S. Africa’s Model For Cybesecurity

A vast range of topics and case studies was presented by industry leaders at the Cyber Security in Banking Conference in Cape Town, South Africa.

The event highlighted the latest trends and development in cyber security and provided a comprehensive as well as multi-faceted agenda that is relevant to all banking and financial services professionals in the industry.

The local cloud specialist, One Channel addressed delegates by highlighting the opportunities of using technology in the fight against cybercrime in the banking environment. One Channel CEO, Bernard Ford, not only presented the future model of Cybersecurity but also showed how businesses can prepare for the 4th Industrial Revolution and the implications thereof.

Ford warned that organisations can no longer afford to operate in isolation in the process era of the 4th Industrial Revolution. "We stand on the brink of a technological revolution that will fundamentally alter the way we live, work, and relate to one another." He made an example of the current cyber threat landscape and showed the impact global threats had on Africa.

"WannaCry, the worst cyber-attacks in history, affected more than 230 000 computers in at least 150 countries," Ford said. He added, "It will take a concerted effort from both private and public sectors to fight cyber-crime and improve cyber security so that Africa’s cybersecurity landscape can reach optimally contend with global standards."

According to the statement, financial services institutions need to incorporate a greater agile cyber risk management approach more especially with the industry's high dependence on mobile payments, e-banking, and general cyber-operations. According to Ford, the possibilities of billions of people connected by mobile devices, with unprecedented processing power, storage capacity, and access to knowledge, are unlimited.

"And these possibilities will be multiplied by emerging technology breakthroughs in fields such as Artificial Intelligence (AI), robotics, the Internet of Things (IoT), 3-D printing, nanotechnology, autonomous vehicles and quantum computing," he said.

"Technology has made possible new products and services that increase the efficiency and pleasure of our personal lives. Ordering a cab, booking a flight, buying a product, making a payment, listening to music, watching a film, or playing a game - any of these can now be done remotely."

Technological innovation in the future will lead to a supply-side miracle. This will have long-term gains in efficiency and productivity. Communication and transportation costs will drop, global supply chains and logistics will become more effective, and trading cost will diminish, all of which will open new markets and drive the growth of the economy.

The demand side is seeing major shifts, as growing transparency, consumer engagement, and new patterns of consumer behaviour are forcing companies to adapt the way they design, deliver products and services as well as market.

He stated that, "It’s no secret that technology has been advancing at a tremendous rate. This means that it is not only more powerful, intuitive and automated, but also more accessible, with companies offering software solutions that are now affordable for small to medium sized businesses - sometimes they’re even free," 

"Acumatica is a post-modern, true-cloud business system that takes advantage of the following trending technologies: blockchain security, IoT, artificial intelligence, multi-cloud and natural language interface to ERP," Ford explained.
 
"The conference certainly equipped the financial sector with strategies and skills for successful operations in the cyber security space. We shared valuable industry insights and knowledge, addressing the latest developments in cyber security as faced by financial institutions, with particular emphasis on cyber resilience, cyber security culture, and the protection of critical financial infrastructure, as well as risk mitigation strategies," he concluded.

IOL:

You Might Also Read:

The 4th Industrial Revolution:Can Democracy Survive ?:

Industrial Robots Are A Security Weak Link:

South Africa: Serious about cyberwarfare:

« Cyberwar: A Guide
Which Countries Are Ready For Cyberwar? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Centre for Secure Information Technologies (CSIT)

Centre for Secure Information Technologies (CSIT)

CSIT is a UK Innovation and Knowledge Centre (IKC) for secure information technologies. Our vision is to be a global innovation hub for cyber security.

FlashRouters

FlashRouters

FlashRouters offers DD-WRT compatible router models with improved performance, privacy/security options, and advanced functionality.

Prewen

Prewen

Prewen provide solutions to protect sensitive data across the organisation.

Organization for Security and Co-operation in Europe (OSCE)

Organization for Security and Co-operation in Europe (OSCE)

OSCE is the world's largest security-oriented intergovernmental organization. Areas of activity include Cyber/ICT security.

maCERT

maCERT

maCERT is the national Computer Emergency Response Team for Morocco.

DynaRisk

DynaRisk

DynaRisk helps companies protect their staff, clients and supply chain from cyber threats by enabling people to take action for themselves.

Procilon Group

Procilon Group

Procilon Group specialize in the development of cryptographic software as well as strategic advice on information security and data protection.

Consortium for Information & Software Quality (CISQ)

Consortium for Information & Software Quality (CISQ)

The mission of CISQ is to develop international standards for software quality and to promote the development and sustainment of secure, reliable, and trustworthy software.

ThreatGen

ThreatGen

ThreatGEN™ works with your team to improve your resiliency and industrial cybersecurity capabilities through an innovative and modernized approach to training and services.

Elevate Security

Elevate Security

Elevate is the leading Security Behavior Platform, changing employee security habits while giving security teams unprecedented visibility.

Trustmarque

Trustmarque

Trustmarque delivers customer-centric IT solutions that enable better outcomes. We combine the technology, expertise and services to release value at every stage of the IT lifecycle.

Akto

Akto

Akto, the plug & play API security platform. Discover your APIs, run tests and find business logic vulnerabilities at ludicrous speed.

Minorities in Cybersecurity (MiC)

Minorities in Cybersecurity (MiC)

MiC was developed out of a unique passion to help fill the gap that exists in the support and development of women and minority leaders in the cybersecurity field.

Oz Forensics

Oz Forensics

Oz Forensics is a global leader in preventing biometric and deepfake fraud. It is a developer of facial Liveness detection for Antifraud Biometric Software with high expertise in the Fintech market.

Nortal

Nortal

Nortal is a strategic digital transformation partner for leading companies and governments around the world.

Defend

Defend

DEFEND are 100% focused on providing managed cybersecurity solutions and services that make a real difference to the cyber resilience of your organisation.