New cybersecurity pavilion for Securex 2019

March 2019 Editor's Choice, Information Security, News & Events, Conferences & Events, Training & Education

Securex South Africa 2019 has announced that 4Sight Technologies, a subsidiary of an international holdings company focusing on investing in Industry 4.0 companies, has signed on as the official sponsor of the expo’s new Cybersecurity Pavilion.

“4Sight Technologies (previously Strategix), a member of the 4Sight Holdings Group, worked with us in 2018 to introduce the Securex Cyber Lab, which proved so relevant to many of our visitors that we’ve decided to go even larger in 2019,” says Sven Smit, portfolio director at Specialised Exhibitions Montgomery. “This year, our focus on cybersecurity is going to be bigger, more engaged and hosted on the brand new Cybersecurity Pavilion.”

The pavilion will bring a zoned-in focus to the state of cybersecurity in South Africa, looking at the steps businesses are taking to confront the growing threats and at how companies, like 4Sight, are helping them protect their valuable business data.

“Cybersecurity is one of the largest threats any business faces in today’s digital economy and it seems local businesses are all in different spaces when it comes to prevention and management protocols,” says Deneys Minne, chief revenue officer at 4Sight Technologies.

He says that data integrity and sovereignty for a company is its livelihood, but all of this data is at risk if the organisation’s security strategy doesn’t include cybersecurity. This is most relevant when talking about big businesses that have been entrusted with personal customer information.

“Those that are aware are protective of this data, but there are a surprising number of people who don’t actually realise how prevalent cyber threats are, or how damaging they can be should they manage to break through the firewall,” explains Minne.

“Poor security practices inevitably lead to financial loss and reputational damage, which affects the entire organisation’s bottom line and credibility. Trust and loyalty are hard to replace and so taking measures to ensure best practice is now a non-negotiable.

“Our intention for the Cybersecurity Pavilion will be to offer a platform to demonstrate the types of threats we are currently facing, the challenges experienced by businesses wanting to increase security levels and preparedness, as well as the solutions available to those focusing on cybersecurity as part of their digital transformation journey.”

Aside from the existing free-to-attend Securex Seminar Theatre, visitors to the Cybersecurity Pavilion will have access to additional free talks by industry experts across a range of cybersecurity related topics, as well as one-on-one time with these speakers, who will be on-site throughout the exhibition. The talks will delve into various hot topics including ‘How to reduce the risk of cyber-attacks’, ‘A future without passwords’, and ‘Social engineering and the risk social media exposes’. Exhibiting companies on the pavilion will include AccTech Azure, 4Sight Technologies, Glovent, Ntsika Digital, DQS, and Dynamics Africa, amongst others.

Minne believes that there are sufficient solutions on the market to ensure a fair amount of protection, but says the question is whether people and businesses are making the right choices in securing themselves adequately.

“The Securex Cybersecurity Pavilion offers the platform for this type of investigation, as it will play host to a number of cybersecurity companies and experts who will be demonstrating various security solutions and apps,” adds Smit. “It is here that organisations can empower themselves to prevent, detect and respond to the cyber threats and attacks that, like it or not, businesses will be facing in the coming years,” he concludes

Securex South Africa 2019 will take place at Gallagher Convention Centre from 14 to 16 May 2019, and is co-located with A-OSH EXPO as well as – for the very first time – Facilities Management Expo 2019.

Visitors are able to register for attendance at no cost by visiting www.securex.co.za, gaining access to all three shows.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Managing access for devices, bots, and systems
Securex South Africa IoT & Automation
South African access control environments are becoming more complex. It is no longer only people who need identities; machines, IoT devices, service accounts, and even AI tools now require secure authentication.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
Protecting high-value data from AI
CASA Software Infrastructure Information Security Products & Solutions
As artificial intelligence accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.