Intelligent CIO Africa Issue 18 | Page 41

////////////////////////////////////////////////////////////////////////// publicised threats such as data theft, identity theft and financial trojans are also leaving considerable damages in their wakes. A cyberattack can do a lot of damage. Beyond the financial impact of lost data, compromised identities or having to pay a ransom to recover data; there is also reputation damage to consider. People are more reluctant to do business with an organisation known to have suffered data losses. www.intelligentcio.com FEATURE: THREAT ASSESSMENT Cybersecurity maturity evaluation The first port of call for any organisation should be to evaluate and understand where their weak points are, not just currently but in line with their business strategy too. Current security controls need to be reviewed frequently in line with the business trajectory, while also incorporating any possible digital transformation strategies. Current and potential gaps Paul Joliffe, Lead DSM: Security at T-Systems South Africa INTELLIGENTCIO 41