Africa CISO Summit
The Africa CISO Summit
As the digital landscape evolves, the Africa CISO Summit emerges as a critical nexus for cybersecurity thought leadership in the region. This summit, a convergence point for over 200 key decision-makers from across Africa, represents a strategic opportunity in a market where cybersecurity investments are seeing a robust upward trajectory. The African cybersecurity market, is poised for a 11.7% resulting in a market volume of US$3.54bn by 2028, presenting an unparalleled opportunity for sponsors to capitalize on emerging trends and influence key industry stakeholders.
Speaker ListPrivacy is not for sale. It is a valuable asset to protect. Threat is a mirror of security gaps. Cyber-threat is mainly a reflection of our weaknesses. An accurate vision of digital and behavioral gaps is crucial for consistent cyber-resilience.
Topics and Themes
Cyber Threats, Incident Management, and Resilience
Digital Transformation and Cybersecurity Challenges
Data Protection, Privacy and Workforce Development
The Future of Identity and Access Management
Cybersecurity Metrics and Reporting
Target Audience
Chief Information Security Officers (CISOs)
Chief Information Officers (CIOs)
IT Security Managers and Directors
Risk Management Officers
Compliance and Regulatory Officers
Data Protection Officers (DPOs)
Government Officials and Policy Makers
Speakers
David Mugonyi, EBS
Director General, Communications Authority of Kenya (CA)
Celia Mantshiyane
Chief Information Security Officer, MTN South Africa
Engr Harrison Nnaji
Group CISO, FirstBank Nigeria
Bright Gameli Mawudor
Founder, AfricaHackon
William Makatiani
Founder and CEO, Serianu Ltd
Joseph Mathenge
Chief Operations Officer, Serianu Ltd
Harry Hare
Co-Founder and Chairman, dx5
Andrew Karanja
Director, dx5
Russel Okoth
CISO (US), Principal Consultant, Cyberdiligent
Aprielle Oichoe
Senior Advisor Africa, Center for Strategic Cyberspace and International Studies
Francis Mwangi
Group Head - IT Security and Infrastructure, Platcorp Group
Duncan Omani
Chief Information Security Officer, Access Bank Kenya Plc.
Tim Theuri
CISO, M-Pesa Africa
Daniel Adaramola
CISO, SunTrust Bank Nigeria Ltd (NG)
Fredrick Wahome
Vice Chair, Kenya Cybersecurity & Forensics Association (KCSFA)
Thelma Kganagka
Group CISO, Equity Group Holdings Plc (KE)
Joan Mburu
Chief Information Security Officer, Airtel Kenya
Georgina Mukami
Head of ICT Channels Operations, National Bank of Kenya
Rodgers Mumelo
SO-KE CIRT, Communications Authority of Kenya (CA)
Anthony Muiyuro
Partner, Risk Advisory and Cybersecurity Leader, Deloitte (KE)
Richard Muthua
Executive Head - Cloud and Security, Liquid C2
Sunday McDickson Samuel
CEO, SMSAM Systems Ltd
Lt Col David Rom
Founder, GDIS Cyber Intelligence Shield
Prasanna Burri
Group CIO, CISO, Dangote Group (NG)
Shalom Onyibe
CISO, UBA Kenya
Mercy Omollo
President and Board Chair, ISACA Kenya Chapter
Daniel Wakori
Technical Solutions Specialist - Cybersecurity, Liquid C2
Felix Malombe
Executive Director, STEAMLabs Africa (KE)
Nancy Muriithi
Lead Security Engineer, Platcorp Group
Alex Osunga
Cybersecurity Technical Lead, @iLabAfrica IT Security Unit
Hartnell Ndungi
CDO, Absa Bank Kenya (KE)
Laban Nyarera
CISO, Family Bank Ltd
Sam Muthui
CISO, Blurok Africa Ltd (KE)
Michelle Kuria
Regional Marketing Manager, ESET East Africa
Asher Geffen
Advisor and Commercial Lead, Plena Solutions Ltd
Nancy Nderi
Regional Sales Manager - East, West and Central Africa, Cyble Inc.
Dr Kenneth Riany
Manager – ICT, KMTC
Angela Ngava
ICT Risk Manager, National Bank of Kenya (KE)
Ronald Ngugi Maina
Security Specialist, Trans Business Machines (TBM)
Sammy Ongalo
CIO and Head - Innovation and Technology, Anjarwalla & Khanna (ALN)
Noam Krakover
CRO - Cyber Division, IAI/Elta Systems Ltd
George Kisaka
ISACA Kenya Vice President, ISACA Kenya Chapter
Jothi Murugan
Strategic Account Manager, ManageEngine (ZOHO)
Sithembile Songo
Group Head - Information Security, National State-Owned Entity
Mbugua Njihia
Venture Builder and Solution Architect, Gruppo Potente
Evan Miriti
Security Specialist, Trans Business Machines (TBM)
Wilson Maina
Security Specialist, Trans Business Machines (TBM)
Brian Mwau
Business Development Coordinator, Two Rivers Innternational Finance & Innovation Centre
Paul Macharia
Manager - Technology Advisory and Business Intelligence, BDO East Africa
Andrew Mecca
Solutions Architect, Safaricom Plc
Lawrence Muchilwa
Head of Information Security, Governance, Risk and Compliance, Silensec
Kevin Tuei
Cloud and Cybersecurity Consultant
Raymond Kiprotich Bett
CEO, Salaam Technologies
Carol Odero
Head of Content, dx5
Victor Paul
Software Development Lead, dx5
Kevin Namunwa
dxContent Writer, dx5
Ken Mbuki
Business Intelligence Specialist, Moringa School
Patricia Jepkoech
Manager - Cybersecurity Incident Response, Safaricom PLC
Agenda
-
March 20, 2024
Cybersecurity Leadership and Risk Management
-
March 21, 2024
Application Security and Cybersecurity Operations
Registration and Welcome Coffee
Opening Remarks
Andrew Karanja
Director, dx5
Official Opening
David Mugonyi, EBS
Director General, Communications Authority of Kenya (CA)
Emerging Cybersecurity Trends in Africa
Richard Muthua
Executive Head - Cloud and Security, Liquid C2
The Art of Cyber War: Lessons in Leadership From Real-World Cyber Attacks
This explores the strategic and tactical elements of warfare within the digital realm. It analyzes past cyber attacks to extract valuable leadership lessons for defending against and potentially launching future cyber operations.
Engr Harrison Nnaji
Group CISO, FirstBank Nigeria
Tea Break
Leadership in Times of Crisis: Managing Cybersecurity During Major Incidents
Leaders must make rapid, critical decisions to protect digital assets when a major cyber attack occurs. It requires an emphasis on strategies for responding to the crisis while minimising damage.
Joseph Mathenge
Chief Operations Officer, Serianu Ltd
Tim Theuri
CISO, M-Pesa Africa
Sammy Ongalo
CIO and Head - Innovation and Technology, Anjarwalla & Khanna (ALN)
Sithembile Songo
Group Head - Information Security, National State-Owned Entity
Daniel Wakori
Technical Solutions Specialist - Cybersecurity, Liquid C2
Navigating the Evolving Cyber Threat Landscape
Cybersecurity threats are constantly changing – think of new viruses, more advanced hacking techniques, and unexpected targets. There is a need for individuals and organisations to stay informed about these shifts in the threat landscape.
The goal is to continuously adapt security strategies to maintain protection in this ever-evolving digital world.
Ronald Ngugi Maina
Security Specialist, Trans Business Machines (TBM)
Unveiling the Invisible: AI's Role in Real-Time Threat Intelligence
This explores how artificial intelligence (AI) transforms cybersecurity by swiftly detecting and analysing hidden threats. Leveraging vast data streams, AI algorithms provide real-time insights, empowering organizations to proactively defend against evolving cyber risks. This presentation illuminates AI's pivotal role in fortifying cyber resilience through advanced threat intelligence.
Nancy Nderi
Regional Sales Manager - East, West and Central Africa, Cyble Inc.
Lunch
Cyber Resilience: Preparing for the Inevitable Breach
Rodgers Mumelo
SO-KE CIRT, Communications Authority of Kenya (CA)
Fireside Chat
Cyber resilience is a mindset that shifts away from the idea of perfect prevention and instead focuses on preparation for the inevitable cybersecurity breach. It is how organisations remain operational and protect critical assets even when facing a cyber attack.
Mbugua Njihia
Venture Builder and Solution Architect, Gruppo Potente
Engr Harrison Nnaji
Group CISO, FirstBank Nigeria
Machine Learning and Predictive Analytics in Cyber Risk Management
This pair are revolutionising cybersecurity by harnessing the power of data. These tools analyse patterns and historical data to identify potential threats before they strike, uncovering vulnerabilities that traditional methods may miss. This proactive approach strengthens defenses and allows for more informed risk management decisions.
Russel Okoth
CISO (US), Principal Consultant, Cyberdiligent
The CISO’s Dilemma: Balancing Cybersecurity With Business Innovation
CISOs face the challenge of maintaining strong cybersecurity without hindering the company's ability to innovate and grow. New technologies often introduce potential security risks, forcing CISOs to carefully weigh the benefits of innovation against the need to protect sensitive data and systems. This balancing act requires constant vigilance and collaboration between security teams and business leaders.
Michelle Kuria
Regional Marketing Manager, ESET East Africa
Daniel Adaramola
CISO, SunTrust Bank Nigeria Ltd (NG)
Aprielle Oichoe
Senior Advisor Africa, Center for Strategic Cyberspace and International Studies
William Makatiani
Founder and CEO, Serianu Ltd
Shalom Onyibe
CISO, UBA Kenya
Tea Break
Roundtable Discussions
IAM will play a central role in securing the expanding digital landscape of businesses. Advanced IAM solutions will leverage technologies like AI and biometrics for more robust authentication and authorisation. The goal is a frictionless yet secure experience for users, enabling streamlined access to necessary resources while protecting sensitive corporate data.
Victor Paul
Software Development Lead, dx5
Duncan Omani
Chief Information Security Officer, Access Bank Kenya Plc.
Noam Krakover
CRO - Cyber Division, IAI/Elta Systems Ltd
Kevin Tuei
Cloud and Cybersecurity Consultant
Jothi Murugan
Strategic Account Manager, ManageEngine (ZOHO)
Selecting the right cybersecurity data to track (metrics) and presenting it to company leadership (the board) in a clear and understandable way cannot be overestimated. Sound reporting helps the board grasp the importance of cybersecurity investments and understand the level of risk the company faces. This is crucial for securing resources and aligning cybersecurity goals with overall business strategy.
Carol Odero
Head of Content, dx5
Thelma Kganagka
Group CISO, Equity Group Holdings Plc (KE)
Anthony Muiyuro
Partner, Risk Advisory and Cybersecurity Leader, Deloitte (KE)
Laban Nyarera
CISO, Family Bank Ltd
Lawrence Muchilwa
Head of Information Security, Governance, Risk and Compliance, Silensec
Dr Kenneth Riany
Manager – ICT, KMTC
Registration
Get Hacked! Inside the Mind of a Hacker: See a Live Hacking Demo and Stay One Step Ahead
Bright Gameli Mawudor
Founder, AfricaHackon
Balancing Risk and Innovation in Cybersecurity
Businesses need to embrace new technologies to remain competitive, but these innovations often introduce new cybersecurity risks. The challenge lies in finding a balance between adopting beneficial technologies and implementing the necessary security measures to protect those technologies. Successful cybersecurity in this context means carefully assessing risks and continuously adapting security strategies to match a changing digital environment.
Celia Mantshiyane
Chief Information Security Officer, MTN South Africa
Tea Break
The Future-Forward Approach to Data Privacy and Security
An approach focusing on proactive and adaptable strategies to protect sensitive information in a dynamic digital landscape. It recognises that as technology and regulations change, security solutions must evolve too. Key elements include ongoing risk assessment, robust encryption, user privacy controls, and continuous education to counter potential threats and ensure compliance with privacy laws.
Ken Mbuki
Business Intelligence Specialist, Moringa School
Celia Mantshiyane
Chief Information Security Officer, MTN South Africa
Angela Ngava
ICT Risk Manager, National Bank of Kenya (KE)
Hartnell Ndungi
CDO, Absa Bank Kenya (KE)
Paul Macharia
Manager - Technology Advisory and Business Intelligence, BDO East Africa
The Threat of Rogue Devices in Organisations
Rogue devices represent a significant risk to organisations. They can introduce malware, leading to the theft of sensitive data or unauthorised network access. Unmanaged rogue devices also strain network resources, impacting productivity. Additionally, they expose a company to fines and legal consequences for failing to meet security regulations.
Sunday McDickson Samuel
CEO, SMSAM Systems Ltd
Lunch Break
Cybersecurity Orchestration and Automation: Boosting Efficiency and Response
By connecting various security tools and automating repetitive security tasks, organisations can significantly improve the way they respond to cyber threats. This approach leads to faster detection and resolution of security incidents, allowing security teams to work more efficiently. It also ensures that security procedures are carried out consistently, reducing the risk of human error.
Patricia Jepkoech
Manager - Cybersecurity Incident Response, Safaricom PLC
Prasanna Burri
Group CIO, CISO, Dangote Group (NG)
Engr Harrison Nnaji
Group CISO, FirstBank Nigeria
Francis Mwangi
Group Head - IT Security and Infrastructure, Platcorp Group
Fredrick Wahome
Vice Chair, Kenya Cybersecurity & Forensics Association (KCSFA)
Evan Miriti
Security Specialist, Trans Business Machines (TBM)
Cloud Security: Protecting Data In A Multi-Cloud Environment
As businesses increasingly use multiple cloud providers, ensuring robust data security becomes more complex. This requires implementing consistent security policies across different cloud environments, utilising strong encryption, and carefully managing access controls. Centralised visibility and monitoring tools are key to quickly identifying and responding to potential threats in this distributed landscape.
Lt Col David Rom
Founder, GDIS Cyber Intelligence Shield
Future-Proofing Cybersecurity Operations: Preparing for Tomorrow's Threats
Focusing on proactively evolving security strategies is essential to stay ahead of constantly changing cyber threats. It involves anticipating the tactics used by attackers and identifying potential weaknesses in technology. The goal is to build a resilient and adaptable cybersecurity system that can withstand unforeseen challenges.
Thelma Kganagka
Group CISO, Equity Group Holdings Plc (KE)
Tea Break
Roundtables
Mitigate. Detect. Prevent. Insider threats, security risks from those with authorised access, needs a multi-faceted approach. One focused on limiting access, monitoring behavior, and fostering a security-conscious culture. Key strategies include strict access controls, employee awareness training, and tools for detecting unusual activity.
Raymond Kiprotich Bett
CEO, Salaam Technologies
Joan Mburu
Chief Information Security Officer, Airtel Kenya
Felix Malombe
Executive Director, STEAMLabs Africa (KE)
George Kisaka
ISACA Kenya Vice President, ISACA Kenya Chapter
Brian Mwau
Business Development Coordinator, Two Rivers Innternational Finance & Innovation Centre
Andrew Mecca
Solutions Architect, Safaricom Plc
Next-Gen SOCs (Security Operations Centers) are the nerve centers of modern cybersecurity, evolving to meet ever-changing threats. They leverage advanced technologies like AI and automation to detect and respond to attacks faster and more intelligently. These modernised centres focus on proactive threat hunting and seamless integration with other security systems.