IT leaders summit to address cyber security

Cyber-crime

Cyber-crime

by TINTSWALO BALOYI
JOHANNESBURG, (CAJ News) – THE upcoming IT Leaders Africa Summit will explore the mechanisms companies could use to ensure a secure information-processing environment.

The event, which is in its sixth year, is scheduled for March 18 and 19 at the Maslow Hotel in Sandton, Johannesburg.

Joint silver sponsors at the 6th IT Leaders Africa Summit, SLVA and Ubusha will explore the mechanisms to ensure a secure information-processing environment during their workshop presented by Kris Budnik, Managing Director for SLVA Information Security.

SLVA and Ubusha’s holistic response to minimising information security risks requires the ability to understand and manage who has access to information and systems within your environment and what they are able to do with such access, track and have the capability to influence the way that data is accessed, processed and shared within your environment as well as maintain oversight over that environment – ensuring that it remains reliable and free from vulnerabilities which may be exploited to bypass your access control and data governance policies.

Attendees will hear how they can maximise existing capabilities and leverage the emerging wave of enterprise security technologies that tip the balance away from cyber-criminals and dishonest employees.

The IT Leaders Africa Summit comes as the pace of digital transformation increases, so does the frequency of high profile security incidents and information leaks.

This often prompts complex and costly responses, as those who have suffered security breaches – and those who are trying to avoid them – seek ways to manage their exposures and comply with a plethora of industry standards, best practices and government regulations.

During these 60 minute educational workshops, leading industry vendors present their solutions and services in case study format to attending CIOs and IT Heads. Each session is limited to 15 delegates in order to encourage debate and discussion.

– CAJ News

Short URL: http://cajnewsafrica.com/?p=4362

Posted by on Feb 24 2015. Filed under IT Security, Technology. You can follow any responses to this entry through the RSS 2.0. You can leave a response or trackback to this entry

CAJ News Sponsored Links

Commonwealth Technology Organisation

Connect to CAJ News on Facebook

Subscribe to our Newsletter

Log in
All material © CAJ News Africa. Material may not be published or reproduced in any form without prior written permission.