Akhona Damane is currently the Manager: Office of Digital Advantage at CSIR (Council for Scientific and Industrial Research). He is responsible for facilitating the implementation of the South Africa's ICT Research, Development and Innovation (RDI) Roadmap, which seeks to stimulate investment in R&D and Innovation in ICT by both public and private sectors through partnerships with industry, universities, research institutions and international organisations. He guides RDI programs that unearth the potential of the emerging / exponential technologies, such as Data Science, Artificial Intelligence / Machine Learning, Blockchain, Internet of Things, and Cybersecurity within the context of the 4th Industrial Revolution.
Mr Damane has previously worked as the Manager for Knowledge Management and Innovation (2012-2017) at Transnet Freight Rail, where he was responsible for spearheading the Knowledge Management function. Prior to joining Transnet, Mr Damane was employed by the Western Cape Government Department of Human Settlements as the acting Director for Strategy, Monitoring & Evaluation, and Information Management. During 2010-2011, he worked as a part-time Lecturer in Information Systems at the University of the Western Cape, in Cape Town. In recent years Mr Damane has honoured invitations to be a Guest Lecturer at Wits Business School and at University of Johannesburg.
He holds a Bachelor of Science Honours Degree in Computer Science and a Bachelor of Science from the University of Fort Hare. He has completed a number of training certificates in Systems Analysis, Knowledge Management, Project Management, Agile SCRUM and ITIL 4 Foundation. He is currently studying towards an MBA.
Craig is the MD of Wolfpack Information Risk - a South African firm established in 2011 that specialises in cyber threat intelligence, research, training, awareness and advisory services. A community of 9000+ information and cyber security specialists subscribe to their regular community updates.
We have partnered with senior management teams from all major sectors to understand the opportunities and threats that cyberspace presents. Wolfpack have also been instrumental in driving many strategic cyber security initiatives with stakeholders on the African continent.
Craig was previously an Associate Director of Deloitte's Risk Advisory division. He ran the Deloitte School of Risk Management and was responsible on a national level for learning and innovation for a team of over 400 professionals.
Craig has over 18 years of management experience in the fields of IT & cyber security. He is frequently invited to speak at information security, cybercrime and counter-espionage events. He provides regular opinion pieces via TV, radio and print/online media.
He is proudly South African and an even prouder husband and father to three healthy “cubs”.
MBA, CISSP, CISM, CVE, ISO 27001 Lead Implementer & Auditor, ISO 27035 Lead Incident Response Professional, Certified ISO 27005 Risk, COBIT & ITIL trainer.
NWU Strategic management and co-ordination of Information and Communication Technology, including:
- Management of ICT resources;
- Advocacy for digital transformation;
- Setting and executing strategy;
- Provision and optimisation of ICT-supported systems, processes and services for teaching, learning, research and administration;
- ICT Governance, including development and implementation of ICT plicy and standards;
- ICT Representation and Positioning in external and internal relationships;
- and management of IT portfolio.
Wilhelm van Belkum
NWU Management of OI department which includes:
- Overall responsible for all IT Infrastructure at the University (Strategy, Plan, Implement, Deploy and Operation)
- Overall responsibility for IT Operational Management
- Staff Management (3 Department - Operations, Systems and Infrastructure)
- Key role player in determining ICT strategies and directions at NWU
- Key role player in IT Governance planning and implementation
- IT-Infrastructure financial and budget management
- IT and HE sector collaboration & community engagement
Maiendra Moodley graduated from the University of Natal, with a Bachelor of Commerce Degree in Business Information Systems and Information Systems Technology. Subsequently, he read for the Advanced Business Programme and Bachelor of Technology (Management) at Technikon Natal, before studying for his Masters in Business Administration through the University of Wales. His dissertation, on the security risk management measures that banks adopt in online banking, was awarded a distinction. His qualifications include the Foundation Certificate in IT Service Management (ISEB), Advanced Security Management Programme from Technikon Pretoria, Post Graduate Diploma in Forensic and Investigative Accounting and a Master in Security Studies from the University of Pretoria. He is presently reading for his doctorate on financial transformation through the use of ERP systems at the European University in Belgrade.
He is a member of the Golden Key International Honour Society.
Mr. Moodley's diverse experience includes having served as a senior systems auditor, a security architect with a leading retail bank, supervising IT LAN support services, to being a panelist and examiner on the IT programme of a national tertiary institution. Other posts that he has held include serving as a Trainee Accountant, a Senior Risk Consultant, a Principal Consultant, managing a security advisory services function, acting as a Chief Risk Officer to presently serving as a Senior Analyst for Wikistrat. He is the former HoD for Financial Systems and Processes at the State Information Technology Agency. His articles, extensive speaking and teaching engagements presented and published both locally and internationally in India, Kenya, Ghana, Botswana, Mauritius, Tanzania, Zimbabwe, and Zambia, span a wide range of industries and topics such as auditing, fraud, security and risk management to unlocking the strategic value of technology. He presently provides advisory services to Government customers.
Peter is a specialist forensic investigator with over 20 years professional experience.
He specialises in investigating common forms of white-collar crime and dismantling sophisticated schemes and cover-ups. He has successfully guided multi-disciplinary teams to investigate and overcome common forms of white-collar crime on the African continent and Europe.
Peter has investigated and overcome incidents of the common forms of white-collar crime such as fraud, bribery, corruption, brand protection, theft and tax evasion.
He is often instructed to investigate conflicts of interest, collusive tendering, fraudulent disbursements, unlawful gratuities and maladministration in the public sector. He has also developed specific expertise investigating the manipulation of accounts, breach of contract and loss of profits, post transaction disputes and professional negligence in construction projects.
He has established a dedicated brand protection practice to investigate infringements of intellectual property. The brand protection practice investigates product substitutions, dilutions, tampering and diversions and common forms of infringement such as IP theft, counterfeiting and misuse of trademarks.
His solutions-focused approach means that he not only solves white-collar offences but also identifies the shortcomings within organizations that allowed the offences to take place. He supports clients to overcome their vulnerabilities by improving their management systems, policies, procedures and controls.
He is a regular contributor on white-collar crime to local and international publications, serves as a regular guest on radio programmes and has presented at several seminars and conferences. He is a guest lecturer at the University of Cape Town and the external moderator for the forensic certificate course at the University of the Western Cape.
Specialities: Economic Crime, Brand Protection, Cyber Crime, Forensic Engineering, Regulatory Compliance, Risk Management, Strategic Intelligence, Asset Tracing & Forfeiture, Diagnostic Reviews.
BCom (Marketing & Business Management) | ISO27001 Foundation | ITIL Foundation | ITIL Service Management |Completed CISSP course | Train the Trainer | Lotus Domino Administrator | Lotus Domino Developer
Nadia has 13 years of IT experience in Service Desk Management, Training, Account Management and Information Security.
She has spent the last 3 years providing advice and assurance on Information Security related activities
- Application and Infrastructure Baselines
- Writing and implementing Information Security policies
- Leading IT DR testing and planning for inclusion in the Business Continuity Plans
- Conducting Phishing campaigns with remedial training
- Vulnerability Management
Nadia trained in the UK in the Information Assurance Maturity Model (IAMM) and successfully adapted and implemented it in South Africa over a 12-month period.
Jacques is a senior lecturer in the Department of Information Systems at the University of Cape Town. His research covers a variety of topics within information systems security, with a specific focus on behavioral (human) aspects of information security. Jacques supervises a Security & Privacy Research Group with more than a dozen active research students and has over 40 peer-reviewed publications.
Jacques holds a Ph.D. in Information Technology from the Nelson Mandela Metropolitan University
Stephen has over 18 years' experience in Consulting and is currently the Group Senior Manager of Transformational Consulting. He previously was Head Security Consulting for MEA. During his 6 years at Dimension Data, he has worked across multiple industry verticals, assisting organisations with their Transformational and Cyber Security Challenges, aligning these strategies with the organisational business outcomes. His background includes management positions in one of the big four audit firms and working in the financial sector.
During this time Stephen was a Senior Information Security Consultant and at various stages was acting in the Group Information Security Officer role. Stephen worked primarily within Information Security Management and Governance arena where he was responsible for setting Security Strategy and defining the Information security target operating model, he was also responsible for the implementation roadmap for the effective execution of Information Security within the Group.
Stephen has also numerous years' experience assisting local and international companies within the E-commerce industry with their security architecture, strategies, and implementation. During this time Stephen was responsible for defining the security strategies and aligning the strategies to the business strategy. This included the development of and delivery against a security road map.
Mervyn George is a seasoned technologist, experienced in driving value discussions and implementing enterprise systems at multinational organisations. As a business architect with SAP, Mervyn dedicates his focus to advising leaders of large enterprises on the role technology plays in business innovation and the modernisation of corporate strategy.
Dominic holds a master’s degree in ICT law from UCT and specialises in electronic communications regulation. After proving unsuited – due to a stubborn streak of pragmatism – to the formalities of life as an attorney, Dominic founded ellipsis regulatory solutions (www.ellipsis.co.za) as a consultancy seeking to assist those navigating the murky waters of communications law.
Dominic’s brief is to shape policy and regulation towards the interests of ISPA’s members and to ensure effective communication between ICASA and members.
Dr Kiru Pillay
Kiru has thirty years of experience in the ICT sector with the first 23 years as an ICT practitioner and has worked in various industry sectors and in various roles globally.
He has eight years of experience in an academic and research environment and has been based at three South African universities both on a full-time, and currently on a part-time basis.
He is presently in the Public Sector as a Chief Director, Cybersecurity Operations at the Department of Telecommunications and Postal Services (DTPS) responsible for the national Cybersecurity mandate and the management of the national Computer Security Incident Response Team (CSIRT). He also has a mandate for the operationalisation of the Department’s 4IR initiatives via its Digital Transformation Centre.
Kiru holds a PhD in Information Systems from the University of KwaZulu Natal. He is currently a visiting academic attached to the LINK Centre at the University of Witwatersrand and also to Wits Business School, with a primary responsibility of post-graduate supervision with some lecturing responsibilities.
Prof SH (Basie) von Solms
Prof SH (Basie) von Solms is a Research Professor in the Academy for Computer Science and Software Engineering at the University of Johannesburg, the Director of the Centre for Cyber Security at the University of Johannesburg as well as an Associate Director of the Global Cybersecurity Capacity Centre of the University of Oxford in the UK. Basie is a member of the World Economic Forum’s Global Future Council for Cyber Security.
(Via Video Presentation)
Call for Papers
All those working in the information and cybersecurity fields are invited to submit an abstract to present at the upcoming CSSA 2019.
Standard presentations are short conversation starters of 20 minutes, providing enough information to encourage the audience to engage and seek further information.
You can submit your abstract by completing the online form. Submissions close Friday, 31 May 2019.
We have provided a list of focus areas, but you are welcome to present exemplars and case studies in any field of information and cybersecurity. Only PDF or Word documents may be attached for the abstracts.
You will be asked during the submission process to select a focus area that your abstract is related to. Please select only one area to ensure your abstract is placed in the correct programme stream.
- Cyber hygiene 101
- Getting the basics right in digital usage
- Awareness of cybersecurity risks leads to well-informed user choices
- Protect and defend your personal and organisation’s data assets
- Cybersecurity trends: current and emerging
Selections for all submissions will be based on the following criteria:
- Alignment with the conference aims
- Interest and relevance to the Information and Cybersecurity community
- Potential to be engaging and enhance the symposium
- Quality of the submission – clarity and readability
- Sufficiency of information
Note: Speakers whose submission is successful will pay a discounted registration rate.