Transform your SOC with a modern security operations platform built
21st August 2025, Tamarind Tree Hotel, Nairobi
Cybersecurity and AI for Governments, Company Executives and Directors.
Elevating Cybersecurity to a Boardroom Priority: Protecting People, Reputation, and Enterprise Value.
Understand the latest cybersecurity risks specific to Africa’s business landscape and their global impacts.
1Connect with fellow executives and share opportunities, experiences, challenges, and best practices.
3Gain practical insights on embedding cybersecurity and AI oversight into your organization’s governance framework.
2Receive expert-curated guides and toolkits to support your ongoing cybersecurity governance journey.
4President at Internet Society Kenya
Telecommunications | Computer Networks | Data Protection | Cybersecurity | Community Networks | Tutor | Founder
Group Director Technology Governance & Control at Equity Group Holdings PLC
IMD EMBA ★Transformational C-level Information Security Executive ★ Chief Information Officer ★ Digital, AI transformation & Security Leadership ➤ Positioning Businesses for Success by Unveiling Insights from Data ★ AI
Manager, Data Protection - SBM Bank
Cynthia is a legal practitioner licensed to practice in Kenya and currently working as a Data Protection and Cybersecurity Counsel in the Banking sector. Cynthia is Certified in Cybersecurity and a Certified Information Privacy Manager by IAPP. She is member of the Law Society of Kenya (LSK), International Association of Privacy Professionals (IAPP) and International Information Security Systems and Controls Consortium (ISC2). Additionally, Cynthia is one of the Founding Leaders of the Association of Privacy Lawyers in Africa(APLA) which is a connection hub for licensed privacy practitioners in Africa. She has a biased interest in legal- tech with extensive experience in Digital Rights, Internet Governance, Data Protection and Privacy Compliance and Cybersecurity (Governance, Risk & Compliance) Audits. She firmly believes in the transformative potential of the internet and fervently advocates for investment in internet infrastructure (connectivity) with a view of promoting digital transformation and inclusivity, e-commerce, digital literacy while enhancing safety online. She’s also a seasoned researcher at the Centre for Artificial Intelligence and Digital Policy (CAIDP)2023, and an alumni of Moi University, Kenya School of Internet Governance (KeSIG), 2021 Cohort, a Cybersecurity Fellow 2022 (Cohort 2.0) at Cybersafe Foundation and a former IGF Global Youth Ambassador 2022.
SHADOWSERVER Director for Africa
SHADOWSERVER Director for Africa | Cybersecurity Expert | Trusted Strategic Advisor to National Governments | Former British Diplomat
Chief Operations Officer at Milima Security
Cybersecurity Operations | IoT | Coffee | Tourism | Optimist. Passionate about technology, but a limitless problem solver. Got a problem? Let's brainstorm because I have no idea about it, but we can figure it out.
Chief Technology Officer Certeon Technology
CTO | Cybersecurity Expert | Digital Transformation Leader | FinTech Innovator | Tech Lead | Rotarian
ISACA Kenya Vice President
ISACA Kenya Vice President | Governance, Risk & Compliance | Cybersecurity Thought Leader
Senior Information Security manager / Acting CISO at Sabi
Cyber Security Manager | 40 under 40 | hacker of the year| Fintech Security | API Sec |Global Speaker| Hacker of the year 2021 | Cyber security woman of the year finalist 2023 | Top 50 African women in cyber security
SECURE AFRICA 2025 – NAIROBI
Recognize cybersecurity as a key component of enterprise risk management and implement governance frameworks that ensure accountability and proactive risk mitigation.
Empower the corporate leadership to confidently navigate cyber security and AI risk, opportunities and policies in today’s volatile digital environment.
Event Sponsor
This session examines how AI is reshaping cyber threats, enabling more sophisticated phishing, deepfakes, and social engineering tactics. Learn how these evolving threats impact organizations and what proactive measures can mitigate the risks.
LIMITED SLOTS AVAILABLE
0/18
LIMITED SLOTS AVAILABLE
61/82
Transform your SOC with a modern security operations platform built
According to a report from the Google Threat Intelligence Group,
On Wednesday, June 4, Cisco released updates to address a