prevents attacks on endpoints on or off the network. CrowdStrike Falcon deploys in minutes to deliver real-time protection and actionable intelligence from Day One. It seamlessly unifies next-generation AV with best-in-class endpoint detection and response, backed by 24/7 managed hunting. Its cloud infrastructure and single-agent architecture take away complexity and add scalability, manageability, and speed.
CrowdStrike Falcon protects customers against all cyber attack types, using sophisticated signatureless AI and Indicator-of-Attack (IoA) based threat prevention to stop known and unknown threats in real time. Powered by the CrowdStrike Threat Graph™, Falcon instantly correlates 1 trillion security events a week from across the globe to immediately prevent and detect threats.
There’s much more to the story of how Falcon has redefined endpoint protection but there’s only one thing to remember about CrowdStrike: We stop breaches.
Charl van der Walt is the original founder of SensePost - a pen testing company in South Africa and in the UK - where he still sits on the board. He has acted in various roles there, including CEO for about five years. After they sold SensePost to SecureData, he took a diverse role within the group that includes leading its research unit, directing security strategy and leading the "Security Intelligence Unit," which (amongst other things) runs a significant Managed SIEM and Threat Hunting (MDR) Operation. He has spoken on a variety of occasions over the duration of his career, including Black Hat, HITB, Defcon, NATA CCDCOE, BSides and 44Con.
George Beebe is one of America's most well-informed and insightful experts on international affairs and foreign policy. He has an especially strong background in cyber security, US intelligence, US-Russia relations, and the challenges of the changing international order. George Beebe is Vice President and Director of Studies at the Center for National Interest. He is former President of BehaviorMatrix LLC, a technology company that measured audience response to events, issues, and commercial brands. His new book (August 2019), The Russia Trap: How Our Shadow War with Russia Could Spiral into Nuclear Catastrophe, examines how changing technology, the dysfunctional politics, garbled communications, and unsettled regional conflicts are combining to trap the US and Russia in a disastrous escalation spiral neither one wants or expects. George has spent more than two decades in government service as an intelligence analyst, diplomat, and policy advisor. A speaker of both Russian and German, he was the director of the CIA's Russia analysis and Special Advisor to Vice President Cheney for Russia/Eurasia and Intelligence Programs. He also is well versed in the challenges the US faces in North Korea and the Middle East. George speaks with unparalleled authority on cyber security and information warfare. He brings to his presentations a unique combination of expertise in technology, experience with intelligence practice, and connections with the intelligence community.
Website
Speaking engagements
Digital Enterprise Show 2019: www.des-madrid.com
Review from a recent cybersecurity event that George spoke at:
George Beebe delivered a tremendous opening keynote session at our [ ... ] event that our attendees were talking about all day. He was an absolute pleasure to deal with both onsite and in the run-up to the show and I’d have no concerns recommending him to anyone looking for a knowledgeable speaker on cybersecurity and more specifically Russia’s role in what is happening in cyberspace.
Youtube and videos
Books and articles
nationalinterest.org/feature/election-hacking-false-russian-flag-france-20635
nationalinterest.org/feature/russias-role-the-us-elections-the-case-caution-18756
www.pbs.org/newshour/world/is-the-u-s-doing-enough-to-fight-russias-troll-factory
All George’s other articles can be found here:
leighbureaultd.com/speakers/gbeebe/articles
More information about his book, The Russia Trap, can be found here:
leighbureaultd.com/speakers/gbeebe/books
Jo has over 25 years’ experience in the IT field, some of which were spent as CIO in the utilities, as Group CIO in the tourism space and as a Group CISO in the health services arena. She underpins her information technology and security background with her qualifications in education and management. She specialises in consulting in risk and technology issues with a particular emphasis on governance and security in both the commercial and operational areas of businesses. Jo provides strategic advice to organisations across several industry sectors including banking and finance, utilities, manufacturing, tertiary education, retail and government.
Jo has chaired a number of ISACA’s international committees including the Board Audit & Risk Committee, Leadership Development and Professional Influence & Advocacy. She served as an Elected Director on ISACA’s international Board of Directors for seven years and was the founder of its global women’s leadership initiative, SheLeadsTech.
Because of her involvement with ISACA and the SheLeadsTech programme and her rural background, Jo was selected from a large number of candidates to be one of only two non-government delegates and was invited to join the officialAustralian Government delegation to the 62nd Session of the United Nations Commission on the Status of Women (CSW62) held in New York in March 2018. She has spoken on Capitol Hill during a Day of Advocacy designed to bring tech leaders together in one place to discuss issues related to women in tech leadership and then to meet with Congress representatives and Senator’s offices. Jo has had an award established in her honour to recognise her outstanding leadership and commitment to increasing the representation of women in technology leadership and the tech workforce more broadly. The inaugural ISACA Oceania Jo Stewart-Rattray Award was awarded in September 2018.
Qualifications, Memberships and Awards
Website
Speaking engagements
Youtube and videos
Books and articles
Articles:
ISACA Rep Works with UN to Advance Gender Equality
https://www.theaustralian.com.au/business/technology/bridging-the-gender-divide/news-story/2aa09c4012ff9d323f7fc218979b03d0
blubrry.com/mysecurity/48488879/episode-171-interview-with-sheleadstech-founding-isaca-director-jo-stewart-rattray/
Publications (as a member or Chair of the development team):
Business Model for Information Security, ISACA, 2011
Creating a Culture of Security, ISACA, 2012
COBIT 5 for Information Security, ISACA, 2012
COBIT Information Security Focus Area (in draft 2019)
Kenneth Geers is an Atlantic Council Senior Fellow and a NATO Cyber Centre Ambassador. Kenneth served for 20 years in the U.S. Government, the Army, National Security Agency (NSA), Naval Criminal Investigative Service (NCIS) and NATO. In the private sector, he was Senior Global Threat Analyst at FireEye and Senior Research Scientist at Comodo. In academia, he was a Visiting Professor at the National University of Kyiv in Ukraine. His publications include: Strategic Cyber Security, Cyber War in Perspective, The Virtual Battlefield, Tallinn Manual on the International Law Applicable to Cyber Warfare and many articles on national and cyber security.
Speaking engagements
Youtube and videos
Books and articles
Articles:
scholar.google.ca/citations?user=hSDWeOMAAAAJ&hl=en&oi=ao
www.washingtonpost.com/news/monkey-cage/wp/2018/11/05/hackers-are-using-malware-to-find-vulnerabilities-in-u-s-swing-states-expect-cyberattacks/
Books:
Strategic Cyber Security
Cyber War in Perspective
Tallinn Manual on the the International Law Applicable to Cyber Warfare
The Virtual Battlefield
Roger A. Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and author of 11 books and over 1,000 magazine articles on computer security. He has spoken at many of the world’s biggest computer security conferences, been in Newsweek™ magazine, appeared on television, been interviewed for NPR’s All Things Considered™, the Wall Street Journal and been a guest on dozens of radio shows and podcasts. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. He has consulted for hundreds of companies, from the largest to the smallest, around the world. He specializes in host and network security, identity management, anti-malware, hackers, honeypots, Public Key Infrastructure, Cloud security, cryptography, policy and technical writing. His certifications have included CPA, CISSP, CISA, CISM, CEH, MSCE: Security, Security+ and yada-yada others, and he has been an instructor for many of them. His writings and presentations are often known for their real-world, contrarian views. He has been the weekly security columnist for InfoWorld and CSO magazines since 2005.
Website
Speaking engagements
RSA Conference, March 2019, USA
Blackhat, August 2018, USA
BSides Tampa 2019, USA
KB4-CON, May 2019, USA
Youtube and videos
Books and articles
Books:
www.amazon.com/Roger-A.-Grimes/e/B001IQUMT4
www.amazon.com/Cryptography-Apocalypse-Preparing-Quantum-Computing/dp/1119618193
Blogs/articles:
blog.knowbe4.com/author/roger-grimes
www.csoonline.com/author/Roger-A.-Grimes
www.infoworld.com/article/3014323/a-free-almost-foolproof-way-to-check-for-malware.html
Dr Suelette Dreyfus is a Lecturer in the School of Computing and Information Systems at The University of Melbourne. She did her bachelor’s degree at Columbia University (Barnard College) in New York and her Ph.D. at Monash University. She is a frequent public commentator in the media on IT-related topics. Her main research areas are: cyber security and hacking, digital privacy and anonymity, the impact of technology on integrity systems (whistleblowing) and social media as a tool for language learning in schools. She wrote Underground, the first mainstream book about computer hacking in Australia, with Julian Assange, which was subsequently made into two different films and translated into seven other languages. Rolling Stone Magazine described the work as ‘entirely original’, and the book has become a cult classic.
For her research work on the impact of digital technologies on whistleblowing, she has been invited to appear before several parliamentary committees at a state and federal level in Australia. She has co-authored several international reports and papers in this area. She works with civil society not-for-profit NGOs internationally which seek to improve the whistleblower protection structures in their society, both in law and via use of technology. She has integrated these two research areas by co-developing an experimental programme to teach journalists how to protect their whistleblower sources by improving data security and anonymity.
Her e-education research work is in the use of social media for education. She initiated an innovative cross disciplinary project using social media to teach Chinese to Australian primary school children in Australia, and English to Chinese students in China. Prior to earning her PhD and entering academia, she trained and worked as a staff journalist on a major daily newspaper in Australia. Suelette is particularly enthusiastic about encouraging and supporting women in IT.
Speaking engagements
Ethics and Transport Planning Symposium, January 2019, Melbourne, Australia
Exposing Secrets: The Past, Present and Future of US National Security Whistleblowing and Government Security, January 2019, London, UK
Splendour Forum, August 2019, Australia
Youtube and videos
Books and articles
Books:
www.amazon.com/Underground-Hacking-Obsession-Electronic-Frontier/dp/0857862596/
Articles:
cis.unimelb.edu.au/news/data-tracking-report-2019
pursuit.unimelb.edu.au/articles/what-kind-of-rear-window-into-encryption-do-the-five-eyes-want
pursuit.unimelb.edu.au/articles/drone-warfare-why-the-whole-truth-matters
theconversation.com/fbi-vs-apple-giving-up-security-and-privacy-could-hurt-us-all-55024
theconversation.com/governments-undermining-encryption-will-do-more-harm-than-good-53038
theconversation.com/the-security-paradox-individual-privacy-versus-digital-driftnets-38910
Uri Rivner has been fighting online fraud for twenty years, working closely with major financial institutions on developing strategies against cybercrime. Uri started his security career at Cyota, the anti-fraud company that was later acquired by RSA. He joined in 2000 and spent years working closely with the best fraud teams worldwide, gaining deep perspectives on cybercrime, thinking of innovative solutions and building them. Uri took a central role in developing technologies now used by thousands of financial institutions, protecting roughly one billion online banking users, and stopping billions of dollars in fraud each year.
As Head of New Technologies, Identity Protection at RSA, Uri helped corporations shape a new defence doctrine against emerging cyber threats. During his 12th year at RSA he came across an intriguing new start-up called BioCatch, an invisible biometrics company for mobile and web. It has a very cool "twist" to behavioural biometrics. Uri is currently working with the world’s leading banks and corporations on mitigating advanced cyber threats and is enjoying the thrill of an early stage start-up that can finally bring practical biometrics to the world of mobile, cloud and web.
Website
Speaking engagements
Uri has spoken several times at the annual RSA Conference, USA
CyberWeek 2017, Tel Aviv, Israel
FraudCon 2018, Israel
CyberCrime Symposium 2015, USA
Youtube and videos
Ava’s vision is to help organizations monitor, understand, and act on threats across both cyber and physical domains. The company offers insider threat detection cybersecurity solutions and security solutions to protect people, assets, and data. Security professionals leverage embedded machine learning to recognize and investigate patterns and respond quickly.
Please visit www.ava.uk
CrowdStrike is the leader in cloud-delivered endpoint protection. Leveraging artificial intelligence (AI), the CrowdStrike Falcon® platform offers instant visibility and protection across the enterprise and prevents attacks on endpoints on or off the network. CrowdStrike Falcon deploys in minutes to deliver real-time protection and actionable intelligence from Day One. It seamlessly unifies next-generation AV with best-in-class endpoint detection and response, backed by 24/7 managed hunting. Its cloud infrastructure and single-agent architecture take away complexity and add scalability, manageability, and speed.
CrowdStrike Falcon protects customers against all cyber attack types, using sophisticated signatureless AI and Indicator-of-Attack (IoA) based threat prevention to stop known and unknown threats in real time. Powered by the CrowdStrike Threat Graph™, Falcon instantly correlates 1 trillion security events a week from across the globe to immediately prevent and detect threats.
There’s much more to the story of how Falcon has redefined endpoint protection but there’s only one thing to remember about CrowdStrike: We stop breaches.
Visit: www.crowdstrike.com
Axiz
Our commitment to our stakeholders is to be the best and most successful distributor in our region. We strive towards this goal by being the most valued channel for our partners and by contributing to the growth and profitability of our shareholders, staff, vendors, channel partners and their customers.
www.axiz.com
Citrix
Citrix (NASDAQ:CTXS) is powering a better way to work with unified workspace, networking, and analytics solutions that help organizations unlock innovation, engage customers, and boost productivity, without sacrificing security. With Citrix, users get a seamless work experience and IT has a unified platform to secure, manage, and monitor diverse technologies in complex cloud environments. Citrix solutions are in use by more than 400,000 organizations including 99 percent of the Fortune 100 and 98 percent of the Fortune 500.
Learn more at www.citrix.com
Microsoft South Africa’s mission is to empower every person and organisation on the planet to achieve more. The breadth and depth of our mission unlocks unprecedented opportunity as technology transforms every industry and has the power to make a difference in the lives of everyone. Our mission is grounded in both the world in which we live and the future we strive to create and speaks to our new worldview which is rooted in the intelligent edge and intelligent cloud. The intelligent edge is the interface between the cloud and the real world. It is the layer of mobile devices we use to access the data in the cloud, speeding up the processing power of the internet of things, helping this new world to react faster to changing conditions, and become more efficient. Our Business applications, Applications and Infrastructure, and Data and Artificial Intelligence (AI) solutions, are designed to help accomplish effective digital transformation, by empowering employees, engaging customers, optimising operations and transforming products. Through gaming, Modern Life, and Modern Workplace we are driving quality engagement to create empowered experiences.
Please visit www.microsoft.com/en-za
Cybereason is the leader in endpoint protection, offering endpoint detection and response, next-generation antivirus, managed monitoring and IR services. Founded by elite intelligence professionals born and bred in offense-first hunting, Cybereason gives enterprises the upper hand over cyber adversaries. The Cybereason platform is powered by a custom-built in-memory graph, the only truly automated hunting engine anywhere. It detects behavioural patterns across every endpoint and surfaces malicious operations in an exceptionally user-friendly interface. Cybereason is privately held and headquartered in Boston with offices in London, Tel Aviv, and Tokyo.
See more at: www.cybereason.com.
Hosi Technologies
Established in 2010, Hosi Technologies is an Information Security Solutions Company, a trusted partner of Cofense in Africa. We provide amongst other services Cyber Security Awareness and Phishing Solutions.
cofence.hosi.tech/cat
Cofense
Cofense®, the leading provider of intelligent phishing defence solutions worldwide, is uniting humanity against phishing. The Cofense suite of products combines timely attack intelligence on phishing threats that have evaded perimeter controls and were reported by employees, with best-in-class security operations technologies to stop attacks faster and stay ahead of breaches. Cofense customers include Global 1000 organizations in defence, energy, financial services, healthcare and manufacturing sectors that understand how changing user behaviour will improve security, aid incident response and reduce the risk of compromise.
For additional information, please visit www.cofense.com
Splunk Inc. turns data into doing with the Data-to-Everything Platform. Splunk technology is designed to investigate, monitor, analyze and act on data at any scale.
Please visit www.splunk.com
South African listed Allied Electronics Corporation Limited (Altron) is invested in telecommunications and information technology, offering ICT services in the areas of cybersecurity, software security solutions, business process outsourcing, skills development, secure transactional solutions, systems integration, cloud computing, managed services, IT infrastructure, electronic component distribution, fleet management, telematics, data analytics, converged and broadband communication services and networks, and the resale of Microsoft software.
The group’s primary focus is in providing innovative solutions in the fintech, healthtech, safety & security, and learning and development verticals that have a meaningful impact on society by addressing challenges facing communities in South Africa, the continent and beyond, while delivering shared value for all its stakeholders.
Founded in 1965, Altron has a direct presence in South Africa, the rest of Africa, the UK and Australia through its various businesses. In addition, the group’s strategic partnerships with leading international technology companies gives it access to leading technology capabilities and products from across the world, including Asia, Europe and North America. The majority of the groups revenue and headcount are derived from the local market in South Africa where the group is headquartered. The Altron group employs more than 8 500 employees globally.
Visit: www.altronsecurity.com
Cloudflare, Inc. (@cloudflare) is on a mission to help build a better Internet. Today the company runs one of the world’s largest networks that powers more than 10 trillion requests per month, which is nearly 10 percent of all Internet requests worldwide. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare have all traffic routed through its intelligent global network, which gets smarter with each new site added. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was recognized by the World Economic Forum as a Technology Pioneer, named the Most Innovative Network & Internet Technology Company for two years running by the Wall Street Journal, and ranked among the world's 50 most innovative companies by Fast Company. Headquartered in San Francisco, CA, Cloudflare has offices in San Jose, CA, Austin, TX, Champaign, IL, New York, NY, Washington, D.C., London, Munich, Beijing, and Singapore.
Please visit www.cloudflare.com
About ManageEngine
ManageEngine is the enterprise IT management division of Zoho Corporation. 60 percent of the Fortune 500 - rely on our real-time IT management tools to ensure optimal performance of their IT infrastructure, including networks, servers, applications, desktops and more.
www.manageengine.com
About ITR Technology
ITR Technology have been the sole distributers of ManageEngine software in South Africa for over 19 years. With certified support engineers, a dedicated sales team and a newly constructed ManageEngine training centre, ITR Technology values making a difference in the lives of South African IT professionals
Learn more at www.itrtech.africa
Maxtec
Maxtec was established in 1986 and has evolved its offering from the provision of PC storage solutions and reliable and accessible data storage, to that of a complete IT cyber security, services and solutions provider to technology users across the business spectrum. Maxtec is a distributors of market leading technologies that are trusted around the globe by major players in the IT Industry.
www.maxtec.co.za
Fortinet
Fortinet (NASDAQ: FTNT) secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network—today and into the future. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud, or mobile environments. Fortinet ranks number one in the most security appliances shipped worldwide and more than 450,000 customers trust Fortinet to protect their businesses.
Learn more at www.fortinet.com
Nclose is a leading Specialist Cyber Security Solutions Provider. We architect, deploy and manage security solutions aimed at protecting our clients' resources from damage caused by the ever growing number of threats present in the business place.
Please visit www.nclose.com
Orange Cyberdefense is the expert cybersecurity business unit of the Orange Group, providing managed security, threat detection & response services to organisations around the globe. Security assessment services and hacking trainings are delivered by the prominent specialist division, SensePost.
Please visit www.orangecyberdefense.com/
Panda Security is a European based security vendor with a global footprint. Initially focused on the development of antivirus software, the company has since expanded its line of business to advanced cyber-security services with technology for preventing cyber-crime and addressing advanced threats. The Adaptive Defense product family is an Endpoint Detection and Response (EDR) solution that addresses the changed threat landscape with a differentiated approach using machine learning and big data. The company is recognized by Gartner as Europe's sole EDR vendor. In 2006, Jeremy Matthews founded Panda's local office in Cape Town, opening the international vendor's first presence on the African continent.
Please visit www.pandasecurity.com/southafrica/intelligence-platform/
KnowBe4, the provider of the world’s most popular integrated new-school security awareness training and simulated phishing platform, is used by more than 20,000 organizations worldwide to manage the ongoing problem of social engineering. Founded by data and IT security expert Stu Sjouwerman, KnowBe4 helps organizations address the human element of security by training users to be able to identify and report phishing attempts to avoid falling victim to ransomware attacks, CEO fraud, W-2 scams, and other social engineering tactics through a new-school approach to security awareness training.
Thousands of organizations trust KnowBe4 to mobilize their end-users as the last line of corporate IT defence. KnowBe4 provides an affordable, easy-to-use GRC tool that helps organizations cut down audit time and manage their compliance and risk projects faster than ever.
With the acquisition of Popcorn Training in 2018, KnowBe4 Africa continues to develop locally relevant content for African audiences.
Please visit popcorntraining.com
ZeroFOX, the global category leader in public attack surface protection, safeguards modern organizations from dynamic security risks across social, mobile, surface, deep and dark web, email and collaboration platforms.
For more information visit: www.zerofox.com
Wolfpack provides specialist information and cyber threat consulting, training & awareness services to governments and organisations in Africa and pro bono incident support to victims of cyber attacks.
Please visit www.wolfpackrisk.com
ASG Africa operate in South Africa and MEA focused on solving Clients’ challenges as they experience an increase in attacks on Operational Technology (OT) and Industrial Control Systems (ICS) networks, through mutated ransomware and ICS specific attacks, targeting disruption of activities more so now than pure financial gains. Through leading-edge Content Disarm and Construct (CDR) technologies ASG Africa offers a cost-effective solution throughout the region. ASG Africa also offers cost-effective Secure Remote Access to Corporate Networks without the use of VPNs, on Azure and other platforms.
See more at: www.asg.africa.com.
Cyanre is the leading Digital Forensic and Incident Response firm in SA. Through our extensive digital forensic investigative experience in cyber-crimes, we have the skill and expertise to effectively manage any security incident. Our IR team of specialist, assist ICT teams in containing an incident, eradicating the treat, rebuilding the environment, improve security posture, conduct a deep-dive forensic analysis of the actions of the perpetrator while maintaining forensically sound data collection processes and chain of custody requirements. Our in-depth legal knowledge and expert witness services allow us to take an investigation from initial notification to prosecution.
Please visit www.cyanre.co.za
ExtraHop delivers unprecedented visibility, definitive insights, and immediate answers for security and IT professionals across the hybrid enterprise with cloud-native network detection and response, complete visibility, real-time detection, and intelligent response.
Please visit www.extrahop.com
Mobius
Mobius creates sustainable change in your organisation to enable you to govern and manage your information risk.
mobiusconsulting.co.za
Phinity Risk Solutions
Phinity Risk Solutions innovate, so that everyone can make more informed decisions. Our powerful suite of software solutions identifies, profiles, assesses, and reports operational risks so that you can visualise your risks and track each one through to remediation, on a single platform.
Learn more at www.phinityrisk.com
RSA delivers a unified, business-driven approach to managing digital risk—uniting stakeholders, integrating technologies and transforming risk into reward.
Please visit www.rsa.com
Seceon aiXDR™ combines network, identity, application, cloud, and endpoint visibility with behavioural ML algorithms and AI based dynamic threat models to surface only the alerts that matter.
Please visit www.seceon.com
Trend Micro is the global leader in enterprise data security and cybersecurity solutions for businesses, data centres, cloud environments and networks.
Please visit www.trendmicro.com
- LogPoint - Next Gen SIEM
- Acalvio - AI driven fluid deception technology
- Snare Log Agents – Dramatically reduce your SIEM EPS or Storage based costs
- Spirion - Sensitive Data Management
- MassComz – Multi channel critical event communication and cyber awareness.Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus vehicula velit vel ante rhoncus, a lacinia libero ultrices. Mauris vel tristique odio, at luctus dui.
For more information visit: www.zenithsystems.co.za
The Institute of Information Technology Professionals South Africa (IITPSA) is South Africa’s industry body for IT professionals, and a SAQA recognised and IP3 accredited professional body.
Visit: www.iitpsa.org.za
Follow the ITWeb Events community to engage with your peers, read our editorial pieces and newsletters and more.
Follow our Twitter Group @ITWeb_Events and post your thoughts and opinion using the Twitter handle
#ITWebSS2020
RT @RachChinyoka: Ensure you not left exposed with regards to 3rd party risk #ITWebSS2020 https://t.co/jXuUCRhwc0
RT @jjza: The threat of worms on the mobile has not materialised (yet) but has happened on IoT #ITWebSS2020 https://t.co/OPNcrDIksk