ICCWS Keynote Speaker Outlines

The following are outlines for the Keynote Speeches which will take place at ICCWS 2024

A cyber security tale from the trenches

Dr. Manuel Corregedor

This talk is aimed at looking at the current threat landscape and how it has evolved (or not that much) over the last few years. We will draw parallels between the wilder than Wile E. Coyote's pursuit of the Road Runner! Just like the Road Runner constantly evades all the innovative Wile E. Coyote traps, so to do cyber criminals by evading all the controls, technologies etc that defenders are utilising. These technologies include AI, ML, deception, zero trust and a whole arsenal of buzzword-worthy technologies. However, for criminals, even with all these technologies it is sometimes just as easy as walking through the front door (both physically and in cyber space).

This talk won't just be focused on the attacks but it will also equip you with the defenses. This will be done by dissecting how criminals set their sights on their targets (business and people), unveil the lessons hard-won from past skirmishes, and build a fortress of effective countermeasures. The talk will include a number of hacking demos to demonstrate how criminals go about targeting individuals and / or organisations.

The threat of ransomware attacks in Higher Education Institutions

Prof Joey Jansen van Vuuren

Ransomware assaults have emerged as the swiftest growing and gravest form of cybercrime, posing a significant threat to both businesses and governments. The severity of their repercussions continues to escalate, making them a top concern in the realm of cybersecurity. This presentation will delve into the latest ransomware incidents, focusing on Africa, with a special emphasis on recent breaches targeting higher education institutions in South Africa. Detailed examination of the attack vectors employed in these incidents will be provided. Additionally, practical guidelines will be offered to aid institutions in fortifying their systems against ransomware assaults and establishing recovery protocols in the event of an attack.