Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Big Microsoft 365 price increases coming next year

      Big Microsoft price increases coming next year

      5 December 2025
      Vodacom to take control of Safaricom in R36-billion deal - Shameel Joosub

      Vodacom to take control of Safaricom in R36-billion deal

      4 December 2025
      Black Friday goes digital in South Africa as online spending surges to record high

      Black Friday goes digital in South Africa as online spending surges to record high

      4 December 2025
      BYD takes direct aim at Toyota with launch of sub-R500 000 Sealion 5 PHEV

      BYD takes direct aim at Toyota with launch of sub-R500 000 Sealion 5 PHEV

      4 December 2025
      'Get it now': Takealot in new instant deliveries pilot

      ‘Get it now’: Takealot in new instant deliveries pilot

      4 December 2025
    • World
      Amazon and Google launch multi-cloud service for faster connectivity

      Amazon and Google launch multi-cloud service for faster connectivity

      1 December 2025
      Google makes final court plea to stop US breakup

      Google makes final court plea to stop US breakup

      21 November 2025
      Bezos unveils monster rocket: New Glenn 9x4 set to dwarf Saturn V

      Bezos unveils monster rocket: New Glenn 9×4 set to dwarf Saturn V

      21 November 2025
      Tech shares turbocharged by Nvidia's stellar earnings

      Tech shares turbocharged by stellar Nvidia earnings

      20 November 2025
      Config file blamed for Cloudflare meltdown that disrupted the web

      Config file blamed for Cloudflare meltdown that disrupted the web

      19 November 2025
    • In-depth
      Jensen Huang Nvidia

      So, will China really win the AI race?

      14 November 2025
      Valve's Linux console takes aim at Microsoft's gaming empire

      Valve’s Linux console takes aim at Microsoft’s gaming empire

      13 November 2025
      iOCO's extraordinary comeback plan - Rhys Summerton

      iOCO’s extraordinary comeback plan

      28 October 2025
      Why smart glasses keep failing - no, it's not the tech - Mark Zuckerberg

      Why smart glasses keep failing – it’s not the tech

      19 October 2025
      BYD to blanket South Africa with megawatt-scale EV charging network - Stella Li

      BYD to blanket South Africa with megawatt-scale EV charging network

      16 October 2025
    • TCS
      TCS+ | How Cloud on Demand helps partners thrive in the AWS ecosystem - Odwa Ndyaluvane and Xenia Rhode

      TCS+ | How Cloud On Demand helps partners thrive in the AWS ecosystem

      4 December 2025
      TCS | MTN Group CEO Ralph Mupita on competition, AI and the future of mobile

      TCS | Ralph Mupita on competition, AI and the future of mobile

      28 November 2025
      TCS | Dominic Cull on fixing South Africa's ICT policy bottlenecks

      TCS | Dominic Cull on fixing South Africa’s ICT policy bottlenecks

      21 November 2025
      TCS | BMW CEO Peter van Binsbergen on the future of South Africa's automotive industry

      TCS | BMW CEO Peter van Binsbergen on the future of South Africa’s automotive industry

      6 November 2025
      TCS | Why Altron is building an AI factory - Bongani Andy Mabaso

      TCS | Why Altron is building an AI factory in Johannesburg

      28 October 2025
    • Opinion
      Your data, your hardware: the DIY AI revolution is coming - Duncan McLeod

      Your data, your hardware: the DIY AI revolution is coming

      20 November 2025
      Zero Carbon Charge founder Joubert Roux

      The energy revolution South Africa can’t afford to miss

      20 November 2025
      It's time for a new approach to government IT spend in South Africa - Richard Firth

      It’s time for a new approach to government IT spend in South Africa

      19 November 2025
      How South Africa's broken Rica system fuels murder and mayhem - Farhad Khan

      How South Africa’s broken Rica system fuels murder and mayhem

      10 November 2025
      South Africa's AI data centre boom risks overloading a fragile grid - Paul Colmer

      South Africa’s AI data centre boom risks overloading a fragile grid

      30 October 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » Breaking down security silos helps combat cybercrime

    Breaking down security silos helps combat cybercrime

    By Obscure Technologies and Rapid 726 November 2020
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    The growing number of cyberattacks assailing companies today is prompting many organisations to rethink their security operations, with a trend toward creating one unified response team.

    Many companies have allowed separate security teams to develop for different areas of the business, but they’re now debating whether a consolidated approach would be more effective.

    Although different security teams could specialise in combating the particular type of attack most common to their area of business, this silo approach could cause miscommunication and hinder the overall effectiveness, participants agreed during a recent C-suite digital discussion hosted by Obscure Technologies and Rapid 7. The debate focused “major security challenges facing risk detection and response” and highlighted how security teams are struggling with rising workloads and limited resources.

    Several participants said their organisations were now dissolving the fragmented approach to security to better combat some increasingly advanced threats. Part of that involved reviewing the numerous tools and solutions used by different teams, which added complexity and made it difficult to obtain a clear view of their security landscape.

    African Bank had operated with different security teams, but ran into challenges, said Clinton Fung, its head of innovation technology. “When you’re trying to enable your business to be more innovative, you need to grant more autonomy to the individual teams, which is a double-edged sword. Teams have the tools they need, but having no clear idea of what each team is doing creates a lot of sprawl,” he explained.

    Clinton Fung

    To combat that, a steering committee comprised of colleagues from risk, compliance, distribution, finance, human capital and other departments met periodically to discuss security issues, including different tools used by each team and by a centralised security team. “It’s not about dictating what has to be used and by whom; it’s about having an open discussion so people are able to put forward their needs, which allows us to look for both duplications and potential efficiencies,” Fung said.

    American Tower Corporation started with a decentralised security model that varied with the product and the nature of the business, such as network security and app security teams. Now Tony Christodoulou, its regional vice president for IT and process efficiency, is trying to align them. “We started to realise that if you want to take a proactive approach to cybersecurity and ensure you’re a step ahead of your attackers, it takes a village,” he said.

    “It’s also critical to continue to engage with the right people, particularly within the business, because most incidents happen through the ignorance of the user.

    Tony Christodoulou

    Around 10% of the risk came from third-party vulnerabilities, particularly in the telecoms sector where IoT integrations increase the risk. Attackers could get in if third-party suppliers were not aligned to American Tower Corporation’s standards, he said. “It takes the consolidated efforts of our centralised team in Boston to make sure we’re being proactive in the space.”

    Christodoulou also stressed the importance of partnerships, with experts from third-party vendors adding different skills to help them to scan the dark Web, e-mail and systems.

    Efforts to standardise the security approach across various divisions is underway at the Vitality Group, said Stanley Langa, its senior information security officer. The holding company, Discovery Group, had one framework, and Vitality Group had a slightly different framework. Vitality was working to adopt the parent company’s blueprint for standardisation and simplification. But it wasn’t a one-way street as Vitality could contribute its ideas to the overall information steering committee, Langa said.

    Stanley Langa

    He believes Vitality’s infosec and cybersec capabilities complement each other well and cover all aspects of enterprise risk management, including governance, security, operations, compliance and assurance. Other initiatives including continuous and agile penetration testing, continuous assurance activities and self-assessments improve the security, too, he said.

    E-commerce platform Bidorbuy has one team that handles security for its payment processes and deals with suspected fraud. “They also deal with attackers trying to take over accounts and other physical attacks,” said its chief technology officer, James Ostrowick.

    “When it comes to attacks on actual systems, such as attackers trying to run Burp Suites, my team handles that. They will look for users running cheap servers overseas that try to use penetration tools against us. We also get ‘script kiddies’ looking for vulnerabilities,” he said. “Generally, we have very few vulnerabilities or issues reported to us that are legitimate, perhaps three over the last six months, and we do we do pay bounties for them.”

    James Ostrowick

    The City of Johannesburg uses a hybrid model, relying on both in-house and outsourced skills. The end goal was to have a full internal Security Operations Centre (SOC), said John Bosco Arends, its group head of information and network technology operations. External service providers from the government security cluster were contributing some skills towards establishing the SOC, and helping the municipality to find the skills it needed.

    “This has enabled us find the right people without the urgency of having to find them yesterday, allowing us to have an established, working, operating team,” he said. “We have a partner that builds what we need, and we operate in conjunction with them on a day-to-day basis, finally taking it over completely, with all the skills and the tool sets that go with it.”

    John Bosco-Arends

    As an entity subject to constant scrutiny, the South African Post Office (Sapo) had developed a coordinated approach to cybersecurity, so everyone knew what steps to follow to report an incident and who to escalate to. “There’s no such thing as being too prepared for a breach. You should always have your defences up and be on guard,” said Maclaud Mafaiti, Sapo’s GM of IT security & Trust Centre.

    Security incidents at Sapo posed a major concern since a breach could be escalated all the way to the minister of communications, he said. “I really want to emphasise partnerships, because in this day and age there’s nothing that you can defeat on your own. A well-coordinated partnership can ensure that all bases are covered, and can also act as an early warning mechanism.”

    Maclaud Mafaiti

    Another public sector company, Sasria (the South African Special Risks Insurance Association), is also a strong believer in IT partnerships. Hulisani Mamphiswana, its IT security specialist, said attacks were inevitable, so you needed to find ways to prevent, or contain and mitigate them so they didn’t spread. Sasria’s security was divisionally based, and a partner managed its SOC that it operated 24/7. “They monitor our environment, our servers, firewalls, events and logs, and report to us if there is anything that needs to be done on our end. Educating users is also quite a challenge, and we rely on partners to do phishing simulation tests, as well as end-user and awareness training,” he said.

    Hulisani Maphiswa

    The biggest challenge for Niel Van Rooyen, head of information security at Vox, was to integrate security as a central function into all its subsidiaries. “There’s still a bit of a gap with several subsidiaries but we’re closing it,” he said. “From a breach point of view, the gaps have made it a struggle to respond appropriately, have processes that work properly, and have the ability to respond within the necessary timeframes. But we’re getting there.”

    Niel van Rooyen

    As a fairly new and small bank, the South African Post Bank has tried to establish a security function that’s integrated into everything it does, and becomes part of its core strategy. “Banking is all about customers and data, and security has to deliver the service to safeguard and protect that data, and ultimately, the customer,” said Kevin Maartens, its chief risk officer.

    Kevin Maartens

    For any business to build a rapid response plan, it must identify what data it needs to protect, specify that data, and ensure that the response to a breach is appropriate, said Prien Pillai, head of group IT governance at RCL Foods. “Developing a cyber response plan is very different from developing an incident response plan,” he said. RCL Foods had 6 000 users, and had adapted and enhanced its incident response plan to form a cyber response plan. The toughest part wasn’t the process; it was the people underpinning that process, he said. “Policies are pieces of paper, but a response team is a set of people that have a vested interest in security.”

    Prien Pillai

    At one time, insurance company Hollard didn’t have the best security and suffered some breaches, admitted Zanele Mazibuko, its privacy information officer. “Since then, our IT and security teams have come together to make sure the environment is better secured. Hollard deals with a lot of personal data and its risk, for the most part, lies with its third parties and brokers. It is impossible to manage the security of these partners, you can only suggest that they should have specific controls in place but you don’t have a real view into their environment,” she said.

    Zanele Mazibuko

    Mothibi Ramusi, CIO of the National Lotteries Commission, said his organisation also dealt with a vast amount of confidential information and his priority was to ensure that all the cybersecurity checks and balances were in place, and that appropriate infrastructure was deployed to keep it safe.

    Mothibi Ramusi

    A big issue is support from your leadership, Ramusi said. “It’s critical to get buy-in from the decision makers, so when spending money it doesn’t appear as if you’re buying a ‘nice to have’ piece of technology, but something that aligns to the various institutions and properly safeguards information.”

    Barend Pretorius

    An increase in security incidents had definitely been noticed at Transnet Port Terminals, with its threat intelligence partners fending off a significant spike since the lockdown. Phishing had become particularly common, said its head of security, Barend Pretorius. “By working with our partners, I would say 99.99% of those have been blocked. “The occasional zero-day attack sneaks through as expected, but we have controls in place to mitigate and catch those,” he said.

    • This promoted content was paid for by the party concerned


    Barend Pretorius Clinton Fung Hulisani Maphiswa James Ostrowick John Bosco-Arends Kevin Maartens Maclaud Mafaiti Mothibi Ramusi Niel van Rooyen Obscure Obscure Technologies Prien Pillai Rapid 7 Stanley Langa Tony Christodoulou Zanele Mazibuko
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleEOH probe links Jo’burg mayor to IT tender kickbacks scandal
    Next Article Volkwagen’s ID.3 electric car is a hit

    Related Posts

    Icasa jacks up licensing and 'type approval' fees

    Icasa jacks up licensing and ‘type approval’ fees

    2 April 2025
    Big overhaul of ICT sector policy needed: Icasa chairman

    Big overhaul of ICT sector policy needed: Icasa chairman

    16 November 2024
    Stage set for court battle over spectrum pooling

    Stage set for court battle over spectrum pooling

    12 August 2024
    Company News
    AI is not a technology problem - iqbusiness

    AI is not a technology problem – iqbusiness

    5 December 2025
    Telcos are sitting on a data gold mine - but few know what do with it - Phillip du Plessis

    Telcos are sitting on a data gold mine – but few know what do with it

    4 December 2025
    Unlock smarter computing with your surface Copilot+ PC

    Unlock smarter computing with your Surface Copilot+ PC

    4 December 2025
    Opinion
    Your data, your hardware: the DIY AI revolution is coming - Duncan McLeod

    Your data, your hardware: the DIY AI revolution is coming

    20 November 2025
    Zero Carbon Charge founder Joubert Roux

    The energy revolution South Africa can’t afford to miss

    20 November 2025
    It's time for a new approach to government IT spend in South Africa - Richard Firth

    It’s time for a new approach to government IT spend in South Africa

    19 November 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Big Microsoft 365 price increases coming next year

    Big Microsoft price increases coming next year

    5 December 2025
    AI is not a technology problem - iqbusiness

    AI is not a technology problem – iqbusiness

    5 December 2025
    Vodacom to take control of Safaricom in R36-billion deal - Shameel Joosub

    Vodacom to take control of Safaricom in R36-billion deal

    4 December 2025
    Black Friday goes digital in South Africa as online spending surges to record high

    Black Friday goes digital in South Africa as online spending surges to record high

    4 December 2025
    © 2009 - 2025 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}