The ITWeb Security Summit is the meeting place for infosec professionals from across southern Africa.
From 16-17 May, Vodacom World, Midrand, will host the 2017 ITWEB Security Summit. The annual conference allows attendees to share their experiences, knowledge and insights, as well as get the most relevant and topical cyber security information.
Throughout the conference, experts on information security, both locally and internationally, will present their views on the latest advancements in cyber security. Attendees are given the opportunity to engage with key vendors during the scheduled business matchmaking opportunities, discuss the products and services on on offer and engage in meaningful debate during panel discussions and Q&A sessions.
Vodacom, as the Diamond sponsor of the 2017 ITWEB Security Summit, will cover Secure Cloud Computing and will be participating in a number of Q&A sessions throughout the duration of the conference. Cloud computing presents a new IT service delivery model that allows users to interact and consume their business applications on-demand, allowing scalability, elasticity of virtualised resources over an IP based network.
Although cloud computing of course has enormous benefits, it can introduce new security risks. Compliance with standards, policies and controls becomes an essential consideration around protecting and safeguarding your business systems and mission-critical data. Business and IT management should equip themselves with cloud security framework and controls to understand, analyse and mitigate these new risks.
Darshan Lakha, Executive Head Vodacom Group Technology Security, will take part in the discussion on Secure Cloud Computing on 16 May at 11:40.
'Cloud computing presents a new IT service delivery model that allows users to interact and consume their business applications on demand, allowing scalability, elasticity of virtualised resources over an IP based network. With great and compelling benefits which cloud computing presents, new risks and opportunities for security exploits are also introduced,' he says.