Ryan started his career in IT in 2002, with over 17 years of experience in IT security and risk management, spanning across various industries for organisations of all sizes. Ryan holds various IT qualifications including a BSc Computer Science Degree, National Diploma in Computer System Engineering, PMP, CISM and CISA.
Candice is a qualified CAIB(SA) specialising in Finance. Specifically on the topic of cyber crime and cyber insurance, Candice has appeared on:CliffCentral, eTV, eNCA and CNBC as well as featured numerous radio and printed articles such as:The Star, Cape Argus, Cape Times, Citizen, Cosmopolitan Magazine, Cover Magazine, Daily News, FA News, Mercury, New Age and RiskSA.
Candice is a qualified CAIB(SA) specialising in Finance. Specifically on the topic of cyber crime and cyber insurance, Candice has appeared on:CliffCiugotiugoritugs radio and printed articles such as:The Star, Cape Argus, Cape Times, Citizen, Cosmopolitan Magazine, Cover Magazine, Daily News, FA News, Mercury, New Age and RiskSA.
Bennie was in the service of the South African Police Service for seven years where he was trained in computer forensic investigations, and was one of the founding members of the computer forensic investigation capacity of the SAPS.
Bennie joined Cyanre in 2007. Due to the fact that cyber forensics is a relatively new science, he dedicates considerable time to research and studying of international standards and investigation methodology used by Forensic Companies and Law Enforcement Agencies around the world. He is considered to be one of the leading experts in the use of the forensic software and hardware in the country.
Bennie is also a member of the Association of Certified Fraud Examiners – SA Chapter.
Please complete this form to register for the event.
Itec manages the operational administration of information security within regulations
Employees are prevented from sharing company information with the wrong people or applications
Cloud-based systems have a layer of encryption built in
Digital, paper-based and voice-based information is secured
Our cloud-based systems have in-built encryption and access control
Our printers and document management software come standard with security features such as secure print, permissions-based access control and automated workflows
Lock down telephony security with Mitel Clearspan
Share documents securely without compromise with the M-Files platform and by integrating with credential systems such as Microsoft ActiveDirectory
Secure Endpoint Devices
Laptops, PCs, smartphones and tablets can be a very useful tools for your business, but they also represent serious security risks. The same goes for multi-function printers and copiers, and other office equipment. By smartly integrating these devices into your company’s security culture and using platforms such as ITEC Print Director, you can rest assured that they will deliver their potential to staff without exposing you to unwanted risk.and.
Take the hassle out of security
It’s crucial to know what is important to your business and then put the measures in place to secure those valuable assets. But you don’t have to do it alone. Through remote management, best-of-breed practices and the latest in applications, your business can be secure and safe while being managed by ITEC’s experienced experts.
Expand your data’s reach
Enable your employees to get the documentation and details they need, ensuring your data is secure, by deploying virtual private networks (VPNs), reliable connectivity, security on user devices and easy access to company documents through M-Files.
Enjoy safe, secure telephony
Modern telephone systems are faster, more reliable and highly affordable, because they are digital. This means there are many things motivated criminals can do to infiltrate, eavesdrop, reroute and disable calls. Don’t let your telephony system become a dark horse that can harm your company. Use the best in telephone technology security, such as Mitel Clearspan, and get the best in communications without unwanted ears listening in.
Lock down your network
The network is where all your data moves, both inside and outside your company. This makes it the main target of criminals and they will go to great lengths to compromise this business nerve centre. Secure your networks by using smart, strategic and affordable measures, such as secure firmware installed on the network devices themselves.
Full access control
From the receptionist to sales to contractors and visitors, there are many moving pieces in a company and all of them require some level of access to your systems. Use the latest in access control technologies to ensure only the right people log in at the right place and time.
Secure your documents
Your business thrives on documents: deals, brochures, case studies, customer details, reports and many more pieces of information. Ensure your people can access company knowledge without accidentally sharing it with the wrong people or applications.
Give access to the right applications
Software is pervasive in the modern workplace, but the mix can include authorised and unauthorised applications. Lock down the rights of applications, limiting software without fussing over every user.