Event Schedule

Day 01 | 15 July, 2024

Slot reserved for a senior Government official.

  • Delving into the pivotal role of key stakeholders in shaping a robust cybersecurity framework, encompassing policy development, regulatory compliance, and incident response strategies.
  • Evaluating the responsibilities of businesses in safeguarding critical infrastructure and sensitive information from cyber threats.
  • Illuminating the importance of digital hygiene and education in fostering a culture of cyber resilience.
  • Examining role of artificial intelligence in fortifying cybersecurity defenses.
  • Scrutiny of ethical considerations surrounding the integration of AI in cybersecurity practices.
  • Exemplifying successful applications of AI in augmenting cybersecurity resilience.
  • Exploring cyber resilience strategies.
  • Illustrating effective cyber resilience strategies and highlighting successful incident response and mitigation.
  • Deploying robust cybersecurity measures across extensive fiber optic network.
  • Best practices for securing critical infrastructure against evolving cyber threats.
  • Building a national culture of cybersecurity preparedness and promoting responsible online behaviour and combat cybercrime.

Slot reserved for Broadband Systems Corporation

  • Assessment of the vulnerabilities and risks posed by cyberattacks to critical infrastructure.
  • Elucidation of the strategies and technological solutions employed to fortify critical assets.
  • Insightful exploration from global case studies, drawing critical lessons from successful and thwarted cyberattacks on critical infrastructure.

Slot reserved for Solution provider.

  • In-depth analysis of the unique cybersecurity challenges that accompany region’s ambitious digital transformation journey.
  • Showcasing the adaptive strategies and technological investments being made to mitigate risks ensuring secure digital progress.

Slot reserved for Cyberteq

  • Explore customized cybersecurity solutions designed to navigate the unique challenges within the business landscape.
  • Delve into practical strategies tailored for SMEs, balancing effective cybersecurity with the constraints of limited resources.
  • Impactful cybersecurity measures, providing actionable insights on implementing defences without compromising financial resources.

Slot reserved for Trend Micro

  • Foresight into the emerging trends shaping the cybersecurity landscape in Africa.
  • Formidable challenges and abundant opportunities lying ahead for cybersecurity practitioners and stakeholders.
  • Strategizing proactive measures to future-proof African nations against evolving cyber threats.

Day 02 | 16 July, 2024

  • Deliberate on the paradigm shift in cybersecurity challenges induced by the 4IR, encompassing IoT, AI, and other technologies.
  • Prescriptive insights into how region can proactively prepare for cyber challenges, harmonizing technological advancement with security imperatives
  • Reflect on the profound lessons gleaned from previous large-scale cyberattacks; ensuing best practices for preemptive preparedness.
  • Dissect actionable strategies for businesses to fortify their cyber defences, including incident response planning and threat intelligence.
  • Illuminating the distinctive threats ranging from targeted attacks on sensitive financial data to emerging financial cybercrime.
  • Navigating the regulatory landscape governing cybersecurity in the financial sector.
  • Establishing robust cybersecurity frameworks within financial services.
  • Engage in an incisive analysis of the escalating threat surface presented by IoT devices, addressing vulnerabilities and attack vectors.
  • Propose a comprehensive approach to securing IoT ecosystems in both consumer and industrial environments, incorporating encryption, authentication, and development lifecycles.
  • Uncovering vulnerabilities and shoring up cyber defences.
  • Employing ethical hackers as a security measure.
  • Designing a roadmap integrating ethical hacking and penetration testing in their security posture.
  • Delving into the critical importance of safeguarding personal and sensitive information in an increasingly digital world.
  • Navigating through the evolving landscape of data protection regulations, harmonizing compliance with operational imperatives.
  • Best practices and technological safeguards for preserving individual privacy and fortifying data protection protocols.
  • Understanding the symbiotic relationship between cyber resilience and business sustainability.
  • Highlighting strategic corporate investments in bolstering cyber capabilities, safeguarding against cyber threats, and fortifying critical business infrastructure.
  • Drawing actionable insights from incidents with significant business implications.
  • Leveraging the power of collective intelligence.
  • Addressing challenges and enumerating the advantages of cross-border cooperation in the face of evolving cyber threats, underlining the importance of diplomatic and technological collaboration.
  • Proposing recommendations and frameworks for enhancing industry cooperation in cybersecurity.
  • Confronting the evolving and dynamic threat landscape, underlining the imperative for sustained vigilance and proactive security measures.
  • Advocating for collective responsibility across all stakeholders.
X