Investor
Head, International Cooperation · Directorate of Cybersecurity, ONSA
Vice President of the Federal Republic of Nigeria
The CSCS cybersecurity conference is an exclusive high-profile business networking event that brings together leading cybersecurity industry professionals, government officials, financial institutions, telecommunication companies and industry regulators to discuss the significance of keeping cyber vigilance on varying degrees of business technology touchpoints for data exchange.
National Security Adviser
The state of Cybersecurity in Nigeria, challenges, successes, future state, protection of critical infrastructures.
National Security Adviser
Presentation 1
Harnessing the power of AI in your cybersecurity strategy
Presentation 2
Cybersecurity and AI: Enabling Security While Managing Risk
International Keynote speaker and Chairman of the Lagos State Cybersecurity Advisory Board
Presentation 2
State of exploitation across the Internet
Presentation 4
Talent in an age of Cybersecurity and AIs
Board Engagement and Oversight, Risk Appetite and Decision-Making, Budget Allocation and Resource Prioritization, Leadership Buy-In and Cultural Shifts, Metrics and Reporting.
In this era of rapid digitalization and increased connectivity, it is crucial that organizations especially those with online presence are aware of the corresponding cybersecurity risks that arise from such presence and work to manage them through effective cybersecurity risk management. With ever-evolving cyber threats such as ransomware and phishing attacks, effective risk management is essential to identify, assess, and mitigate cybersecurity risks. An essential component of any cybersecurity risk management is Management oversight.
This panel will discuss the factors responsible for achieving effective management oversight in cybersecurity.
Consider Amplified Devices and Vulnerabilities, API Security, Remote Work, IOT Devices, Misconfiguration, Multi-cloud strategies and their Impact on Attack Surface.
An attack surface is the sum of all entry points that an attacker can exploit to gain unauthorized access to a system/environment/infrastructure. Attack surface expansion refers to the increase in number and complexity of these entry points. As attack surfaces expand, traditional identity systems may not be enough to provide adequate security. With more entry points for malicious actors, there is a higher risk of identity data theft and privilege escalation. Moreover, managing identities becomes more complex as the infrastructure grows, potentially leading to misconfigurations and broken security controls.
Investor
Presentation 5
Building Resilient Financial Systems: AI’s role in Cyber Defense and Incident response
Presentation 6
Leveraging AI in the Advancement of Cybersecurity.
Presentation 7
Proactive defense through rigorous crisis management
Presentation 8
Mitigating AI-Powered Attacks on Critical Infrastructure: Strategies for Enhanced Security
Considering the continuous cyber-attack on several Nation’s critical infrastructure, it is essential to evaluate the reasons why this is becoming a soft target and what should be done to address this concern. Strengthening the security and resilience of critical infrastructure is a shared responsibility
between stakeholders — the critical
infrastructure owners and operators, and the
various government entities and non-government
organizations (including industry associations).
In the ever-evolving landscape of cybersecurity, organizations face relentless threats from malicious actors seeking to exploits vulnerabilities. To safeguard digital assets effectively, cyber intelligence plays a pivotal role in building a robust defense either through automated threat detection with AI, predicting cyberattacks, enhancing cyber analyst effectiveness or building a holistic defense strategy.
This panel discusses the role of cyber intelligence in building a holistic strategy to defend against cyber-attacks.
Investor
Investor
Attack Simulation Workshop
This workshop will provide participants with the skills and knowledge of how an attack is carried out. Description: This workshop will provide participants with the skills and knowledge required to effectively hunt for threats within a network and respond to security incidents. The session will cover advanced techniques for detecting, analyzing, and mitigating cyber threats.
Attack detection and Mitigation Techniques
This workshop will provide participants with the skills and knowledge required to effectively hunt for threats within a network and respond to security incidents. The session will cover advanced techniques for detecting, analyzing, and mitigating cyber threats.
To be confirmed.
International Keynote speaker and Chairman of the Lagos State Cybersecurity Advisory Board
Investor
Investor
Investor
Investor
The CSCS cybersecurity conference is an exclusive high-profile business networking event that brings together leading cybersecurity industry professionals, government officials, financial institutions, telecommunication companies and industry regulators to discuss the significance of keeping cyber vigilance on varying degrees of business technology touchpoints for data exchange.
Head, International Cooperation · Directorate of Cybersecurity, ONSA
Managing Director / CEO, CSCS
09.00
Recent Trends in Marketing
William Smith
Online Portfolio Management View is a service aimed at providing investors with access to view their respective stock portfolio in addition to services provided by intermediary stockbrokerage firms. We ask that you ensure that all devices used to access the Service are adequately protected from malware and viruses. You must also take care to secure and maintain the confidentiality of your password and log-in information. CSCS shall not bear any responsibility and or be liable for any unauthorized access to your information on the Application using your log-in details.
Online Portfolio Management View is a service aimed at providing investors with access to view their respective stock portfolio in addition to services provided by intermediary stockbrokerage firms. We ask that you ensure that all devices used to access the Service are adequately protected from malware and viruses. You must also take care to secure and maintain the confidentiality of your password and log-in information. CSCS shall not bear any responsibility and or be liable for any unauthorized access to your information on the Application using your log-in details.
Online Portfolio Management View is a service aimed at providing investors with access to view their respective stock portfolio in addition to services provided by intermediary stockbrokerage firms. We ask that you ensure that all devices used to access the Service are adequately protected from malware and viruses. You must also take care to secure and maintain the confidentiality of your password and log-in information. CSCS shall not bear any responsibility and or be liable for any unauthorized access to your information on the Application using your log-in details.
Online Portfolio Management View is a service aimed at providing investors with access to view their respective stock portfolio in addition to services provided by intermediary stockbrokerage firms. We ask that you ensure that all devices used to access the Service are adequately protected from malware and viruses. You must also take care to secure and maintain the confidentiality of your password and log-in information. CSCS shall not bear any responsibility and or be liable for any unauthorized access to your information on the Application using your log-in details.
Online Portfolio Management View is a service aimed at providing investors with access to view their respective stock portfolio in addition to services provided by intermediary stockbrokerage firms. We ask that you ensure that all devices used to access the Service are adequately protected from malware and viruses. You must also take care to secure and maintain the confidentiality of your password and log-in information. CSCS shall not bear any responsibility and or be liable for any unauthorized access to your information on the Application using your log-in details.