Home


 

Follow Us :

PARTNERS:

 

Why ITSECON 2010

The increasing growing global information security threats in internet fraud and in the e-banking space is a course of concern. This has become worrisome because:

  • Threats poised by organizations by cyber crimes have increased faster than potential victims or that which cyber security professionals can cope with.
  • Organizations may also leave themselves vulnerable to cyber crime based on false sense of security in their IT environment
  • Misallocating limited resources to lesser threats.
  • Growing ATM and Internet banking fraud.

THE OBJECTIVE OF ITSECON 2010

  • To explore the various techniques on how organizations security can be breached and sensitive data compromised with practical demonstration.
  • The conference is aimed at bringing together professionals in the field of IT security to discuss the latest topics in contemporary and prospective computer, network security, e-banking and fraud prevention.
  • To explore prevalent security threats, challenges and solutions.
  • Explore the modern techniques in Fraud Prevention and Detection in the financial detector.
  • A platform for CIO, CEO, industry leaders, managers, academics and government officials to exchange ideas on technology trend and best practices.
  • To create a platform for a collaborative effort towards raising information security awareness in Africa.

HIGHLIGHT OF ITSECON 2010

  • Exciting keynote speeches and panel discussion from well renowned speakers in the information security industry.
  • Case study presentation from industry leaders on the hottest topics of IT Security including; Wireless & Mobile Security, e-payment risks, challenges and solutions, cyber terrorism, etc.
  • Exhibitions.
  • Product Presentation and demonstrations.
  • Product Lunch.
  • Features new and exciting activities to help you network and form long-lasting and profitable business relationships.
  • Post Conference Review luncheon

Sub-theme

  1. Data Mobility Security challenge in IT
  2. Computer Security: the role of Fire walls; Antivirus & Encryption security
  3. Cyber security: The Role and Responsibilities of an Effective Regulator.
  4. ATM skimming: The fastest growing electronic fraud- Issues, Challenges and Solutions
  5. Payment Gateways Fraud: Issues, challenges, counters measures.

 

Registration is limited to no more than 100 delegates, on a first-come, first-serve basis.
This event is for CIO’s, CSO’s, CFO’s, IT Managers, Data Center Professionals, Network Administrators, Security Officers and Information Security Professionals who wish to learn about improved productivity and compliance through innovative physical/logical/network security countermeasures for combating cyber-crime, malicious insiders and the latest internet threats targeting financial institutions and other regulated organizations.

Note: Available space is very limited!

WHO SHOULD ATTEND

  • Professional IS Auditors
  • Chief Information Officers
  • Chief Information Security Officers
  • Captains of Industry
  • Bankers
  • Telecommunication Experts
  • Professional Accountants
  • Auditors, Solicitors
  • Staff of Financial Services Industry Regulators
  • Law Makers
  • Law enforcement and Compliance Officers
  • Judicial Officers
  • Member of Academia…and Other Professionals
  • Government Officials and members of diplomatic community
  • Chief Risk Officers
  • Operational Risk Managers
  • IT Managers
  • Application Developers
  • Transaction Switching Companies
  • Mobile Operators
  • Investigation and fraud Prevention experts
  • E-Banking Directors and Managers
  • Information securities professional
  • Academics
  • Information Securities professionals
 

Home | About Us | Privacy Policy | Contact | Webmail

 ©2010 African Human Assistance Initiative (AHAI). All Rights Reserved