New cybersecurity pavilion for Securex 2019

March 2019 Editor's Choice, Information Security, News & Events, Conferences & Events, Training & Education

Securex South Africa 2019 has announced that 4Sight Technologies, a subsidiary of an international holdings company focusing on investing in Industry 4.0 companies, has signed on as the official sponsor of the expo’s new Cybersecurity Pavilion.

“4Sight Technologies (previously Strategix), a member of the 4Sight Holdings Group, worked with us in 2018 to introduce the Securex Cyber Lab, which proved so relevant to many of our visitors that we’ve decided to go even larger in 2019,” says Sven Smit, portfolio director at Specialised Exhibitions Montgomery. “This year, our focus on cybersecurity is going to be bigger, more engaged and hosted on the brand new Cybersecurity Pavilion.”

The pavilion will bring a zoned-in focus to the state of cybersecurity in South Africa, looking at the steps businesses are taking to confront the growing threats and at how companies, like 4Sight, are helping them protect their valuable business data.

“Cybersecurity is one of the largest threats any business faces in today’s digital economy and it seems local businesses are all in different spaces when it comes to prevention and management protocols,” says Deneys Minne, chief revenue officer at 4Sight Technologies.

He says that data integrity and sovereignty for a company is its livelihood, but all of this data is at risk if the organisation’s security strategy doesn’t include cybersecurity. This is most relevant when talking about big businesses that have been entrusted with personal customer information.

“Those that are aware are protective of this data, but there are a surprising number of people who don’t actually realise how prevalent cyber threats are, or how damaging they can be should they manage to break through the firewall,” explains Minne.

“Poor security practices inevitably lead to financial loss and reputational damage, which affects the entire organisation’s bottom line and credibility. Trust and loyalty are hard to replace and so taking measures to ensure best practice is now a non-negotiable.

“Our intention for the Cybersecurity Pavilion will be to offer a platform to demonstrate the types of threats we are currently facing, the challenges experienced by businesses wanting to increase security levels and preparedness, as well as the solutions available to those focusing on cybersecurity as part of their digital transformation journey.”

Aside from the existing free-to-attend Securex Seminar Theatre, visitors to the Cybersecurity Pavilion will have access to additional free talks by industry experts across a range of cybersecurity related topics, as well as one-on-one time with these speakers, who will be on-site throughout the exhibition. The talks will delve into various hot topics including ‘How to reduce the risk of cyber-attacks’, ‘A future without passwords’, and ‘Social engineering and the risk social media exposes’. Exhibiting companies on the pavilion will include AccTech Azure, 4Sight Technologies, Glovent, Ntsika Digital, DQS, and Dynamics Africa, amongst others.

Minne believes that there are sufficient solutions on the market to ensure a fair amount of protection, but says the question is whether people and businesses are making the right choices in securing themselves adequately.

“The Securex Cybersecurity Pavilion offers the platform for this type of investigation, as it will play host to a number of cybersecurity companies and experts who will be demonstrating various security solutions and apps,” adds Smit. “It is here that organisations can empower themselves to prevent, detect and respond to the cyber threats and attacks that, like it or not, businesses will be facing in the coming years,” he concludes

Securex South Africa 2019 will take place at Gallagher Convention Centre from 14 to 16 May 2019, and is co-located with A-OSH EXPO as well as – for the very first time – Facilities Management Expo 2019.

Visitors are able to register for attendance at no cost by visiting www.securex.co.za, gaining access to all three shows.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
The HR Trap
Security Services & Risk Management Training & Education
When human resources becomes a risk factor. Andre du Venage examines why your CCTV security and other technology risks are covered, but human resources are often overlooked.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
GenAI fraud forcing banks to shift from identity to intent
AI & Data Analytics Information Security Financial (Industry)
The complexity and velocity of modern fraud schemes, from deepfakes to fraud and scams involving social engineering, demand more than just investment in new tools; they need adaptability and expanding the security net.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.