< Cybersecurity Across Cultures/>

4-5 November 2025

Register Now
Bafana Bafana

THREAT 2025 is a collaborative platform where business, government and academia interact to build a secure, digitally-enabled society.

In Association With

< conference_details />

Cybersecurity Across Cultures

Location

Coastlands Umhlanga Hotel and Convention Centre.

Discover More
Dates

The offical dates for the conference is 4 to 5 November 2025.

Discover More
Agenda

The THREAT 2025 themes and agenda have been confirmed.

Discover More
Call for Papers

THREAT 2025 invites submissions for its upcoming gathering.

Download
< conference_co_chairs />

THREAT 2025 Co-Chairs

< conference_editorial_board />

THREAT 2025 Editorial Board

Associate Professor Dr. Sheeba Armoogum

University of Mauritius (UoM)

Mauritius

Prof. Manoj Maharaj

University of KwaZulu-Natal

South Africa

Dr. Kiru Pillay

University of KwaZulu-Natal

South Africa

Dr. Kaleem Ahmed Usmani

Computer Emergency Response Team of Mauritius (CERT-MU)

Mauritius

Professor Gurpreet Dhillon

University of North Texas

United States

Professor Kavi Kumar Khedo

University of Technology, Mauritius (UTM)

Mauritius

Professor Vinaye Armoogum

University of Technology, Mauritius (UTM)

Mauritius

Associate Professor Dr. Deshinta Arrova Dewi (UKM)

INTI International University

Malaysia

Dr. Stephen Naicken

African Leadership College of Higher Education

Mauritius

Professor Parameshachari B D

Nitte Meenakshi Institute of Technology

India

Associate Professor Dr. Kennedy Njenga

University of Johannesburg

South Africa

Dr. Jabu Mtsweni

Council for Scientific and Industrial Research (CSIR)

South Africa

< conference_venue />

THREAT 2025 Venue

Coastlands Umhlanga Hotel and Convention Centre 4 November 2025

Threat Conference 2025

THREAT

Cybersecurity Across Cultures

THREAT 2025 explores how cultural and societal contexts shape cybersecurity, focusing on the importance of cross-cultural understanding when building secure, digitally enabled societies. It provides a platform for government representatives, business leaders, and researchers to examine how language, values, and social norms influence both the perception and practice of cybersecurity. The conference emphasises the strategic role of cybersecurity as a safeguard for economic development and as a catalyst for trust and innovation in diverse cultural settings. By broadening the scope of digital transformation beyond purely technical boundaries, THREAT 2025 highlights the interplay between emerging technologies, cybersecurity, digital public infrastructure, and cultural frameworks. It advocates a triple helix approach—bringing together industry, policy-makers, and academia—to foster inclusive dialogue and cooperative solutions. THREAT 2025 will equip participants with insights to navigating the cultural complexities of global digital transformation, exploring how cybersecurity practices can be harmonized across societies while respecting local realities. THREAT 2025 thus becomes a pivotal event for reshaping international dialogues and equipping leaders with the tools to secure a more resilient and culturally attuned digital future.

Threat Conference Sponsor
< conference_themes />

Cybersecurity Across Cultures 2025 Themes

THEMES PDF

< conference_agenda />

Cybersecurity Across Cultures 2025 Agenda

Download Full Program Outline PDF
Day 1 – Deepening Understanding (4 November 2025)
08h00 – 09h00: Registration, Tea/Coffee, Networking
09h00 – 09h30: Opening Ceremony – Opening and Welcome
09h30 – 11h00: Opening Keynote Address & Panel Discussion – Cybersecurity in the Global South: Language, Locality, and Policy
11h00 – 11h30: Tea/Coffee Break – Informal Networking
11h30 – 12h30: Panel 1 – One Threat, Many Responses

National and regional case studies of culturally contextualised cybersecurity frameworks

12h30 – 13h30: Lunch Break – Informal Networking and Discussions
13h30 – 14h30: Workshop – Windows Incident Response Artifact Primer

Participants will explore key Windows system artifacts such as event logs, registry hives, and file system metadata that reveal attacker behavior. The session highlights how these artifacts fit into the incident response process and map to specific attack techniques.

14h30 – 15h00: Tea/Coffee Break – Informal Networking
15h00 – 16h00: Workshop – Targeted Log and Artifact Collection using KAPE and EvtxEcmd

Learn to rapidly collect and parse logs and forensic data using KAPE (Kroll Artifact Parser and Extractor) and EvtxEcmd. The session emphasizes targeted evidence collection and validation to support efficient analysis.

16h00 – 17h00: Workshop – Analytical Log Analysis using Timeline Explorer and the PANICS Framework

Participants will perform structured log analysis using Timeline Explorer, applying the PANICS framework to interpret events, correlate activity, and build an investigative narrative from the collected data.

18h00 – 21h00: Conference Dinner (Venue TBC)
Day 2 – Towards Action and Collaboration (5 November 2025)
08h00 – 09h00: Registration, Tea/Coffee, Networking
09h00 – 11h00: Workshop – Log Analysis using Hayabusa and the PANICS Framework

This session introduces Hayabusa, a fast and powerful event log analysis tool that helps detect suspicious activity using Sigma rules. Participants will practice mapping findings to attacker TTPs and use PANICS to contextualize alerts.

11h00 – 11h30: Tea/Coffee Break – Informal Networking
11h30 – 13h00: Workshop – Log Analysis using Wazuh SIEM and the PANICS Framework

Participants will transition to analyzing logs at scale using Wazuh, an open-source SIEM platform. The session focuses on detection correlation, alert interpretation, and mapping observed behaviors to MITRE ATT&CK TTPs through guided investigations.

13h00 – 14h00: Lunch
14h00 – 15h30: Panel 2 – Designing Multicultural Cyber Awareness Campaigns

Practical, all-participant session with facilitators guiding the creation of context aware tools and messaging

15h30 – 16h00: Closing – Remarks, Certificates, and Awards
16h00 – 17h00: Tea/Coffee – Networking

Accepted papers will be presented via round-table discussions in the relevant sessions.

< conference_speakers />

THREAT 2025 Confirmed Speakers

Mondli Gungubele

Hon. Mondli Gungunbele

Deputy Minister of Communications and Digital Technologies of the Republic of South Africa

Muhammad Ali

Muhammad Ali

Managing director, WWise

Kiru Pillay

Dr. Kiru Pillay

SA Department of Communications and Digital Technologies (DCDT)

Eric Akumiah

Eric Akumiah

Africa Regional Liaison

Bruce Watson

Prof. Bruce Watson

Chief Advisor (Technology) at Canada's National Security Centre of Excellence, AI Subject Matter Expert to the Government of Canada, and Co-Director of AI Research at the African Cybersecurity Centre of Excellence, Honarary Professor, UKZN

Given Shingange

Given Shingange

Aviation Security Risk and Cybersecurity Specialist with the South African Civil Aviation Authority (SACAA)

Andy Chadwick

Andy Chadwick

Director for Africa at The Shadowserver Foundation, a global non-profit dedicated to improving cybersecurity and internet safety. With over 35 years of prior experience in the UK Government.

Farad Hoosen Chohan

Farad Hoosen Chohan

Academic Programme Leader at MANCOSA's School of Information and Digital Technology.

Prof Brett van Niekerk

Prof Brett van Niekerk (PhD)

Associate professor in information technology at the Durban University of Technology.

Chair for the International Federation of Information Processing Working Group on ICT in Peace and War, and the co-Editor-in-Chief of the International Journal of Cyber Warfare and Terrorism.

Dr. Nishal Khusial

Dr. Nishal Khusial

highly accomplished technology leader, fintech innovator, and artificial intelligence expert with over 20 years of experience

His tenure includes serving as MD, CTO, and CEO across global utilities companies, fintech firms, and pioneering Africa-first cyber security and digital forensics organizations.

< conference_fees />

The THREAT 2025 conference fees

Full fee

R 4000.00

Student fee

R 3500.00

Group fee

Contact us

< conference_partners_and_sponsors />

THREAT 2025 Confirmed Partners and Sponsors

Threat 2025 sponsor
Threat 2025 sponsor
Threat 2025 sponsor
Threat 2025 sponsor
Threat 2025 sponsor
< conference_contact />

THREAT 2025 Contact Form