How can we initiate a global conversation on cybersecurity and gender issues and bring perspectives from different stakeholders to a common platform to:
Look at the relevance of gender disparities/inequalities in cybersecurity and define the need to focus on actionable measures to close the gender workforce and awareness gap;
Highlight current good practices on how women are being included in cybersecurity roles across sectors;
Discuss the various challenges faced by women as cybersecurity professionals and internet users and possible ways to address them;
Outline the advantages of including women in the cybersecurity workforce; and
Define what governments, civil society, and the private sector can do to make this space more diverse, inclusive, and safer.
This talk provides a peek into the present and near future where AI is not just a defensive tool, but a powerful weapon in the hands of cybercriminals. Confidence Staveley paints a picture of an increasingly automated cyber threat landscape, where AI-driven attacks challenge the very foundations of current cybersecurity defenses.
The talk begins by exploring how AI has changed cybersecurity by enabling faster threat detection, predictive analytics, and automated responses, these same capabilities can be exploited by the bad guys as well. She uses powerful storytelling skills to detail how AI is being weaponized to conduct highly sophisticated attacks, such as AI-generated phishing campaigns that are difficult to distinguish from legitimate communications or create malware that continuously evolves to avoid detection by traditional security tools.
A particularly thought-provoking aspect of the talk is the discussion on the potential for AI to independently find and exploit vulnerabilities in systems, evolving independently from its creators. This raises the unsettling possibility of AI-driven attacks that are a new form of digital life with its own agenda—a scenario where the hacker is not a person but an autonomous entity.
If AI becomes the hacker, traditional defense mechanisms will likely become obsolete.
In our technology-shaped world, where “seeing is not believing”, digital trust is the foundation that ensures progress and innovation continue. It’s not just about keeping data secure or complying with regulations; it’s about creating a digital environment that people can truly rely on. This talk will argue that rebuilding digital trust means designing technology that feels safe, experiences that resonate, and solutions that empower everyone. Because without digital trust, the future of technology loses its potential to meaningfully transform our world.
How can we initiate a global conversation on cybersecurity and gender issues, and bring perspectives from different stakeholders to a common platform to:
Look at the relevance of gender disparities/inequalities in cybersecurity and define the need to focus on actionable measures to close the gender workforce and awareness gap.
Highlight current good practices on how women are being included in cybersecurity roles across sectors.
Discuss the various challenges faced by women as cybersecurity professionals and internet users, and possible ways to address them.
Outline the advantages of including women in the cybersecurity workforce.
Define what governments, civil society, and the private sector can do to make this space more diverse, inclusive, and safer.
Given the rapid growth in cyber-attacks and digital crime vis-à-vis the current acceptance of digital trading, this session will seek to answer the following questions;
How effective are our cyber security measures? How can data protection impact the digital economy? Cybercrime is one impediment to a thriving digital economy. How can professionals utilize international, regional, and private sector cooperation to address the cybercrime pandemic? How could developing countries build capacities, including skills, to use new and emerging technologies such as big data analytics and artificial intelligence to grow the digital economy?
Confidence Staveley is an award-winning cybersecurity leader, global speaker, and inclusion advocate recognized as one of the most influential voices shaping Africa’s digital future. Known widely as “The Relatable CyberSecurity Queen,” she blends deep technical expertise with exceptional communication skills, making complex cybersecurity concepts accessible to audiences of all backgrounds.
As an official member of the Forbes Technology Council, Confidence has been recognized globally for her leadership in cybersecurity awareness, education, and innovation. She is the Winner of the 2023 Cybersecurity Woman of the World Award, an IFSEC Global Top Influencer in Security & Fire (2021), and one of the Top 50 Women in Cybersecurity Africa.
Confidence is the Founder of CyberSafe Foundation, Africa’s leading non-profit organization promoting inclusive and secure digital access, and Co-Founder of MerkleFence, a blockchain and application security consultancy. She is also an alumna of the Obama Foundation Leaders: Africa Program and the U.S. State Department’s International Visitors Leadership Program (IVLP).
In this 31-minute presentation, cybersecurity expert Confidence Staveley breaks down the evolving payment threat landscape—revealing how financial systems can stay resilient against fraud, ransomware, and emerging cyberattacks.
In The Payment Threat Landscape, Confidence Staveley—renowned cybersecurity leader and founder of CyberSafe Foundation—delivers a powerful and practical analysis of the latest threats facing digital payment systems across Africa and the globe. Speaking with authority and clarity, she connects technical insight with real-world cases to help organizations understand, anticipate, and mitigate risk in today’s complex financial ecosystem.
Confidence opens by highlighting how digital transformation in banking and fintech has dramatically increased exposure to cyberattacks. She outlines the most pressing payment threats, from social engineering and credential theft to payment gateway exploitation and insider risks. Using vivid examples, she explains how threat actors evolve their tactics faster than traditional defenses, forcing security teams to move from reactive to proactive strategies.
She dives into ransomware trends, phishing innovations, and malware-as-a-service models, explaining how criminal syndicates now target not just financial institutions but also small businesses and individuals through mobile money systems. Throughout the session, she emphasizes the human element—how awareness, training, and behavioral change are as critical as technology in defense.
Midway through the presentation, Confidence introduces frameworks for building resilient payment ecosystems, including layered authentication, zero-trust architecture, and threat intelligence sharing among financial organizations. She also advocates for regulatory collaboration and cross-sector information exchange to close regional security gaps.
Her closing remarks are both cautionary and empowering: while the threat landscape is evolving rapidly, collective action, digital literacy, and security culture can outpace adversaries. By treating cybersecurity as a shared responsibility, she argues, the financial sector can transform vulnerability into resilience.
Cybersecurity advocate Confidence Staveley explains how our unique personality traits influence the way we interact with technology — and how they can make us more or less vulnerable online.
In this engaging TEDxLagos talk, Confidence Staveley reveals that cybersecurity is as much about psychology as it is about technology. She begins by asking a simple but powerful question: “Could who you are be what puts you at risk online?” Drawing on her expertise as a cybersecurity leader and founder of CyberSafe Foundation, she shows how different personality types — from the overly trusting to the overly confident — display predictable patterns of digital behavior that hackers can exploit.
Using relatable examples and real-world data, Confidence demonstrates how emotional triggers such as curiosity, fear, and urgency shape our online decisions. She explains how these traits can make people more susceptible to phishing, social engineering, or privacy breaches.
Rather than instilling fear, Confidence empowers her audience with self-awareness. She encourages individuals to recognize their online behavior patterns and adopt small, consistent habits that enhance their security — from verifying sources to limiting oversharing. Her message is clear: understanding yourself is one of the most powerful ways to stay safe online.
01:11–03:20 — Behavioral patterns and how hackers exploit them
03:21–06:00 — Real-world examples of phishing and emotional manipulation
06:01–08:40 — The link between self-awareness and digital resilience
Overview:
The listing has received overwhelmingly positive feedback from clients, highlighting the speaker's exceptional skills and professionalism. Users praised the engaging keynote presentation, noting the speaker's preparedness and ability to address audience questions effectively. The overall sentiment reflects a strong appreciation for the impact and quality of the program delivered.
Strengths:
Weaknesses:
Overall, attendees felt honored to be part of the program and expressed high satisfaction with the experience.
Speaker fees can vary depending on factors such as expertise, demand, and event specifics. While some speakers may charge a flat fee for their services, others may have hourly rates. It’s best to discuss fee structures directly with the speaker or their representative to understand the pricing model.
Keynote speeches typically range from 30 to 90 minutes, with the duration determined by the speaker’s expertise, the event’s agenda, and audience preferences. Keynote speeches often include a combination of inspirational stories, practical insights, and actionable advice tailored to the event’s theme or objectives.
The scale of the event and audience size can indeed impact a speaker’s fee. Larger events with a broader reach or higher attendance may command higher fees due to increased exposure and demand. Conversely, smaller events or niche audiences may offer opportunities for more flexible pricing arrangements.
Travel expenses such as transportation, accommodation, and meals are typically negotiated separately from the speaker’s fee. These costs vary depending on the speaker’s location, travel distance, and event duration. It’s important to clarify travel arrangements and expenses during the booking process to avoid misunderstandings.
Many speakers require a deposit to secure a booking, with the remaining balance due closer to the event date. Deposits are often non-refundable and serve as a commitment from both parties. It’s advisable to discuss deposit requirements and payment terms with the speaker or their representative when finalizing the booking.
Ready to find the perfect speaker for your event? Use our advanced search feature or contact us to get started today!
He helps organizations stay secure in an evolving threat landscape.
No results available
These remain the property of its owner and are not affiliated with or endorsed by Speakers Inc.
All talent fees exclude VAT, travel and accommodation where required.
Connecting you with the perfect speaker.
We connect you with world-class speakers to create impactful, memorable events.
Tell us about your event and we’ll match you with the right speaker.
© All rights reserved 2026. Designed using Voxel