Thursday, March 19, 2015

Telspace to host invite only IT security conference in March 2015

Telspace Systems is to host a “by invitation only” conference on March 26th 2015 in Johannesburg.

“The Telspace Security Conference Part 1 is part of a series the company has planned to disseminate IT security information to ensure that its clients remain at the forefront of cybersecurity trends,” says Telspace Systems CEO Dino Covotsos.

The conference series will take place three or four times a year, most likely in line with each quarter.

“The aim of the series is for Telspace Systems to give back to its customers through sharing knowledge, and enabling business to see the current and future trends that may impact them. This is not a sales event, and will not include sales pitches to sell our services,” Covotsos says.

Our goal is to disseminate information that we, and other parties have researched in order to bring cutting-edge information to our clients, allowing them to be on the forefront of the cybersecurity landscape,” he says.

“We value our clients’ business and we know how much they value up-to-date information on the information security landscape.”

Kick-starting the series

According to Covotsos, Jayson Street, author of “Dissecting the hack: The F0rb1dd3n Network, will kick-start the series at the Telspace Security Conference Part 1 in March, with more international security experts scheduled to deliver keynote addresses throughout the year.

Topics covered will include demonstrations by Telspace Systems analysts on the latest vulnerabilities, current trends in the hacker space, 0-Days and how they impact corporates and individuals alike, social engineering, and other pertinent security matters for the industry.

“The March program has the perfect balance between technical and informative material so that it’s relevant for technical staff, project managers, managerial and CIO-level employees”, he says.  


Tuesday, March 10, 2015

Reino Mostert to speak at ITWeb Security Summit 2015

One of our senior security analysts will offer some insight on the process complexity that eventually leads many corporates to IT security failings.

Many a time companies put in place strong precautions to protect their data and clients from cybercriminals, yet breaches, data theft and the spread of malware continue to happen at a fast pace, with some of the cyber-attacks having such far-reaching consequences that they make it into the news headlines.

Telspace Systems senior security analyst Reino Mostert has some insight on the process complexity that usually leads to IT security failings, and he plans to share some of it in his talk at the ITWeb Security Summit 2015. The summit will take place on 26-28 of May at Vodacom World in Midrand, Gauteng.

Entitled “Hacked: Why We All Fail At Information Security,” Mostert’s presentation will expose the most common flaws in the practice of information security in large corporates and enterprises.  

“IT Security is a complex field, with a variety of challenges. One of the main reasons corporations fail at security is the inability to fully grasp this complexity and address it appropriately.  IT Security should be process driven to effectively mitigate the threats faced by organizations,” Mostert says.

The second reason corporations fail at IT security is that they tend to compartmentalize the responsibilities of IT Security to the IT Security department, while it should be diversified across the organization, he adds.

Mostert’s presentation will cover business and technical aspects of IT security, with a special focus on the process complexity that eventually leads to security failings and topics that include procurement, architecture design, change control, ticketing workflow and vulnerability management.

Mostert, whose job at Telspace Systems focuses on the penetration testing of enterprise networks and assessment of critical web applications, will also provide real-life examples of security failings, the technical issues involved, fixing these issues and how this relates back to business processes.


“The Summit always allows one to catch up with one’s peers in the industry and to exchange war stories and experience in the corridors before gaining wisdom from industry leaders at their presentations,” he says.