Renee Naidoo, Professor in Information Systems at the Wits School of Business Sciences.
At first glance, South African organizations appear to be modernizing at an impressive pace. Cloud migrationhybrid work strategies, aye Use, internet of things (IoT) expansion, and rapidly growing data-driven business culture is reshaping the corporate landscape.
But behind this digital transformation lies a more complex story. Governance systems are not evolving fast enough to manage the risks that come with innovation. Complexity is increasing faster than control.
INTERPOL's Africa Cyber Threat Assessment Report 2025 South Africa has been ranked among the most targeted countries on the continent for ransomware. But it is not just the increase in cyber crime that is of deep concern. This is the persistence of old thinking.
Too many business leaders still treat cybersecurity as a technical support function rather than an enterprise risk that requires oversight and strategic management.
That mentality is no longer sustainable.
The King IV Report on Corporate Governance emphasizes that cyber risk is a governance responsibility linked to value, risk and assurance. Cybersecurity is now at the center of business risk conversations.
If it continues to be viewed as a separate IT problem managed through purchasing or outsourced support, no amount of spending will be enough to protect the organization. Only through structured, transparent and accountable governance can cyber risks be managed effectively.
Change in understanding of risk
Effective cybersecurity risk management is not about eliminating threats. This ambition represents a false promise that no longer fits the reality of the digital economy.
Instead, the work starts with understanding what risks really matter, what level of risk can be tolerated, and how to find compromises between innovation, speed, and control.
This process does not happen at technical boundaries, but where strategy, operations and governance meet.
Emerging technologies aren't just bringing new risks. They are changing the nature of responsibility.
The five domains need to work together to enable sound risk decisions. These include clarity about which products and services are most important to the business, what systems and data enable them, a realistic understanding of risk appetite, insight into the threat landscape, and clear ownership of control and response.
Pressure on South African enterprises
The South African context brings additional urgency. Regulatory, legal and financial risks are increasing.
The Personal Information Protection Act requires that data breaches be reported to both regulators and affected individuals. The Cyber Crime Act formalizes a series of offenses that can turn routine breaches into criminal investigations.
The economic consequences of cyber incidents are also becoming more serious. IBM's global breach report, when applied to local circumstances, shows that losses could easily reach millions of rand.
These costs include not only recovery but also legal risk, reputation damage, customer churn and potential penalties. This makes it clear that cyber security cannot be considered a symbol of digital maturity.
The problem with device-centric thinking
Many organizations believe they are secure because they have a long list of tools. Firewalls, endpoint security, identity systems, e-mail security, backup and incident response plans are all well-represented in corporate environments.
But attacks are increasingly successful, and the reason is often not a technical failure. This is because cybersecurity decisions are made in isolation from the organization's broader strategy and risk priorities.
When controls are deployed without clear risk logic, three common problems arise. The first is reactive investing. Security tools are chosen based on industry buzz or vendor influence rather than their relevance to actual threats.
The second is weak governance. Boards receive activity reports but lack visibility into currency or exposure.
The third is false confidence. The dashboard shows green, teams are busy, and yet the most dangerous scenarios remain untested and unresolved.
Building a risk-based cyber security practice
To move cybersecurity into the realm of executive governance, organizations need a different starting point. It starts with identifying the most important assets and services of the business. These are systems that, if compromised, would immediately disrupt operations. These typically include customer platforms, payment services, identity infrastructure, and sensitive data repositories.
From there, leadership must define what levels of risk are concretely acceptable. Vague ratings like high or medium are no longer useful. Executives need to know how much downtime the organization can afford, what level of data loss will be considered tolerable, and what financial loss can be absorbed without significant disruption.
International frameworks such as NIST, ISO, and FAIR can provide a starting point. But certification alone is not the goal. What matters is developing repeatable practices that align with the specific context of the organization.
A dynamic risk register should be at the heart of this system. It should document risk scenarios with realistic impact narratives, provide rationale for their likelihood, assign ownership, record relevant controls, and schedule reviews.
Decisions about risk treatment should also be visible and rational. Some risks will require active mitigation. Others may be accepted, transferred through contracts or insurance, or avoided through operational changes. What matters is that decisions are taken consciously, properly documented and approved by leadership.
People remain the most exploitable surface
Despite all the technological investments, human behavior remains the most exploited vulnerability in the digital environment.
In 2024, Kaspersky reported millions of phishing link clicks on African networks, many of which were from inside corporate systems. This shows that human behavior is not just a bland concern. It is a fundamental part of an organization's risk surface, as critical to security as any technical system.
When organizations treat employees with unpredictable and irreversible behavior, they miss the opportunity to design systems that guide and support safe behavior. This mentality weakens overall security. Fatigue, urgency, and learned reactions are all known factors that attackers take advantage of.
Unless behavioral controls are taken seriously, technical security will continue to be undermined from within.
Scenarios Organizations Should Prepare For
The absence of violations does not prove resilience. The ability to overcome these is tested.
Organizations should focus their preparations on scenarios that truly threaten their continuity. These scenarios include ransomware attacks that encrypt systems while exfiltrating sensitive data, identity breaches that enable attackers to move laterally across networks, compromises of high-trust third-party suppliers, executive impersonation using deepfake audio or video, and data leaks resulting from uncontrolled AI behavior.
These are not marginal probabilities. They are defining risks that require rehearsal, not just theoretical discussion.
New technologies reshape the risk landscape
Emerging technologies aren't just bringing new risks. They are changing the nature of responsibility.
AI systems may quietly expand access to personal data or make decisions that lack explanation. IoT deployment multiplies entry points into environments that were never designed for cyber defense. Big data platforms can amplify the impact of a single breach. And social media can turn misinformation and impersonation into a rapidly growing risk factor.
Boards and executives must start asking tough questions. What is being traded in the name of innovation or efficiency? Which of these agreements is defensible? And who will be held accountable if those decisions fail?
talent as a control surface
Talent is part of the front line defense. Even the best-designed cybersecurity plan will fail without the people who can deliver it.
The lack of cybersecurity talent in South Africa remains a major obstacle. While outsourcing can support execution, it cannot replace internal judgment, contextual awareness or institutional learning.
This means that training is not a secondary concern. This is a primary control. Investing in skills directly improves the quality of decisions, speed of response and reliability of reporting.
The local cybersecurity skills gap is not just about technical expertise or executive literacy. It's about the missing link in between.
Organizations need professionals who can translate strategic direction into operational clarity. These do not necessarily have to be the most certified individuals. They can create risk registers that boards can understand, justify investments with clear logic, and explain risks without relying on jargon.
Without this layer, security governance remains fragmented and disconnected from enterprise priorities.
Technical violations are rarely a failure of security controls alone. More often, it is a visible symptom of deeper governance failures and business decisions that do not fully account for risk.
In the digital economy, flexibility is no longer defined by the number of devices or the speed of compliance. It is shaped by how intentionally organizations control risk, how consistently they monitor it, and how clearly leadership understands their role in shaping outcomes.
In South Africa's high-risk and rapidly evolving environment, those organizations most likely to succeed will stop treating cyber risk as a technical issue to be relegated to.
They will recognize it for what it really is – a reflection of leadership quality, institutional accountability and the ability to make tough decisions under pressure.
