Cyber Security

Reimagine your Perimeter Webinar

7th October 2020
10:00-11:00 CAT
11:00-12:00 EAT

Rewatch and Secure Your Perimeter

85% of your traffic is in the cloud. Shouldn’t your security be, too? There’s no question that the year 2020 has turned the world upside down and has abruptly inverted organisations. Almost every company has remote workforces accessing cloud applications and web services to continue their business operations. 

Percentage of traffic to cloud applications
Percentage of enterprise devices that are mobile (and off the network half the time)

Businesses are undergoing both network transformation and security transformation. Clearly, legacy lines of defences are fading, starting with the network perimeter that no longer sees data that is going to the cloud.


David Behr

Liquid Telecom Group
Chief Digital Officer

As Liquid Telecom’s Group Chief Digital Officer, David is helping enterprises across Africa successfully navigate their digital transformation journey. He is passionate about enabling African enterprises to safely and securely leverage the business benefits of private and public cloud. David is an internet pioneer and entrepreneur in Africa, having founded ZOL in 1995 and grown it into the largest ISP in Zimbabwe. 

Grant Reynolds

Grant Reynolds

Regional Sales Manager for Africa

With a 22 year history in the IT industry, 17 of which have been focused on major security vendors, Grant has unique insight into the cyber security solutions that really bring value to businesses. Leading the Netskope’s Africa strategy, he’s a firm believer in a cloud-first cyber security strategy powered by Netskope’s industry-leading global network, protecting business assets and information no matter where users are working from.

Watch the previous Cyber Security webinars

Cyber Security Launch Event

Build you Human Firewall

Reimagine your Perimeter

True Value of SOCs

Securing identity and devices
for remote work

Because your business is
nobody else's business