Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      South Africa's AI policy is a bureaucrat's dream - Solly Malatsi

      South Africa’s draft AI policy is a bureaucrat’s dream

      10 April 2026
      Big Tech is going nuclear

      Big Tech is going nuclear

      10 April 2026
      5G expected to reshape South Africa's wireless broadband market

      5G expected to reshape South Africa’s wireless broadband market

      10 April 2026
      Warning that South Africa's digital competitiveness is in retreat

      Warning that South Africa’s digital competitiveness is in retreat

      10 April 2026
      South Africa's biggest banks are lining up behind Optasia - Salvador Anglada

      South Africa’s biggest banks are lining up behind Optasia

      10 April 2026
    • World
      Anthropic mulls building its own AI chips

      Anthropic mulls building its own AI chips

      10 April 2026
      DeepSeek V4 to run on Huawei silicon as China builds its own AI stack

      DeepSeek V4 to run on Huawei silicon as China builds its own AI stack

      4 April 2026
      Amazon in talks to buy satellite operator Globalstar

      Amazon in talks to buy satellite operator Globalstar

      2 April 2026

      Apple plans to open Siri to rival AI services

      27 March 2026
      It's official: ads are coming to ChatGPT

      It’s official: ads are coming to ChatGPT

      23 March 2026
    • In-depth
      Africa switches on as Europe dims the lights

      Africa switches on as Europe dims the lights

      9 April 2026
      The biggest untapped EV market on Earth is hiding in plain sight

      The biggest untapped EV market on Earth is hiding in plain sight

      1 April 2026
      The R18-billion tech giant hiding in plain sight - Jens Montanana

      The R16-billion tech giant hiding in plain sight

      26 March 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
    • TCS
      TCS+ | Vodacom Business moves to crack the SME tech gap - Andrew Fulton, Sannesh Beharie

      TCS+ | Vodacom Business moves to crack the SME tech gap

      7 April 2026
      TCS | MTN's Divysh Joshi on the strategy behind Pi - Divyesh Joshi

      TCS | MTN’s Divyesh Joshi on the strategy behind Pi

      1 April 2026
      Anoosh Rooplal

      TCS | Anoosh Rooplal on the Post Office’s last stand

      27 March 2026
      Meet the CIO | HealthBridge CTO Anton Fatti on the future of digital health

      Meet the CIO | Healthbridge CTO Anton Fatti on the future of digital health

      23 March 2026
      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses - Clare Loveridge and Jason Oehley

      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses

      19 March 2026
    • Opinion
      The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

      The conflict of interest at the heart of PayShap’s slow adoption

      26 March 2026
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      R230-million in the bag for Endeavor's third Harvest Fund - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Hold the doom: the case for a South African comeback

      26 February 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • BBD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • Kaspersky
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » Breaking down security silos helps combat cybercrime

    Breaking down security silos helps combat cybercrime

    By Obscure Technologies and Rapid 726 November 2020
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    The growing number of cyberattacks assailing companies today is prompting many organisations to rethink their security operations, with a trend toward creating one unified response team.

    Many companies have allowed separate security teams to develop for different areas of the business, but they’re now debating whether a consolidated approach would be more effective.

    Although different security teams could specialise in combating the particular type of attack most common to their area of business, this silo approach could cause miscommunication and hinder the overall effectiveness, participants agreed during a recent C-suite digital discussion hosted by Obscure Technologies and Rapid 7. The debate focused “major security challenges facing risk detection and response” and highlighted how security teams are struggling with rising workloads and limited resources.

    Several participants said their organisations were now dissolving the fragmented approach to security to better combat some increasingly advanced threats. Part of that involved reviewing the numerous tools and solutions used by different teams, which added complexity and made it difficult to obtain a clear view of their security landscape.

    African Bank had operated with different security teams, but ran into challenges, said Clinton Fung, its head of innovation technology. “When you’re trying to enable your business to be more innovative, you need to grant more autonomy to the individual teams, which is a double-edged sword. Teams have the tools they need, but having no clear idea of what each team is doing creates a lot of sprawl,” he explained.

    Clinton Fung

    To combat that, a steering committee comprised of colleagues from risk, compliance, distribution, finance, human capital and other departments met periodically to discuss security issues, including different tools used by each team and by a centralised security team. “It’s not about dictating what has to be used and by whom; it’s about having an open discussion so people are able to put forward their needs, which allows us to look for both duplications and potential efficiencies,” Fung said.

    American Tower Corporation started with a decentralised security model that varied with the product and the nature of the business, such as network security and app security teams. Now Tony Christodoulou, its regional vice president for IT and process efficiency, is trying to align them. “We started to realise that if you want to take a proactive approach to cybersecurity and ensure you’re a step ahead of your attackers, it takes a village,” he said.

    “It’s also critical to continue to engage with the right people, particularly within the business, because most incidents happen through the ignorance of the user.

    Tony Christodoulou

    Around 10% of the risk came from third-party vulnerabilities, particularly in the telecoms sector where IoT integrations increase the risk. Attackers could get in if third-party suppliers were not aligned to American Tower Corporation’s standards, he said. “It takes the consolidated efforts of our centralised team in Boston to make sure we’re being proactive in the space.”

    Christodoulou also stressed the importance of partnerships, with experts from third-party vendors adding different skills to help them to scan the dark Web, e-mail and systems.

    Efforts to standardise the security approach across various divisions is underway at the Vitality Group, said Stanley Langa, its senior information security officer. The holding company, Discovery Group, had one framework, and Vitality Group had a slightly different framework. Vitality was working to adopt the parent company’s blueprint for standardisation and simplification. But it wasn’t a one-way street as Vitality could contribute its ideas to the overall information steering committee, Langa said.

    Stanley Langa

    He believes Vitality’s infosec and cybersec capabilities complement each other well and cover all aspects of enterprise risk management, including governance, security, operations, compliance and assurance. Other initiatives including continuous and agile penetration testing, continuous assurance activities and self-assessments improve the security, too, he said.

    E-commerce platform Bidorbuy has one team that handles security for its payment processes and deals with suspected fraud. “They also deal with attackers trying to take over accounts and other physical attacks,” said its chief technology officer, James Ostrowick.

    “When it comes to attacks on actual systems, such as attackers trying to run Burp Suites, my team handles that. They will look for users running cheap servers overseas that try to use penetration tools against us. We also get ‘script kiddies’ looking for vulnerabilities,” he said. “Generally, we have very few vulnerabilities or issues reported to us that are legitimate, perhaps three over the last six months, and we do we do pay bounties for them.”

    James Ostrowick

    The City of Johannesburg uses a hybrid model, relying on both in-house and outsourced skills. The end goal was to have a full internal Security Operations Centre (SOC), said John Bosco Arends, its group head of information and network technology operations. External service providers from the government security cluster were contributing some skills towards establishing the SOC, and helping the municipality to find the skills it needed.

    “This has enabled us find the right people without the urgency of having to find them yesterday, allowing us to have an established, working, operating team,” he said. “We have a partner that builds what we need, and we operate in conjunction with them on a day-to-day basis, finally taking it over completely, with all the skills and the tool sets that go with it.”

    John Bosco-Arends

    As an entity subject to constant scrutiny, the South African Post Office (Sapo) had developed a coordinated approach to cybersecurity, so everyone knew what steps to follow to report an incident and who to escalate to. “There’s no such thing as being too prepared for a breach. You should always have your defences up and be on guard,” said Maclaud Mafaiti, Sapo’s GM of IT security & Trust Centre.

    Security incidents at Sapo posed a major concern since a breach could be escalated all the way to the minister of communications, he said. “I really want to emphasise partnerships, because in this day and age there’s nothing that you can defeat on your own. A well-coordinated partnership can ensure that all bases are covered, and can also act as an early warning mechanism.”

    Maclaud Mafaiti

    Another public sector company, Sasria (the South African Special Risks Insurance Association), is also a strong believer in IT partnerships. Hulisani Mamphiswana, its IT security specialist, said attacks were inevitable, so you needed to find ways to prevent, or contain and mitigate them so they didn’t spread. Sasria’s security was divisionally based, and a partner managed its SOC that it operated 24/7. “They monitor our environment, our servers, firewalls, events and logs, and report to us if there is anything that needs to be done on our end. Educating users is also quite a challenge, and we rely on partners to do phishing simulation tests, as well as end-user and awareness training,” he said.

    Hulisani Maphiswa

    The biggest challenge for Niel Van Rooyen, head of information security at Vox, was to integrate security as a central function into all its subsidiaries. “There’s still a bit of a gap with several subsidiaries but we’re closing it,” he said. “From a breach point of view, the gaps have made it a struggle to respond appropriately, have processes that work properly, and have the ability to respond within the necessary timeframes. But we’re getting there.”

    Niel van Rooyen

    As a fairly new and small bank, the South African Post Bank has tried to establish a security function that’s integrated into everything it does, and becomes part of its core strategy. “Banking is all about customers and data, and security has to deliver the service to safeguard and protect that data, and ultimately, the customer,” said Kevin Maartens, its chief risk officer.

    Kevin Maartens

    For any business to build a rapid response plan, it must identify what data it needs to protect, specify that data, and ensure that the response to a breach is appropriate, said Prien Pillai, head of group IT governance at RCL Foods. “Developing a cyber response plan is very different from developing an incident response plan,” he said. RCL Foods had 6 000 users, and had adapted and enhanced its incident response plan to form a cyber response plan. The toughest part wasn’t the process; it was the people underpinning that process, he said. “Policies are pieces of paper, but a response team is a set of people that have a vested interest in security.”

    Prien Pillai

    At one time, insurance company Hollard didn’t have the best security and suffered some breaches, admitted Zanele Mazibuko, its privacy information officer. “Since then, our IT and security teams have come together to make sure the environment is better secured. Hollard deals with a lot of personal data and its risk, for the most part, lies with its third parties and brokers. It is impossible to manage the security of these partners, you can only suggest that they should have specific controls in place but you don’t have a real view into their environment,” she said.

    Zanele Mazibuko

    Mothibi Ramusi, CIO of the National Lotteries Commission, said his organisation also dealt with a vast amount of confidential information and his priority was to ensure that all the cybersecurity checks and balances were in place, and that appropriate infrastructure was deployed to keep it safe.

    Mothibi Ramusi

    A big issue is support from your leadership, Ramusi said. “It’s critical to get buy-in from the decision makers, so when spending money it doesn’t appear as if you’re buying a ‘nice to have’ piece of technology, but something that aligns to the various institutions and properly safeguards information.”

    Barend Pretorius

    An increase in security incidents had definitely been noticed at Transnet Port Terminals, with its threat intelligence partners fending off a significant spike since the lockdown. Phishing had become particularly common, said its head of security, Barend Pretorius. “By working with our partners, I would say 99.99% of those have been blocked. “The occasional zero-day attack sneaks through as expected, but we have controls in place to mitigate and catch those,” he said.

    • This promoted content was paid for by the party concerned
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    Barend Pretorius Clinton Fung Hulisani Maphiswa James Ostrowick John Bosco-Arends Kevin Maartens Maclaud Mafaiti Mothibi Ramusi Niel van Rooyen Obscure Obscure Technologies Prien Pillai Rapid 7 Stanley Langa Tony Christodoulou Zanele Mazibuko
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleEOH probe links Jo’burg mayor to IT tender kickbacks scandal
    Next Article Volkwagen’s ID.3 electric car is a hit

    Related Posts

    MultiChoice, now owned by Canal+, will terminate Showmax at the end of April

    Commission to probe Showmax closure

    18 March 2026
    Icasa gears up for South Africa's next big spectrum auction - Tshiamo Maluleka-Disemelo

    Icasa gears up for South Africa’s next big spectrum auction

    17 February 2026
    Icasa jacks up licensing and 'type approval' fees

    Icasa jacks up licensing and ‘type approval’ fees

    2 April 2025
    Company News
    Vertiv AI Innovation Roadshow returns to Africa as virtual event

    Vertiv AI Innovation Roadshow returns to Africa as virtual event

    10 April 2026
    What South African parents look for in an online school - CambriLearn

    What South African parents look for in an online school

    9 April 2026
    Modernising legacy systems - without the downtime - BBD Software

    Modernising legacy systems – without the downtime

    9 April 2026
    Opinion
    The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

    The conflict of interest at the heart of PayShap’s slow adoption

    26 March 2026
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026
    Hold the doom: the case for a South African comeback - Duncan McLeod

    Apple just dropped a bomb on the Windows world

    5 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    South Africa's AI policy is a bureaucrat's dream - Solly Malatsi

    South Africa’s draft AI policy is a bureaucrat’s dream

    10 April 2026
    Big Tech is going nuclear

    Big Tech is going nuclear

    10 April 2026
    5G expected to reshape South Africa's wireless broadband market

    5G expected to reshape South Africa’s wireless broadband market

    10 April 2026
    Warning that South Africa's digital competitiveness is in retreat

    Warning that South Africa’s digital competitiveness is in retreat

    10 April 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}