S. Africa’s Model For Cybesecurity

A vast range of topics and case studies was presented by industry leaders at the Cyber Security in Banking Conference in Cape Town, South Africa.

The event highlighted the latest trends and development in cyber security and provided a comprehensive as well as multi-faceted agenda that is relevant to all banking and financial services professionals in the industry.

The local cloud specialist, One Channel addressed delegates by highlighting the opportunities of using technology in the fight against cybercrime in the banking environment. One Channel CEO, Bernard Ford, not only presented the future model of Cybersecurity but also showed how businesses can prepare for the 4th Industrial Revolution and the implications thereof.

Ford warned that organisations can no longer afford to operate in isolation in the process era of the 4th Industrial Revolution. "We stand on the brink of a technological revolution that will fundamentally alter the way we live, work, and relate to one another." He made an example of the current cyber threat landscape and showed the impact global threats had on Africa.

"WannaCry, the worst cyber-attacks in history, affected more than 230 000 computers in at least 150 countries," Ford said. He added, "It will take a concerted effort from both private and public sectors to fight cyber-crime and improve cyber security so that Africa’s cybersecurity landscape can reach optimally contend with global standards."

According to the statement, financial services institutions need to incorporate a greater agile cyber risk management approach more especially with the industry's high dependence on mobile payments, e-banking, and general cyber-operations. According to Ford, the possibilities of billions of people connected by mobile devices, with unprecedented processing power, storage capacity, and access to knowledge, are unlimited.

"And these possibilities will be multiplied by emerging technology breakthroughs in fields such as Artificial Intelligence (AI), robotics, the Internet of Things (IoT), 3-D printing, nanotechnology, autonomous vehicles and quantum computing," he said.

"Technology has made possible new products and services that increase the efficiency and pleasure of our personal lives. Ordering a cab, booking a flight, buying a product, making a payment, listening to music, watching a film, or playing a game - any of these can now be done remotely."

Technological innovation in the future will lead to a supply-side miracle. This will have long-term gains in efficiency and productivity. Communication and transportation costs will drop, global supply chains and logistics will become more effective, and trading cost will diminish, all of which will open new markets and drive the growth of the economy.

The demand side is seeing major shifts, as growing transparency, consumer engagement, and new patterns of consumer behaviour are forcing companies to adapt the way they design, deliver products and services as well as market.

He stated that, "It’s no secret that technology has been advancing at a tremendous rate. This means that it is not only more powerful, intuitive and automated, but also more accessible, with companies offering software solutions that are now affordable for small to medium sized businesses - sometimes they’re even free," 

"Acumatica is a post-modern, true-cloud business system that takes advantage of the following trending technologies: blockchain security, IoT, artificial intelligence, multi-cloud and natural language interface to ERP," Ford explained.
 
"The conference certainly equipped the financial sector with strategies and skills for successful operations in the cyber security space. We shared valuable industry insights and knowledge, addressing the latest developments in cyber security as faced by financial institutions, with particular emphasis on cyber resilience, cyber security culture, and the protection of critical financial infrastructure, as well as risk mitigation strategies," he concluded.

IOL:

You Might Also Read:

The 4th Industrial Revolution:Can Democracy Survive ?:

Industrial Robots Are A Security Weak Link:

South Africa: Serious about cyberwarfare:

« Cyberwar: A Guide
Which Countries Are Ready For Cyberwar? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Advenica

Advenica

Advenica develops, manufactures and sells innovative cybersecurity solutions for encryption and secure information exchange.

ESNC

ESNC

ESNC’s vulnerability management and real-time SAP security monitoring solutions help largest corporations in the world to effectively prioritize SAP security tasks and secure their business.

Upstream Security

Upstream Security

Upstream Security is the first cloud-based cyber-security solution that protects the technologies and applications of connected and autonomous vehicles.

Bottomline Technologies

Bottomline Technologies

Bottomline Technologies is an innovator in business payment automation technology, helping companies make complex business payments simple, smart and secure.

SCIS Security

SCIS Security

SCIS Security provides affordable cyber security services and solutions to small to medium sized businesses and homes.

Computest

Computest

Computest security testing services include Mobile app security, Vulnerability assessments, Attack & penetration testing, Security awareness training, Network security assessments.

RFA

RFA

RFA is an institutional-quality IT, financial cloud and cyber-security services provider to the financial service and investment management sector.

iosiro

iosiro

iosiro was created to guide companies through securely using blockchain technologies. We help teams launch and manage ICOs, deploy secure dApps, and integrate private networks into business practices.

Google for Startups

Google for Startups

Google for Startups is Google’s initiative to help startups thrive across every corner of the world.

Data Privacy Office (DPO) - Belarus

Data Privacy Office (DPO) - Belarus

Data Privacy Office is a company that specializes in privacy and personal data protection, following the highest standards in its sector.

Guidehouse

Guidehouse

Guidehouse is a leading global provider of consulting services to the public and commercial markets with broad capabilities in management, technology, and risk consulting.

InferSight

InferSight

InferSight can help you design an architecture that takes into account security, performance, availability, functionality, resiliency and future capacity to avoid technological lock in and limitations

8com

8com

8com is an established Managed Security Service Provider (MSSP) with over 75 employees and customers in over 40 countries.

CyberMontana

CyberMontana

CyberMontana is a statewide initiative providing cybersecurity awareness, training, and workforce development for businesses and residents of Montana.

Assurestor

Assurestor

Assurestor's singular focus is delivering leading cloud-based backup and disaster recovery designed to increase levels of IT resilience.

ClamAV

ClamAV

ClamAV is an open-source (GPL) anti-virus engine used in a variety of situations, including email and web scanning, and endpoint security.