Frequently Asked Questions

You are here

1. AfriSecure Cyber Security  Summit

18 & 19 October 2017  |  The Maslow Hotel, Sandton, Johannesburg

2. Customer Service

If you have any questions about the event, do not hesitate to email us

3. Registration

Registration can be completed through your sales representative or through the website registration form, here: ###

4. Agenda

If you are registered to attend and would like an updated copy of the agenda, you can requests on through the producer




Registration will be at the information desk at The Maslow Hotel, Sandton, Johannesburg. You need not bring anything along with you as you are automatically added to the attendee list when you register.

You can enter via the designated parking area around the back (level 0) or via the drop off area around the front of the venue. Below you will find a map to the parking area. Please note that parking is complimentary, and you can collect your ticket at the help desk.

At registration you will receive

  • Your delegate badge - without a badge you will not be allowed into the main plenary and workshop sessions.
  • AfriSecure Event brochure

If you require accommodation for the event please request our "AfriSecure Accommodation and Directions" information sheet via
Our venue is proudly Kosher/Halaal friendly. However should you require a specific meal, please send your requirements to
The wifi at the venue is password protected. You will be able to find this password in your event brochure on the day.
The dress code is Business Formal
 We endeavor to get the presentations up after three working days of the event you will be sent a link to complete the event feedback form. Once completed you can download the event presentations.
 As an attendee you will receive periodic updates. However, you are welcome to request any information, such as an updated agenda, at any time via
As an attendee you will have 3 days before the start of the summit to make your selections. Should you not make a selection, you will be allocated a workshop. Please be advised that you need to stick with your selections as you will not be allowed to enter a workshop you are not registered for.

The agenda allocates 4 workshop sessions all workshops will take place on Day 1 of the summit. Day 2 will be the main conference day. You will be required to select 1 workshop in each session.


All our event information is private and is accessed by entering the event password #AfriSecure

Session question and answer, In each session attendees will be able to relay their questions directly to the moderator and respective speaker. Fellow attendees are also able to up-vote questions to ensure they are addressed before less relevant ones. These questions are answered in real time during the session.

 Live polling, Attendees will have the opportunity to rate speakers, presentations, and a particular session.
Session and event feedback, Complete the event feedback form via the app. Attendees will be able to rate, comment, and grade all aspects of the event from venue to food and the event in its entirety.
Speaker profiles, Get to know the speakers by reading up on speaker profiles and accessing speaker company websites and social media links.


AfriSecure will create awareness around Cybersecurity threats, that organisations face today and a look to the future. Bringing together an industry that needs more collaboration between organisations and solution providers.

Risk Management

For Corporate, Financial and Technology Enterprises: Companies now find themselves encountering new corporate governance and financial reporting challenges which are causing them to view company-wide risk in a different perspective.

Cloud Security and Virtualization

How has cloud security progressed over the past year? What is new, and how can you take full advantage of cloud security.

The human element

Educating the entire organisation and its importance on cybersecurity as staff members are a weak link for hackers.


Governance, Risk and Compliance

IT governance risk and compliance is important to you and your organisation as we use it to make money, improve the customer experience, manage employees effectively and to create efficiencies.

Hackers and Threats

Aims to inform you on how to prevent: Hijacking of your usernames and passwords, stealing your money via bank account fraud, Identity theft, Making purchases in your name, Cyber criminals infiltrating your credit facilities.

DDOS Mitigation

DISTRIBUTED DENIAL OF Service (DDoS) attacks are a real threat businesses and organizations deal with daily, but this does not mean they have to endure the slashes of service or slowdowns attacks bring on.


Application Security and DevOps

Rapid application delivery is dramatically transforming how software is created and delivered, pushing the limits on the speed and innovation required of development teams.

Mobile Security

“Bring Your Own Device”, (BYOD) is most definitely a security incident waiting to happen for many businesses. But in Africa, where many employees own multiple devices, the risks are stacked even higher.


Cybercriminals have emerged to feed off this burgeoning market, targeting innocent users with a wide range of malware. Today, ransomware has emerged as one of the most troublesome malware categories of our time.