Working Hours Monday - Friday 08:00-16:00
Toll Free 1800.899.900

Smart Cloud and Security Summit

March 16 - 17, 2023
Mercure Hotel (formerly Crown Plaza), Upper Hill, Nairobi (also happening virtually)
welcome

Smart Cloud and Security

The proliferation of cloud services and the advent of new development methodologies like DevOps are creating unprecedented possibilities, driving many organizations to migrate to the cloud and modernize existing applications. This evolution presents opportunities for business growth through accelerated development, enhanced scalability and collaboration, new revenue streams, business agility, and greater technical resilience.

Speaker List

As these deployments mature and more data and business functions are hosted in the cloud, there is increasing awareness that benefits can be wiped out by costly regulatory missteps and damaging cyber attacks if security is not woven into the transformation process.

But buying and selling into the lucrative cybersecurity marketplace can be a painful experience, on both sides.

Buyers are overwhelmed by vendor cold calls, unsolicited LinkedIn outreach, buzzword-overuse and confusing product descriptions. For sellers with high-quality products and innovative solutions, cutting through the noise and bringing clarity to the buying process can be quite a challenge.

The Summit will explore and discuss several emerging trends in cloud computing and cybersecurity including edge computing, serverless cloud, artificial intelligence in the cloud and how to secure the multi-cloud, modernization of web application security, organization-wide cloud security posture management and AI for cloud security intelligence.

topics

Target Industries

Banking and Financial Services

Manufacturing and Supply Chain

Hospitality and Service

Transport and Logistics

Healthcare

Education

Security

Retail

Government

Sacco

Speakers

Speakers

Dan Kwach

Managing Director, East Africa Region, Africa Data Centres

Harry Hare

Chairman, dx5Group

Moses Okundi

CIO/CTO, Absa Bank Kenya

Diana Majimbo

Manager - Cyber and Intelligence, East Africa, Mastercard

Richard Muthua

Executive Head, Cloud and Cyber Security - Liquid Intelligent Technologies

Francis Mwangi Wokabi

Group Head, IT Security & Infrastructure, Platcorp Holdings Limited

Edgar Okioga

Area Head Digital Business Solutions West & Central Africa, BAT

Patrick Ndegwa

Business Sales Lead, SEACOM Ltd

Phares Kariuki

CEO, Pure Infrastructure Limited

Kabuthia Riunge

Group Head, Cybersecurity (CISO), KCB Bank Group

Thelma Kganagka

Group CISO, Equity Bank PLC

Bonface Asiligwa

Manager - IT, Infrastructure & Security, Kenya Trade Network Agency

George Kisaka

Information Security GRC Lead, Yellow Card Financial

Nancy Muriithi

Programmes Lead, SheHacksKE and Security Consultant, Silensec

Fredrick Wahome

Vice Chairman, Kenya Cybersecurity and Forensics Association (KCSFA)

Duncan Eric Ogonji

Principal Cloud Adoption Manager, Oracle

Warren Hero

CIO/CDO, Webber Wentzel

Peter Muchemi Muriithi

Co-Founder and CEO, FaidiHR

Amos Njogu

CISO, Faulu Bank

Aprielle Oichoe

Director - Information Security and Risk, InfoSphere Ltd

Carol Odero

Head of Content, dx5

Rosemary Koech-Kimwatu

Data Protection Officer, Risk Division, KCB Group

Riyaz Bachani

CEO, Angani Ltd.

Anthony Muiyuro

Partner, Risk Advisory & Cybersecurity Leader, Deloitte East Africa

Lewis Miriti

Cybersecurity Compliance and Identity Specialist, Microsoft

Alex Karanja

CIO, Naivas

Aunally Maloo

Group CEO, CLC Africa

Frank Karuganda

Information Security Manager, Unguka Bank PLC, Rwanda

Mercy Mutemi

Managing Partner, Nzili and Sumbi Advocates

Michael Michie

CTO, Solv

Shalom Onyibe

Head of Cybersecurity Assurance Services, Cyber1 Solutions (formerly ProTec)

Lee Syse

Lead Cloud Solutions Architect - Cloud Providers SSA, VMware

Hartnell Ndungi

CDO, Absa Bank Kenya

Joylynn Kirui

Senior Cloud Security Advocate, Microsoft

Makale Benson

Head - Banking Applications and Services, I&M Bank Ltd

David Murimi

CEO and Co-Founder, Cloudoon

Sumeeth Singh

Cloud Provider Manager, Sub-Saharan Africa, VMware

Fraiser Kilonzo

Cybersecurity Engineer, CyberGuard Africa

Judy Ngure

Data and Information Security Analyst, also Advisory Board Member, Cyber Girls

Mwende Stardust

Committee Chair ICT, Law Society of Kenya

Kevin Namunwa

Tech Writer, dx⁵

agenda

Agenda

  • Day 01

    March 16, 2023

  • Day 02

    March 17, 2023

09:00 AM - 10:00 AM
Panel Discussion

Keynote Breakfast Panel - The Future of Cloud Computing: Opportunities and Challenges

Cloud computing has become an increasingly popular technology for businesses of all sizes, offering numerous advantages such as increased agility, scalability, and cost savings. The opportunities of cloud computing are expected to expand in the future, with the potential for even greater innovations and new business models. However, along with the opportunities come challenges, such as data privacy and security concerns, dependence on third-party providers, vendor lock-in, complexity of managing multiple cloud environments, and lack of in-house expertise and skills. These challenges need to be addressed in order to fully realise the benefits of cloud computing. Looking ahead, the future of cloud computing is expected to bring even more advancements, such as serverless computing, edge computing, and AI-based cloud services. There is also a growing focus on data privacy and security.

Harry Hare

Chairman, dx5Group

moderator

Phares Kariuki

CEO, Pure Infrastructure Limited

panelist

Richard Muthua

Executive Head, Cloud and Cyber Security - Liquid Intelligent Technologies

panelist
10:00 AM - 10:15 AM

Opening Remarks & Introduction to Keynote Speaker

Harry Hare

Chairman, dx5Group

speaker
10:15 AM - 10:35 AM

Migrations To The Cloud: How To Become Cloud Native

Migrating to the cloud can provide numerous benefits, such as increased scalability, reduced costs, and improved reliability. However, simply moving your existing applications to the cloud may not fully leverage the potential benefits of cloud computing. To truly become cloud native, you need to adopt cloud-native practices and architectures.

Michael Michie

CTO, Solv

speaker
10:35 AM - 10:40 AM

Introduction to Panel 2

10:40 AM - 11:10 AM
Panel Discussion

Power Up: Accelerating Cloud Adoption in the Enterprise

Cloud adoption is becoming increasingly important for enterprises to remain competitive in today's digital landscape. While many organisations have already made significant progress in their cloud adoption journey, there is still a need to accelerate this process to fully realise the benefits of cloud technology. One of the main challenges in accelerating cloud adoption is overcoming the cultural resistance to change. Many organisations have established processes and infrastructure that are deeply ingrained in their culture, making it difficult to adapt to new technologies and approaches. Another challenge is the lack of skills and expertise required to manage and optimise cloud-based infrastructure. This can lead to increased costs and reduced efficiency, as well as potential security risks.

Makale Benson

Head - Banking Applications and Services, I&M Bank Ltd

moderator

Dan Kwach

Managing Director, East Africa Region, Africa Data Centres

panelist

Riyaz Bachani

CEO, Angani Ltd.

panelist

Patrick Ndegwa

Business Sales Lead, SEACOM Ltd

panelist

David Murimi

CEO and Co-Founder, Cloudoon

panelist
11:10 AM - 11:15 AM

Introduction to Speaker 2

11:15 AM - 11:30 AM

Breaking the Bank? Optimise the Cloud Instead.

To achieve this, businesses can implement strategies such as monitoring and analysing cloud usage, identifying unnecessary or redundant resources, and optimising resource allocation based on actual usage. Additionally, businesses can consider implementing automation tools to reduce manual work and improve efficiency. By focusing on cloud optimisation, businesses can save costs, reduce wastage of resources, and make the most of their cloud investment. Ultimately, this can help businesses improve their bottom line, while still achieving their cloud-based goals.

Joylynn Kirui

Senior Cloud Security Advocate, Microsoft

speaker
11:50 AM - 11:55 AM

Introduction to Panel 3

11:55 AM - 12:25 PM
Panel Discussion

Set the Vendors Free: Don’t Get Locked in the Cloud

Vendor lock-in can be a major challenge for CIOs when adopting cloud technology, as it limits their ability to switch to another provider or technology if the current one is no longer meeting their needs. This can occur due to a variety of factors, such as proprietary technologies and platforms, complex integration and customisation, contractual restrictions, or dependencies on unique features or services. It can limit an organisation's ability to respond to changing business needs or to take advantage of new technologies and innovations that are not supported by the current vendor. It makes it difficult to negotiate favourable terms or pricing, as one is limited to a particular vendor's technology. Strategy can help mitigate this risk.

Carol Odero

Head of Content, dx5

moderator

Duncan Eric Ogonji

Principal Cloud Adoption Manager, Oracle

panelist

Warren Hero

CIO/CDO, Webber Wentzel

panelist

Alex Karanja

CIO, Naivas

panelist

Aunally Maloo

Group CEO, CLC Africa

panelist
12:25 PM - 12:40 PM

The Big Secret to Cloud Adoption - Culture Shift

As organisations move their IT resources to the cloud, it's essential to bring everyone along, including employees, partners, and customers. Cloud adoption requires a cultural shift in how an organization operates, with everyone needing to understand and embrace the new technologies, tools, and processes that cloud computing brings. This requires ongoing education and training programs to ensure that employees have the necessary skills and knowledge to use cloud-based resources effectively. Additionally, organizations must communicate the benefits of cloud computing to customers and partners to ensure that they are also on board with the organization's cloud strategy.

Sumeeth Singh

Cloud Provider Manager, Sub-Saharan Africa, VMware

speaker
12:40 PM - 01:50 PM

Lunch Break

02:25 PM - 02:30 PM

Introduction to Speaker 4

02:30 PM - 02:55 PM

Protect Your Data and Choose the Company You Keep

The company you choose to store and manage your data must have robust data protection policies, strong encryption capabilities, and a solid incident response plan in place. It is also essential to ensure that your service provider is compliant with relevant data protection regulations, such as the General Data Protection Regulation (GDPR). Additionally, it is recommended that you assess your service provider's security practices, such as access controls, network security, and physical security measures. By thoroughly evaluating your service provider, you can ensure that your data is in safe hands and that your privacy is protected.

Hartnell Ndungi

CDO, Absa Bank Kenya

speaker
02:55 PM - 03:00 PM

Introduction to Panel 4

03:00 PM - 03:30 PM
Panel Discussion

Think Smarter: Innovations Driving the Future of Cloud Computing

These innovations are aimed at making cloud computing more accessible, secure, and efficient. One such innovation is the rise of hybrid cloud architectures, which enable businesses to run applications and store data across public and private cloud environments. Another innovation is the emergence of serverless computing, which eliminates the need for businesses to manage infrastructure and enables them to focus on developing applications. Artificial intelligence (AI) and machine learning (ML) are also playing a significant role in the future of cloud computing, as businesses use these technologies to automate processes and gain insights from large volumes of data. Finally, the development of edge computing is bringing computing power closer to where it is needed, enabling faster processing and reducing latency. All of these innovations are driving the future of cloud computing and making it an increasingly essential part of modern business operations.

Kevin Namunwa

Tech Writer, dx⁵

moderator

Moses Okundi

CIO/CTO, Absa Bank Kenya

panelist

Edgar Okioga

Area Head Digital Business Solutions West & Central Africa, BAT

panelist

Peter Muchemi Muriithi

Co-Founder and CEO, FaidiHR

panelist

Lee Syse

Lead Cloud Solutions Architect - Cloud Providers SSA, VMware

panelist
03:30 PM - 04:30 PM

Coffee Break

10:00 AM - 10:15 AM

Welcome Remarks and Introduction

Harry Hare

Chairman, dx5Group

speaker
10:15 AM - 10:30 AM

Mind Shift Wanted: Enforcing the Zero Trust Approach

This topic will explore the challenges and opportunities involved in enforcing a zero trust approach to cybersecurity, including the strategies and best practices that can be used to identify, assess, and mitigate risks in a more dynamic and adaptable way. The discussion will delve into specific cases and examples, highlighting the challenges and opportunities for promoting a culture of risk awareness and accountability across the organisation.

Anthony Muiyuro

Partner, Risk Advisory & Cybersecurity Leader, Deloitte East Africa

speaker
10:30 AM - 10:35 AM

Introduction to CISO Fireside Chat

10:35 AM - 11:05 AM
Panel Discussion

Managing an Evolving Threat Landscape: A Case for Cybersecurity

Managing an evolving threat landscape requires a proactive and multi-layered approach to cybersecurity. Organisations must be prepared to continuously assess and update their security strategies to stay ahead of emerging threats and protect sensitive data from cybercriminals. By taking a strategic and comprehensive approach to cybersecurity, organisations can reduce the risk of security incidents and minimise the potential impact of any breaches that do occur.

Harry Hare

Chairman, dx5Group

moderator

Thelma Kganagka

Group CISO, Equity Bank PLC

panelist

Kabuthia Riunge

Group Head, Cybersecurity (CISO), KCB Bank Group

panelist

Francis Mwangi Wokabi

Group Head, IT Security & Infrastructure, Platcorp Holdings Limited

panelist
11:05 AM - 11:30 AM

Coffee Break

An opportunity to network over a cup of coffee

11:30 AM - 11:35 AM

Introduction to Speaker 2

11:35 AM - 11:50 AM

Minimising Touchpoints: Can You Really Secure Your Digital Supply Chain?

Securing a digital supply chain is certainly possible, but it requires a comprehensive approach that includes risk management, the adoption of best practices and protocols, and the use of appropriate technologies. By taking proactive measures to secure their digital supply chains, organisations can reduce the risk of cybersecurity incidents and ensure that their data remains safe and confidential.

Shalom Onyibe

Head of Cybersecurity Assurance Services, Cyber1 Solutions (formerly ProTec)

speaker
11:50 AM - 11:55 AM

Introduction to Panel 2

11:55 AM - 12:25 PM
Panel Discussion

Regulator as an Ally: Creating a Legal Framework for Security Posture

Cybersecurity has become an increasingly important area of concern for both organizations and regulators. As the frequency and severity of cyber attacks continues to rise, many regulators are recognizing the need to take a more proactive approach to cybersecurity regulation. One approach to this is to create a legal framework that encourages collaboration between regulators and organizations, with the goal of improving overall security posture.

Bonface Asiligwa

Manager - IT, Infrastructure & Security, Kenya Trade Network Agency

moderator

George Kisaka

Information Security GRC Lead, Yellow Card Financial

panelist

Fredrick Wahome

Vice Chairman, Kenya Cybersecurity and Forensics Association (KCSFA)

panelist

Lewis Miriti

Cybersecurity Compliance and Identity Specialist, Microsoft

panelist
12:55 PM - 01:55 PM

Lunch Break

02:00 PM - 02:15 PM

Align Internal Cybersecurity Practices With Third-Party Risk Management

When businesses work with third-party vendors, they are sharing sensitive information and data that could be compromised if the vendor's cybersecurity practices are inadequate. By aligning internal cybersecurity practices with third-party risk management, businesses can ensure that their vendors are following appropriate cybersecurity protocols and that their own cybersecurity practices are compatible with those of their vendors. This alignment can involve a range of measures, such as reviewing vendor security assessments, establishing vendor security requirements, and providing cybersecurity training to employees who work with third-party vendors. By taking a proactive approach to third-party risk management, businesses can mitigate potential cyber threats and protect their data and reputation.

Amos Njogu

CISO, Faulu Bank

speaker
02:15 PM - 02:20 PM

Introduction to Panel 3

02:20 PM - 02:50 PM
Panel Discussion

dxNova Panel - Armed to the Teeth: What Next-Gen Cybersecurity Professionals Need to Know

Next-generation cybersecurity professionals must be armed with a range of skills and knowledge to protect their organizations from increasingly sophisticated cyber threats. These skills may include proficiency in AI & ML, the ability to develop and implement effective security policies and procedures, and expertise in emerging technologies such as blockchain and IoT. They must also have strong communication skills to effectively educate and inform their colleagues about cybersecurity best practices and to respond to incidents. Finally, they must stay up to date with the latest cybersecurity trends and be able to adapt their skills and knowledge to the rapidly changing cybersecurity landscape.

Carol Odero

Head of Content, dx5

moderator

Judy Ngure

Data and Information Security Analyst, also Advisory Board Member, Cyber Girls

panelist

Aprielle Oichoe

Director - Information Security and Risk, InfoSphere Ltd

panelist

Frank Karuganda

Information Security Manager, Unguka Bank PLC, Rwanda

panelist

Mwende Stardust

Committee Chair ICT, Law Society of Kenya

panelist
02:35 PM - 02:40 PM

Introduction to Speaker 3

02:40 PM - 02:55 PM

Building a Cyber-Resilient Society: Best Practices for Small and Medium Enterprises

In today's digital age, cyber threats are becoming increasingly sophisticated and frequent. Small and medium enterprises (SMEs) are often vulnerable targets for cyber-attacks due to a lack of resources and expertise to adequately protect themselves. In the face of these challenges, it is crucial that SMEs adopt a proactive approach to cybersecurity and develop a cyber-resilient society. This topic aims to explore the best practices that SMEs can adapt to become more cyber-resilient, including risk assessment, training and awareness programs, data protection, incident response, and crisis management. By implementing these practices, SMEs can enhance their cybersecurity posture and protect their businesses and customers from the adverse impacts of cyber-attacks.

Diana Majimbo

Manager - Cyber and Intelligence, East Africa, Mastercard

speaker
02:55 PM - 03:00 PM

Introduction to Panel 4

03:00 PM - 03:30 PM
Panel Discussion

The Ethics of Cybersecurity: Addressing Issues of Hacking, Surveillance, and Human Rights

The intersection of cybersecurity and human rights is a rapidly evolving and complex topic that has far-reaching implications for individuals, organisations, and governments around the world. With the rise of sophisticated cyberattacks and the growing use of surveillance technologies, ethical questions have emerged around the use of hacking, surveillance, and other cybersecurity measures. Through the panel discussion, we aim to provide a nuanced and multifaceted understanding of the ethical considerations involved in the field of cybersecurity, and to promote best practices for addressing these challenges in a responsible and ethical manner.

Rosemary Koech-Kimwatu

Data Protection Officer, Risk Division, KCB Group

moderator

Richard Muthua

Executive Head, Cloud and Cyber Security - Liquid Intelligent Technologies

panelist

Nancy Muriithi

Programmes Lead, SheHacksKE and Security Consultant, Silensec

panelist

Mercy Mutemi

Managing Partner, Nzili and Sumbi Advocates

panelist
03:30 PM - 03:45 PM

Making Trade-Offs: Balancing Privacy and Security in the Digital Age

As digital technologies continue to transform our lives, the trade-offs between privacy and security have become a critical and pressing issue. Governments, corporations, and individuals face complex decisions about how to balance the need for security with the desire for privacy, often in situations where the two may be in conflict. Through the discussion, we aim to provide a nuanced and multifaceted understanding of the complex trade-offs involved in the field of digital security and privacy, and to promote best practices for addressing these challenges in a responsible and ethical manner.

Francis Mwangi Wokabi

Group Head, IT Security & Infrastructure, Platcorp Holdings Limited

speaker
03:45 PM - 04:45 PM

Coffee Break

Another chance to network over a cup of coffee

sponsors

Sponsors

Africa Data Centres Seacom Liquid Cloud and Cybersecurity - C2
dx5 (formerly CIO Africa)
© 2024 dx5 (formerly CIO Africa). All rights reserved.

Type

Hybrid

Status

Past

Where & When

Mercure Hotel (formerly Crown Plaza), Upper Hill, Nairobi (also happening virtually)
March 16 - 17, 2023

Contact Person Details

Catherine Chepchirchir
+254 703 419663
events@cioafrica.co