Security everywhere: Managing new cyber risks

This year, more than any other, we have a critical need to come together to accelerate essential recovery and transformation. Whether you are supporting a newly remote workforce or shifting to digital platforms across different tools, applications and cloud platforms, cybersecurity remains an essential practice to protect your organization and clients.

Join our Security Virtual Summit : a free event designed for leaders to put security everywhere, so you can thrive in the face of uncertainty.

Enroll now to hear from security leaders who will talk about best practices in dealing with the latest cyber security challenges.

Title Content
Security everywhere: Manage new cyber risks Everything from new business models to rapid adoption of technology to regulations are pushing cybersecurity teams to find new, faster ways to shield their business and ensure privacy while accelerating growth. Infusing security everywhere business is done can support growth while protecting against emerging and accelerating threats. Mary O'Brien and John Wheeler will discuss client stories where IBM brought together the right people, processes, and technology to accelerate business securely.
Future-proofing your security against Quantum

Quantum computing promises power far beyond the reach of any supercomputer. That power can render the very best of today's encryption pointless. Organizations that intend to keep their most sensitive data private need to future-proof their security by implementing quantum-safe cryptography, which starts with risk analysis and data classification. Dr. Sridhar Muppidi, IBM Fellow will discuss with JR Rao, IBM Fellow how you can ensure security in the Quantum Age.

Discover, Classify and Secure your sensitive information (GDPR, POPI) Data is dynamic and multiplying everyday. There’s a need for the data to be accessible anywhere, anytime. The data is stored, processed and transited on the distributed environments and into clouds with underlying security vulnerabilities, and no visibility who’s using the data. Add to this challenge the complex regulations, like GDPR & POPI, which are making it difficult for many organizations to meet compliant requirements set out by these regulations. Sheldon Hand will discuss why Securing your Sensitive Information is so important and the 6 step approach to doing this.

Modernize Security with an Open Platform

Speaker: Justin Youngblood

Security leaders get a first-hand look at not just the security challenges the journey to cloud imposes, but the tremendous advantages the cloud offers; flexibility, automation, and collective insights. Justin Youngblood, Vice President, IBM Security will discuss how the journey to hybrid multicloud is unlocking innovation and uniting defenses. Security teams, already struggling with a skills gap, are often forced to undertake costly migration projects, build complex integrations, and continuously switch between different screens and products, causing threats and risks to be missed, and it’s time for a new approach.
Women in CyberSecurity in Africa Women now make up nearly a quarter of the cybersecurity workforce. This brings new perspectives and experiences to the field and with our exceptional women in cyberSecurity in Africa we will discuss the impact of COVID and the “new normal” on security strategy, the future post COVID threat landscape , advice for newly appointed CISOs and they will share some advices for women considering cyber security careers
Run analytics on encrypted data in the cloud Today, businesses have to weigh the benefits and risks of going faster verses staying safe. Imagine if you could do both for your data: run real-time advanced analytics on encrypted data. That is the promise of homomorphic encryption, and the ability to stay safe while going fast unlocks incredible opportunities in many industries regardless of which cloud the data resides in. J.R. will share how IBM is leading the charge in this exciting space and share a glimpse into the future of this technology
How to effectively respond to a data breach through orchestration and automation Security orchestration, automation and response (SOAR) is graduating to the mainstream.  Organizations burdened by the growing volume of alerts, multiple tools and staff shortages are adopting a single platform to improve their security operations centers. Stephen Berjak will discuss how to effectively respond to a data breach through orchestration & automation. How SOAR tools can help your organization accelerate incident response with automation, process standardization, and integration with your existing security tools.
Fireside Chat on “Security Landscape in Africa” The businesses are intensifying their activities in the continent, Africa is on the up. We must  consider that such a rapid growth could create favorable conditions for the development of cybercrime.The number of malware, cyber frauds and cyber attacks is growing in Africa at an exponantianl rate. The top Security Executives from Africa will discuss diverse issues on Cybersecurity threats in 2020, Cyber Security Challenges in Africa. How CISOS believe organizations in Africa responded to the ‘work from home’ model due to the Pandemic and top 3 recommendations for the African organizations.
Defending AI, extending AI Every defense has a weakness and AI is no exception. Attackers can poison the data we train on, steal our computational models, or even exploit the bias encoded into our tools. AI is too powerful and too valuable, to allow these potential vulnerabilities to stop security teams from taking advantage of using it. Learn how IBM's open-source Adversarial Robustness Toolkit
Manage accelerating threats to your IoT and OT investments As organizations have transformed how business is done, our digital and physical world rapidly became more connected. Systems once far removed from the benefits of the internet are now part of a widening mesh of smarter, interconnected devices and systems. Once isolated infrastructures, like factories and power plants, are now exposed to very real, accelerating risks. And the implications are profound. From plant interruptions to endangering workers' lives, attacks on operational technologies (OT) and the Internet of Things (IoT) need to be mitigated and controlled. Learn how the IBM X-Force team and threat management framework is trusted by clients around the world to help protect their connected environments.

Time (GMT+2)

Session Title Speaker
11:00 – 11:06 Welcome Note Joe Ruthven, IBM Integrated Security Leader, IBM Middle East and Africa
11:06 – 11:24 Security everywhere: Manage new cyber risks

Mary O’Brien, General Manager, IBM Security

John Wheeler, BISO, IBM Security

11:24 – 11:30 Future-proofing your security against Quantum

Sridhar Muppidi, IBM Fellow and Chief Technology Officer

J.R. Rao, IBM Fellow and CTO, Research Security

11:30 – 11:50 Discover, Classify and Secure your sensitive information (GDPR, POPI) Sheldon Hand, IBM Security Business Unit Leader Southern Africa
11:50 – 12:08 Modernize Security with an Open Platform Justin Youngblood, VP, R&D and Offering Management
12:08 – 12:38 Women in CyberSecurity in Africa, a panel discussion of top CISOs and Security Leaders

Abeer Khedr, Information Security Director, National Bank of Egypt

Charity Chirowamhangu, Information Security Manager, Standard Bank South Africa

Olawumi Babalola, Country CISO for Standard Chartered Bank (SCB) Nigeria

Funzani Madi, CISO, Johannesburg Stock Exchange South Africa

12:38 – 12:44

Run analytics on encrypted data in the cloud

Sridhar Muppidi, IBM Fellow and Chief Technology Officer

J.R. Rao, IBM Fellow and CTO, Research Security

12:44 – 12:59 How to effectively respond to a data breach through orchestration and automation Stephen Berjak, Associate Partner, IBM Cloud and Cognitive Software Southern Africa
12:59 – 13:24 Fireside Chat on “Security Landscape in Africa”

Moderator:Kawther Haciane, IBM Security Services Executive MEA

Speakers:

Alvin Chebii, Head of Information Security at NCBA Group Nigeria

Mohamed Elbeshti, Deputy Director of the Information Security Department at the Central Bank of Libya

13:24 – 13:30 Defending AI, extending AI

Sridhar Muppidi, IBM Fellow and Chief Technology Officer

J.R. Rao, IBM Fellow and CTO, Research Security

13:30 – 13:48 Manage accelerating threats to your IoT and OT investments
Spencer Ingram, Global Vice President, Managed Security Services
13:48– 13:51 Closing Remarks Sheldon Hand, IBM Security Business Unit Leader Southern Africa

Speakers

Mary O’Brien

General Manager of IBM Security

John Wheeler

CISO and VP of Services & Integrated Solutions, IBM Security

Spencer Ingram

Global Vice President, Managed Security Services

Justin Youngblood

VP, R&D and Offering Management

Sridhar Muppidi

IBM Fellow and Chief Technology Officer

J.R. Rao

IBM Fellow and CTO, Research Security

Joe Ruthven

Business Unit Executive, IBM Integrated Security

Sheldon Hand

Security Software and Services Business Unit Manager, IBM Security

Funzani Madi

CISO of Johannesburg Stock Exchange

Olawumi Babalola

CISO, Standard Chartered Bank, Nigeria

Abeer Khedr

Information Security Director, National Bank of Egypt

Stephen Berjak

IBM Cloud & Cognitive Software Leader

Charity Chirowamhangu

Group IT | IT Security: Digital Platforms & Innovation, Standard Bank, Charity