">
TechMoran
  • About Us
  • Deals
  • Jobs
  • Motoring
    • Money
  • Pitch Your Startup
  • Submit Your Post
  • Freelance Gigs
  • Travel
  • Men’s Corner
  • Dating
Monday, January 25, 2021
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition
No Result
View All Result
TechMoran
">
Home Cybersecurity

CISOs and Cybersecurity experts to assess the continent’s Cybersecurity landscape

Val Lukhanyu by Val Lukhanyu
5 months ago
in Cybersecurity
5 min read
0

CISOs and Cybersecurity experts across Africa are set to host a content-rich virtual conference on Cybersecurity on 28th of August to assess the state of Cybersecurity in the continent.

Hosted by Trescon, the online event will draw interesting insights from leading voices in cyber threat intelligence on Africa’s booming digital ecosystem and its continent-wide online digital trade that is spurring the fundamental requirement of data protection regulations.

The continent is making great strides in fortifying its Cybersecurity perimeter by rendering cyber safety a national priority for most African states. Moreover,

Reports continue to suggest that Africa stands as one of the top regions on the global map to be hard hit by rising cybercrimes. The average cost of cybercrime for businesses increased by 22.7 per cent since 2016, reaching an average of $11.7 million globally

“There is the growing risk of economic stagnation due to Africa’s digital divide and increased cybercrimes,” said Mohammed Saleem, Founder and CEO of Trescon. He further added, “The fundamental idea behind hosting World Cyber Security Summit Africa, is to convene CISOs, IT and Cybersecurity leaders from across the world on an open online forum to unearth cyber intelligence strategies and critical investment opportunities in the African Cybersecurity ecosystem.”

The conference will explore Africa’s complex Cybersecurity landscape by essentially focusing on new-age threats and the technologies/strategies to mitigate them. Some of the key topics to be discussed include Data Privacy & Cyber Regulations; AI and ML for Cybersecurity Intelligence; Disaster Prevention and Recovery Planning; Cybersecurity Capacity Building and Cloud Security.

READ  3 Suspected Hackers Arrested In Ngara For Huge NTSA Cyber Crime

Related posts

Learn Data Privacy, Data Protection Measures & Privacy Laws

December 6, 2020
0
Computer privacy attack. Mixed media

Cybersecurity Attacks Increase As Kenyans Ignore The New Data Protection Act

November 30, 2020
0

Beware of North Korean Hackers, US Warns

November 5, 2020
0

Seculetter partners with SA’s Afri-ko as a product supplier

September 14, 2020
0

The summit will feature virtual keynotes, panel discussions, technology use-cases, product showcases and other insightful sessions.

Readers 1,144

Share

  • Click to share on Telegram (Opens in new window)
  • More
  • Click to share on Tumblr (Opens in new window)
  • Click to print (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Pocket (Opens in new window)

Like this:

Like Loading...

Related

Tags: Cyber RegulationsCybersecurityData Privacy
Val Lukhanyu

Val Lukhanyu

Related Posts

Cybersecurity

Learn Data Privacy, Data Protection Measures & Privacy Laws

December 6, 2020
0
Computer privacy attack. Mixed media
Cybersecurity

Cybersecurity Attacks Increase As Kenyans Ignore The New Data Protection Act

November 30, 2020
0
Columnists

Beware of North Korean Hackers, US Warns

November 5, 2020
0
Cybersecurity

Seculetter partners with SA’s Afri-ko as a product supplier

September 14, 2020
0
Cybersecurity

How to Protect Mobile Applications?

September 7, 2020
0
Cybersecurity

How to secure your business from Cyber Attacks

July 30, 2020
0
Cybersecurity

How to Avoid Being a Victim of Online Fraud

July 16, 2020
0
Cybersecurity

(Update) India bans TikTok, WeChat among 59 chinese apps due to security concerns

June 30, 2020
0

https://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoB
ADVERTISEMENT

Join our Mailing List

Loading

Recent Posts

Finnfund & Norfund double Starsight’s funding to $20 million for Ghana expansion

January 23, 2021

African tech startup funding passes $700m in 2020 despite COVID-19

January 23, 2021
Toshiba

Chrome Now Helps You Change Weak Passwords

January 23, 2021
Toshiba

Shoppable Ad Formats Are Coming Soon To Youtube

January 23, 2021

Hero MotoCorp Surpasses the Monumental 100M Cumulative Production Milestone

January 23, 2021
">
">

Follow Us

">

There are many sites out there focused on blowing off some steam, from funny entertainment to thrilling experiences like playing online, in some cases online gaming could grant you the chance to win extra money. We came across rocketpot.io while browsing for a good btc casino online and it left us a very good impression with their wide variety of games and crypto offering.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

© 2019 Moran Media Group - All rights reserved TechMoran.

No Result
View All Result
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition

© 2019 Moran Media Group - All rights reserved TechMoran.

Login to your account below

Forgotten Password? Sign Up

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
%d bloggers like this: