CYBER1 Solutions on data and identity governance

Loading player...
Data and identity governance should be a top-of-mind issue for business leaders in 2024.
CYBER1 Solutions MD Jayson O’Reilly and senior cybersecurity architect Christiaan Swanepoel share their insights on this important topic in this episode of TechCentral’s business technology show, TCS+.
They kick off the discussion with a definition of the topic, and why it’s critically important that companies get data and identity governance right in a world of significantly heightened cyber risk.
It’s by no means a new focus area – indeed, many organisations have been trying to solve this for years, decades even, showing just how difficult it is to get right.
O’Reilly and Swanepoel discuss how the threat landscape has evolved over time, and the risks organisations face if they overlook data governance protocols.
In this TCS+ episode, they also tackle these key questions:
• What are examples of the tangible consequences of disregarding data governance and the direct implications for personal security?
• Identity has been a focus for many organisations for the past 10 years or longer, so why does it remain a problem to be solved and what are the roadblocks in getting it done right?
• How does the mishandling of personal information compromise privacy?
• In what ways do emerging technologies, such as artificial intelligence and the internet of things complicate Identity governance efforts.
• What is the impact of legislation such as South Africa’s Protection of Personal Information Act and Europe’s General Data Protection Regulation, and what’s next on the horizon from a regulatory perspective?
Don’t miss discussion on a topic of critical importance to modern, data-driven organisations.
About CYBER1 Solutions
CYBER1 Solutions is a cybersecurity specialist operating in Southern Africa, East and West Africa, Dubai, and Europe. Its solutions deliver information security; IT risk management; fraud detection; governance and compliance; and a full range of managed services. It also provides bespoke security services across the spectrum, with a portfolio that ranges from the formulation of its customers’ security strategies to the daily operation of end-point security solutions. To do this, it partners with world-leading security vendors to deliver cutting-edge technologies augmented by its wide range of professional services.
Its services enable organisations in every sector to prevent attacks by providing the visibility into vulnerabilities they need to detect compromises rapidly, respond to breaches and stop attacks before they become an issue. Visit www.c1-s.com for more.
13 Mar 2024 English South Africa Technology · Business

Other recent episodes

Cassava’s Adil El Youssefi on data centre growth in Africa

In this episode of TCS+, Adil El Youssefi, newly appointed CEO of the colocation business at Cassava Technologies and CEO of Africa Data Centres, chats about the challenges and opportunities in sub-Saharan Africa. El Youssefi delves into: • His background prior to being appointed into the role and how it…
13 Aug 30 min

Zahir Cajee on Samsung’s new Galaxy Z Fold7, Flip7 and Watch8 line-up

Folding phones are advancing at light speed. For consumers, the appeal is self-evident: on one hand, folding phones give them the option to have a larger, tablet-like interface that offers enhanced productivity and a better user experience. On the other hand, the fit-in-your-pocket design when folded maintains easy portability. Samsung…
31 Jul 18 min

Lessons from South Africa’s biggest cyberattacks

IT security breaches are on the rise in South Africa and worldwide, and with AI tools at their disposal, criminals are scaling up their attacks. With the risk of attack so high, organisations are forced to look beyond beefing up security – they must prepare for the unfortunate event where…
25 Jul 15 min

First Distribution’s guide to a bulletproof cyber crisis response strategy

In cybersecurity, prevention is always better than cure. However, organisations have to prepare for the worst-case scenario, one where their systems are breached by cybercriminals. This is the second in a series of three podcasts on how to manage cyber crises effectively when they happen. The first episode – watch…
24 Jul 11 min

How cyberthreats turn into cyber crises

In today's hyperconnected society, a cybersecurity crisis isn’t just a technical glitch; it's a profound disruption that can bring businesses, governments and even entire countries to a halt. For organisations to protect themselves effectively, they must understand what cybercriminals are capable of, where the vulnerabilities in their own systems are…
23 Jul 13 min