Cloud and Security Summit 2018 commences today in Rwanda

The two-day summit will present an immersive platform where the sector IT leaders from both the supply and demand side can convene and interact


Devdiscourse News Desk | Updated: 28-03-2018 17:10 IST | Created: 28-03-2018 16:59 IST
Cloud and Security Summit 2018 commences today in Rwanda
Cloud and Security Summit (image credit: twitter)
  • Country:
  • Rwanda

Cloud and security summit commences today at Marriott Hotel in Kigali, Rwanda. The two-day summit will present an immersive platform where the sector IT leaders from both the supply and demand side can convene and interact.

The theme of the Cloud and Security Summit2018 is "Protecting the digital space" and delegates will be discussing a number of topics in regards to cybersecurity at the center of business innovation in the region. It will provide a platform to engage with the foremost minds leading the digital transformation to drive economic growth in the region.

The Government of Rwanda through Rwanda Information Society Authority (RISA) in partnership with the CIO East Africa have assembled to host the summit.

The summit intends to sustain the momentum of the world that has steadily risen to cloud computing while tapping several public institutions and enterprises which are on the course towards investing in it.

“The agenda of the Cloud and Security aims to share pragmatic steps and insights in addressing information security issues and questions plaguing security professionals at all types and sizes of organizations. The talks cover a diverse range of topics, such as information security best practices in the age of cloud computing,” says Innocent Muhizi, CEO, RISA.

Speaking about the partnership Laura Chite, CEO, CIO East Africa stated, “Partnership between CIO East Africa and RISA aims to provide a platform that brings together security practitioners to advance their knowledge of the technologies, processes, and procedures that allow them to run a more secure, agile business, and enable them to identify, manage, and communicate information security risk throughout their organizations.”

 

 

Give Feedback