S. Africa’s Model For Cybesecurity

A vast range of topics and case studies was presented by industry leaders at the Cyber Security in Banking Conference in Cape Town, South Africa.

The event highlighted the latest trends and development in cyber security and provided a comprehensive as well as multi-faceted agenda that is relevant to all banking and financial services professionals in the industry.

The local cloud specialist, One Channel addressed delegates by highlighting the opportunities of using technology in the fight against cybercrime in the banking environment. One Channel CEO, Bernard Ford, not only presented the future model of Cybersecurity but also showed how businesses can prepare for the 4th Industrial Revolution and the implications thereof.

Ford warned that organisations can no longer afford to operate in isolation in the process era of the 4th Industrial Revolution. "We stand on the brink of a technological revolution that will fundamentally alter the way we live, work, and relate to one another." He made an example of the current cyber threat landscape and showed the impact global threats had on Africa.

"WannaCry, the worst cyber-attacks in history, affected more than 230 000 computers in at least 150 countries," Ford said. He added, "It will take a concerted effort from both private and public sectors to fight cyber-crime and improve cyber security so that Africa’s cybersecurity landscape can reach optimally contend with global standards."

According to the statement, financial services institutions need to incorporate a greater agile cyber risk management approach more especially with the industry's high dependence on mobile payments, e-banking, and general cyber-operations. According to Ford, the possibilities of billions of people connected by mobile devices, with unprecedented processing power, storage capacity, and access to knowledge, are unlimited.

"And these possibilities will be multiplied by emerging technology breakthroughs in fields such as Artificial Intelligence (AI), robotics, the Internet of Things (IoT), 3-D printing, nanotechnology, autonomous vehicles and quantum computing," he said.

"Technology has made possible new products and services that increase the efficiency and pleasure of our personal lives. Ordering a cab, booking a flight, buying a product, making a payment, listening to music, watching a film, or playing a game - any of these can now be done remotely."

Technological innovation in the future will lead to a supply-side miracle. This will have long-term gains in efficiency and productivity. Communication and transportation costs will drop, global supply chains and logistics will become more effective, and trading cost will diminish, all of which will open new markets and drive the growth of the economy.

The demand side is seeing major shifts, as growing transparency, consumer engagement, and new patterns of consumer behaviour are forcing companies to adapt the way they design, deliver products and services as well as market.

He stated that, "It’s no secret that technology has been advancing at a tremendous rate. This means that it is not only more powerful, intuitive and automated, but also more accessible, with companies offering software solutions that are now affordable for small to medium sized businesses - sometimes they’re even free," 

"Acumatica is a post-modern, true-cloud business system that takes advantage of the following trending technologies: blockchain security, IoT, artificial intelligence, multi-cloud and natural language interface to ERP," Ford explained.
 
"The conference certainly equipped the financial sector with strategies and skills for successful operations in the cyber security space. We shared valuable industry insights and knowledge, addressing the latest developments in cyber security as faced by financial institutions, with particular emphasis on cyber resilience, cyber security culture, and the protection of critical financial infrastructure, as well as risk mitigation strategies," he concluded.

IOL:

You Might Also Read:

The 4th Industrial Revolution:Can Democracy Survive ?:

Industrial Robots Are A Security Weak Link:

South Africa: Serious about cyberwarfare:

« Cyberwar: A Guide
Which Countries Are Ready For Cyberwar? »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Exatel

Exatel

Exatel is Poland’s leading provider of ICT security services.

Plurilock Security Solutions

Plurilock Security Solutions

Plurilock is a real-time cybersecurity solution that uses artificial intelligence to identify, prevent, and eliminate insider threats.

FraudScope

FraudScope

FraudScope is an AI-assisted platform that accelerates the identification of fraud, waste, and abuse.

Venrock

Venrock

Venrock helps entrepreneurs build some of the world's most disruptive, successful companies. We invest in technology: Security, Cloud Services, Big Data, Healthcare IT, AdTech.

Titans24

Titans24

Titans24 is a Software-as-a-Service security platform for web applications. It prevents attacks on business websites that are protected under 11 cyber-security layers.

Internetwork Defense (IND)

Internetwork Defense (IND)

Internetwork Defense is a premier provider of Information Security Training and Business Consulting Services in the Mid-Atlantic region.

Alacrinet

Alacrinet

Alacrinet is an IT and cyber security consultancy. From penetration testing to fully managed MSSP, our team is focused on knowing the latest threats, preventing vulnerabilities, and providing value.

Elisity

Elisity

Elisity Cognitive Trust is a new security paradigm that combines Zero Trust Network Access and an AI-enabled Software Defined Perimeter.

Presidio Identity

Presidio Identity

Presidio Identity offers a digital-native approach that brings security, privacy, and simplicity to user authentication and digital interactions.

Triaxiom Security

Triaxiom Security

Triaxiom Security offers penetration testing, security audits, and strategic consulting customized to meet your needs.

Iconium Software

Iconium Software

DataLenz by Iconium offers continuous and real-time tracking of your data assets delivering you the tools you need to successfully reach and maintain your target security standards.

Vanta

Vanta

Vanta helps companies scale security practices and automate compliance for the industry’s most sought after standards - SOC 2, ISO 27001, HIPAA, GDPR, and other security and privacy frameworks.

Alethea

Alethea

Alethea is a technology company helping companies, nonprofits, and democracies protect themselves from harms stemming from disinformation and social media manipulation.

Finlaw Associates

Finlaw Associates

Finlaw Associates is a trusted cybercrime law firm providing a wide range of taxation, legal, advisory and regulatory services to the financial, commercial and industrial communities.

Haiku

Haiku

Haiku stands at the forefront of cybersecurity upskilling, leveraging video games to immerse you in a flow state for accelerated, enduring learning.

Darknetsearch by Kaduu

Darknetsearch by Kaduu

Our dark web and deep web monitoring continuously tracks confidential data across dark web markets, telegram channels, paste sites, botnet logs, IRC, social media and other sources.