BSides Joburg 2024

BSides Joburg 2024

The speaker’s profile picture
Andre Lopes

I am a developer who became a security consultant in order to gain more perspective as to how other organisations build their infrastructure and handle their security. I am currently working in mobile division at MWR Cybersec.

  • Terribly Layered Security - The common security failings of cryptography implementations for mobile
The speaker’s profile picture
Ansie Brough

Ansie Brough is a Senior Cyber Security Consultant and Head of Digital Forensics & Incident Response at Redshift Cyber Security (Pty) Ltd. Joining Redshift in 2020, Ansie quickly rose to become Head of Mobile, where she identified a lack of accessible mobile security training, leading her to release a Mobile Security YouTube series. Passionate about digital forensics, she transitioned to Head of Digital Forensics and Incident Response, boasting multiple certifications in both fields. Ansie aims to integrate her expertise in mobile security and digital forensics to enhance cybersecurity practices in her presentations and initiatives.

  • Doppelgänger Devices: Investigating Fake iPhones & Security Implications
The speaker’s profile picture
Connor du Plooy

Connor and Andre work as mobile security consultants for MWRCybersec. Both speakers are passionate about reverse engineering and making their corner of the world safer.

  • Terribly Layered Security - The common security failings of cryptography implementations for mobile
The speaker’s profile picture
Gerhard Botha

Always has time for a meme, but never has time for in-person interaction. I like spending weekends and free time building tools and researching malware. Ask me to do a CTF and I will ask you if I can go home.

  • Reverse-Shell Fallacy: An introduction into defence evasion techniques
The speaker’s profile picture
Heloise Meyer

Heloise Meyer is currently employed as a senior member of the CSIRT within the SANReN group that forms part of the NICIS center at the CSIR. She completed her PhD Computer Science degree in 2019, with a focus on identifying the authenticity of smartphone data. Her interests include digital forensics, mobile security and cyber security.

  • Is ChatGPT a friend of foe to CTF competitions?
The speaker’s profile picture
Isak van der Walt

Security analyst @ OrangeCyberdefense with a keen interest in mobile security and electronics.

  • Certpinning, OpenSSL and Memory Patching. Sounds fun right?
The speaker’s profile picture
Ivan Burke

I have been a cyber security researcher for over 15 years. Mostly working with the CSIR and SANDF. For the last few years I have been working for BlueVision ITM as the head of Research, Development and Innovation. This has allowed me to build cyber security challenges for universities and to get involved with cyber security conferences such as BSides and 0xCon.

  • The evolution/revolution of Cryptography and Quantum Computing in Cyber Security
The speaker’s profile picture
Kitso Moema

Hi! I'm a certified Junior Penetration Tester and Digital Forensics Professional, currently working as a Cyber Security Consultant at Redshift Cyber Security. I have a keen passion for intelligence gathering, cybercrime investigations, and helping others navigate the ever-evolving cyber threat landscape. In my role, I get to actively hunt scammers, fraudsters, and other cyber criminals alike. Really cool stuff. My ultimate goal is to end up into a law enforcement role where I can continue to protect and secure the digital world.

  • The Hidden War: Navigating the Threats of Corporate Espionage
The speaker’s profile picture
Marvin Ngoma

Marvin is a seasoned consultant and security architect. He has a strong passion for helping organizations succeed in their cybersecurity programs. He has led many projects in both the private and public sector, architecting and building Security Operations and Intelligence capability; unifying tools, processes and people.

He is currently based in the nordics and uses his expertise to help organizations throughout EMEA, on how best they can create security value in their organizations.

  • AV Evasion - How Adversaries Aim to Bypass Antivirus Tools
The speaker’s profile picture
nithen

Nithen Naidoo is the founder of Snode Technologies, a South African Cyber Defence firm. Snode's homegrown technologies have won international recognition, most notable is the DTI’s South African Innovation Award in 2020.

  • I've seen you get hacked! (AI Real-Time Attack Simulation)
The speaker’s profile picture
Roberto Arico

All round nice guy and BSides JHB & BSides Cape Town organiser. Keen interest in Cybersecurity and all things hacking.

  • Your Own Worst Enemy - Beating Imposter Syndrome
The speaker’s profile picture
Robin Roodt

I am an ambitious and adaptive individual with a logical mindset and practical approach to problem solving. This makes me good at analyzing and extracting information to make sure that the team understands the problem and their roles on how to solve it. This also allows me to see where possible improvements can be made within the company to enhance overall performance of the team to give the best possible results. I am eager to be challenged to grow and further my current skills. My greatest passion in life is to provide innovative solutions to current challenges.

  • Hacking The Airwaves!
The speaker’s profile picture
Rohan Dayaram

21-year-old cybersecurity enthusiast interested in programming and hardware. I love writing code, 3d modelling and printing, electronics and anything else in tech. I have a deep passion for programming and hacking, I love learning about vulnerabilities and how to exploit them.

  • BlindSQLi falls on deaf ears
The speaker’s profile picture
Rudi Grobler

Seasoned (synonym for old) software engineer who has been developing software for diverse vertical markets for over two decades.

He has previously been recognized as a Microsoft MVP for his expertise in XAML-based products, including Windows Phone, WPF, and Silverlight.

  • From Overheating to Overachieving: A Comedic Tale of Hacking My Car
The speaker’s profile picture
Sa'ad Kari

Sa'ad Kari, a Mathematician with a Bachelor's Degree in Physics & Mathematics, a Honours Degree in Mathematics and professional experience working as a cryptography developer. He is currently pursuing his Masters Degree with a strong focus on quantum-resistant cryptography.

  • The evolution/revolution of Cryptography and Quantum Computing in Cyber Security
The speaker’s profile picture
Samresh Ramjith

Samresh is a Partner in Deloitte Africa’s Risk Advisory practice based in Johannesburg and is the current leader of the Africa Cyber practice. His cyber experience spans more than 20 years in the Sub-Saharan cybersecurity industry.
His core experience spans deep technical roles through to executive business and people management, across market sectors. He qualified as an Electronic Engineer, before moving into software development and system engineering roles. He then qualified as a firewall engineer, before moving into pre-sales, cybersecurity consulting, and business management roles. He holds a Master’s degree in digital business, as well as several cybersecurity specific certifications, most notably CISSP (2009) and CISM (2010).
He was the Deputy CISO at ABSA Group, where he led the Cyber Security Consulting Service Group which comprised of Lead Security Consultants, Security Architects & Research teams. He also chaired the SABRIC Cybersecurity Forum, driving banking sector-wide engagement on topical cybersecurity matters. His prior work experience includes leadership roles in EY Africa, IBM Global Security Services and Dimension Data MEA.

  • The CISO's Field Guide to GenAI
The speaker’s profile picture
Sandika Daya

Sandika is a technology governance, risk and compliance leader with 17 years of experience in IT audit, assurance and advisory in the banking and broadcast industries. She provides strategic oversight in IT, digital, audit, risk, social and ethics committees as an independent committee member for various organisations. Sandika also provides strategic direction for digital products as an advisory board member. She holds a BSc in Computer Science and Applied Mathematics and is currently pursuing her Master’s in Digital Transformation and Innovation Leadership. She speaks publicly on all things digital.

  • Cybersecurity in the Boardroom: From Risk to Strategic Advantage
The speaker’s profile picture
singe

Long time hacker and cybersecurity researcher and more recently, business leader.

  • Could ZA be 1337? What if we cast off the dark and lead the way to a new dawn
The speaker’s profile picture
Tlhologelo Mphahlele

Tlhologelo Mphahlele is a cybersecurity professional currently working within the cyber threat intelligence domain for one of the banks in South Africa, where he applies his knowledge and experience to safeguard financial infrastructure.

With a doctorate in Information Systems from University of the Western Cape and a Master's degree in Security and Network Engineering from Innopolis University in Russia, Dr. Mphahlele has a solid academic foundation in cybersecurity. His professional journey spans diverse sectors, including banking, telecommunications, and retail, where he has honed his skills and expertise in security practices and protocols.

Dr. Mphahlele is not only active in the corporate realm but also contributes to academia. He plays a vital role in shaping the next generation of cybersecurity professionals by contributing to content for one of South Africa's higher education providers in cybersecurity and network engineering modules.

  • Developing a cybersecurity framework for commercial banks in South Africa
The speaker’s profile picture
Vimilan Naiker

TBD

  • The evolution/revolution of Cryptography and Quantum Computing in Cyber Security