Why more isn't always better in IT security

Loading player...
It’s easy to keep layering security solutions on top of a company’s IT systems, but this can lead to complexity, high costs and other unnecessary headaches.
This is where security control validation can play a big role, according to information security specialists CYBER1 Solutions.
In this episode of TechCentral’s TCS+, Duncan McLeod speaks to CYBER1 Solutions MD Jayson O’Reilly and the company’s GM for commercial sales and operations, Clarence Beukes, about why companies should seriously consider embarking on a security control validation project.
To kick things off, O’Reilly provides a quick refresher on CYBER1 Solutions – what it does, the segments of the market it targets, and its client profile.
Both O’Reilly and Beukes then unpack, at a high level, the big trends they are seeing in the security space in 2023, especially in the South African context.
The conversation turns to security control validation, which CYBER1 Solutions describes as being of “significant importance” in building organisational defences against cyberattacks.
O’Reilly provides an overview of security control validation and why companies should be taking it seriously. Among other things, it’s about allocating resources more effectively to focus on areas that provide a better return on investment in security spending. A successful validation project should help organisations enhance their cyber resilience, ensure regulatory compliance, and inform the adoption of security controls.
Beukes explains how validation achieves these outcomes, what’s involved in such a project, whether it’s a once-off exercise or an ongoing process, and how success is measured.
To conclude, the conversation turns to the future role of artificial intelligence technology in enhancing cybersecurity operations. Also, what threat does AI pose to organisations, and how might adversaries use it to their advantage?
Don’t miss a great discussion!
About CYBER1 Solutions
CYBER1 Solutions is a cybersecurity specialist operating in Southern Africa, East and West Africa, and Dubai, and elsewhere in the Europe, Middle East and Africa region.
Our solutions deliver information security; IT risk management; fraud detection; governance and compliance; and a full range of managed services. We also provide bespoke security services across the spectrum, with a portfolio that ranges from the formulation of our customers’ security strategies to the daily operation of endpoint security solutions. To do this, we partner with world-leading security vendors to deliver cutting-edge technologies augmented by our wide range of professional services.
Our services allow organisations in every sector to prevent attacks by providing the visibility into vulnerabilities they need to rapidly detect compromises, respond to breaches and stop attacks before they become an issue.
For more information, visit www.c1-s.com.
15 Aug 2023 English South Africa Technology · Business

Other recent episodes

Just how secure is your cloud database?

In the second episode of this series on migrating to Microsoft Azure SQL, the focus turns to what’s involved in moving from SQL Server to Azure SQL, and First Distribution’s Preegan Chetty returns to discuss the key priority of securing databases in the cloud. If you missed episode 1 in…
19 Dec 2024 12 min

Moving from SQL Server to Azure SQL – what you need to know

Is your company thinking about modernising its IT infrastructure? Is it planning to migrate from an on-premises Microsoft SQL Server database to the cloud-based Azure SQL Solution? Then this podcast is for you. In this two-part series, we delve into greater detail on what’s involved in a cloud database migration…
18 Dec 2024 14 min

Bolt doubling down on safety for riders and drivers

The operating environment in South Africa for ride-hailing services like Bolt is fraught with complexity, while the country’s crime problem only contributes to the challenge of getting passengers safely from A to B. This complexity is compounded by the nuances of operating in different areas. Municipal districts have different permitting…
17 Dec 2024 13 min

Beware the Toxic Cloud Trilogy – a discussion with Tenable

Companies moving to the cloud – and those already there – need to be aware of the Toxic Cloud Trilogy, three pitfalls in cloud computing that must be avoided. Bernard Montel, technical director at exposure management company Tenable for Europe, the Middle East and Africa, recently unpacked this for TechCentral’s…
6 Dec 2024 22 min

Why your company needs network monitoring as a service

Trace Network Operations, founded in 2016, provides bespoke network solutions in network management and network monitoring. Company founder Darryl Theron saw a gap in the market for a company that provides leading solutions in this space, stemming from his many years of experience in the pan-African infrastructure market. This episode…
5 Dec 2024 33 min