Cybersecurity News United Kingdom

Subscribe

Advertise your job ad
    Search jobs

    SA to host Africa Cyber Security Summit

    The vulnerability of industrial control systems (ICS) that underpin national infrastructure is becoming a particular concern in the region, as the number of targeted cyber attacks have increased by 42% from the previous year.
    Stuart Miles via
    Stuart Miles via freedigitalphotos.net

    A recent study stated that the losses from cybercrime in South Africa alone summed up to USD 500 million. Prudent organisations are looking to adopt a more holistic approach to addressing cyber risk, preparing for incursions by advanced threat actors and adding a critical layer of defense against hackers and unknown infectious agents. Scaling up operations and combating cyber crime is on the top of the minds of the African government at the moment.

    Fleming Gulf's inaugural 'African Cyber Security Summit' will take place on 17 and 18 November 2015 in Johannesburg, to address issues relevant to cyber security and a comprehensive approach to assessing the security of network systems, firewall systems, users systems and web applications against cyber threats.

    The summit will host delegations of IT professionals, information security officers, IT auditors, practitioners and researchers from diverse fields, that will provide opportunities for business and intellectual engagement amongst participants tied by a common goal of bolstering cyber security to protect their valuable assets and mitigate threats within their business operations.

    Topics such as 'Securing the Cyber Infrastructure', 'Governments' Role in Securing the Cyberspace', 'Role of Social Media in Cyber Threat', 'Lack of Technical Know-how in terms of Cyber Security', 'Digital Forensics and Cyber Crime' and many more will be imparted to the participants by leading industrial specialists.

    The summit will showcase a range of state-of-art technologies for organisations to adopt a multi-tiered approach to keeping threats out and detect and isolate any breaches quickly.

    Let's do Biz