Artificial Intelligence & Machine Learning , Next-Generation Technologies & Secure Development

ISMG Africa Summit: AI, Incident Response and Digital Future

Thought Leaders Gather to Discuss Proactive Defense and Unified Privacy Policies
ISMG Africa Summit: AI, Incident Response and Digital Future
The Africa summit was held virtually for cybersecurity leaders across the world.

Information Security Media Group concluded its Virtual Cybersecurity Summit: Africa, where cybersecurity leaders from across the globe came together to explore diverse security trends and challenges in the region.

See Also: Safeguarding against GenAI Cyberthreats with Zero Trust

Participants included security professionals from companies such as Mastercard, Coca-Cola Beverages Africa, FNB South Africa, CGI Konsult and government agencies such as the Federal Government of Nigeria.

Africa has become a hot spot for cybercrime activities. In 2022 various cyberthreats - including DDoS attacks, ransomware incidents, attacks targeting industrial control systems, business email compromises and phishing attacks - surged on the continent. Security experts at the summit emphasized the need for a collaborative defense strategy to effectively counteract this new threat landscape.

"At the third edition of the Africa summit, we navigated the complex landscape of cyberthreats, delved into the power of artificial intelligence and charted a course toward unified privacy policies. It was heartening to see women CISOs participating in good numbers," said Suparna Goswami, associate editor, ISMG. "This event has proven that when knowledge and innovation converge, the cybersecurity community becomes an indomitable force, protecting the digital future of Africa and beyond."

Babatunde Bamigboye, head of legal enforcement regulations, NDPC, delivered the keynote address on "Navigating Data Privacy in the Age of AI: Government Policies and Practices." Bamigboye shed light on the approaches various African governments are taking to ensure privacy and discussed the possibility of a unified privacy law for the region. He also highlighted the growing need for businesses to include privacy and digital trust in their security practices and emphasized that the same needs to be driven by policymakers and regulators to ensure that these laws do not hinder trade and businesses.

AI: Friend or Foe?

The growing prevalence of AI in the ever-evolving digital landscape was a consistent theme throughout the summit.

Unathi Thosago, group CTO, Adcorp Group, and Tunde Dada, group head IT/BCM, inq. Digital, led a fireside chat in which they discussed case studies demonstrating how AI has helped improve the internal security posture of companies. Thosago and Dada said intelligent threat detection, automated incident response and strengthening user authentication are some of the ways to leverage AI in cybersecurity.

Discussions also explored the adoption of AI methodologies in security tools and the benefits of widespread automation in lieu of manual methods.

Incident Response Playbook

Industry experts at the summit all agreed on the importance of choosing the right incident response playbook.

According to Interpol's 2022 Africa Cyberthreat Assessment report, South Africa leads the continent in the number of cybersecurity threats identified. Of the 230 million detected threats in the country, 219 million were email-related threats.

Nomaphelo Baloyi, regional security lead, Africa, Mastercard, shared defense strategies for companies to secure themselves against phishing attacks and business email compromise scams.

Nastassja van den Heever, CISO, FNB South Africa, led a plenary session on "Refining Incident Response Playbook on Malicious Attack Pattern: Key Essentials." Van den Heever discussed the importance of having assessments to develop a robust incident response strategy that's efficient in detecting and managing cyberattacks in ways that minimize damage, recovery time and total costs.

Key Takeaways

  • The cybersecurity industry is increasingly turning to AI to not only defend against threats but also predict them in advance.
  • Attackers often target the weakest link in the supply chain, making it crucial to classify, onboard and continuously monitor third-party risk management.
  • With API traffic growing faster, businesses are witnessing three times more attacks, making APIs the new battleground for CISOs.

Join us at ISMG's Cybersecurity Summit: Mumbai on Nov. 1, 2023. Discover cutting-edge strategies and insights from industry experts to safeguard your organization against evolving cyberthreats.


About the Author

Yamini Kalra

Yamini Kalra

Project Manager - Global Copy Desk, ISMG

Kalra has more than seven years of experience in content production, including news journalism, time-boxed editing of research articles and copy editing different kinds of content forms. Prior to ISMG, she worked as associate editor at Gartner, and sub-editor, news, at The Indian Express and Outlook India.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.