Cyber Crime Africa 2008 (CCA 2008)

Venue: Sun City, Hotel Cabanas

Location: Sun City, Gauteng, South Africa

Event Date/Time: Nov 10, 2008 End Date/Time: Nov 12, 2008
Registration Date: Nov 03, 2008
Early Registration Date: Oct 20, 2008
Report as Spam


The nature of the present day attacks is very different from what the security community has been used to in the past. Rather than wide-spread worms and viruses that cause general havoc, attackers are directly targeting their victims in order to achieve monetary or military gain. These attacks are blowing right past firewalls and anti-virus and placing malware deep in the enterprise. Ideally, we could fix this problem at its roots; fixing the software that is making us vulnerable.
The Conference, organised by AII and Couzyn Hertzog & Horak, will examine the impact of Cyber crime in Africa by expert researchers and leaders in the IT Industry. However, the main thrust of this Conference will make you understand Understanding the real matrix of phishing and why it is both a personal and organisational theft.
The key topics in the cyber crime summit will by diversified among an impressive line up of senior speakers from Africa who will provoke you to facilitate and harness an African encryption policy, legislation, compliance and management dynamics to tackle this criminality we tend to ignore in our continent
The cyber crime Africa summit is going to be the biggest and best in the industry showcasing critical infrastructure environments and networks and the major differences that exist between understood security best practice and the protective measures regularly found (or not) in these networks.

The most common security mistakes will be covered, as will real world examples taken from penetration testing environments. Additionally, this summit will expose some of the potentially catastrophic consequences of a failure in an IT environment. There will be an examination of the critical infrastructure hysteria which is currently in vogue and some consideration of steps which can be taken to secure these networks and prevent cyber-terrorism.