Smart Cloud and Security Summit




Smart Cloud and Security
The proliferation of cloud services and the advent of new development methodologies like DevOps are creating unprecedented possibilities, driving many organizations to migrate to the cloud and modernize existing applications. This evolution presents opportunities for business growth through accelerated development, enhanced scalability and collaboration, new revenue streams, business agility, and greater technical resilience.
Speaker List

As these deployments mature and more data and business functions are hosted in the cloud, there is increasing awareness that benefits can be wiped out by costly regulatory missteps and damaging cyber attacks if security is not woven into the transformation process.
But buying and selling into the lucrative cybersecurity marketplace can be a painful experience, on both sides.
Buyers are overwhelmed by vendor cold calls, unsolicited LinkedIn outreach, buzzword-overuse and confusing product descriptions. For sellers with high-quality products and innovative solutions, cutting through the noise and bringing clarity to the buying process can be quite a challenge.
The Summit will explore and discuss several emerging trends in cloud computing and cybersecurity including edge computing, serverless cloud, artificial intelligence in the cloud and how to secure the multi-cloud, modernization of web application security, organization-wide cloud security posture management and AI for cloud security intelligence.
Target Industries
Manufacturing and Supply Chain
Hospitality and Service
Transport and Logistics
Healthcare
Education
Security
Retail
Government
Sacco
Speakers

Harry Hare
Chairman, dx5Group
Harry has 25 years of experience in the tech industry. He's the founder and the Executive Director of Kenya-founded DEMO Africa, a launchpad for emerging technologies and trends on the continent. He's also the Co-founder and Director of the African eDevelopment Resource Centre; Co-founder and Director of the Events Management Solutions.

Diana Majimbo
Manager - Cyber and Intelligence, East Africa, Mastercard

Richard Muthua
Executive Head, Cloud and Cyber Security - Liquid Intelligent Technologies
Richard Muthua is a seasoned technology solutions architect and the current Executive Head for Cloud and Cyber Security at Liquid Intelligent Technologies. Richard joined the organization in April 2021 as the Head of Solutions and Corporate Sales after which he earned his current role as the head of Cloud and Cyber Security in East Africa.

Edgar Okioga
Area Head Digital Business Solutions West & Central Africa, BAT
Edgar is a a skilled professional with more than four years experience in engineering environment and more than twenty years in the information technology field. He has a proven record of strong analytical, leadership, communication, execution and organizational skills.

Kabuthia Riunge
Group Head, Cybersecurity (CISO), KCB Bank Group
A seasoned thought leader with a proven track record of formulating and delivering transformative changes in the areas of strategy, cybersecurity, risk management, information security governance and people management. Leads teams in assessing risks, developing strategies, architecting and implementing solutions to mitigate risks, in order to enable organizations create value for their stakeholders through benefits realization and resource optimization.

Sumeeth Singh
Cloud Provider Manager, Sub-Saharan Africa, VMware
Sumeeth is responsible for building and growing the VMware cloud footprint within the territory by enabling VMware Cloud Provider partners with the strategic and technical input required to grow their businesses. He leverages his over 20-year experience, knowledge and understanding of multi-cloud, business strategy and sales development, coupled with his critical and analytical thinking skills, to help cross-functional teams and customers embrace the transformative and disruptive thinking required for cloud success.
Agenda
-
Day 01
March 16, 2023
-
Day 02
March 17, 2023
Keynote Breakfast Panel - The Future of Cloud Computing: Opportunities and Challenges
Cloud computing has become an increasingly popular technology for businesses of all sizes, offering numerous advantages such as increased agility, scalability, and cost savings. The opportunities of cloud computing are expected to expand in the future, with the potential for even greater innovations and new business models. However, along with the opportunities come challenges, such as data privacy and security concerns, dependence on third-party providers, vendor lock-in, complexity of managing multiple cloud environments, and lack of in-house expertise and skills. These challenges need to be addressed in order to fully realise the benefits of cloud computing. Looking ahead, the future of cloud computing is expected to bring even more advancements, such as serverless computing, edge computing, and AI-based cloud services. There is also a growing focus on data privacy and security.

Harry Hare
Chairman, dx5Group

Phares Kariuki
CEO, Pure Infrastructure Limited

Richard Muthua
Executive Head, Cloud and Cyber Security - Liquid Intelligent Technologies
Opening Remarks & Introduction to Keynote Speaker

Harry Hare
Chairman, dx5Group
Migrations To The Cloud: How To Become Cloud Native
Migrating to the cloud can provide numerous benefits, such as increased scalability, reduced costs, and improved reliability. However, simply moving your existing applications to the cloud may not fully leverage the potential benefits of cloud computing. To truly become cloud native, you need to adopt cloud-native practices and architectures.

Michael Michie
CTO, Solv
Introduction to Panel 2
Power Up: Accelerating Cloud Adoption in the Enterprise
Cloud adoption is becoming increasingly important for enterprises to remain competitive in today's digital landscape. While many organisations have already made significant progress in their cloud adoption journey, there is still a need to accelerate this process to fully realise the benefits of cloud technology. One of the main challenges in accelerating cloud adoption is overcoming the cultural resistance to change. Many organisations have established processes and infrastructure that are deeply ingrained in their culture, making it difficult to adapt to new technologies and approaches. Another challenge is the lack of skills and expertise required to manage and optimise cloud-based infrastructure. This can lead to increased costs and reduced efficiency, as well as potential security risks.

Makale Benson
Head - Banking Applications and Services, I&M Bank Ltd

Dan Kwach
Managing Director, East Africa Region, Africa Data Centres

Riyaz Bachani
CEO, Angani Ltd.

Patrick Ndegwa
Business Sales Lead, SEACOM Ltd

David Murimi
CEO and Co-Founder, Cloudoon
Introduction to Speaker 2
Breaking the Bank? Optimise the Cloud Instead.
To achieve this, businesses can implement strategies such as monitoring and analysing cloud usage, identifying unnecessary or redundant resources, and optimising resource allocation based on actual usage. Additionally, businesses can consider implementing automation tools to reduce manual work and improve efficiency. By focusing on cloud optimisation, businesses can save costs, reduce wastage of resources, and make the most of their cloud investment. Ultimately, this can help businesses improve their bottom line, while still achieving their cloud-based goals.

Joylynn Kirui
Senior Cloud Security Advocate, Microsoft
Introduction to Panel 3
Set the Vendors Free: Don’t Get Locked in the Cloud
Vendor lock-in can be a major challenge for CIOs when adopting cloud technology, as it limits their ability to switch to another provider or technology if the current one is no longer meeting their needs. This can occur due to a variety of factors, such as proprietary technologies and platforms, complex integration and customisation, contractual restrictions, or dependencies on unique features or services. It can limit an organisation's ability to respond to changing business needs or to take advantage of new technologies and innovations that are not supported by the current vendor. It makes it difficult to negotiate favourable terms or pricing, as one is limited to a particular vendor's technology. Strategy can help mitigate this risk.

Carol Odero
Head of Content, dx5

Duncan Eric Ogonji
Principal Cloud Adoption Manager, Oracle

Warren Hero
CIO/CDO, Webber Wentzel

Alex Karanja
CIO, Naivas

Aunally Maloo
Group CEO, CLC Africa
The Big Secret to Cloud Adoption - Culture Shift
As organisations move their IT resources to the cloud, it's essential to bring everyone along, including employees, partners, and customers. Cloud adoption requires a cultural shift in how an organization operates, with everyone needing to understand and embrace the new technologies, tools, and processes that cloud computing brings. This requires ongoing education and training programs to ensure that employees have the necessary skills and knowledge to use cloud-based resources effectively. Additionally, organizations must communicate the benefits of cloud computing to customers and partners to ensure that they are also on board with the organization's cloud strategy.

Sumeeth Singh
Cloud Provider Manager, Sub-Saharan Africa, VMware
Lunch Break
Introduction to Speaker 4
Protect Your Data and Choose the Company You Keep
The company you choose to store and manage your data must have robust data protection policies, strong encryption capabilities, and a solid incident response plan in place. It is also essential to ensure that your service provider is compliant with relevant data protection regulations, such as the General Data Protection Regulation (GDPR). Additionally, it is recommended that you assess your service provider's security practices, such as access controls, network security, and physical security measures. By thoroughly evaluating your service provider, you can ensure that your data is in safe hands and that your privacy is protected.

Hartnell Ndungi
CDO, Absa Bank Kenya
Introduction to Panel 4
Think Smarter: Innovations Driving the Future of Cloud Computing
These innovations are aimed at making cloud computing more accessible, secure, and efficient. One such innovation is the rise of hybrid cloud architectures, which enable businesses to run applications and store data across public and private cloud environments. Another innovation is the emergence of serverless computing, which eliminates the need for businesses to manage infrastructure and enables them to focus on developing applications. Artificial intelligence (AI) and machine learning (ML) are also playing a significant role in the future of cloud computing, as businesses use these technologies to automate processes and gain insights from large volumes of data. Finally, the development of edge computing is bringing computing power closer to where it is needed, enabling faster processing and reducing latency. All of these innovations are driving the future of cloud computing and making it an increasingly essential part of modern business operations.

Kevin Namunwa
Tech Writer, dx⁵

Moses Okundi
CIO/CTO, Absa Bank Kenya

Edgar Okioga
Area Head Digital Business Solutions West & Central Africa, BAT

Peter Muchemi Muriithi
Co-Founder and CEO, FaidiHR

Lee Syse
Lead Cloud Solutions Architect - Cloud Providers SSA, VMware
Coffee Break
Welcome Remarks and Introduction

Harry Hare
Chairman, dx5Group
Mind Shift Wanted: Enforcing the Zero Trust Approach
This topic will explore the challenges and opportunities involved in enforcing a zero trust approach to cybersecurity, including the strategies and best practices that can be used to identify, assess, and mitigate risks in a more dynamic and adaptable way. The discussion will delve into specific cases and examples, highlighting the challenges and opportunities for promoting a culture of risk awareness and accountability across the organisation.

Anthony Muiyuro
Partner, Risk Advisory & Cybersecurity Leader, Deloitte East Africa
Introduction to CISO Fireside Chat
Managing an Evolving Threat Landscape: A Case for Cybersecurity
Managing an evolving threat landscape requires a proactive and multi-layered approach to cybersecurity. Organisations must be prepared to continuously assess and update their security strategies to stay ahead of emerging threats and protect sensitive data from cybercriminals. By taking a strategic and comprehensive approach to cybersecurity, organisations can reduce the risk of security incidents and minimise the potential impact of any breaches that do occur.

Harry Hare
Chairman, dx5Group

Thelma Kganagka
Group CISO, Equity Bank PLC

Kabuthia Riunge
Group Head, Cybersecurity (CISO), KCB Bank Group

Francis Mwangi Wokabi
Group Head, IT Security & Infrastructure, Platcorp Holdings Limited
Coffee Break
An opportunity to network over a cup of coffee
Introduction to Speaker 2
Minimising Touchpoints: Can You Really Secure Your Digital Supply Chain?
Securing a digital supply chain is certainly possible, but it requires a comprehensive approach that includes risk management, the adoption of best practices and protocols, and the use of appropriate technologies. By taking proactive measures to secure their digital supply chains, organisations can reduce the risk of cybersecurity incidents and ensure that their data remains safe and confidential.

Shalom Onyibe
Head of Cybersecurity Assurance Services, Cyber1 Solutions (formerly ProTec)
Introduction to Panel 2
Regulator as an Ally: Creating a Legal Framework for Security Posture
Cybersecurity has become an increasingly important area of concern for both organizations and regulators. As the frequency and severity of cyber attacks continues to rise, many regulators are recognizing the need to take a more proactive approach to cybersecurity regulation. One approach to this is to create a legal framework that encourages collaboration between regulators and organizations, with the goal of improving overall security posture.

Bonface Asiligwa
Manager - IT, Infrastructure & Security, Kenya Trade Network Agency

George Kisaka
Information Security GRC Lead, Yellow Card Financial

Fredrick Wahome
Vice Chairman, Kenya Cybersecurity and Forensics Association (KCSFA)

Lewis Miriti
Cybersecurity Compliance and Identity Specialist, Microsoft
Lunch Break
Align Internal Cybersecurity Practices With Third-Party Risk Management
When businesses work with third-party vendors, they are sharing sensitive information and data that could be compromised if the vendor's cybersecurity practices are inadequate. By aligning internal cybersecurity practices with third-party risk management, businesses can ensure that their vendors are following appropriate cybersecurity protocols and that their own cybersecurity practices are compatible with those of their vendors. This alignment can involve a range of measures, such as reviewing vendor security assessments, establishing vendor security requirements, and providing cybersecurity training to employees who work with third-party vendors. By taking a proactive approach to third-party risk management, businesses can mitigate potential cyber threats and protect their data and reputation.

Amos Njogu
CISO, Faulu Bank
Introduction to Panel 3
dxNova Panel - Armed to the Teeth: What Next-Gen Cybersecurity Professionals Need to Know
Next-generation cybersecurity professionals must be armed with a range of skills and knowledge to protect their organizations from increasingly sophisticated cyber threats. These skills may include proficiency in AI & ML, the ability to develop and implement effective security policies and procedures, and expertise in emerging technologies such as blockchain and IoT. They must also have strong communication skills to effectively educate and inform their colleagues about cybersecurity best practices and to respond to incidents. Finally, they must stay up to date with the latest cybersecurity trends and be able to adapt their skills and knowledge to the rapidly changing cybersecurity landscape.

Carol Odero
Head of Content, dx5

Judy Ngure
Data and Information Security Analyst, also Advisory Board Member, Cyber Girls

Aprielle Oichoe
Director - Information Security and Risk, InfoSphere Ltd

Frank Karuganda
Information Security Manager, Unguka Bank PLC, Rwanda

Mwende Stardust
Committee Chair ICT, Law Society of Kenya
Introduction to Speaker 3
Building a Cyber-Resilient Society: Best Practices for Small and Medium Enterprises
In today's digital age, cyber threats are becoming increasingly sophisticated and frequent. Small and medium enterprises (SMEs) are often vulnerable targets for cyber-attacks due to a lack of resources and expertise to adequately protect themselves. In the face of these challenges, it is crucial that SMEs adopt a proactive approach to cybersecurity and develop a cyber-resilient society. This topic aims to explore the best practices that SMEs can adapt to become more cyber-resilient, including risk assessment, training and awareness programs, data protection, incident response, and crisis management. By implementing these practices, SMEs can enhance their cybersecurity posture and protect their businesses and customers from the adverse impacts of cyber-attacks.

Diana Majimbo
Manager - Cyber and Intelligence, East Africa, Mastercard
Introduction to Panel 4
The Ethics of Cybersecurity: Addressing Issues of Hacking, Surveillance, and Human Rights
The intersection of cybersecurity and human rights is a rapidly evolving and complex topic that has far-reaching implications for individuals, organisations, and governments around the world. With the rise of sophisticated cyberattacks and the growing use of surveillance technologies, ethical questions have emerged around the use of hacking, surveillance, and other cybersecurity measures. Through the panel discussion, we aim to provide a nuanced and multifaceted understanding of the ethical considerations involved in the field of cybersecurity, and to promote best practices for addressing these challenges in a responsible and ethical manner.

Rosemary Koech-Kimwatu
Data Protection Officer, Risk Division, KCB Group

Richard Muthua
Executive Head, Cloud and Cyber Security - Liquid Intelligent Technologies

Nancy Muriithi
Programmes Lead, SheHacksKE and Security Consultant, Silensec

Mercy Mutemi
Managing Partner, Nzili and Sumbi Advocates
Making Trade-Offs: Balancing Privacy and Security in the Digital Age
As digital technologies continue to transform our lives, the trade-offs between privacy and security have become a critical and pressing issue. Governments, corporations, and individuals face complex decisions about how to balance the need for security with the desire for privacy, often in situations where the two may be in conflict. Through the discussion, we aim to provide a nuanced and multifaceted understanding of the complex trade-offs involved in the field of digital security and privacy, and to promote best practices for addressing these challenges in a responsible and ethical manner.

Francis Mwangi Wokabi
Group Head, IT Security & Infrastructure, Platcorp Holdings Limited
Coffee Break
Another chance to network over a cup of coffee
Sponsors


Africa Data Centres
Africa Data Centres is your trusted partner for rapid and secure data centre services and interconnections across the African continent. Africa Data Centres is one of Africa's largest network of interconnected, carrier and cloud-neutral data centre facilities. Bringing international experts to the pan-African market. We are your trusted partner for rapid and secure data centre services and interconnections across the African continent. Strategically located, our world-class facilities provide a home for all your business-critical data. Proudly African, we are dedicated to being the heart that beats your business. Africa Data Centres' aim is to unveil various business opportunities and to develop a strategic network of partnerships. This will further strengthen Africa Data Centres' superiority in providing our customers with the highest standard of interconnected, carrier and cloud-neutral data centre facilities throughout Africa.


Seacom
Through its ownership of Africa’s most extensive ICT data infrastructure – including multiple subsea cables, a resilient, continent-wide IP-MPLS network, and Metro Fibre in major African Cities – SEACOM provides a full suite of flexible, scalable and high-quality communications and cloud solutions that enable the growth of the continent’s economy. SEACOM is privately owned and operated, allowing the company the agility to rapidly tailor-make and deploy new services, commercial models, and infrastructure in response to customer requirements. Without the red tape or hidden costs often prevalent in this industry. SEACOM launched Africa’s first broadband submarine cable system along the continent’s Eastern and Southern coasts in 2009. Today SEACOM is the preferred partner for African businesses, network carriers, and service providers.


Liquid Cloud and Cybersecurity - C2
Liquid C2 is a business of Cassava Technology, a pan-African technology group, and the Liquid division was launched to offer customers managed cloud and security services, product solutions, and related professional and advisory services to customers in 22 African countries. The business operates Africa's widest Azure Stack deployment across four countries and deployed the only African Cyber Security Fusion Centres in South Africa and Kenya with another four to be launched in 2023. Liquid C2 was selected as an Operator Connect launch partner by Microsoft in six countries. Liquid C2 was a finalist in the Microsoft Partner of the Year 2021 and 2022, the New Partner of the Year for Cloudflare in 2022, and a Microsoft Partner of the Year in Ethiopia in 2022.