S. Africa’s Model For Cybesecurity

A vast range of topics and case studies was presented by industry leaders at the Cyber Security in Banking Conference in Cape Town, South Africa.

The event highlighted the latest trends and development in cyber security and provided a comprehensive as well as multi-faceted agenda that is relevant to all banking and financial services professionals in the industry.

The local cloud specialist, One Channel addressed delegates by highlighting the opportunities of using technology in the fight against cybercrime in the banking environment. One Channel CEO, Bernard Ford, not only presented the future model of Cybersecurity but also showed how businesses can prepare for the 4th Industrial Revolution and the implications thereof.

Ford warned that organisations can no longer afford to operate in isolation in the process era of the 4th Industrial Revolution. "We stand on the brink of a technological revolution that will fundamentally alter the way we live, work, and relate to one another." He made an example of the current cyber threat landscape and showed the impact global threats had on Africa.

"WannaCry, the worst cyber-attacks in history, affected more than 230 000 computers in at least 150 countries," Ford said. He added, "It will take a concerted effort from both private and public sectors to fight cyber-crime and improve cyber security so that Africa’s cybersecurity landscape can reach optimally contend with global standards."

According to the statement, financial services institutions need to incorporate a greater agile cyber risk management approach more especially with the industry's high dependence on mobile payments, e-banking, and general cyber-operations. According to Ford, the possibilities of billions of people connected by mobile devices, with unprecedented processing power, storage capacity, and access to knowledge, are unlimited.

"And these possibilities will be multiplied by emerging technology breakthroughs in fields such as Artificial Intelligence (AI), robotics, the Internet of Things (IoT), 3-D printing, nanotechnology, autonomous vehicles and quantum computing," he said.

"Technology has made possible new products and services that increase the efficiency and pleasure of our personal lives. Ordering a cab, booking a flight, buying a product, making a payment, listening to music, watching a film, or playing a game - any of these can now be done remotely."

Technological innovation in the future will lead to a supply-side miracle. This will have long-term gains in efficiency and productivity. Communication and transportation costs will drop, global supply chains and logistics will become more effective, and trading cost will diminish, all of which will open new markets and drive the growth of the economy.

The demand side is seeing major shifts, as growing transparency, consumer engagement, and new patterns of consumer behaviour are forcing companies to adapt the way they design, deliver products and services as well as market.

He stated that, "It’s no secret that technology has been advancing at a tremendous rate. This means that it is not only more powerful, intuitive and automated, but also more accessible, with companies offering software solutions that are now affordable for small to medium sized businesses - sometimes they’re even free," 

"Acumatica is a post-modern, true-cloud business system that takes advantage of the following trending technologies: blockchain security, IoT, artificial intelligence, multi-cloud and natural language interface to ERP," Ford explained.
 
"The conference certainly equipped the financial sector with strategies and skills for successful operations in the cyber security space. We shared valuable industry insights and knowledge, addressing the latest developments in cyber security as faced by financial institutions, with particular emphasis on cyber resilience, cyber security culture, and the protection of critical financial infrastructure, as well as risk mitigation strategies," he concluded.

IOL:

You Might Also Read:

The 4th Industrial Revolution:Can Democracy Survive ?:

Industrial Robots Are A Security Weak Link:

South Africa: Serious about cyberwarfare:

« Cyberwar: A Guide
Which Countries Are Ready For Cyberwar? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ACME Communications

ACME Communications

ACME Communications specialises in the field of data centre, implementation, maintenance & operation and all aspects of other IT service.

Secure Identity Alliance (SIA)

Secure Identity Alliance (SIA)

The Secure Identity Alliance is dedicated to supporting sustainable worldwide economic growth and prosperity through the development of trusted digital identities and the adoption of secure eServices.

Templar Executives

Templar Executives

Templar Executives is a leading, expert and dynamic Cyber Security company trusted by Governments and multi-national organisations to deliver business transformation.

Zerocopter

Zerocopter

Zerocopter enables you to confidently leverage the skills of the world's most knowledgable ethical hackers to secure your applications.

CloudAlly

CloudAlly

CloudAlly provides online cloud to cloud backup and recovery solutions, which backs up daily changes in your SaaS to unlimited Amazon S3 storage and makes it available for restore or export.

Cyber Observer

Cyber Observer

Cyber Observer’s team specializes in providing corporate officers with comprehensive, visual, real-time performance overview, critical security control (CSC) analysis.

Dreamlab Technologies

Dreamlab Technologies

Dreamlab specialises in securing critical IT infrastructures. We offer qualitative support and advice for managing your infrastructure and cyber security needs.

T-REX

T-REX

T-REX is a coworking space, technology incubator, and entrepreneur resource center for technology startups.

OwnZap Infosec

OwnZap Infosec

OwnZap Infosec aims to digitally shield the cyberspace by offering services like Penetration Testing and Red Teaming, Infrastructure Security Testing, and Vulnerability Assessments.

Axio Global

Axio Global

Axio is a leading cyber risk management SaaS company. Our Axio360 platform gives companies visibility to their cyber risk, and enables them to prioritize investments to protect their business.

Conquest Cyber

Conquest Cyber

Conquest Cyber builds adaptive risk management programs where innovation is most needed – within defense, intelligence, federal civilian agencies and the industrial base that supports them.

Mirai Security

Mirai Security

Mirai Security are a cyber security company that specializes in Governance, Risk Management and Compliance, Cloud Security and Application Security.

Accenture

Accenture

Accenture is a leading global professional services company providing a range of strategy, consulting, digital, technology & operations services and solutions including cybersecurity.

Olympix

Olympix

Dev-first Web3 security that starts at the source. Olympix is a pioneering DevSecOps tool that puts security in the hands of the developer by proactively securing code from day one.

Neosoft

Neosoft

Néosoft is an independent digital transformation consulting group with expertise in Consulting & Agility, Cybersecurity, Data, DevOps, Infrastructure & Cloud and Software Engineering.

DuckDuckGoose

DuckDuckGoose

DuckDuckGoose offer advanced solutions to protect against manipulated videos, images, voices and texts.