AfricaHackOn is one of East Africa’s premier technical computer security collective that brings together the individual talents of the brightest and best security experts in the region, through live presentations, engaging discussions and hands-on demonstrations. The organizers are connoisseurs in a full range of defensive and offensive security topics are well versed in the theoretical … Read more
The World Economic Outlook 2017 has recognized that Africa currently hosts some of the fastest growing economies in the world and that the entire continent is set for a huge economic transformation. Information and communication technology and cyberspace are key enablers of African national visions including Kenya’s Vision 2030 which aims to use science, technology … Read more
opcode: short for operational code, it is a number that determines the computer instruction to be executed. OPCDE_, the most technical security conference of the Middle East, holds its annual and inaugural event on April 6-7, 2018 at the Dubai Future Accelerator, Emirates Towers, Dubai, UAE. The conference will feature a number of keynote speakers … Read more
East Africa Cybersecurity Week (EACSW) is an annual cybersecurity conference held at Strathmore university_ Nairobi, with East Africa Cybersecurity Week 2018 running from May 10th to May 11th, 2018. Cybercrime has become a global challenge and is estimated to cost the world economies over $444B annually according to MacAfee. East Africa Cybersecurity Week (EACSW) offers … Read more
Africahackon is East Africa’s premier technical computer security collective which brings together the individual talents of the best and brightest security professionals in the region, through live presentations, engaging discussions and hands-on demonstrations. We are connoisseurs in a full range of defensive and offensive security topics are well versed in the theoretical aspect of cyber … Read more
The event agenda will have key theme topics around Ransomware, Threat Intelligence, Dealing with Insider Risks and Security Complexities.