This is a past event. Registration is closed. View other DX5 (formerly CIO Africa) events.


As organizations rapidly adopt cloud networks, due to flexibility, scalability, cost effectiveness and more, security needs to be at the front and centre. It is indeed against this background that the virtual Cloud & Security Forum 2020 is designed to assist in driving an impartial and informed dialogue in the rapidly evolving information security industry.

Having continued to create an environment for making new connections, the summit with visionary speakers at the nexus of new technologies and cyber security solutions purposes to share their insights and demonstrate their ability to safeguard customer data.

From new applications being consistently added to networks to employees taking access control shortcuts and credentials being compromised, it is clear that there are endless vulnerabilities to detect and manage.


Join the information security industry experts as they discuss strategies, tools and solutions to ensure your organization is secure.

Agenda

8

45AM

-

8

55AM

WELCOME REMARKS

Laura Chite

9

30AM

-

10

00AM

PANEL DISCUSSION: Walking the Privacy Journey in the Era of Emerging Technologies

Harry HareAmb. Dr. Monica JumaOtilia PhiriMercy Wanjau

Since the Kenya’s Data Protection Law enactment in November 2019, what has been the immediate next step? To what extent has it raised the bar of obligation, accountability and compliance among the industry players? To what extent are organisations (public or private sector) adhering to strict regulations around privacy, security and consent? What are the data protection procedures and how is it moving on in enterprises? What obvious things have changed to uphold the spirit of the law? What activities reflect how practices within organisations are changing or have changed?

10

00AM

-

10

15AM

10

45AM

-

11

15AM

PANEL: Running Secure & Effective Business in The Cloud Era

Phillip Irode MSc. CISSP CISA CRISC CISM CGEIT CBCI ITIL V3Dan KwachNyimbi Odero

12

15PM

-

12

25PM

Securing Your Cloud Space

George Gakungu

As CIOs role largely hinges on driving revenue and scaling digital business for their organizations, their focus seems to have put a spotlight on chief information security officers (CISOs) hence begging the question: Shouldn’t the CISOs role be evolving just as seemingly dynamic role of CIOs? Who should the CISOs report to?  To what extent should organizations shift the view of security and risk from a technical problem to a strategic business priority?

12

25PM

-

12

55PM

Roles of CISO Vs CIOs

As CIOs role largely hinges on driving revenue and scaling digital business for their organizations, their focus seems to
have put a spotlight on chief information security officers (CISOs) hence begging the question: Shouldn’t the CISOs role
be evolving just as seemingly dynamic role of CIOs? Who should the CISOs report to?  To what extent should
organizations shift the view of security and risk from a technical problem to a strategic business priority?

12

55PM

-

1

00PM

8

45AM

-

9

00AM

OPENING REMARKS

Laura Chite

11

00AM

-

11

30AM

PANEL DISCUSSION: Impact of COVID-19 on Cybersecurity

Samuel WachiraFrancis Mwangi

How has the threat landscape changed since the crisis started? What type of threats are on the increase? How have organizations responded? What new response measures have been implemented? What lessons have been learned? To what extent are organizations’ remote working infrastructures and endpoints protected? What risks do companies need to be aware of? How have companies educated their remote workers/implemented awareness campaigns? What lessons about cybersecurity can be learned from the virus itself?

11

50AM

-

12

20PM

PANEL DISCUSSION| Driving Organizational Change by Developing a Security Culture

With our modern dependence on technology and security, from what stage should organizations develop a security culture? How effective has security be embedded into everything an organization does? While security awareness appears widespread and possibly mainstreamed, why has security culture not kept up with the pace of threat landscape?

12

30PM

-

1

00PM

PANEL DISCUSSION | Why Vendor Risk Management Is Now A Must-Have

Ken KimaniJohn Ohaga

Vendor risk management isn’t just required in highly regulated industries, it's good practice in all industries. But today’s approaches are mired in lengthy and complex assessments that span a variety of threats and risks. This session will discuss how to improve and enhance your model for managing vendor risks. How can we improve the efficiency and value of our vendor risk-management program?

1

00PM

-

1

05PM

CLOSING REMARKS

Laura Chite

Speakers

Sponsors and Partners

Organizer

Sponsors

Partners

First Distribution

Type here the content of the page or click on some items in the Common Objects-section to add more images, titles and texts to your page

Community

Connect with 408 people attending this event

Tickets

  • End User Ticket

    Complimentary

    Reserve Ticket
  • Vendor Ticket

    $500.-

    This is a ticket for Sellers, resellers or distributors of technology and solutions

    Buy Ticket
  • Vendor 1 day Ticket

    $250.-

    This vendor ticket is valid for one conference day only

    Buy Ticket