Agenda

08:00 – 09:00

REGISTRATION & COFFEE

09:00 – 09:10

INAUGURATION CEREMONY

09:10 – 09:30

The National Cyber Mandate: Governance, Strategy, and the Path to a Resilient Digital Nigeria

  • Assessing implementation progress of the NCPS 2021 and Cybercrimes Act 2024 against stated objectives
  • Examining the coordinating roles of NITDA, ngCERT, and ONSA in building a whole-of-nation cyber defence posture
  • Benchmarking national progress against the ITU Global Cybersecurity Index and continental peers

09:30 – 09:50

Africa's Cyber Frontline: Threat Vectors, Policy Gaps, and the Intelligence Imperative

  • Mapping dominant attack vectors across the continent — BEC, ransomware, SIM swap, and state-sponsored intrusions
  • Assessing the AU Convention on Cyber Security — progress made, gaps remaining, and enforcement realities
  • Exploring shared threat intelligence frameworks through AFRIPOL, INTERPOL Africa, and regional SOC collaboration

09:50 – 10:10

AI-Powered Threat Detection: Moving from Pilots to Production-Grade Defence

  • Understanding why AI security deployments stall — fragmented data, weak governance, and absent audit trails
  • Enabling real-time behavioural analytics and anomaly detection at enterprise scale
  • Transitioning security operations from reactive incident response to predictive threat hunting

10:10 – 10:30

Zero Trust in Practice: Rearchitecting Security for Hybrid and Cloud Environments

  • Examining why perimeter-based models are failing African enterprises at scale
  • Implementing identity-first Zero Trust security in resource-constrained environments
  • Identifying viable migration paths for legacy infrastructure without operational disruption

10:30 – 11:00

PANEL DISCUSSION

The CISO Mandate: Cyber Resilience, Board Accountability, and Cross-Sector Collaboration

  • Addressing the challenge of building and retaining cybersecurity talent in a competitive, skills-scarce market
  • Translating cyber risk into board-level language — aligning metrics, materiality, and accountability
  • Evaluating cross-sector intelligence sharing models — what is working and what remains aspirational

11:00 – 11:30

NETWORKING BREAK & VISIT TO EXHIBITION LOUNGE

11:30 – 12:00

PANEL DISCUSSION

Digital Identity at Scale: Trust, Biometrics, and the Security of e-Government Infrastructure

  • Evaluating national identity systems as the foundation for digital trust — progress achieved and gaps remaining
  • Detecting and mitigating biometric authentication threats — deepfakes, liveness spoofing, and presentation attacks
  • Exploring decentralised and self-sovereign identity models gaining traction across African markets

12:00 – 12:20

Digital Fraud and Financial Crime: Detection, Attribution, and Disruption at Scale

  • Identifying the most damaging attack vectors in 2025-26 — BEC, account takeover, and mobile money fraud
  • Deploying GenAI-powered fraud detection and real-time transaction monitoring in high-volume environments
  • Addressing attribution challenges and cross-border takedown coordination in West African cybercrime cases

12:20 – 12:40

Critical Infrastructure Protection: OT/IT Convergence and the Expanding Attack Surface

  • Assessing growing exposure as industrial control systems connect to enterprise and cloud networks
  • Understanding how threat actors target power grids, oil & gas operations, and telecom backbone infrastructure
  • Establishing public-private coordination models for sustained national infrastructure protection

12:40 – 01:10

PANEL DISCUSSION

Regulated, Resilient, Ready: Navigating Cyber Compliance in a Maturing Policy Environment

  • Navigating Nigeria Data Protection Act 2023 obligations and tracking enforcement trends
  • Aligning CBN, SEC, and NCC cyber directives across sectoral requirements without duplicating effort
  • Managing data sovereignty, residency mandates, and the complexity of cross-border data flows

01:10 – 01:30

Cloud Security and Risk Governance: Closing the Gaps as Adoption Accelerates

  • Identifying top misconfigurations responsible for cloud breaches in African enterprise environments
  • Defining shared responsibility boundaries — what cloud providers cover and what organisations must own
  • Evaluating CSPM, CWPP, and CIEM tools against African enterprise realities and budget constraints

01:30 – 02:30

NETWORKING LUNCHEON

02:30 – 03:00

PANEL DISCUSSION

Ransomware and APTs: Incident Response Lessons from Africa's Frontlines

  • Analysing the anatomy of ransomware campaigns targeting African public institutions and private enterprises
  • Profiling APT groups active in West Africa — TTPs, attribution complexity, and geopolitical dimensions
  • Assessing cyber insurance availability, pricing gaps, and coverage realities in the African market

03:00 – 03:20

Supply Chain and Third-Party Risk: The Blind Spot in Enterprise Cyber Defence

  • Tracing how threat actors exploit vendor and partner access to breach larger, well-defended targets
  • Strengthening software supply chain integrity through SBOMs, code signing, and dependency management
  • Enforcing contractual and operational controls for sustained vendor cyber risk oversight

03:20 – 03:50

PANEL DISCUSSION

Generative AI, Unfiltered: The Threats, the Tools, and the Rules That Must Follow

  • Examining AI-generated phishing, deepfake social engineering, and automated malware development in the wild
  • Applying LLMs to threat intelligence synthesis, log analysis, and SOC automation on the defender side
  • Establishing AI governance and responsible use policies inside security operations environments

03:50 – 04:10

SOC Maturity and Threat Intelligence: Scaling Security Operations Across African Enterprises

  • Comparing in-house, outsourced, and hybrid MSSP models across different organisational growth stages
  • Contextualising global threat intelligence feeds for the African threat environment
  • Optimising SIEM deployments to reduce alert fatigue and improve mean time to detect and respond

04:10 – 04:30

FIRESIDE CHAT

Closing the Skills Gap: Cyber Talent Development and Workforce Strategy Across Africa

  • Quantifying the cybersecurity workforce shortage across West Africa and addressing its structural causes
  • Scaling university partnerships, apprenticeships, and women-in-cyber initiatives to broaden the talent pipeline
  • Mobilising government programmes and private sector investment to sustain long-term workforce growth

04:30 – 05:00

PANEL DISCUSSION

Future Horizons: Quantum Threats, 5G Security, and Africa's Cyber Defence Roadmap to 2030

  • Preparing for post-quantum cryptography — defining migration timelines and prioritisation frameworks
  • Assessing new attack surfaces emerging from 5G network rollout across critical infrastructure
  • Defining strategic priorities to shape the continent’s collective cyber defence posture through 2030

05:00 – 05:30

NETWORKING BREAK & VISIT TO EXHIBITION LOUNGE

05:30 – 06:30

CYFRICA AWARDS & GALA EVENING

*The above is a running agenda and is subject to change

Stay Informed Subscribe to Our #CyFrica Newsletter