CISO Africa 2020
Event submitted on Thursday, November 21st 2019, approved by Content Team ✓
This event has been tagged as follows:
We encourage CXO level professionals to attend this conference. There will be training and talks that will help you protect your organization from threats. There will also be several practical industry case studies, including security strategy roadmaps, developing skills best practices and driving cultural change.
Conference Event Summary
The following description was either submitted by the Conference Organizer on Thursday, November 21st 2019, or created by us.
Across IT and business, we are inundated with a slew of modern business principles and trends. In this instance, two of them really stick out. Firstly, everything is now digital, so much so that digital has lost meaning. Every workforce will be machine-run and the leftover humans will work remotely. All data and applications will be stored and conducted in the cloud (maybe). User experience is driven by continuous little hits of dopamine and instant gratification, and it must be fed at all costs! Secondly, because of all this digital expanse and surplus of data, we are constantly under attack from hackers, bots, and our very own employees – you can’t trust anyone!
To a degree, both are correct, but information security is still often regarded as a grudge purchase, a must-have, checking a box and moving on. For too long, security has been regarded as an add-on, a compliance issue, a laborious process that receives little fanfare or praise. But it shouldn’t be that way. In fact, security should be the cornerstone of driving business value; it’s not just a money saver, it is, in fact, a moneymaker.
CISO Africa 2020 delves into why data and IT security have greater value than merely a defensive mechanism. Designed as a peer-led conference for information security, fraud and risk professionals, the CISO Africa 2020 conference will showcase pragmatic case studies and provides high-level interactive discussions on the latest approaches and tactics to allay the bombardment of cyber-attacks, but deliver and interpret the business value.