Event Overview

As digital transformation accelerates, with over 500 million internet users and increasing cloud adoption, the region has become a prime target for cybercriminals. Organizations across banking, telecom, healthcare, energy, and government sectors face an alarming surge in ransomware, phishing, data breaches, and supply chain attacks, leading to billions in economic losses and operational disruptions. Africa’s cybersecurity landscape is complex and evolving, driven by rapid digitalization, regulatory developments, and emerging threats. Ransomware groups and state-sponsored actors are targeting critical infrastructure, exploiting weak security frameworks, outdated systems, and low cybersecurity awareness.

The Cybersecurity Summit: Africa 2025 is the premier event for enterprise security leaders, policymakers, and technology pioneers committed to strengthening Africa’s cyber resilience. This summit will bring together top cybersecurity experts to explore AI-driven threat detection, cloud security, cyber threat intelligence sharing, social engineering defenses, and evolving regulatory frameworks. Attendees will gain actionable insights, best practices, and strategic roadmaps to navigate Africa’s dynamic threat landscape, mitigate risks, and fortify their cybersecurity infrastructure for the future.

Advisors

Guiding Our Summit With Industry Expertise

Advisor 1
Corradino Corradi
General Manager, Information Security Strategy, Architecture and Technical Excellence, MTN
Advisor 2
Dr. Bharat Soni
CISO and DPO, GT Bank
Advisor 3
Renaldo Jack
Group Head, Cybersecurity, Globeleq

Our Summit Advisory Committee comprises industry visionaries whose guidance ensures the conference programs remain relevant, cutting-edge, and aligned with the most pressing cybersecurity challenges and opportunities – enabling attendees to apply the insights and learnings to their daily work.

Speaker
Deidre Marais
CISO, Western Cape Government, and ISC2 Cape Town Chapter Advisory Board Member
Speaker
Dr. Bharath Soni
CISO and DPO, GT Bank
Speaker
Anna Collard
Senior Vice President of Content Strategy and Evangelist, KnowB4 Africa
Speaker
Tunde Dada
Group CIO/BCM, inq. digital Group
Speaker
Renaldo Jack
Group Head, Cybersecurity, Globeleq
Speaker
Mojalefa Mofammere
Network and Security Manager, Assupol
Speaker
Grant Hughes
CISO, GWV Group
Speaker
Hanniel Jafaru
Founder and Executive Director, HTC Academy
Speaker
Femi Olofintila M
Cyber risk, compliance and data privacy SME, Reliance Home Comfort

Speakers

Thought Leaders on Stage Leading Deep-Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats.

Agenda Highlights

  • The Enemy Within- Tackling Insider Risks
  • AI vs AI: How AI Can be Used to Fight Against AI Attacks
  • Managing Vendor Risks Beyond the Contract
  • Cloud Security with Zero Trust
  • Smart Cloud Strategies: Balancing Cost Reduction with Peak Performance

Agenda

Opening Remarks

8:54 AM - 9:00 AM SAST

9:00 AM – 9:15 AM SAST
Speaker

Deidre Marais,
CISO, Western Cape Government, and ISC2 Cape Town Chapter Advisory Board Member

Keynote: AI, Automation and the Future of Cybersecurity Careers in Africa

Artificial intelligence is reshaping the cybersecurity landscape faster than any previous wave of technology.

From automating detection and response to generating sophisticated attacks, AI is both a powerful tool and a formidable disruptor. For African enterprises and governments, this transformation raises urgent questions: Will automation deepen the cybersecurity talent gap? Which roles are most at risk of being augmented or eliminated? How can regulation, policy and upskilling ensure that the workforce evolves alongside the technology? This keynote will address strategies to future-proof careers, build sustainable talent pipelines and balance innovation with responsible governance.

This session will cover:

  • How AI-driven tools are changing the skills mix and redefining cybersecurity roles across African industries;
  • Strategies for upskilling, re-skilling and developing talent to thrive in an AI-augmented security environment;
  • Why African regulators and industry leaders must collaborate to create frameworks that protect both security and livelihoods.

Deidre Marais, CISO, Western Cape Government, and ISC2 Cape Town Chapter Advisory Board Member

9:15 AM – 9:37 AM SAST
Speaker 1

Mojalefa Moffamere
Network,Security and Telephony Manager, Assupol

Speaker 2

Corradino Corradi
General Manager, Information Security Strategy, Architecture and Technical Excellence, MTN

Fireside Chat: Fighting Fire with Fire: Defending Against AI With Advanced Intelligence

As threat actors increasingly harness artificial intelligence for reconnaissance, evasion and large-scale attacks, security leaders are turning to AI-powered defenses to keep pace.

But can defensive AI truly outsmart offensive AI, or are we entering an arms race with unpredictable consequences? This session will explore the evolving landscape of AI-powered cybersecurity, weighing the opportunities and risks of using machine intelligence to detect, defend and respond in real time.

This session will cover:

  • Examining how offensive AI is transforming the threat landscape through automation, obfuscation and scale;
  • Exploring how defensive AI can be deployed to accelerate detection, reduce response time and anticipate attack patterns;
  • The strategic, ethical and operational implications of an AI vs. AI security paradigm, and what it means for enterprise defense planning.

Mojalefa Moffamere, Network, Security and Telephony Manager, Assupol.

Corradino Corradi, General Manager, Information Security Strategy, Architecture and Technical Excellence, MTN

9:35 AM - 10:09 AM SAST​
Speaker

Anna Collard
Senior Vice President of Content Strategy and Evangelist, KnowB4 Africa

Attention Is the New Perimeter: Strengthening Security Culture With Cognitive Resilience

In today’s hyper-connected, distraction-fueled world, the greatest vulnerability in cybersecurity isn’t just technical, it’s cognitive.

As threat actors exploit our attention and emotions, it’s time we reframe our human defense strategies.

This session introduces a modern, science-based approach to security culture: one that moves beyond awareness into actionable resilience. Drawing from cyber psychology and behavioral science, we’ll explore how cultivating digital mindfulness can interrupt habitual mistakes, improve decision-making and foster a more vigilant workforce.

Rather than blaming users, the session introduces a constructive and empowering model to build cognitive resilience – treating attention as the new perimeter in your layered defense strategy.

This session will cover:

  • Embedding cognitive resilience into your security culture;
  • Applying security-in-depth thinking to the human layer;
  • Why attention hygiene is becoming as critical as password hygiene.

Anna Collard, Senior Vice President of Content Strategy and Evangelist, KnowB4 Africa

10:10 AM - 10:20 AM SAST

Networking break

10:20 AM - 10:42 AM SAST​
Speaker

Dr. Bharat Soni
CISO and DPO, GT Bank

The CISO's Boardroom Playbook: Communicating Cyber Risk to Executives

In today's threat landscape, African CISOs must do more than secure infrastructure: they must influence strategic decisions at the board level.

This session will explore how security leaders can effectively communicate cyber risk in business terms, align cybersecurity KPIs with enterprise goals and build boardroom confidence during periods of economic uncertainty. Attendees will learn how to shift conversations from vulnerabilities and tools to resilience, risk appetite and long-term value creation while securing critical investment in cybersecurity initiatives.

This session will cover:

  • Translating technical risk into business impact for African boards;
  • Aligning cybersecurity KPIs with business objectives;
  • Making the case for investment in cybersecurity during economic volatility.

Dr. Bharat Soni CISO and DPO, GT Bank

10:40 AM - 10:57 AM SAST​
Speaker

Tunde Dada
Group CIO/BCM, inq. digital Group

Securing LLMs in the Enterprise: Managing Risk Without Slowing Innovation

Large language models are rapidly entering enterprise workflows - from customer service automation to threat intelligence augmentation.

But with new opportunities come new risks: data leakage, prompt injection, unauthorized access and compliance gaps. This session will guide CISOs and IT leaders through the evolving threat landscape of enterprise LLMs, offering practical strategies for securing models, controlling access and aligning deployments with internal policies and regulatory requirements. Whether you’re piloting gen AI or scaling adoption, this session will help you build safely and responsibly.

This session will cover:
  • How prompt injection, model manipulation and data exposure can compromise enterprise LLM deployments;
  • Exploring frameworks for access controls, usage monitoring and internal policy enforcement around gen AI tools;
  • Securing LLM pipelines – from data inputs and APIs to model hosting environments and third-party integrations.

Tunde Dada, Group CIO/BCM, inq. digital Group

10:55 AM - 11:11 AM SAST​
Speaker 1

Renaldo Jack
Group Head, Cybersecurity, Globeleq

Speaker 2

Grant Hughes
CISO, GVW Group

Fireside chat: AI in Zero Trust: Hope, Hype and Hidden Gaps

As the conversation shifts from generative AI to agentic AI, it's clear that artificial intelligence holds tremendous potential to ease zero trust fatigue, but only when guided by business context, quality data and human oversight.

CISOs see AI as a “basket of opportunities” with plenty of “vendor blind spots.

This session will cover:

  • How CISOs can cut through the vendor hype around AI;
  • Why AI-driven zero trust fails without architecture alignment;
  • Where should CISOs draw the line between AI autonomy and oversight.

Renaldo Jack, Group Head, Cybersecurity, Globeleq

Grant Hughes, CISO, GVW Group

11:10 AM - 11:42 AM SAST​
Speaker

Hanniel Jafaru
Founder and Executive Director of HTC Academy

Managing Vendor Risks Beyond the Contract

Cybersecurity risks associated with third parties often extend far beyond the terms of the initial contract.

As high-profile breaches involving vendors become more common, enterprises must develop a continuous, risk-based approach to vendor management — focusing on real-time monitoring, access governance, compliance auditing, and incident response readiness. This session will explore how organizations can move beyond checklist-based vendor onboarding to build dynamic, proactive vendor risk management programs that safeguard sensitive data, critical operations, and regulatory compliance across complex supply chains.

This session will cover:
  • What red flags can one look for during vendor onboarding to mitigate fraud risk
  • What tools or techniques must be used to detect fraudulent activity post-onboarding
  • How can organizations operationalize continuous vendor risk assessment without creating administrative burden

Hanniel Jafaru, Founder and Executive Director of HTC Academy

11:40 AM - 12:13 PM SAST​
Speaker 1

Femi Olofintila M
Cyber Risk, Compliance and Data Privacy SME, Reliance Home Comfort

Speaker 2

Sodiq Bello
CISO, Lotus Bank

Speaker 2

Abumere Igboa
CISO/DPO, Stanbic IBTC

Panel: Future-Proof Cloud Security: Leadership Strategies for Emerging Threats

CISOs and security leaders face a growing array of sophisticated threats targeting hybrid and multi-cloud environments as African enterprises accelerate their cloud adoption.

From supply chain compromises to AI-powered attacks, the cloud security landscape is evolving faster than traditional controls can keep up.

Attendees will explore actionable strategies to build resilient, future-ready cloud security programs, while gaining guidance on aligning security architecture with business priorities, managing risk across infrastructure and fostering a culture of continuous security innovation.

This session will cover:

  • Evolving tactics being used by adversaries to exploit cloud misconfigurations, supply chains and identity systems;
  • How AI-driven detection, automated response and continuous validation can help mitigate sophisticated attacks at scale
  • How to communicate cloud security risks and investments to boards and executives to drive alignment and accountability.

Femi Olofintila M, Cyber Risk, Compliance and Data Privacy SME, Reliance Home Comfort

Sodiq Bello, CISO, Lotus Bank

Abumere Igboa, CISO/DPO, Stanbic IBTC

12:13 PM - 12:15 PM SAST

Closing Comments

The event will be simulive on August 7, 2025 (9:00 am – 2:00 pm) and available on demand until the end of Day, August 7, 2025.