Frequently Asked Questions

You are here

1. AfriSecure Summit

17 - 18 October 2018, The forum, Johannesburg

2. Customer Service

If you have any questions about the event, do not hesitate to email us

3. Registration

Registration can be completed through your sales representative or through the website registration form, here

4. Agenda

If you are registered to attend and would like an updated copy of the agenda, contact customer service




 Registration will open 1hour 30 minutes before the start of the conference.

Accounts department Should you have a payment query please contact Simone Karsten or Megan Mitchley via (+27) 021 180 4700 or click here to send us an email
We recommend you bring a power bank/additional battery pack as charging ports are limited.  Business cards - networking is our main objective, although you are able to swop contacts via the app we recommend bringing along business cards for any additional people you would like to connect with.
"For everything else there is Customer Service. Our customer service desk is monitored by more than 1 person dedicated to assisting you with any other questions you may have about the event. (+27) 021 180 4700.

You can also visit our registration area should you have any app related questions or require any additional assistance with regards to your attendance throughout the 2 days

Registration will be at the information desk at The Forum, Bryanston, Johannesburg.

ou can enter via the designated parking area around the back (level 0) or via the drop off area around the front of the venue. Below you will find a map to the parking area. Please note that parking is complimentary and you can collect your ticket at the help desk.

At registration you will receive

  • Your delegate badge - without a badge you will not be allowed into the main plenary and workshop sessions.
  • IT Leaders and AfriSecure Event agenda

If you require accommodation for the event please request our "AfriSecure Accommodation and Directions" information sheet via
Our venue is proudly Kosher/Halaal friendly. Should you require a kosher meal, please send your requirement  to
The wifi at the venue is password protected. Please visit the registration desk for assistance.
The dress code is business formal
 We endeavour to provide you with copies of the speaker presentations. Unfortunately not all the presentations will be available due to privacy reasons. Expect to receive notification within five working days after the event. You will be sent a link to complete the event feedback form, after completing your feedback you will be able to download the speaker presentations
As an attendee you will receive periodic updates. However, you are welcome to request any information, such as an updated agenda, at any time via
As an attendee you will have 3 days before the start of the event to make your selections. Should you not make a selection, you will be allocated a workshop. Please be advised that you need to stick with your selections as you will not be allowed to enter a workshop you are not registered for.

The agenda allocates 2 workshop sessions all workshops will take place on Day 1 of the summit. Day 2 will be the main conference day. You will be required to select 1 workshop in each session.


All our event information is private and is accessed by following the event app link:

Session question and answer, In each session attendees will be able to relay their questions directly to the moderator and respective speaker. Fellow attendees are also able to up-vote questions to ensure they are addressed before less relevant ones. These questions are answered in real time during the session.

 Live polling, Attendees will have the opportunity to rate speakers, presentations, and a particular session.
Session and event feedback, Complete the event feedback form via the app. Attendees will be able to rate, comment, and grade all aspects of the event from venue to food and the event in its entirety.
Speaker profiles, Get to know the speakers by reading up on speaker profiles and accessing speaker company websites and social media link


AfriSecure will create awareness around Cybersecurity threats, that organisations face today and a look to the future. Bringing together an industry that needs more collaboration between organisations and solution providers.

Risk Management

For Corporate, Financial and Technology Enterprises: Companies now find themselves encountering new corporate governance and financial reporting challenges which are causing them to view company-wide risk in a different perspective.

Cloud Security and Virtualization

How has cloud security progressed over the past year? What is new, and how can you take full advantage of cloud security.

The human element

Educating the entire organisation and its importance on cybersecurity as staff members are a weak link for hackers.


Governance, Risk and Compliance

IT governance risk and compliance is important to you and your organisation as we use it to make money, improve the customer experience, manage employees effectively and to create efficiencies.

Hackers and Threats

Aims to inform you on how to prevent: Hijacking of your usernames and passwords, stealing your money via bank account fraud, Identity theft, Making purchases in your name, Cyber criminals infiltrating your credit facilities.

DDOS Mitigation

DISTRIBUTED DENIAL OF Service (DDoS) attacks are a real threat businesses and organizations deal with daily, but this does not mean they have to endure the slashes of service or slowdowns attacks bring on.


Application Security and DevOps

Rapid application delivery is dramatically transforming how software is created and delivered, pushing the limits on the speed and innovation required of development teams.

Mobile Security

“Bring Your Own Device”, (BYOD) is most definitely a security incident waiting to happen for many businesses. But in Africa, where many employees own multiple devices, the risks are stacked even higher.


Cybercriminals have emerged to feed off this burgeoning market, targeting innocent users with a wide range of malware. Today, ransomware has emerged as one of the most troublesome malware categories of our time.