As digital transformation accelerates, with over 500 million internet users and increasing cloud adoption, the region has become a prime target for cybercriminals. Organizations across banking, telecom, healthcare, energy, and government sectors face an alarming surge in ransomware, phishing, data breaches, and supply chain attacks, leading to billions in economic losses and operational disruptions. Africa’s cybersecurity landscape is complex and evolving, driven by rapid digitalization, regulatory developments, and emerging threats. Ransomware groups and state-sponsored actors are targeting critical infrastructure, exploiting weak security frameworks, outdated systems, and low cybersecurity awareness.
The Cybersecurity Summit: Africa 2025 is the premier event for enterprise security leaders, policymakers, and technology pioneers committed to strengthening Africa’s cyber resilience. This summit will bring together top cybersecurity experts to explore AI-driven threat detection, cloud security, cyber threat intelligence sharing, social engineering defenses, and evolving regulatory frameworks. Attendees will gain actionable insights, best practices, and strategic roadmaps to navigate Africa’s dynamic threat landscape, mitigate risks, and fortify their cybersecurity infrastructure for the future.

Guiding Our Summit With Industry Expertise
Our Summit Advisory Committee comprises industry visionaries whose guidance ensures the conference programs remain relevant, cutting-edge, and aligned with the most pressing cybersecurity challenges and opportunities – enabling attendees to apply the insights and learnings to their daily work.
Thought Leaders on Stage Leading Deep-Dive Discussions
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats.
Opening Remarks
8:54 AM - 9:00 AM SAST
Artificial intelligence is reshaping the cybersecurity landscape faster than any previous wave of technology.
From automating detection and response to generating sophisticated attacks, AI is both a powerful tool and a formidable disruptor. For African enterprises and governments, this transformation raises urgent questions: Will automation deepen the cybersecurity talent gap? Which roles are most at risk of being augmented or eliminated? How can regulation, policy and upskilling ensure that the workforce evolves alongside the technology? This keynote will address strategies to future-proof careers, build sustainable talent pipelines and balance innovation with responsible governance.
This session will cover:
Deidre Marais, CISO, Western Cape Government, and ISC2 Cape Town Chapter Advisory Board Member
As threat actors increasingly harness artificial intelligence for reconnaissance, evasion and large-scale attacks, security leaders are turning to AI-powered defenses to keep pace.
But can defensive AI truly outsmart offensive AI, or are we entering an arms race with unpredictable consequences? This session will explore the evolving landscape of AI-powered cybersecurity, weighing the opportunities and risks of using machine intelligence to detect, defend and respond in real time.
This session will cover:
Mojalefa Moffamere, Network, Security and Telephony Manager, Assupol.
Corradino Corradi, General Manager, Information Security Strategy, Architecture and Technical Excellence, MTN
In today’s hyper-connected, distraction-fueled world, the greatest vulnerability in cybersecurity isn’t just technical, it’s cognitive.
As threat actors exploit our attention and emotions, it’s time we reframe our human defense strategies.
This session introduces a modern, science-based approach to security culture: one that moves beyond awareness into actionable resilience. Drawing from cyber psychology and behavioral science, we’ll explore how cultivating digital mindfulness can interrupt habitual mistakes, improve decision-making and foster a more vigilant workforce.
Rather than blaming users, the session introduces a constructive and empowering model to build cognitive resilience – treating attention as the new perimeter in your layered defense strategy.
This session will cover:
Anna Collard, Senior Vice President of Content Strategy and Evangelist, KnowB4 Africa
10:10 AM - 10:20 AM SAST
Networking break
In today's threat landscape, African CISOs must do more than secure infrastructure: they must influence strategic decisions at the board level.
This session will explore how security leaders can effectively communicate cyber risk in business terms, align cybersecurity KPIs with enterprise goals and build boardroom confidence during periods of economic uncertainty. Attendees will learn how to shift conversations from vulnerabilities and tools to resilience, risk appetite and long-term value creation while securing critical investment in cybersecurity initiatives.
This session will cover:
Dr. Bharat Soni CISO and DPO, GT Bank
Large language models are rapidly entering enterprise workflows - from customer service automation to threat intelligence augmentation.
But with new opportunities come new risks: data leakage, prompt injection, unauthorized access and compliance gaps. This session will guide CISOs and IT leaders through the evolving threat landscape of enterprise LLMs, offering practical strategies for securing models, controlling access and aligning deployments with internal policies and regulatory requirements. Whether you’re piloting gen AI or scaling adoption, this session will help you build safely and responsibly.
This session will cover:Tunde Dada, Group CIO/BCM, inq. digital Group
As the conversation shifts from generative AI to agentic AI, it's clear that artificial intelligence holds tremendous potential to ease zero trust fatigue, but only when guided by business context, quality data and human oversight.
CISOs see AI as a “basket of opportunities” with plenty of “vendor blind spots.
This session will cover:
Renaldo Jack, Group Head, Cybersecurity, Globeleq
Grant Hughes, CISO, GVW Group
Cybersecurity risks associated with third parties often extend far beyond the terms of the initial contract.
As high-profile breaches involving vendors become more common, enterprises must develop a continuous, risk-based approach to vendor management — focusing on real-time monitoring, access governance, compliance auditing, and incident response readiness. This session will explore how organizations can move beyond checklist-based vendor onboarding to build dynamic, proactive vendor risk management programs that safeguard sensitive data, critical operations, and regulatory compliance across complex supply chains.
This session will cover:Hanniel Jafaru, Founder and Executive Director of HTC Academy
CISOs and security leaders face a growing array of sophisticated threats targeting hybrid and multi-cloud environments as African enterprises accelerate their cloud adoption.
From supply chain compromises to AI-powered attacks, the cloud security landscape is evolving faster than traditional controls can keep up.
Attendees will explore actionable strategies to build resilient, future-ready cloud security programs, while gaining guidance on aligning security architecture with business priorities, managing risk across infrastructure and fostering a culture of continuous security innovation.
This session will cover:
Femi Olofintila M, Cyber Risk, Compliance and Data Privacy SME, Reliance Home Comfort
Sodiq Bello, CISO, Lotus Bank
Abumere Igboa, CISO/DPO, Stanbic IBTC
12:13 PM - 12:15 PM SAST
Closing Comments
The event will be simulive on August 7, 2025 (9:00 am – 2:00 pm) and available on demand until the end of Day, August 7, 2025.