A Cloud Paradox: Be “Open” to be more Secure Mark Hosking
Mark Hosking
Head of Emerging Technology Sales, CEMEA at Red Hat
Cloud Security Challenges and Supply Chain Risks Dave Funnel
Dave Funnel
Senior Cloud Solutions Architect SSA at VMWARE
Be the Next Cyber Security Superpower Kadri Humal-Ayal
Kadri Humal-Ayal
Honorary Consul at Republic of Estonia in Kenya
PANEL DISCUSSION: Data is the New Oil! So What? Kadri Humal-Ayal•Nyimbi Odero•Harry Hare•Mark Hosking
Security and privacy leaders face some critical decisions in the years ahead to ensure their organization is completely safeguarding data. The risk of not securing data and protecting privacy is too great. Well, to what extent are prepared for a data breach in today’s ever threatened digital space? Considering how are organizations are capturing data today, to what extent is the right level of consent being adhered to? How secure is data today in the quest of businesses using the same data to propel businesses? What are some of the data compliance challenges being experienced today and how are organizations overcoming them? What’s the future of data privacy?
Kadri Humal-Ayal
Honorary Consul at Republic of Estonia in Kenya
Nyimbi Odero
Founder of Nyimbi Inc
Harry Hare
Chairman & Publisher at CIO East Africa
Mark Hosking
Head of Emerging Technology Sales, CEMEA at Red Hat
Driving Innovation with AWS Cloud. Shadrack Anyuo
There are many different drivers for customers to initiative their journey to the cloud such as cost. Business leaders however, expect more than just cost savings and efficiency from their investment . They want to be able to move faster as businesses and transform customer experiences, deliver digital transformation and modernize their businesses-in order for them to reinvest the cost savings achieved to drive new innovations and business models. We will explore how AWS cloud helps them achieve these goals.
Shadrack Anyuo
Solution Architect Lead (E/Africa), at AWS
Jump-starting Your Digital Transformation Using Cloud Esther Wambugu - Obado
Esther Wambugu - Obado
Africa Lead: SAP S4Hana & RISE Program at SAP Africa
PANEL DISCUSSION: Re-engineering Cloud Infrastructure for Digital Transformation Nawaz Bagha•Kamal Budhabhatti,•Keith Andere
As IT organizations need to deliver in a more agile and flexible manner, how are they steadily shifting away from traditional equipment purchasing and investing on outsourcing? To what extent has the market matured to embrace more efficient, consolidated, manageable, and cloud-enabled infrastructure? Since digital transformation sits at the heart of today’s organizational shifts and initiatives how are they adopting to technologies like cloud, mobility and social business among others? To what extent are these developments reshaping the datacenter and driving organizations to reassess their architecture?
Nawaz Bagha
Territory Lead at VMWARE
Kamal Budhabhatti,
CEO of Craft Silicon
Keith Andere
Director of Programs at African Youth Commission
Securing the Cloud Transformation Peter Sandkuijl
Peter Sandkuijl
Solution Engineer Director, EMEA of Check Point Software Technologies
Panel Discussion: Building a Cloud First Business Strategy Jeremiah Chunge Munyasa•Martin Kimani•Ken Ogwang’•Fatma Said
Jeremiah Chunge Munyasa
Head of Alternative Channels & ICT at Genghis Capital
Martin Kimani
Associate Director of KPMG
Ken Ogwang’
Head of Digital & Technology at Diageo South Africa
Fatma Said
Head of Digital Marketing at AAR
Keeping Public Data Secure at Scale Hartnell Ndungi
Hartnell Ndungi
Chief Data Officer (CDO) at Absa Bank Kenya PLC
Securing the Cloud DATA COMPLIANCE: ENABLING ANALYTICS WHILE MAINTAINING PRIVACY Hartnell Ndungi•Stanley Chege•Philip Ndegwa•Humphrey Odhiambo
What are organizations doing to manage the unstoppable force of privacy that has coincided with digital transformation? What can be done to enhance data compliance without compromising the ability to use data to its full potential? What are the emerging challenges of enhancing customer experience, compliance, and the growing demands for privacy? What’s being done to make automation of data compliance or making data usage approvals a straight-through processv?
FIRESIDE CHAT: Why Security is Now an Accelerator for Digital Transformation Harry Hare
Harry Hare
Chairman & Publisher at CIO East Africa
Big Data: Next Battle Ground for Security Wars Varun Parikh
Varun Parikh
Manager, Sales Engineering at Sophos
Understanding the Behaviour of Threat Actors Chibuzo Mbuka
Chibuzo Mbuka
Director, Systems Engineering of Data Group IT
PANEL DISCUSSION: Is Cyberdefense Collaboration Possible? Tevin Mwenda•Joseph Nzano•Varun Parikh•Michael D. Tumusiime•Joseph Mathenge
What motivates a threat actor in today's landscape? What culture differences exist amongst threat actors? Which threat actors are more likely to target the public sector? Which threat actors are more likely to target the private sector? What are some of the real-life examples of such events?
Tevin Mwenda
Policy Associate at KICTANET
Joseph Nzano
Manager, KE-CIRT at Communications Authority of Kenya (CA)
Varun Parikh
Manager, Sales Engineering at Sophos
Michael D. Tumusiime
Solution Engineer Team Leader, East Africa, at Check Point Software Technologies
Joseph Mathenge
COO at Serianu LTD
The State of Cybersecurity & Auditing in the Cloud John Ward
John Ward
Principal and SME for Cloud Technologies, Africa at Fortinet
PANEL DISCUSSION: People the Weakest Link in Cybersecurity Fiona Makaka•Francis Mwangi,•Cephas Okal•Evelyn Kilel•John Ward
Since cybersecurity is never just a technology problem but a people, processes and knowledge, how should organizations be managing it? Why don’t people take up cyber security advice? How should organisations be sharing info to secure their processes against malicious actors? How can organisations effectively audit suppliers?
Fiona Makaka
Data Protection Officer
Francis Mwangi,
IT Security Consultant
Cephas Okal
CISO at Madison Group, Kenya
Evelyn Kilel
Cybersecurity Engineer at Safaricom PLC
John Ward
Principal and SME for Cloud Technologies, Africa at Fortinet
Building an Outcome Focused Roadmap Nawaz Bagha•Clifford Levi
How is the cybersecurity challenge contributing to the need of increasing the cybersecurity workforce? How should the industry be attracting and retaining individuals from diverse backgrounds to a cybersecurity career?
Nawaz Bagha
Territory Lead at VMWARE
Clifford Levi
Subject Matter Expert Cloud Computing at Safaricom Limited
PANEL DISCUSSION: Optimising Security for Remote Working Mbugua Njihia•Mutheu Khimulu•Ken Kimani•Dr. Bright Mawudor
Mbugua Njihia
COO at Safiri Express
Mutheu Khimulu
Cybersecurity, Counterterrorism and Crisis Management Lawyer
Ken Kimani
Channel Manager at ESET East Africa
Dr. Bright Mawudor
Head of Cybersecurity at Dimension Data
Could AI Be the Future of Cyber Security Nuno Martins
How can AI create a constantly evolving cyber secure network? Will AI mitigate against the weakest part of the chain, people? Is AI the future of cyber security?
Nuno Martins
Senior Solution Architect, at Red Hat, SSA
PANEL DISCUSSION: Are We Safe Working from Home in 2021 Janet Othero.•Paul Njuguna•Diana Waithanji
While 2020 technically released people from the constraints of the office, to what extent are they exposed to secuirity threats plus that of their organizations in 2021? To What extent is remote working compromising on performance and security? How is work affected by where people are working and their data located? Zero Trust frameworks are a great enabler for working anywhere
Janet Othero.
Partner, Telecommunications, Media and Technology at TripleOKLaw