Nominate female innovators of the year

Rewarding innovation
Female Innovator of
the Year Award.

Sunday, Oct 20th

Infosec seen as a grudge purchase

Infosec seen as a grudge purchase.

So says Maiendra Moodley, divisional head GM for financial systems and processes at the State IT Agency (SITA).

Moodley, who has trained and consulted to customers in India, Kenya, Ghana, Botswana, Zimbabwe as well as locally, says he sees similar patterns among enterprises across Africa, despite differences in their levels of maturity and the security risks they face.

"I've narrowed it down to what I call the four Ps – pace, pragmatism, paranoia and people," he says.

Moodley says the pace of information security adoption is impacted by issues such as budget; and external factors such as new legislation and companies overlooking the importance of information security when all is running well and there are no breaches.

Pragmatism implies that companies tend to ask "how much do I have to spend on information security before I have enough?" Paranoia drives much of the information security spending, but often with the end result being that companies buy high-end, highly ranked systems that are unsuitable to meet their specific needs, as these solutions are not orientated to their specific threat-risk scenarios. And despite all the investments in technology, people are the weak link in the entire security infrastructure, he says.

The upshot is that enterprises tend to buy security solutions that do not deliver the expected returns on investment, due to the "four Ps", making future information security purchases very much a grudge purchase, says Moodley.

The risk that emerges when information security becomes a grudge buy is that enterprises become reluctant to allocate budget to solutions they actually need, as they do not see the value of previous purchases when measured against the other competing organisational/budget priorities.

Moodley says achieving the right levels of security begins with a thorough risk assessment encompassing both information and physical security, which combines a firm grasp of processes under the enterprise governance and risk banner.

Too many enterprises still silo their physical and information security, he says, explaining that this leads to counter-productive duplication of effort and delays when breaches or fraud involve both the physical and information security.

"These areas are increasingly linked, so they need to be seen as part of a holistic security strategy that also includes sub-disciplines such as fraud and risk management," he says. "In line with this, the role of the chief security officer has to change. Now, enterprises need a CSO with a background in both physical and information security, who understands overall risk, governance and business issues. The challenge is – where do you find these people?"

Moodley will address delegates at the ITWeb Security Summit 2014, to be held in Sandton in May, on the topic: "Security in an interconnected world – why security strategies fail." For programme information and to register, click here.

Editorial contacts
ITP Communications
Leigh Angelo
011 869 9153
This e-mail address is being protected from spambots. You need JavaScript enabled to view it.


Achieving 4IR goals hinges on skills development, job creation Published on 08 October 2019

Two acute societal pressures must be addressed: current skills development and preparation for the jobs of tomorrow says Saurabh Kumar, CEO of In2IT Technologies South Africa.

Orange, Global Fund unite to mobilise m-health solutions Published on 10 October 2019

Aim to speed up action against AIDS, tuberculosis and malaria.

NEC XON wins global networking award for innovative African solutions Published on 18 October 2019

NEC XON has won ADVA's Global Partner of the Year award and received the award at its annual Summit held at Sun City in October, 2019.