Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Illegal streaming crackdown nets arrests, convictions in Cape Town

      Illegal streaming crackdown nets arrests, convictions in Cape Town

      12 March 2026
      Vodacom claims African first with 254Mbit/s 5G uplink test

      Vodacom claims African first with 254Mbit/s 5G uplink test

      12 March 2026
      UCT astronomers uncover vast hidden supercluster behind the Milky Way

      UCT astronomers uncover vast hidden supercluster behind the Milky Way

      12 March 2026
      Standard Bank IT bill tops R14-billion as software spending shifts

      Standard Bank IT bill tops R14-billion as software spending shifts

      12 March 2026
      Canal+ shares plunge on weak MultiChoice outlook

      Canal+ shares crash on weak MultiChoice outlook

      11 March 2026
    • World
      Musk launches Macrohard in cheeky nod to Microsoft - Elon Musk

      Musk launches Macrohard in cheeky nod to Microsoft

      12 March 2026
      Europe is building an alternative to Microsoft Office

      Europe is building an alternative to Microsoft Office

      11 March 2026
      Microsoft bets on Anthropic as it loosens ties with OpenAI

      Microsoft bets on Anthropic as it loosens ties with OpenAI

      10 March 2026
      World hit by worst oil shock since the 1970s

      World hit by worst oil shock since the 1970s

      9 March 2026
      iStore prices MacBook Neo at R11 999 in South Africa

      Apple debuts MacBook Neo to challenge Windows PCs, Chromebooks

      5 March 2026
    • In-depth
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
      Digital authoritarianism grows as African states normalise internet blackouts

      Digital authoritarianism grows as African states normalise internet blackouts

      19 December 2025
    • TCS
      TCS | Sink or swim? Antony Makins on how AI is rewriting the rules of work

      TCS | Sink or swim? Antony Makins on how AI is rewriting the rules of work

      5 March 2026
      TCS+ | Bolt ups the ante on platform safety - Simo Kalajdzic

      TCS+ | Bolt ups the ante on platform safety

      4 March 2026
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E4: ‘We drive an electric Uber’

      10 February 2026
      TCS+ | How Cloud On Demand is helping SA businesses succeed in the cloud - Xhenia Rhode, Dion Kalicharan

      TCS+ | Cloud On Demand and Consnet: inside a real-world AWS partner success story

      30 January 2026
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E3: ‘BYD’s Corolla Cross challenger’

      30 January 2026
    • Opinion
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      VC's centre of gravity is shifting - and South Africa is in the frame - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Hold the doom: the case for a South African comeback

      26 February 2026
      The AI fraud crisis your bank is not ready for - Andries Maritz

      The AI fraud crisis your bank is not ready for

      18 February 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » IT services » Cryptography and data security – experts unpack the big issues

    Cryptography and data security – experts unpack the big issues

    Promoted | A recent round-table event explored the challenges and opportunities in cryptography and data security.
    By TechCentral6 February 2025
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Cryptography and data security - experts unpack the big issuesTechCentral and Publishared recently hosted a round-table discussion on cryptography and data security, which was sponsored by Altron, Synthesis and Thales and which brought together leaders and professionals from various industries to explore the evolving role of data in business operations.

    The discussion was rich with insights, covering critical areas such as data value, security, compliance, artificial intelligence and the future of data-driven decision making. Participants shared their experiences and challenges, offering a comprehensive view of how organisations are adapting to the ever-changing data landscape.

    The strategic role of data in business

    They began by acknowledging that data is not just an operational asset but the lifeblood of modern businesses. It informs strategy, customer experience, investment decisions and return on investment. However, the question arose: are businesses truly maximising their data’s potential?

    A key discussion point was data quality – ensuring that organisations collect and maintain high-integrity data. Without clean and accurate data, insights become unreliable (garbage in, garbage out). They explored how businesses could enrich and refine data to increase its utility and overall business value. The conversation naturally led to the question of how to assign value to data.

    They discussed the importance of aligning security measures with the value of the data being protected. For example, investing in a US$10-million security solution for data worth only $50 000 is not justifiable. This led to an exploration of the broader concept of the data economy, where data is monetised and its value is directly tied to its utility and relevance.

    Data value and monetisation

    Assigning value to data remains a challenge and the conversation naturally evolved into data monetisation and how businesses can assign tangible value to data? This led to a broader discussion on the data economy – how organisations leverage data as a revenue stream while maintaining privacy and compliance. They also discussed how businesses can break down silos and enhance data collaboration through cryptographic solutions, enabling secure data sharing while preserving privacy.

    Data security and collaboration

    A significant hurdle discussed was the concept of collaboration, both internally between departments and externally with partners. A key takeaway was the importance of anonymising and encrypting data to maintain security while still deriving value. The participants in the round table debated methods of stripping personally identifiable information to allow secure data sharing without compromising security policies, ethics or regulations.

    Another area of concern was dated data. As businesses move towards real-time data utilization, old and outdated data loses relevance. The shift towards live-streaming data and AI-driven insights was acknowledged as a necessity for businesses striving to remain agile and competitive in 2025 and beyond. Participants also critiqued some regulations, particularly in regions like the EU, where fines for non-compliance could sometimes be seen as a cheaper alternative to investing in expensive security measures. This raised a broader question: do existing regulations genuinely improve security, or do they create unnecessary barriers to business innovation?

    Data security as a business enabler

    One of the most engaging discussions centred on the changing perception of security – specifically, positioning security as a business enabler and using robust data security measures as a differentiator in the market, appealing to customers who value data ethics and trust.

    Round-table participants also explored the challenge of securing data while maintaining agility. Businesses need real-time insights but must balance speed with security. They debated how security gates and controls can be implemented without stifling innovation and discussed how encryption, for example, can facilitate data sharing between departments or even businesses within the same industry, breaking down silos and enabling more informed decision making.

    Bridging the gap between security and business leaders

    Many organisations struggle to communicate data security needs to executives and board members effectively. One attendee pointed out that CISOs and CIOs often fail to speak the board’s language, making it difficult to secure investment in security initiatives.

    Instead of focusing solely on cyber risks, security leaders must frame discussions around how data security drives business value, efficiency and competitive advantage. Participants dived into the aspect of positioning and being able to align technical solutions to business gains.

    Data discovery and platforming challenges

    The discussion then moved into data discovery and platforming. Many organisations struggle with data silos, where valuable data is hidden across different business units and divisions. We discussed the importance of finding ways to discover and pool data from various sources, while also addressing the concerns of different teams through robust security and encryption mechanisms – allowing them to benefit from the use of the data without the challenges of it containing to sensitive information.

    The evolving role of the CFO in data security

    The conversation expanded beyond traditional security leadership roles, emphasising that cybersecurity is now a burden to chief financial officers. As cybersecurity investments become a critical budgetary consideration, CFOs need a deeper understanding of security risks and solutions. This shift is driving more informed financial decisions around security spending and investment in risk mitigation strategies.

    Round-table panellists discussed how this change is driving more intuitive customer experiences and better business outcomes, as CFOs are now more involved in understanding the value of data and the need for innovative solutions to address gaps and fine-tune strategies. This also has a direct impact on the quality of the questions being raised about data, its security and the business’s investments in this space. Ultimately this raises the bar in terms of the questions the business can ask about data, its security and how we value that data in the first place.

    Skills and the global data landscape

    The discussion also touched on the loss of South African professional skills. Participants shared insights from different countries, like Nigeria, where repatriation of skills is prevalent and these professionals, having gained experience in more complex developed-world environments, bring back this thinking and innovation. There could be a “brain-gain approach” to entice skilled professionals back to share their valuable knowledge and skills in South Africa.

    Participants also discussed the challenges of adopting new data-related technologies, particularly in regions like South Africa where some global innovations are not yet viable.

    Key takeaways

    • The value of data must be carefully assessed to ensure that security investments are proportionate to the data’s worth.
    • Breaking down data silos and enabling secure data sharing through encryption is critical for collaboration.
    • Businesses need to drill down into the utilisation of mechanisms that provide real-time data insights to improve agility and guide business strategy.

    Conclusion

    The round table provided a comprehensive exploration of the challenges and opportunities in cryptography and data security. From the importance of data quality and value to the evolving role of AI, the discussion highlighted the need for a balanced approach to data security that enables business growth and innovation. As businesses continue to navigate the complexities of the data landscape, the insights shared during this event will serve as a valuable guide for future strategies and data decisions.

    • This promoted content was paid for by the parties concerned
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    Altron Synthesis Thales
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleMobile networks plead for fair licensing rules as Starlink eyes South Africa launch
    Next Article Get ready for the incredible Xiaomi Redmi Note 14 Series

    Related Posts

    The data sovereignty paradox - Altron Digital Business

    The data sovereignty paradox

    27 February 2026
    Altron flags strong year as annuity revenue tops 65%

    Altron flags strong year as annuity revenue tops 65%

    24 February 2026
    Netstar and Sunshine Tour team up on data-driven golf analytics

    Netstar and Sunshine Tour team up on data-driven golf analytics

    24 February 2026
    Add A Comment

    Comments are closed.

    Company News
    How AI is changing the way we work - Angela Ho, Obsidian Systems

    How AI is changing the way we work

    12 March 2026
    Mitel launches Edge platform for mission-critical on-premises communications

    Mitel launches Edge platform for mission-critical on-premises communications

    11 March 2026
    Why the smartest companies have stopped chasing cheap outsourcing deals - BBD

    Why the smartest companies have stopped chasing cheap outsourcing deals

    11 March 2026
    Opinion
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026
    Hold the doom: the case for a South African comeback - Duncan McLeod

    Apple just dropped a bomb on the Windows world

    5 March 2026
    VC's centre of gravity is shifting - and South Africa is in the frame - Alison Collier

    VC’s centre of gravity is shifting – and South Africa is in the frame

    3 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Illegal streaming crackdown nets arrests, convictions in Cape Town

    Illegal streaming crackdown nets arrests, convictions in Cape Town

    12 March 2026
    How AI is changing the way we work - Angela Ho, Obsidian Systems

    How AI is changing the way we work

    12 March 2026
    Vodacom claims African first with 254Mbit/s 5G uplink test

    Vodacom claims African first with 254Mbit/s 5G uplink test

    12 March 2026
    UCT astronomers uncover vast hidden supercluster behind the Milky Way

    UCT astronomers uncover vast hidden supercluster behind the Milky Way

    12 March 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}