Agenda

We’ve got it all.

The agenda is specially curated to bring out the most pressing topics from the industry.

bg

8:00 - 9:00

Registration & Coffee

9:00 – 9:20

Cyber Secure Africa: Defending the National Cybersecurity Strategy for a Safe Digital Footprint
  • Addressing the major challenges in protecting sensitive information and safeguarding the national assets
  • Implementing strategic policies and promoting awareness among the Kenyan workforce to curb threats
  • Prioritizing public-private cooperation and the need for developing and implementing cybersecurity protocols

9:20 - 9:40

Focus on CII Cushioning: Prioritising the Effective Functioning of the Growing Digital Economy
  • Creating a strong outline of shared responsibility between private and public sector to safeguard critical infrastructure
  • Continued collaboration between key agencies and departments to aid in cyber resiliency
  • Implementing proactive monitoring measures to minimize loss and ensure continuous productivity

9:40 - 10:00

Zero Trust Etiquette: Addressing the Security Privilege Strategies with an Always Verify Model
  • What is the scope of a Zero Trust initiative? How to inspect the security provided by “Never Trust, Always Verify” security model?
  • Identity system: How to address the most critical unit for a Zero Trust security posture?
  • Convergence of AI and ML in Zero Trust model to learn and predict employee behavior

10:00 - 10:20

Cyber Warfare: Advancement of New Age Weaponry in a Thriving Digital Ecosystem
  • Discussing the efforts taken by defence forces in combating digital threats
  • Addressing the need for strategic steps to safeguard the national interest of the country
  • Strengthening the infrastructure, policies, and governance to fight against the eminent threat

10:20 - 11:00

Panel Discussion

CISOs Being Ahead in the Security Quest - Building a Secure Tomorrow for Organizational Excellence
  • With the ever-growing penetration of internet users, how to ensure comprehensive security?
  • In a constantly shifting technological environment, leveraging the CISO leadership in enabling scalable, low-risk business frameworks to maximise enterprise protection
  • Accelerating collaboration and succinctly communicating top priorities for efficient and effective workplace order
bg

11:00 - 11:30

NETWORKING BREAK

11:30 - 11:50

Security at the Intersection of IoT and 5G: Building a Cyber Safe Connected Nation
  • Discussing the rise in need to encrypt and protect 5G network traffic to avoid endpoint vulnerabilities
  • Addressing the necessity to secure vulnerable cellular-connected devices from the unique threats faced by IoT devices on cellular networks
  • Strengthening IOT security: Only way forward to a secure connected world

11:50 - 12:10

Future of Cybersecurity: Security Consolidation – One Roof Solution
  • Unifying web, cloud services and private application access using a SASE/SSE architecture
  • Is converged security service the way forward to remove complexity?
  • Delivering consistent, contextual application access for all users

12:10 - 12:30

DevSecOps: Integrating Security with the Initial Stages of Software Development Life Cycle
  • Enabling regulated testing since the beginning of the software evolution to avoid reckless cyber attacks
  • Will automating manual processes and integrating DevSecOps congruent tools into CI/CD delivery pipeline enhance workflow and deliver services efficiently?
  • Integrating SAST in the building stage to identify and prevent vulnerabilities from passing on to the further stages

12:30 - 12:50

Overview on the Benefit and Affliction with the Confluence of AI and ML in Building a Cybersecure Future
  • AI helps in shaping the future of cybersecurity and contributes enormously to making minimal human errors, but how trustworthy and reliable are they?
  • Intelligent Security: How can AI become the strongest cybersecurity ally in an already convoluted world?
  • Addressing the challenges with the convergence of AI, ML and security

12:50 - 13:10

Supply Chain Security: Strengthening the Integrity of Sensitive Data
  • Continuous attack surface monitoring to minimize the exposure to software vulnerabilities
  • Focus on regular third-party risk assessments to ensure continuous improvement in the security posture of an organisation
  • Enforcing encryption practices at the interface of third-party integrations
bg

13:10 - 14:00

LUNCH BREAK

14:00 - 14:40

Panel Discussion

Cyber Secure Cloud - Migrating towards Cloud with Confidence
  • Understanding the challenges in establishing a regulatory compliance management system for enterprises using public or hybrid cloud deployments
  • Enhancing visibility into data through various controls – Data classification, DLP & Encryption
  • Discussing different levels of cloud security – SaaS, PaaS & IaaS

14:40 - 15:00

Redefining the Security Culture in Kenya for a Safe & Secure Digital Infrastructure
  • Challenges in building a sustainable security culture in Kenya
  • Aligning organizational determinants and individual determinants of culture to manifest a cyber secure conscious behavior
  • Identify and prioritize objectives for building a national culture of cybersecurity

15:00 - 15:20

Threat Intelligence – Shedding light on the Unknown by Powering the Cyber Defence Strategy
  • Empowering cybersecurity stakeholders by revealing their adversarial motives and TTPs
  • With the constant evolution of threats, how can intelligence cycle provide framework to effectively respond to threat landscape?
  • Effectively processing the threat data to optimize resources and business efficiency

15:20 - 15:40

Unified Endpoint Security: The Gatekeeper to Safeguard Access Points in a Network
  • With the rapid growth of IT assets footprint in an organization, what are the challenges in securely managing all the endpoints in an enterprise?
  • Reducing complexity by improving coordination and reducing friction between IT Operations and security teams
  • IDEA – Leveraging emerging technology to deliver rich and secure user experience

15:40 - 16:00

Social Engineering Prevention: Mitigating the Mounting Cyber Attacks
  • Securing the passwords – Being vigilant and enabling multifactor authentication to ensure account protection
  • How to strengthen the most common attack layer – Workforce?
  • How to detect and identify the extent of the attack to significantly decrease the associated risk and lost productivity
bg

16:00 – 17:00

COFFEE & NETWORKING BREAK

bg

17:00 – 19:00

COCKTAIL & AWARDS

bg

Networking Break
& end of Day 1

bg

8:00 - 9:00

Registration & Coffee

9:00 - 9:20

Shielding Digital Identity Ecosystem in Kenya to Boost National Economy
  • Focusing on both adoption and adaptation of the new structures and regulations to enhance cyber resiliency
  • With the advent of transition into cloud services, addressing the security challenges might require a new wider outlook
  • Implementing identity focused security outcomes to curb the mounting data breaches

9:20 - 9:40

Rethinking Network Security in the Flourishing Age of Cloud Services
  • Leveraging the solutions provided by adaptive control and visibility over networks and firewalls
  • Managing permitting access to effectively secure device in the network
  • Minimizing interoperability shortcomings and maximizing an environment that leaves no gap for adversaries to exploit

9:40 - 10:00

Boosting Cyber Capacity Building to Strengthen the Regional Cyber Ecosystem
  • With mounting reliance on internet and ICT services, how will security in cyber space impact good governance, human rights & economic freedom?
  • Developing collective capabilities and facilitating international cooperation and partnership to effectively respond to cyber threats in the digital age
  • Emphasizing the relevance of going beyond technical issues and sharing cyber secure best practices at the international level

10:00 - 10:20

Advocating Inclusivity and Empowering Women in the Battle of Secure Cyberspace
  • Focusing on the need for actionable measures to close the gender workforce and awareness gap
  • Strengthening the power in shared identity in building a strong and resilient cyber security posture
  • Discussing the role of government, civil society, and the private sector in making cyberspace more diverse, inclusive and safe

10:20 - 11:00

Panel Discussion

Privileged Access Management - Reinforcing the Authorisation Control in an Organisation
  • Finding the line between over and under implementation of privileged access to maintain continuous employee productivity
  • Is decentralization the way forward to a secure IT environment? What are the inherent challenges across various verticals to minimize cybersecurity vulnerabilities?
  • Controlling the damage arising from internal and external malfeasance
bg

11:00 - 11:30

NETWORKING BREAK

11:30 - 11:50

The Rise in DDoS Attacks in Kenya Makes it a Hotspot for Cyber Resiliency
  • Focusing on identifying the incoming traffic varying from up-spoofed single source attacks to complex and adaptive multi-vector attacks
  • How to identify the IP address or IP range of attack vendors to mitigate cyber threats?
  • Ensuring network protection from remote botnet infestation that can customize attacks

11:50 - 12:10

Incorporating an Agile but Robust Security Strategy for Quick Recovery from Cyber Attacks
  • Employing a company-wide recovery plan which serves as a lifesaver for different attack scenarios
  • Creating a cyber vault as a backup system by crypto locking the vault storage
  • Analyzing the security gaps in the network and taking prompt measures to bridge and strengthen the system

12:10 - 12:30

Multi-Vector Attack: Fortifying Security Edges of a Growing Digital Landscape
  • Understanding the various entry points used by hackers to infiltrate a network
  • Use of quality threat intelligence to mitigate damaging events in an organizational cyberspace
  • Securing the internal and external perimeters and verifying every entry point before granting access

12:30 - 12:50

Securing the Pocket Device: Protecting the Critical Mobile Device from Data Thefts
  • How safe is public Wi-Fi access? Is it truly free or is the free access traded with personal data theft?
  • Understanding the various threat actors in mobile devices – Credential Stuffing, Brute Forcing & Guessing Attacks
  • How to protect mobile devices from the rigorous phishing attacks?

12:50 - 13:10

Digital Forensics: Leveraging the Power of Threat Intelligence in Recovery and Cyber Investigation
  • With anti-forensics growing powerful, can digital forensics framework ensure user privacy?
  • Focus on cloud forensics with digital transformation pacing up
  • Addressing the factors affecting the integrity and credibility of the digital forensics process – easy implementation, low cost, and the availability of encryption tools
bg

13:10 - 14:00

LUNCH BREAK

14:00 - 14:40

Panel Discussion

Evolving Ransomware Landscape - Ceasing Data Exfiltration and Preventing the Thriving Threat
  • Addressing the vulnerabilities in the system that allow the attackers to penetrate successfully
  • How to use deception-based model to identify the earliest attack stage?
  • How to mitigate user-initiated actions? Categorizing the data based on organizational value

14:40 - 15:00

Cyber Compliance: Setting the Guidelines to Tackle the Unknown
  • With multiple frameworks, is compliance still a major area of confusion for business leaders?
  • Discussing compliance framework for critical data – PII, PHI and Financial Information
  • Understanding the shift from implementing control-based requirements to risk-based requirements
bg

15:00 - 16:30

Networking Break
& end of Day 2