https://www.wolfpackrisk.com/previous-webinars
As much as we like to believe that we are in control of our lives and what happens in our organisations, we are very much at the mercy of macro-level undercurrents. Everyone is impacted, and the most vulnerable are hit the hardest. The same scenario applies to the growing plague of cybercrime running rife in our communities. Despite pockets of competence on our continent, our strategic and tactical response to this problem could be more effective. The 2023 South African Information Security Thermometer Report generated local stats for information security decision makers by asking 50 challenging questions across ten areas ranging from medium to large companies from different industries. A decade on, the industry has asked us to delve into exercise again. SA organisations can compare where the industry has evolved across the same ten domains, establish what new threats appeared on the radar and how prepared SA companies are to defend themselves. 120 CISOs / CIOs participated in this exercise, which enabled South African companies to benchmark their organisations against industry peers.
The comprehensive study, report and webinars will be shared via ten webinars over ten months. Wolfpack is excited to share the comprehensive report with our community and hopes you find this report useful to guide your information security strategy and planning initiatives. I want to extend my warmest thanks to all participating companies for taking the time and courage to respond with such honesty. It is through the commitment of a select few to improve security that the community as a whole will benefit. Cyber defenders have a tremendous responsibility to protect our country, company and the community entrusted to us. Find your pack and partner to make a difference. If you require deeper insight or analysis:
The advent of the digital world and the inherent interconnectivity of people, devices and organisations open up a whole new playing feld of vulnerabilities. Given that society is increasingly dependent on cyber-enabled technologies for many functions of daily life, these technologies should be underpinned by redundancy, resilience and close scrutiny, in order to avoid harmful disruptions. In our 2015/6 Critical Information Infrastructure Protection (CIIP) project we discovered that organisations are making progress on building the foundations of cyber security. However, most respondents report having only a “moderate” level of maturity in their current capability. There is still a lot of work to be done. The protection of critical information infrastructures (CII) is the shared responsibility of both public and private organisations who develop, own, provide, manage and/or use this critical infrastructure.
Craig Rosewarne
The advent of the digital world and the inherent interconnectivity of people, devices and organisations open up a whole new playing feld of vulnerabilities.
Craig Rosewarne
We hope you find this report useful to guide your own information security strategy and planning initiatives. I would like to extend my warmest thanks to all participating companies for taking the time and courage to respond with such honesty. It is through the commitment of a select few to improving security that the community as a whole will benefit. Secondly I would like to acknowledge the companies that sponsored the 2011 Thermometer report and never once attempted in any way to interfere with its independence. Thanks to your generous advertising sponsorship we were able to release the full version of the report to the information security community at no charge. Finally to my team for producing an outstanding piece of work. The quality of the report is on par with any international reports I have seen yet still so vibrantly South African. I am proud of what we have achieved and look forward to many more projects in the future.
Craig Rosewarne
We hope you find this report useful to guide your own information security strategy and planning initiatives. I would like to extend my warmest thanks to all participating companies for taking the time and courage to respond with such honesty. It is through the commitment of a select few to improving security that the community as a whole will benefit. Secondly I would like to acknowledge the companies that sponsored the 2011 Thermometer report and never once attempted in any way to interfere with its independence. Thanks to your generous advertising sponsorship we were able to release the full version of the report to the information security community at no charge. Finally to my team for producing an outstanding piece of work. The quality of the report is on par with any international reports I have seen yet still so vibrantly South African. I am proud of what we have achieved and look forward to many more projects in the future.
Craig Rosewarne