IT Security & Cyber Forensics Conference

World famous hacker, Kevin MitnickToday I am speaking at the Marcus Evans IT Security & Cyber Forensics conference. The subtitle for this conference is: Mitigating IT security risks through improved processes and innovative investigations

The inspiration for my talk is based on two books by the most famous hacker in the world, Kevin Mitnick: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruder and the The Art of Deception: Controlling the Human Element of Security. In 2003 I established contact with his agent in United States of America to bring him to South Africa. After a very long negotiation period and with assistance from ITWeb he eventually made to sunny South Africa in 2006. It was my pleasure to meet him and have his books autographed. I really have to find that photo we took together. However, I know it won’t be the last time we met. His story has been written up in many books and one of them made into the B-grade Hollywood movie Takedown. When you meet a living legend like this its pretty awesome feeling. However, when you know, in your heart that you had a stake in bringing him to South Africa, it is inspirational. This is one of the things that got me “fired” from FNB’s Randburg Computer Centre in 2003.

Date: 16-17 Oct 2008
Location: The Forum, Wonderers Building, The Campus, Bryanston, Gauteng.

My topic: The Human Element in IT Security

Anyway here is the overview from the Marcus Evans event information page:

Over the last decade IT technology has grown and developed substantially. These new developments where meant to streamline operations but they have also created new breaches in security allowing data and valuable intellectual information to be exposed to competitors. Organisations thus need to start using more advanced forms of investigation to identify its vulnerable points, and cyber forensics is starting to play a crucial role in identifying those individuals and organisations involved in sabotaging your system. Every company uses electronic information extensively to support their daily business processes. Data is stored on customers, products, contracts, financial results, accounting etc. If this electronic information were to become available to competitors or to become corrupted, false or disappear, it will greatly hinder business functioning.

With the increased attention on IT security and cyber forensics, IT professionals are discovering that security information threats do not only fall in the hands of hackers and external forces but in this day and age, 50% of all security threats are internal. This creates major concerns for corporates who not only need to hide their important information from their competitors but now also their employees. As the world moves towards the wireless age, IT security needs to grow and develop to ensure the safety of information no matter what the form it is being transmitted in. By attending this conference you will be able to gain insight on cyber forensics processes, identifying an attack and who is attacking you. You will also be able to identify which information is at risk and who we should be watching out for both internally and externally.

Other Key Speakers

Jason Jordaan
Head of Cyberforensics , Special Investigating Unit SOUTH AFRICA

Poppy Tshabalala
Chief Information Officer, Department of Trade and Industry

Stephen Mark
Information Security Officer, Discovery

William Stucke
Chairman, AfrISPA

Evans Nyagah
Head of IT , Telkom Kenya

Key Topics

  • Creating an awareness of IT security threats through constant monitoring and clear communication of potential security violations
  • Analysing new hostile trends that are emerging in our internet landscape
  • Applying cyber forensics pro-actively to create a more secure IT environment
  • Promoting access control though innovative measures to demotivate and prevent • Promoting access control though innovative measures to demotivate and prevent • Promoting access control though innovative measures to demotivate and prevent unauthorised personnel accessing confidential networks
  • Considering the threat Auditing has on your IT security system and information security in general

For a more detailed overview of my backgroun in Information Security or IT Security industry visit my LinkedIn profile.

 

Author: RJ Thomas

RJ Thomas is an International Relationship Builder. He was born in South Africa, and moved to China in 2013.