Technology consulting services provider In2IT Technologies hosted its second annual CIO Cybersecurity Roundtable discussion last week, in partnership with the Gauteng Department of e-Government, Huawei and Forescout.
Themed “Secure the World”, the event attracted leading CIOs, technology strategists and security professionals to explore how collaboration and innovation can safeguard South Africa’s digital future.
In2IT Vice President and CEO Selva Ganesh told delegates that cybersecurity is not merely a function or cost centre, but a foundational pillar of the digital landscape and a core enabler of resilient infrastructure and trusted connectivity.
He noted that In2IT’s latest research into the evolving impact of cybersecurity reveals staggering figures that demand urgent attention and action. By 2030, the estimated global cost of cybercrime is projected to reach $12 trillion – nearly double the current figure.
The scale of risk and opportunity
“Meanwhile, the cybersecurity services market is projected to grow to $350 billion by 2027. These are not just numbers; they reflect the scale of risk and opportunity facing every sector, said Ganesh.
“These insights underscore a critical truth: that cybersecurity can no longer be managed in silos. It demands collective action across industries, borders, and public and private sectors. Collaboration is not optional; it is essential.”
Delivering a keynote address at the event, Mothibi Ramusi, Chairperson of the Independent Communications Authority of South Africa (ICASA), explained that cybersecurity is not just about money, but also about identity, dignity and trust.
“It’s about the information stored on your phone, your laptop, and your cloud. And it’s about ensuring that when someone in a rural village receives their first WhatsApp message, they understand what’s real, what’s safe, and what’s not,” he noted.
“That is why South Africa, in its G20 presidency, placed digital inclusion at the heart of its global agenda. We recognise that affordability and meaningful connectivity are essential for an inclusive society. Reducing the cost to communicate is not just economic policy; it’s social justice.”
Tracking the digital journey
Ramusi noted that the Ministry of Communications and Digital Technologies has unveiled a Digital Transformation Roadmap that envisions tracking a citizen’s digital journey from birth to death.
This is not solely for surveillance purposes, but rather for the purpose of providing services, fostering connections, and empowering citizens.
“Infrastructure alone is not enough. We must protect it. We’ve all received scam messages from someone impersonating a family member, asking for money. We’ve all seen the vulnerabilities. So how do we manage this? Education is key,” he said.
“Digital skills must be embedded in our curriculum, aligned with the future we’re building. Forums like this are vital, but we must go further. Next year, I have proposed that we host a cybersecurity dialogue in a village, because the people most vulnerable to cyber threats are often those least equipped to understand them.”
Looking ahead to 2030 and guided by the National Development Plan, Ramusi stated that ICASA must ensure that every South African is connected through secure, affordable broadband.
Disconnected and vulnerable
“If the marginalised remain disconnected, they become the most vulnerable, receiving messages they cannot verify, falling prey to attacks they cannot anticipate. So let us begin at the borders, geographically, socially and economically, and work our way inward. Let us build networks that protect, platforms that empower and communities that understand,” he said.
The CIO Cybersecurity Roundtable concluded with a series of panel discussions where security experts and technology strategists discussed topics such as emerging cyber threats and response frameworks, policy gaps and compliance alignment, collaboration between financial and public sectors, and building national cyber resilience.
Other topics that were unpacked included an overview of data privacy regulations and compliance standards, leveraging AI, automation and zero trust for defence, reducing attack surfaces through integrated technology, and OEM-led strategies for public sector protection.






Leave a Reply