IoT Summit Sessions
Identifying the ROI in IoT
More than half of IoT professionals believe that quantifying and identifying a profitable use case for IoT is more important than the lack of available infrastructure or the need for improved device security. With billions of devices soon to be connected, the push towards IoT won't be a mandatory one and the organisations that are able to pull the trigger fastest with strategic clarity and a clearly defined ROI map will be the ones to come out on top. This session will look at the diversity of the IoT landscape, how to extract value from the single largest asset that IoT produces - the data - and how to tie this all together in a strategy that maximises the return on investment in what will be a mandatory industry shift.
Exploiting the digital convergence driven by IoT
A look at the anatomical deconstruction of the Internet of Things makes clear one very sizable benefit of the technology as a whole - its immense and pervasive reach into society.
This reach provides the opportunity to curate incalculable amounts of data from billions of sources simultaneously. The very nature of this structure has triggered a digital convergence of three of the most exciting and innovative technologies at present.
Blockchain and Artificial Intelligence have the ability to secure this massive system of physical data points whilst artificial intelligence provides an effective and scalable platform for intelligent interaction and engagement between the billions of devices and the human ecosystem in which it operates. This session will cover the most intriguing opportunities and potential moonshot applications of these three
AfriSecure Summit Sessions
A cyber security ecosystem as the key to security
Not one product will ever completely protect your organisation, and at the same time too many point systems become unmanageable, unwieldy and ineffective. Current best practice ties together Intrusion Detection (IDS), Security Information and Event Management (SIEM) software, and Privileged Access Management (PAM). This combination offers a sophisticated way to address frequency, complexity and rapidly changing nature of cyber attacks. This session will explore the best practice application of cyber security ecosystems and the nuanced strategy that keeps them in balance and your organisation protected.
Aligning the board for risk, governance and compliance
An organisation will never be free from cyber threats and the effects of a breach can have significant impact on company earnings, with hundreds of millions of dollars being swept from the valuation in a matter of hours.
Boards must do more than simply view metrics, resource allocations and compliance reports - there needs to be an active interest in protecting the organisations information
assets as its very existence may depend on it.
CISO's will need to proactively engage with the board on the cyber security strategy in mitigating risk and developing a secure and balanced security ecosystem. This session will prepare CISO's, CEO's and board member for strategic alignment with resource allocation and the wider organisational strategy to protect organisations.