Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      Cell C may list on the JSE as Blue Label eyes big restructuring

      16 May 2025

      Nvidia shares roar back to life

      16 May 2025

      5 000 fake DStv chargers seized, destroyed in Durban port bust

      16 May 2025

      Now Facebook wants to … scan your face

      16 May 2025

      Grok’s South Africa blunder raises alarms over chatbot oversight

      16 May 2025
    • World

      Microsoft to lay off 3% of workforce in organisation-wide cuts

      14 May 2025

      AI-voiced audiobooks are coming to Audible

      13 May 2025

      Apple turns to AI to tackle iPhone battery woes

      13 May 2025

      Vodafone CFO to step down

      7 May 2025

      Lights, camera, tariffs: Trump declares war on foreign flicks

      5 May 2025
    • In-depth

      South Africa unveils big state digital reform programme

      12 May 2025

      Is this the end of Google Search as we know it?

      12 May 2025

      Social media’s Big Tobacco moment is coming

      13 April 2025

      This is Europe’s shot to emerge from Silicon Valley’s shadow

      10 April 2025

      Microsoft turns 50

      4 April 2025
    • TCS

      Meet the CIO | Schalk Visser on Cell C’s big tech pivot

      13 May 2025

      TCS | Kiaan Pillay on fintech start-up Stitch and its R1-billion funding round

      7 May 2025

      TCS+ | Switchcom and Huawei eKit: networking made easy for SMEs

      6 May 2025

      TCS | How Covid sparked a corporate tug-of-war over Adapt IT

      30 April 2025

      TCS+ | Inside MTN’s big brand overhaul

      11 April 2025
    • Opinion

      Solar panic? The truth about SSEG, fines and municipal rules

      14 April 2025

      Data protection must be crypto industry’s top priority

      9 April 2025

      ICT distributors must embrace innovation or risk irrelevance

      9 April 2025

      South Africa unprepared for deepfake chaos

      3 April 2025

      Google: South African media plan threatens investment

      3 April 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SkyWire
      • Solid8 Technologies
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Information security » Boost security maturity: bridge disconnects between execs, infosec specialists

    Boost security maturity: bridge disconnects between execs, infosec specialists

    Promoted | Disconnects between business executives and technical information security teams must be overcome to advance security maturity within organisations.
    By Solid8 Technologies23 June 2023
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp
    Skybox Security’s Justin Berman

    Disconnects between business executives and technical information security teams must be overcome to advance security maturity within organisations.

    This is according to Justin Berman, technical director for Skybox Security, who says many South African organisations are stuck in early levels of security maturity, which hampers their ability to optimise their security posture and properly support digital transformation of the business.

    Berman explains that the earliest stage of security maturity is an ad hoc approach, followed by a “developing” phase in which organisations have an active cybersecurity programme; then a “defined” phase in which programmes and processes have been defined; and a “managed” phase in which programmes and policies are well established. At the highest level, organisations are in the “optimising” phase, in which they have a holistic view of the attack surface, tight integration between IT and security, and are continually improving the environment.

    Disconnected goals and requirements

    To move beyond the early stages of security, organisations must address the disconnects between executives and technical stakeholders, he says. Berman notes that all stakeholders – from the C-suite through to security architects, NOC and SOC engineers, security architects, and IT operations – have the same goals of mitigating risk for organisational growth. However, the tools, data and dashboards they need to achieve this is different for each stakeholder.

    Questions about Skybox Security? Please e-mail [email protected]

    “The CISO, CIO and CTO need to align security with business objectives. They need quantifiable measurements of cyber risk and the outcomes of actions and programmes that address that risk. Security architects are also strategic thinkers – they must de-risk digital transformation and glue all the components together. They need a holistic view of the environment, risk and business requirements,” Berman says. “Meanwhile, the engineers and NOC and SOC analysts are focused on monitoring and managing critical infrastructure to support the business and enable availability, scale and performance. They need data that drives security efficacy and performance, resiliency and compliance. Finally, risk and compliance teams need reports that provide risk oversight around compliance, policies and enforcement, to prove they are compliant. They all need different information.”

    According to Heidrick & Struggles, only around 12% of CISOs were on corporate boards in 2021

    Meeting these needs in an increasingly complex environment can be challenging, Berman says. “There are communication gaps across business units and even within departments – for example, CIOs and CTOs may have the same objectives but different views and requirements for security, while the board sees security as priority, but is focused on finance and strategy. If a disconnect continues, security will be driven from the bottom up and not as a top-down approach, and as time moves on, security will fail to support the organisation’s strategic direction.”

    While CISOs are considered C-level executives, many tend to play an advisory role and do not sit on the board, he adds. “The CISO role is evolving, but while they drive strategy, they may not be the key decision maker on budget, tooling and engineering,” Berman says.

    According to executive search firm Heidrick & Struggles, only around 12% of CISOs were on corporate boards in 2021.

    People, process and technology for progress

    Berman says organisations must overcome disconnects and advance their security maturity by addressing people, processes and technology. “They need to automate menial tasks and free engineers to work on more meaningful and strategic projects. They also need to empower stakeholders with alerts, dashboards and reports that are timeous, actionable, intelligent and concise.

    “Processes also need to be improved across identification, prioritisation, remediation and oversight,” he says. “In South Africa, many organisations are stuck at identification level. We must put the right processes and workflows in place so that strategic and technical people get what they need, when they need it.”

    They need to automate menial tasks and free engineers to work on more meaningful and strategic projects

    Berman says the right technology helps overcome disconnects and ensure that all stakeholders have the information they need to improve security and compliance and better support the business. “Skybox consolidates the data and gives the right insights to the right people when they need it. It consolidates and aggregates many datasets across complex environments. It allows them to dynamically model the environment to visualise and assess the efficacy of security controls, gives context to help them understand exposure, prioritise vulnerabilities and determine optimal remediation strategies. It also helps them plan and analyse the impact of changes across the hybrid environment,” he says.

    “When executives and technical teams have the tools and information they need, and management is incentivised to drive security strategies, you see massive improvements in security,” Berman says.

    To learn more about Skybox Security, please e-mail [email protected].

    • Read more articles by Solid8 Technologies on TechCentral
    • Read more articles by Skybox Security on TechCentral
    • This promoted content was paid for by the party concerned


    Heidrick & Struggles Justin Berman Skybox Skybox Security Solid8 Solid8 Technologies
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleRMB: SA e-commerce to match developed world by 2026
    Next Article Larry Ellison scores big by cashing in expiring options

    Related Posts

    Seraphic secures $29m to strengthen browser security for businesses

    27 February 2025

    4 tips for exposure management of your business applications

    19 February 2025

    Anjuna Northstar: first-of-its-kind AI data fusion clean room, now available to all

    12 December 2024
    Add A Comment

    Comments are closed.

    Company News

    Zoom Fibre’s mission: powering the economy with world-class internet

    16 May 2025

    Retailers: take back control of your tech stack with self-enablement

    15 May 2025

    Sigfox South Africa unveils next-gen asset intelligence for smarter logistics

    15 May 2025
    Opinion

    Solar panic? The truth about SSEG, fines and municipal rules

    14 April 2025

    Data protection must be crypto industry’s top priority

    9 April 2025

    ICT distributors must embrace innovation or risk irrelevance

    9 April 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.