<H1> Universities Attending </H1> |
<H2> Theme: Cybersecurity-Industry-Workforce. </H2> |
<H2> 6,500 </H2> |
<H2> 75 </H2> |
<H2> 125 </H2> |
<H2> 90 </H2> |
<H2> 65% </H2> |
<H2> CYBERWEEK DIGITAL EXPERIENCE </H2> |
<H2> SPONSORSHIP PACKAGES
</H2> |
<H2> $ 7,500 </H2> |
<H2> $ 5,000 </H2> |
<H2> $ 2,500 </H2> |
<H2> $ 1,500 </H2> |
<H2> Event Schedules </H2> |
<H2> 8:30 AM - 5:30 PM </H2> |
<H2> 8:30 AM - 5:30 PM </H2> |
<H2> 7:00 PM - 9:00 PM
</H2> |
<H2> 7:00 PM - 9:00 PM </H2> |
<H2> 8:00 AM - 9:00 AM
</H2> |
<H2> 8:00 AM - 9:00 AM </H2> |
<H2> 9:00 AM - 9:30 AM
</H2> |
<H2> 9:00 AM - 9:30 AM </H2> |
<H2> 9:35 AM - 9:50 AM
</H2> |
<H2> 9:35 AM - 9:50 AM </H2> |
<H2> 9:55 AM - 10:15 AM
</H2> |
<H2> 9:55 AM - 10:15 AM </H2> |
<H2> 10:20 AM - 10:35 AM
</H2> |
<H2> 10:20 AM - 10:35 AM </H2> |
<H2> 10:40 AM - 10:55 AM
</H2> |
<H2> 10:40 AM - 10:55 AM </H2> |
<H2> 11:00 AM - 11:30 AM </H2> |
<H2> 11:20 AM - 12:00 AM </H2> |
<H2> 01:00 PM - 02:00 PM </H2> |
<H2> 02:00 PM to 2:15 PM </H2> |
<H2> 2:20 PM to 03:00 PM </H2> |
<H2> 03:05 PM to 3:20 PM </H2> |
<H2> 03:20 PM to 4:00 PM </H2> |
<H2> 08:00–09:00
</H2> |
<H2> 08:00–09:00 </H2> |
<H2> 09:00–10:00
</H2> |
<H2> 09:00–10:00 </H2> |
<H2> 10:00–10:30
</H2> |
<H2> 10:00–10:30 </H2> |
<H2> 10:30–11:00
</H2> |
<H2> 10:30–11:00 </H2> |
<H2> 11:00–11:30
</H2> |
<H2> 11:00–11:30 </H2> |
<H2> 11:30–12:00
</H2> |
<H2> 11:30–12:00 </H2> |
<H2> 12:00–12:30 </H2> |
<H2> 12:30–13:00 </H2> |
<H2> 13:00–14:00 </H2> |
<H2> 14:00–14:30 </H2> |
<H2> 14:30–15:30 </H2> |
<H2> 15:30–16:00 </H2> |
<H2> 16:00–16:30 </H2> |
<H2> 08:00–09:00
</H2> |
<H2> 08:00–09:00 </H2> |
<H2> 09:00–10:00
</H2> |
<H2> 09:00–10:00 </H2> |
<H2> 10:00–10:30
</H2> |
<H2> 10:00–10:30 </H2> |
<H2> 10:30–11:00
</H2> |
<H2> 10:30–11:00 </H2> |
<H2> 11:00–11:30
</H2> |
<H2> 11:00–11:30 </H2> |
<H2> 11:30–12:00
</H2> |
<H2> 11:30–12:00 </H2> |
<H2> 12:00–12:30 </H2> |
<H2> 12:30–13:00 </H2> |
<H2> 13:00–14:00 </H2> |
<H2> 14:00–14:30 </H2> |
<H2> 14:30–15:30 </H2> |
<H2> 15:30–16:00 </H2> |
<H2> 16:00–16:30 </H2> |
<H2> 08:00–09:00
</H2> |
<H2> 08:00–09:00 </H2> |
<H2> 09:00–10:00
</H2> |
<H2> 09:00–10:00 </H2> |
<H2> 10:00–10:30
</H2> |
<H2> 10:00–10:30 </H2> |
<H2> 10:30–11:00
</H2> |
<H2> 10:30–11:00 </H2> |
<H2> 11:00–11:30
</H2> |
<H2> 11:00–11:30 </H2> |
<H2> 11:30–12:00
</H2> |
<H2> 11:30–12:00 </H2> |
<H2> 12:00–12:30 </H2> |
<H2> 12:30–13:00 </H2> |
<H2> 13:00–14:00 </H2> |
<H2> 14:00–14:30 </H2> |
<H2> 14:30–15:30 </H2> |
<H2> 15:30–16:00 </H2> |
<H2> 16:00–16:30 </H2> |
<H2> Attending Virtually? </H2> |
<H2> Previous Speakers </H2> |
<H2> 2024 Theme:
Cybersecurity Industry Workforce </H2> |
<H2> Latest News
</H2> |
<H2> Hear from Previous Participants!
</H2> |
<H3> SIDE EVENTS
</H3> |
<H3> Pre-Conference VIP B2B – briefing and workshop – Invitation Only Hackathon </H3> |
<H3> Meet, Engage with Business Leaders, Cyber Experts, Government Officials & Thought Leaders </H3> |
<H3> Cocktail Reception & Networking with Industry Leaders- Invitation Only </H3> |
<H3> Registration, Virtual Entry </H3> |
<H3> Introduction and welcome remarks </H3> |
<H3> Guest of Honor Opening Address </H3> |
<H3> State of Cybersecurity & AI. </H3> |
<H3> Industry Collaboration In Cybersecurity & AI. </H3> |
<H3> Cybersecurity meets AI. </H3> |
<H3> National Cybersecurity Policy & Strategy </H3> |
<H3> Future Technologies, Future Threats and Future Security. </H3> |
<H3> Networking Lunch & Exhibition </H3> |
<H3> AI influence in Disinformation and FAKE NEWS. </H3> |
<H3> The Impact of covid-19 in Cybersecurity & AI </H3> |
<H3> Shaping Next generation Digital Trust </H3> |
<H3> Open Mic </H3> |
<H3> ARRIVAL & REGISTRATION </H3> |
<H3> CLOUD SECURITY’S FUTURE: AI-DRIVEN INSIGHTS AND PREDICTIONS FOR ENTERPRISE STRATEGY </H3> |
<H3> EMERGING TECHNOLOGIES: MACHINE LEARNING </H3> |
<H3> CORE DRIVERS OF CYBER INEQUITY: IDENTIFYING AND ADDRESSING ROOT CAUSES </H3> |
<H3> AI-POWERED THREAT DETECTION IN THE CLOUD: A NEW DAWN IN SECURITY </H3> |
<H3> AI IN CYBERSECURITY: RISKS AND OPPORTUNITIES FOR THE FUTURE </H3> |
<H3> TEN LEGAL ISSUES FOR CISO’S IN 2025: NAVIGATING THE COMPLEX LANDSCAPE </H3> |
<H3> LUNCH BREAK AND NETWORKING </H3> |
<H3> BEYOND THE HYPE: DEEPFAKES, SECURITY AWARENESS, AND THE RESILIENCE OF YOUR COMPANY </H3> |
<H3> SUPPLY CHAIN RISKS – ARE THEY OUT OF CONTROL? </H3> |
<H3> CLOUD BEYOND THE HORIZON: NAVIGATING THROUGH CLOUD SECURITY STRATEGIES </H3> |
<H3> THE BATTLEFIELD OF CYBERSECURITY: ADVANCED CLOUD PROTECTION MEASURES </H3> |
<H3> CLOUD GOVERNANCE TRANSFORMATION: STEERING THROUGH 2024’S SECURITY CHALLENGES </H3> |
<H3> ARRIVAL & REGISTRATION </H3> |
<H3> CYBERSECURITY IN INDUSTRY </H3> |
<H3> CYBERSECURITY AND DEVELOPING COUNTRIES: CHALLENGES AND OPPORTUNITIES </H3> |
<H3> COMMUNICATING CYBERSECURITY TO THE BOARD: CHALLENGES AND BEST PRACTISES </H3> |
<H3> CORPORATE REPUTATION: BUILDING A ROBUST CYBER SECURE ECOSYSTEM </H3> |
<H3> LAW, POLICY, AND ETHICS – SUGGESTIONS ON STAYING COMPLIANT IN THE AGE OF AI </H3> |
<H3> SERVERLESS SECURITY: CRAFTING ROBUST STRATEGIES TO MITIGATE NEW THREATS IN THE CLOUD </H3> |
<H3> LUNCH BREAK AND NETWORKING </H3> |
<H3> BEYOND THE HYPE: DEEPFAKES, SECURITY AWARENESS, AND THE RESILIENCE OF YOUR COMPANY </H3> |
<H3> SUPPLY CHAIN RISKS – ARE THEY OUT OF CONTROL? </H3> |
<H3> CLOUD BEYOND THE HORIZON: NAVIGATING THROUGH CLOUD SECURITY STRATEGIES </H3> |
<H3> THE BATTLEFIELD OF CYBERSECURITY: ADVANCED CLOUD PROTECTION MEASURES </H3> |
<H3> CLOUD GOVERNANCE TRANSFORMATION: STEERING THROUGH 2024’S SECURITY CHALLENGES </H3> |
<H3> ARRIVAL & REGISTRATION </H3> |
<H3> CLOUD-NATIVE SECURITY: BUILDING RESILIENT INFRASTRUCTURES WITH MACHINE LEARNING </H3> |
<H3> CYBERSECURITY IN THE FINANCIAL SECTOR: A CRITICAL BUSINESS IMPACT ANALYSIS </H3> |
<H3> CORE DRIVERS OF CYBER INEQUITY: IDENTIFYING AND ADDRESSING ROOT CAUSES </H3> |
<H3> DEEPFAKES, MISINFORMATION, AND GEN AI </H3> |
<H3> TABLETOP EXERCISE: NIS2 FRAMEWORK IMPLEMENTATION </H3> |
<H3> TEN LEGAL ISSUES FOR CISO’S IN 2025: NAVIGATING THE COMPLEX LANDSCAPE </H3> |
<H3> LUNCH BREAK AND NETWORKING </H3> |
<H3> BEYOND THE HYPE: DEEPFAKES, SECURITY AWARENESS, AND THE RESILIENCE OF YOUR COMPANY </H3> |
<H3> SUPPLY CHAIN RISKS – ARE THEY OUT OF CONTROL? </H3> |
<H3> CLOUD BEYOND THE HORIZON: NAVIGATING THROUGH CLOUD SECURITY STRATEGIES </H3> |
<H3> THE BATTLEFIELD OF CYBERSECURITY: ADVANCED CLOUD PROTECTION MEASURES </H3> |
<H3> CLOUD GOVERNANCE TRANSFORMATION: STEERING THROUGH 2024’S SECURITY CHALLENGES </H3> |
<H3>
Networking
</H3> |
<H3>
Great Speakers
</H3> |
<H3>
New People
</H3> |
<H3>
Fun Basket
</H3> |
<H3> Haider Chaudhary </H3> |
<H3> Noah Emuna </H3> |
<H3> Danstan Akwiri </H3> |
<H3> Victor Muriithi </H3> |
<H3> Sanjiv Sharma </H3> |
<H3> Deborah Masara </H3> |
<H3> Dr. David Njoga </H3> |
<H3> Nancy Muriithi </H3> |
<H3> AI & Machine learning in Cybersecurity. </H3> |
<H3> Cybersecurity: A shared responsibility </H3> |
<H3> Cybersecurity </H3> |
<H3> Limited seats available. Hurry up to book your seat </H3> |
<H3> Our Address
</H3> |
<H3> Our Address </H3> |
<H3> Quick Links </H3> |
<H3> Quick Links </H3> |
<H3> Our Contacts </H3> |
<H3> Our Contacts </H3> |
<H3> Website </H3> |
<H3> Website </H3> |
<H4> .
</H4> |
<H4> . </H4> |
<H4> Why Join </H4> |
<H4> . </H4> |
<H4> INFO UPDATE </H4> |
<H4> Pritam Vekaria </H4> |
<H4> Donna Nyaga </H4> |
<H4> Solomon Njuguna </H4> |
<H4> . </H4> |
<H4> Location </H4> |
<H4> Line Phone </H4> |
<H4> Mobile Phone </H4> |
<H4> Email </H4> |
<H5> Cybersecurity & Cloud Technology Industry Expert </H5> |
<H5> Consultant, Homeland Security </H5> |
<H5> VP, Cyberpro </H5> |
<H5> Technologist </H5> |
<H5> EC- Council </H5> |
<H5> ICT Manager </H5> |
<H5> NC4, Head of Cybersecurity </H5> |
<H5> CyberSecurity Engineer </H5> |
<H5> Cybersecurity Analyst </H5> |
<H5> Cybersecurity Analyst </H5> |
<H5> Data Manager </H5> |
Social
Social Data
Cost and overhead previously rendered this semi-public form of communication unfeasible.
But advances in social networking technology from 2004-2010 has made broader concepts of sharing possible.