{"id":12805,"date":"2026-05-18T10:02:00","date_gmt":"2026-05-18T10:02:00","guid":{"rendered":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/?page_id=12805"},"modified":"2026-05-22T10:54:45","modified_gmt":"2026-05-22T10:54:45","slug":"cyber-100","status":"publish","type":"page","link":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/cyber-100\/","title":{"rendered":"Cyber 100"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"12805\" class=\"elementor elementor-12805\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f774405 e-con-full e-flex e-con e-parent\" data-id=\"f774405\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-4ac6068 e-con-full e-flex e-con e-child\" data-id=\"4ac6068\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-33e7385 elementor-widget elementor-widget-image\" data-id=\"33e7385\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"218\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/cyber100-logo-white-69806792a01d7-1024x279.webp\" class=\"attachment-large size-large wp-image-11819\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/cyber100-logo-white-69806792a01d7-1024x279.webp 1024w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/cyber100-logo-white-69806792a01d7-300x82.webp 300w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/cyber100-logo-white-69806792a01d7-768x209.webp 768w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/cyber100-logo-white-69806792a01d7-1536x418.webp 1536w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/cyber100-logo-white-69806792a01d7-2048x558.webp 2048w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/cyber100-logo-white-69806792a01d7-720x196.webp 720w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f78cee1 elementor-widget elementor-widget-heading\" data-id=\"f78cee1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Honouring Tech Pioneers Securing the Digital Future<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e33c4b4 e-flex e-con-boxed e-con e-parent\" data-id=\"e33c4b4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4da6ff2 e-con-full e-flex e-con e-child\" data-id=\"4da6ff2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c4323a elementor-widget elementor-widget-heading\" data-id=\"6c4323a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Presenting the Cyber100<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1f268d4 e-con-full e-flex e-con e-child\" data-id=\"1f268d4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f47e9b7 elementor-widget elementor-widget-heading\" data-id=\"f47e9b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Methodology<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6c881b elementor-widget elementor-widget-text-editor\" data-id=\"b6c881b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>100 Cyber Leaders to Watch<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ccb5401 elementor-widget elementor-widget-text-editor\" data-id=\"ccb5401\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tThe Cyber Security Summit has put together a list of cyber security leaders to watch based on nominations, direct applications, information from our database, interviews, company websites, and other public sources.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1663c20 elementor-widget elementor-widget-text-editor\" data-id=\"1663c20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tThey are united in their passion and unwavering commitment in making effective changes in the realm of cybersecurity.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57b203e elementor-widget elementor-widget-text-editor\" data-id=\"57b203e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tWant to see someone on the list? <a style=\"color: #ffdc4c;\" href=\"https:\/\/forms.zohopublic.com\/exitomediaconceptspvtltd\/form\/CSS100NominationSouthAfrica2026\/formperma\/CftmyXk-403lP3iJlYK4gqLtyNYywykpSeIDYObXjmA\" target=\"_blank\" rel=\"noopener\">Nominate here<\/a>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14435bb elementor-widget elementor-widget-text-editor\" data-id=\"14435bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tThese inspiring cybersecurity leaders are making waves in diverse domains, encompassing cybersecurity, artificial intelligence, data protection, cloud security and quantum computing\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b55f09 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"6b55f09\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/forms.zohopublic.com\/exitomediaconceptspvtltd\/form\/CSS100NominationSouthAfrica2026\/formperma\/CftmyXk-403lP3iJlYK4gqLtyNYywykpSeIDYObXjmA\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Nominate for the CYBER100<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ae8c815 e-con-full e-flex e-con e-child\" data-id=\"ae8c815\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48d0828 elementor-widget elementor-widget-heading\" data-id=\"48d0828\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Want to meet  these inspiring leaders?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-691d215 elementor-widget elementor-widget-text-editor\" data-id=\"691d215\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tLearn from these incredible leaders by attending the Cyber Security Summit. Attendees will gain insights into the latest trends and technologies, as well as strategies for overcoming challenges and seizing opportunities.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6c10d2 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"d6c10d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/register-now.html\" target=\"_blank\" rel=\"nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Register Now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-28bf1bf e-con-full e-flex e-con e-child\" data-id=\"28bf1bf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48ee1e1 elementor-widget elementor-widget-heading\" data-id=\"48ee1e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Leaders we Honoured in 2026<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7615a90 e-grid e-con-full e-con e-child\" data-id=\"7615a90\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df965d9 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"df965d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Musa-Malungani.webp\" class=\"attachment-full size-full wp-image-11964\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Musa-Malungani.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Musa-Malungani-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Musa Malungani<\/h3><p class=\"elementor-image-box-description\">Divisional Head ICT Governance Risk and Compliance\n<br>\nCity of Ekurhuleni Metropolitan Municipality\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7221a90 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"7221a90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Siphokazi-Novukuza.webp\" class=\"attachment-full size-full wp-image-11971\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Siphokazi-Novukuza.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Siphokazi-Novukuza-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Siphokazi Novukuza<\/h3><p class=\"elementor-image-box-description\">Director Cyber Security\n<br>\nDepartment of Communications and Digital Technologies, South Africa\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-278ddf6 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"278ddf6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Libisi-Maphanga.webp\" class=\"attachment-full size-full wp-image-11972\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Libisi-Maphanga.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Libisi-Maphanga-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Libisi Maphanga<\/h3><p class=\"elementor-image-box-description\">Chief Information Officer\n<br>\nElectoral Commission of South Africa\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fba54f2 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"fba54f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Funwell-Mwarazi.webp\" class=\"attachment-full size-full wp-image-11973\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Funwell-Mwarazi.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Funwell-Mwarazi-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Funwell Mwarazi<\/h3><p class=\"elementor-image-box-description\">Director: IT Infrastructure (Acting)\n<br>\nGPAA<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f476f3 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"0f476f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Joseph-Makinta.webp\" class=\"attachment-full size-full wp-image-11974\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Joseph-Makinta.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Joseph-Makinta-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Joseph Makinta<\/h3><p class=\"elementor-image-box-description\">Deputy Director ICT Security\n<br>\nOffice of the Chief Justice\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b52d67 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"3b52d67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Tsepo-Ramosebi.webp\" class=\"attachment-full size-full wp-image-11975\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Tsepo-Ramosebi.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Tsepo-Ramosebi-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Tsepo Ramosebi<\/h3><p class=\"elementor-image-box-description\">IT Director\n<br>\nThe Presidency\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed4331a elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"ed4331a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Deven-Reddy.webp\" class=\"attachment-full size-full wp-image-11976\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Deven-Reddy.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Deven-Reddy-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Deven Reddy<\/h3><p class=\"elementor-image-box-description\">Head Group Treasury IT\n<br>\nAbsa Group\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76c3319 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"76c3319\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Lesedi-Maselo.webp\" class=\"attachment-full size-full wp-image-11977\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Lesedi-Maselo.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Lesedi-Maselo-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Lesedi Maselo<\/h3><p class=\"elementor-image-box-description\">Vice President Change Assurance\n<br>\nAbsa Group\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0daac75 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"0daac75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Clinton-Govender.webp\" class=\"attachment-full size-full wp-image-11978\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Clinton-Govender.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Clinton-Govender-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Clinton Govender<\/h3><p class=\"elementor-image-box-description\">IT Director Sub Saharan Africa\n<br>\nAccor<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf8d228 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"bf8d228\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Sne-Dlamini.webp\" class=\"attachment-full size-full wp-image-11979\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Sne-Dlamini.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Sne-Dlamini-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Sne Dlamini<\/h3><p class=\"elementor-image-box-description\">Group Vice President for Technology and Digital\n<br>\nAECI Limited\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f2a1e6b elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"f2a1e6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Simon-Nare.webp\" class=\"attachment-full size-full wp-image-11980\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Simon-Nare.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Simon-Nare-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Simon Nare<\/h3><p class=\"elementor-image-box-description\">Group CISO\n<br>\nAECI Limited\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-080bbcd elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"080bbcd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Jonathan-du-Plessis.webp\" class=\"attachment-full size-full wp-image-11981\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Jonathan-du-Plessis.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Jonathan-du-Plessis-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Jonathan du Plessis<\/h3><p class=\"elementor-image-box-description\">Group Chief Information Officer\n<br>\nAfrican Alliance\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e0bde6e elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"e0bde6e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Tevin-Macaullay-.webp\" class=\"attachment-full size-full wp-image-11982\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Tevin-Macaullay-.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Tevin-Macaullay--270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Tevin Macaullay<\/h3><p class=\"elementor-image-box-description\">Head of Information Infrastructure (Communication and Digital Technologies)\n<br>\nAIE Academic Institute of Excellence\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96170fc elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"96170fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Moosa-Kotwal.webp\" class=\"attachment-full size-full wp-image-11983\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Moosa-Kotwal.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Moosa-Kotwal-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Moosa Kotwal<\/h3><p class=\"elementor-image-box-description\">Head of IT\n<br>\nAnchor\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-515ee93 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"515ee93\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Rishi-Hariram.webp\" class=\"attachment-full size-full wp-image-11984\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Rishi-Hariram.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Rishi-Hariram-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Rishi Hariram<\/h3><p class=\"elementor-image-box-description\">Regional Head: Information Security (EMEA\/APAC)\n<br>\nAnglo American\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6941b0d elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"6941b0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Deane-Nkuna.webp\" class=\"attachment-full size-full wp-image-11985\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Deane-Nkuna.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Deane-Nkuna-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Deane Nkuna<\/h3><p class=\"elementor-image-box-description\">Chief Information Officer\n<br>\nArmscor\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ecfbcc8 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"ecfbcc8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Lwando-Shode.webp\" class=\"attachment-full size-full wp-image-11986\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Lwando-Shode.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Lwando-Shode-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Lwando Shode<\/h3><p class=\"elementor-image-box-description\">Head of IT Operations<br>\nBidtravel<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7f9241 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"f7f9241\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Dr.-Jaco-Joubert.webp\" class=\"attachment-full size-full wp-image-11987\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Dr.-Jaco-Joubert.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Dr.-Jaco-Joubert-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Jaco Joubert<\/h3><p class=\"elementor-image-box-description\">Head of Information Technology Department<br> \nCurro Hazeldean<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8fad41c elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"8fad41c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Amanda-Shivamba.webp\" class=\"attachment-full size-full wp-image-11988\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Amanda-Shivamba.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Amanda-Shivamba-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Amanda Shivamba<\/h3><p class=\"elementor-image-box-description\">Director Data Protection and Compliance Progamms<br>\nDHL Express<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0dd657b elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"0dd657b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Amenda-Makhetha.webp\" class=\"attachment-full size-full wp-image-11989\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Amenda-Makhetha.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Amenda-Makhetha-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Amenda Makhetha Sebake<\/h3><p class=\"elementor-image-box-description\">Group Head of Data Privacy and Protection<br>\nFirst Rand Bank<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a542c8 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"7a542c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Parasher-Kanji.webp\" class=\"attachment-full size-full wp-image-11993\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Parasher-Kanji.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Parasher-Kanji-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Parasher Kanji<\/h3><p class=\"elementor-image-box-description\">IT Director<br>\nFluidra<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ce0c60 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"6ce0c60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Vimal-Lala-.webp\" class=\"attachment-full size-full wp-image-11994\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Vimal-Lala-.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Vimal-Lala--270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Vimal Lala<\/h3><p class=\"elementor-image-box-description\">Chief Information Officer<br>\nFNB Commercial, Cash<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a02dac elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"7a02dac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Grace-Letseka.webp\" class=\"attachment-full size-full wp-image-11995\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Grace-Letseka.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Grace-Letseka-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Grace Letseka<\/h3><p class=\"elementor-image-box-description\">Head of Resilience &amp; data<br>\nFNB South Africa<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0f3834 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"b0f3834\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Maikaelelo-Motshabi-.webp\" class=\"attachment-full size-full wp-image-11996\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Maikaelelo-Motshabi-.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Maikaelelo-Motshabi--270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Maikaelelo Motshabi<\/h3><p class=\"elementor-image-box-description\">IT Risk Head<br>\nFNB South Africa<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c4f5b6 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"7c4f5b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/JC-Kirsten.webp\" class=\"attachment-full size-full wp-image-11997\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/JC-Kirsten.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/JC-Kirsten-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">JC Kirsten<\/h3><p class=\"elementor-image-box-description\">Head of Information Technology<br>\nGIC<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-515556a elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"515556a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Sibusiso-Mbingo.webp\" class=\"attachment-full size-full wp-image-12001\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Sibusiso-Mbingo.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Sibusiso-Mbingo-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Sibusiso Mbingo<\/h3><p class=\"elementor-image-box-description\">CIO<br>\nGlu\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3298897 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"3298897\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Phathutshedzo-Mathivha.webp\" class=\"attachment-full size-full wp-image-12002\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Phathutshedzo-Mathivha.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Phathutshedzo-Mathivha-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Phathutshedzo Mathivha<\/h3><p class=\"elementor-image-box-description\">Head of Digital Chapter<br>\nHollard Insurance<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bfdb32f elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"bfdb32f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Neil-Govender.jpg.webp\" class=\"attachment-full size-full wp-image-12003\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Neil-Govender.jpg.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Neil-Govender.jpg-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Neil Govender<\/h3><p class=\"elementor-image-box-description\">Head Of Information Technology<br>\nHyprop Investments Limited<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f2d0f1b elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"f2d0f1b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Hendrik-Wiese.webp\" class=\"attachment-full size-full wp-image-12004\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Hendrik-Wiese.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Hendrik-Wiese-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Hendrik Wiese<\/h3><p class=\"elementor-image-box-description\">CISO<br>\niMas Finance<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-404d2ec elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"404d2ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Malebo-Sefula.webp\" class=\"attachment-full size-full wp-image-12005\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Malebo-Sefula.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Malebo-Sefula-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Malebo Sefula<\/h3><p class=\"elementor-image-box-description\">Group Head: Data Governance<br>\nInvestec<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78158ba elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"78158ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Muvhango-Livhusha.webp\" class=\"attachment-full size-full wp-image-12006\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Muvhango-Livhusha.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Muvhango-Livhusha-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Muvhango Livhusha<\/h3><p class=\"elementor-image-box-description\">Vice President of Information Systems Audit and Control Association<br>\nISACA South Africa Chapter<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f9d2bd2 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"f9d2bd2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Nadet-Budnik.webp\" class=\"attachment-full size-full wp-image-12007\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Nadet-Budnik.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Nadet-Budnik-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Nadet Budnik<\/h3><p class=\"elementor-image-box-description\">Head of IT Governance and Risk<br>\nLand and Agricultural Development Bank<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-726941a elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"726941a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Venisha-nayagar.webp\" class=\"attachment-full size-full wp-image-12008\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Venisha-nayagar.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Venisha-nayagar-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Venisha Nayagar<\/h3><p class=\"elementor-image-box-description\">Group CISO<br>\nLife Healthcare<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8c2b9f elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"c8c2b9f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Sekhwela-Mokgala.webp\" class=\"attachment-full size-full wp-image-12009\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Sekhwela-Mokgala.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Sekhwela-Mokgala-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Sekhwela Mokgala<\/h3><p class=\"elementor-image-box-description\">Group Chief Data and Digital Officer<br>\nMetair Investments Limited<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19daea1 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"19daea1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Dewald-Olivier.webp\" class=\"attachment-full size-full wp-image-12010\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Dewald-Olivier.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Dewald-Olivier-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Dewald Olivier<\/h3><p class=\"elementor-image-box-description\">Regional Director Information Technology &amp; Gaming Africa<br>\nMinor Hotels<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9239027 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"9239027\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Mankoana-Nhlebela.webp\" class=\"attachment-full size-full wp-image-12014\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Mankoana-Nhlebela.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Mankoana-Nhlebela-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Mankoana Nhlebela<\/h3><p class=\"elementor-image-box-description\">Head of Information Security GRC &amp; Program<br>\nMTN<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc29167 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"cc29167\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Gloseije-Jessy-Bazolana.webp\" class=\"attachment-full size-full wp-image-12015\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Gloseije-Jessy-Bazolana.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Gloseije-Jessy-Bazolana-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Gloseije Bazolana<\/h3><p class=\"elementor-image-box-description\">Head of Information Technology<br>\nNational Institute for Communicable Diseases (NICD)<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e86b6e elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"0e86b6e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Manesh-Hari.webp\" class=\"attachment-full size-full wp-image-12016\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Manesh-Hari.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Manesh-Hari-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Manesh Hari<\/h3><p class=\"elementor-image-box-description\">Head of Cloud Solutions<br>\nNedbank<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a718db8 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"a718db8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/John-Mukomana.webp\" class=\"attachment-full size-full wp-image-12017\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/John-Mukomana.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/John-Mukomana-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">John Mukomana<\/h3><p class=\"elementor-image-box-description\">Head IT Governance &amp; Reporting<br>\nNHLS\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a45103b elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"a45103b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Thato-Lehutso.webp\" class=\"attachment-full size-full wp-image-12018\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Thato-Lehutso.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Thato-Lehutso-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Thato Lehutso<\/h3><p class=\"elementor-image-box-description\">IT Director<br>\nNorth-West University \/ Noordwes-Universiteit<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-433bfac elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"433bfac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Sihle-Mthiyane.webp\" class=\"attachment-full size-full wp-image-12019\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Sihle-Mthiyane.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Sihle-Mthiyane-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Sihle Mthiyane<\/h3><p class=\"elementor-image-box-description\">Chief Information Officer<br>\nNTP Radioisotopes SOC Ltd<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58d94f6 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"58d94f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Vukosi-Sambo.webp\" class=\"attachment-full size-full wp-image-12021\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Vukosi-Sambo.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Vukosi-Sambo-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Vukosi Sambo<\/h3><p class=\"elementor-image-box-description\">Group CIO<br>\nPHA<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-958309b elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"958309b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Quantin-Van-Rensburg.webp\" class=\"attachment-full size-full wp-image-12022\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Quantin-Van-Rensburg.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Quantin-Van-Rensburg-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Quantin van Rensburg<\/h3><p class=\"elementor-image-box-description\">Chief Information Officer<br>\nPlatinum Health Medical Scheme<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9831739 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"9831739\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Kenneth-Nikelo.webp\" class=\"attachment-full size-full wp-image-12026\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Kenneth-Nikelo.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Kenneth-Nikelo-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Kenneth Nikelo<\/h3><p class=\"elementor-image-box-description\">Head of IT<br>\nPremium Ideas Distribution Group (Morvest Group)<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ddb440 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"9ddb440\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Ugan-Reddy.webp\" class=\"attachment-full size-full wp-image-12027\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Ugan-Reddy.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Ugan-Reddy-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Ugan Reddy<\/h3><p class=\"elementor-image-box-description\">Digital Risk and Cyber Executive<br>\nRAINBOW<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b3ec944 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"b3ec944\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Nthabiseng-Mosupye.webp\" class=\"attachment-full size-full wp-image-12028\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Nthabiseng-Mosupye.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Nthabiseng-Mosupye-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Nthabiseng Mosupye<\/h3><p class=\"elementor-image-box-description\">Chief Information Technology Officer<br>\nRand Water<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ee59ce elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"1ee59ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Neresh_Manilal.webp\" class=\"attachment-full size-full wp-image-12029\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Neresh_Manilal.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Neresh_Manilal-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Neresh Manilal<\/h3><p class=\"elementor-image-box-description\">Head of IT Support EMEA<br>\nRhenus Logistics<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-64285a2 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"64285a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Mpedi-Keetse.webp\" class=\"attachment-full size-full wp-image-12033\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Mpedi-Keetse.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Mpedi-Keetse-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Mpedi Keetse<\/h3><p class=\"elementor-image-box-description\">Head of Information Technology and Data Provisioning<br>\nRMB - Rand Merchant Bank<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd9a5bb elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"bd9a5bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Samuel-Mokoena.webp\" class=\"attachment-full size-full wp-image-12034\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Samuel-Mokoena.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Samuel-Mokoena-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Samuel Mokoena<\/h3><p class=\"elementor-image-box-description\">Head of ICT Security<br>\nSibanye-Stillwater<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c0315f elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"6c0315f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Reginald-Mazana.webp\" class=\"attachment-full size-full wp-image-12035\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Reginald-Mazana.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Reginald-Mazana-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Reginald Mazana<\/h3><p class=\"elementor-image-box-description\">Information Technology Program Director<br>\nSouth African Qualifications Authority<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65a8f87 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"65a8f87\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Emmerentia-du-Plooy.webp\" class=\"attachment-full size-full wp-image-12036\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Emmerentia-du-Plooy.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Emmerentia-du-Plooy-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Emmerentia du Plooy<\/h3><p class=\"elementor-image-box-description\">Head of Group Information Risk and Data Privacy Risk<br>\nStandard Bank Group<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25fdae6 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"25fdae6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Mohammad-Malik.webp\" class=\"attachment-full size-full wp-image-12040\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Mohammad-Malik.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Mohammad-Malik-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Mohammad Malik<\/h3><p class=\"elementor-image-box-description\">Head of Technology and Enablement<br>\nSuccession Financial Planning<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e55a54 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"6e55a54\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Reyaan-Uys.webp\" class=\"attachment-full size-full wp-image-12041\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Reyaan-Uys.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Reyaan-Uys-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Reyaan Uys<\/h3><p class=\"elementor-image-box-description\">Executive Head of ICT &amp; BI<br>\nTBFS<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b43b1d8 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"b43b1d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Innocent-Mhura.webp\" class=\"attachment-full size-full wp-image-12042\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Innocent-Mhura.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Innocent-Mhura-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Innocent Mhura<\/h3><p class=\"elementor-image-box-description\">Head of Information Technology Operations &amp; Services<br>\nTectura Global and Techadome<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f3e5c0 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"4f3e5c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Joseph-Stokes.webp\" class=\"attachment-full size-full wp-image-12043\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Joseph-Stokes.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Joseph-Stokes-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Joseph Stokes<\/h3><p class=\"elementor-image-box-description\">Group Head: Cybersecurity and IT Governance<br>\nTelesure Investment Holdings<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ccfc804 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"ccfc804\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Marlize-Pistorius.webp\" class=\"attachment-full size-full wp-image-12047\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Marlize-Pistorius.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Marlize-Pistorius-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Marlize Pistorius<\/h3><p class=\"elementor-image-box-description\">Technical Director IT Development and Architecture<br>\nThe Aurum Institute<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fbae877 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"fbae877\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Makgale-Mahlase.webp\" class=\"attachment-full size-full wp-image-12048\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Makgale-Mahlase.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Makgale-Mahlase-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Makgale Mahlase<\/h3><p class=\"elementor-image-box-description\">Head of Digital Enablement\nTransnet Engineering<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7578dd4 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"7578dd4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Sicelo-Njeje_.webp\" class=\"attachment-full size-full wp-image-12049\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Sicelo-Njeje_.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Sicelo-Njeje_-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Sicelo Njeje<\/h3><p class=\"elementor-image-box-description\">Head: ICT Strategy &amp; Enterprise Architecture<br>\nTransnet National Port Authority<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7207a2a elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"7207a2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Topside-Ehleketani-Mathonsi.webp\" class=\"attachment-full size-full wp-image-12050\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Topside-Ehleketani-Mathonsi.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Topside-Ehleketani-Mathonsi-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Prof Topside Mathonsi<\/h3><p class=\"elementor-image-box-description\">Associate Professor and HOD of IT<br>\nTshwane University of Technology<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90d8536 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"90d8536\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Werner-Swanepoel-CA.webp\" class=\"attachment-full size-full wp-image-12054\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Werner-Swanepoel-CA.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Werner-Swanepoel-CA-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Werner Swanepoel CA (SA)<\/h3><p class=\"elementor-image-box-description\">Group Chief Digital Officer<br>\nVertice MedTech<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c0054d6 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"c0054d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Wilma-Crosson.webp\" class=\"attachment-full size-full wp-image-12055\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Wilma-Crosson.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Wilma-Crosson-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Wilma Crosson<\/h3><p class=\"elementor-image-box-description\">Chief Information Officer<br>\nVolkswagen Financial Services South Africa\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afa549c elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"afa549c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Sudeyan-Moodaly.webp\" class=\"attachment-full size-full wp-image-12056\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Sudeyan-Moodaly.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Sudeyan-Moodaly-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Sudeyan Moodaly<\/h3><p class=\"elementor-image-box-description\">Head of Information Security<br>\nYOCO<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff70331 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"ff70331\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Khotso-Lekhetho.webp\" class=\"attachment-full size-full wp-image-12057\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Khotso-Lekhetho.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Khotso-Lekhetho-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Khotso Lekhetho<\/h3><p class=\"elementor-image-box-description\">Head of IT Infrastructure and Operations<br>\nZeda Limited (Avis)<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c94e6f elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"5c94e6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Pulana-Ngwasheng.webp\" class=\"attachment-full size-full wp-image-12058\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Pulana-Ngwasheng.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Pulana-Ngwasheng-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Pulana Ngwasheng<\/h3><p class=\"elementor-image-box-description\">Chief Information Officer<br>\nZeda Limited (Avis)<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d3ee1f4 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"d3ee1f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Gideon.webp\" class=\"attachment-full size-full wp-image-12200\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Gideon.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Gideon-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Gideon A.J Van Der Walt<\/h3><p class=\"elementor-image-box-description\">Acting Head of Technology, Innovation and Systems<br>\nMinopex<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9bc26fc elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"9bc26fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Dr-Sizwe-Gwala.webp\" class=\"attachment-full size-full wp-image-12169\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Dr-Sizwe-Gwala.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Dr-Sizwe-Gwala-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Dr. Sizwe Gwala<\/h3><p class=\"elementor-image-box-description\">Head of Data Governance &amp; Management<br>\nAbsa Group<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9e53ec elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"a9e53ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Nontsasa-Ndlovu.webp\" class=\"attachment-full size-full wp-image-12170\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Nontsasa-Ndlovu.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Nontsasa-Ndlovu-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Nontsasa Ndlovu<\/h3><p class=\"elementor-image-box-description\">Head: Digital &amp; Technology (SWC)<br>\nDiageo<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-600c9f2 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"600c9f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Alfred-M-Mohlala.webp\" class=\"attachment-full size-full wp-image-12171\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Alfred-M-Mohlala.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Alfred-M-Mohlala-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Alfred M Mohlala<\/h3><p class=\"elementor-image-box-description\">Director: ICT Security Risk and Compliance<br>\nDepartment of Public Service and Administration<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd11157 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"cd11157\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Hanli-Grobler.webp\" class=\"attachment-full size-full wp-image-12172\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Hanli-Grobler.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Hanli-Grobler-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Hanli Grobler<\/h3><p class=\"elementor-image-box-description\">Chief Information Officer<br>\nFinbond Mutual Bank<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd91793 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"dd91793\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Oscar-A.webp\" class=\"attachment-full size-full wp-image-12173\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Oscar-A.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Oscar-A-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Oscar A<\/h3><p class=\"elementor-image-box-description\">Director : Technology and Cyber Risk - Africa Regional Operations<br>\nAbsa Group<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41d54ea elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"41d54ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Nomazwi-Mhloma.webp\" class=\"attachment-full size-full wp-image-12174\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Nomazwi-Mhloma.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Nomazwi-Mhloma-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Nomazwi Mhloma<\/h3><p class=\"elementor-image-box-description\">Deputy Chief Information Officer<br>\neThekwini Municipality<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19ba16f elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"19ba16f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Brenda-Sikhala.webp\" class=\"attachment-full size-full wp-image-12175\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Brenda-Sikhala.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Brenda-Sikhala-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Brenda Sikhala<\/h3><p class=\"elementor-image-box-description\">Head of Cyber Risk Oversight<br>\nStandard Bank South Africa<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b36185d elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"b36185d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Phila-Msizazwe.webp\" class=\"attachment-full size-full wp-image-12176\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Phila-Msizazwe.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Phila-Msizazwe-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Phila Msizazwe<\/h3><p class=\"elementor-image-box-description\">CIO<br>\nAutomobile Association of South Africa\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df39af0 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"df39af0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Jaybalan-Goonahsylin.webp\" class=\"attachment-full size-full wp-image-12177\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Jaybalan-Goonahsylin.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Jaybalan-Goonahsylin-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Jaybalan Goonahsylin<\/h3><p class=\"elementor-image-box-description\">CIO<br>\niMasFinance<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f50071f elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"f50071f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Fikile-Mekgoe.webp\" class=\"attachment-full size-full wp-image-12182\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Fikile-Mekgoe.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Fikile-Mekgoe-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Fikile Mekgoe<\/h3><p class=\"elementor-image-box-description\">Head of Technology: Delivery &amp; testing<br>\nBidvest Bank Limited<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ffdd6eb elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"ffdd6eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Andre-Pretorius.webp\" class=\"attachment-full size-full wp-image-12183\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Andre-Pretorius.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Andre-Pretorius-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Andre Pretorius<\/h3><p class=\"elementor-image-box-description\">Head of Cyber Security<br>\nDRDGOLD Limited<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f10e97 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"4f10e97\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Mothie-Singh.webp\" class=\"attachment-full size-full wp-image-12184\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Mothie-Singh.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/Mothie-Singh-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Mothie Singh<\/h3><p class=\"elementor-image-box-description\">Deputy Director: ICT User Support - Desktop<br>\nUnisa<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-477f44d elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"477f44d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/03\/mpho-moseki-69a55701a9247.webp\" class=\"attachment-full size-full wp-image-12233\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/03\/mpho-moseki-69a55701a9247.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/03\/mpho-moseki-69a55701a9247-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Mpho Moseki<\/h3><p class=\"elementor-image-box-description\">Head, Data Governance and Metadata<br>\nStandard Bank Group<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-437df3b elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"437df3b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/03\/eugene-moodley-69a556e703a69.webp\" class=\"attachment-full size-full wp-image-12234\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/03\/eugene-moodley-69a556e703a69.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/03\/eugene-moodley-69a556e703a69-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Eugene Moodley<\/h3><p class=\"elementor-image-box-description\">Head of Technology<br>\nSanlam Collective Investments<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-757301d elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"757301d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"500\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/03\/bellinah-masetla-69a55700e649f.webp\" class=\"attachment-full size-full wp-image-12235\" alt=\"\" srcset=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/03\/bellinah-masetla-69a55700e649f.webp 450w, https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/03\/bellinah-masetla-69a55700e649f-270x300.webp 270w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Bellinah Masetla<\/h3><p class=\"elementor-image-box-description\">Chief Information Officer<br>\nStandard Bank (Insurance)<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Honouring Tech Pioneers Securing the Digital Future Presenting the Cyber100 Methodology 100 Cyber Leaders to Watch The Cyber Security Summit has put together a list of cyber security leaders to watch based on nominations, direct applications, information from our database, interviews, company websites, and other public sources.They are united in their passion and unwavering commitment [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-12805","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber 100 - Cyber Security Summit South Africa | Cybersec Conference<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/cyber-100\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber 100 - Cyber Security Summit South Africa | Cybersec Conference\" \/>\n<meta property=\"og:description\" content=\"Honouring Tech Pioneers Securing the Digital Future Presenting the Cyber100 Methodology 100 Cyber Leaders to Watch The Cyber Security Summit has put together a list of cyber security leaders to watch based on nominations, direct applications, information from our database, interviews, company websites, and other public sources.They are united in their passion and unwavering commitment [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/cyber-100\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Security Summit South Africa | Cybersec Conference\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-22T10:54:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/cyber100-logo-white-69806792a01d7-scaled.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"697\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"20 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/south-africa\\\/cyber-100\\\/\",\"url\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/south-africa\\\/cyber-100\\\/\",\"name\":\"Cyber 100 - Cyber Security Summit South Africa | Cybersec Conference\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/south-africa\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/south-africa\\\/cyber-100\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/south-africa\\\/cyber-100\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/south-africa\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cyber100-logo-white-69806792a01d7-1024x279.webp\",\"datePublished\":\"2026-05-18T10:02:00+00:00\",\"dateModified\":\"2026-05-22T10:54:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/south-africa\\\/cyber-100\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/south-africa\\\/cyber-100\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/south-africa\\\/cyber-100\\\/#primaryimage\",\"url\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/south-africa\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cyber100-logo-white-69806792a01d7-scaled.webp\",\"contentUrl\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/south-africa\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cyber100-logo-white-69806792a01d7-scaled.webp\",\"width\":2560,\"height\":697},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/south-africa\\\/cyber-100\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/south-africa\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber 100\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/south-africa\\\/#website\",\"url\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/south-africa\\\/\",\"name\":\"Cyber Security Summit South Africa | Cybersec Conference\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/south-africa\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/south-africa\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/south-africa\\\/#organization\",\"name\":\"Cyber Security Summit South Africa | Cybersec Conference\",\"url\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/south-africa\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/south-africa\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/south-africa\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/cyber-1.png\",\"contentUrl\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/south-africa\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/cyber-1.png\",\"width\":622,\"height\":321,\"caption\":\"Cyber Security Summit South Africa | Cybersec Conference\"},\"image\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/south-africa\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber 100 - Cyber Security Summit South Africa | Cybersec Conference","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/cyber-100\/","og_locale":"en_US","og_type":"article","og_title":"Cyber 100 - Cyber Security Summit South Africa | Cybersec Conference","og_description":"Honouring Tech Pioneers Securing the Digital Future Presenting the Cyber100 Methodology 100 Cyber Leaders to Watch The Cyber Security Summit has put together a list of cyber security leaders to watch based on nominations, direct applications, information from our database, interviews, company websites, and other public sources.They are united in their passion and unwavering commitment [&hellip;]","og_url":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/cyber-100\/","og_site_name":"Cyber Security Summit South Africa | Cybersec Conference","article_modified_time":"2026-05-22T10:54:45+00:00","og_image":[{"width":2560,"height":697,"url":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/cyber100-logo-white-69806792a01d7-scaled.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"20 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/cyber-100\/","url":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/cyber-100\/","name":"Cyber 100 - Cyber Security Summit South Africa | Cybersec Conference","isPartOf":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/#website"},"primaryImageOfPage":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/cyber-100\/#primaryimage"},"image":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/cyber-100\/#primaryimage"},"thumbnailUrl":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/cyber100-logo-white-69806792a01d7-1024x279.webp","datePublished":"2026-05-18T10:02:00+00:00","dateModified":"2026-05-22T10:54:45+00:00","breadcrumb":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/cyber-100\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/cyber-100\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/cyber-100\/#primaryimage","url":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/cyber100-logo-white-69806792a01d7-scaled.webp","contentUrl":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/cyber100-logo-white-69806792a01d7-scaled.webp","width":2560,"height":697},{"@type":"BreadcrumbList","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/cyber-100\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/"},{"@type":"ListItem","position":2,"name":"Cyber 100"}]},{"@type":"WebSite","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/#website","url":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/","name":"Cyber Security Summit South Africa | Cybersec Conference","description":"","publisher":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/#organization","name":"Cyber Security Summit South Africa | Cybersec Conference","url":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/#\/schema\/logo\/image\/","url":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2020\/09\/cyber-1.png","contentUrl":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2020\/09\/cyber-1.png","width":622,"height":321,"caption":"Cyber Security Summit South Africa | Cybersec Conference"},"image":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-json\/wp\/v2\/pages\/12805","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-json\/wp\/v2\/comments?post=12805"}],"version-history":[{"count":6,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-json\/wp\/v2\/pages\/12805\/revisions"}],"predecessor-version":[{"id":12892,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-json\/wp\/v2\/pages\/12805\/revisions\/12892"}],"wp:attachment":[{"href":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-json\/wp\/v2\/media?parent=12805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}