On the 12 November 2020, I had the rare privilege of being part of a panel discussion on the “opportunities and challenges for Responsible AI in Africa” as part of…
Category: Articles

The Digital Series: Championing a Digital Culture
By IIPGH0In a typical digital transformation effort, C-Level executives often overlook the importance of driving a digital culture. Leaders of digital transformation efforts are often preoccupied with getting the technology and…

The CIO Diaries: Championing a Cybersecurity Culture
By IIPGH0One of the priorities of the Chief Information (Security) Officer [CIO/CISO] is to drive employee cyber behavior. A single click of a malicious link by a naive employee could bring…

The growing animus between Information Technology and Information Security
By IIPGH0Introduction The rapid need for Information Security (IS) in the operations of organizations has led to the formation of Information Security Departments or units (ISDs). ISDs are gradually becoming ubiquitous…

The Sherrif Security Indicator
By IIPGH0As an Information Security Professional, I have taken a keen interest and followed closely the global reports of the Unisys Security Index (USI), for the past 4 years. Findings from…

Information Security Governance: the cornerstone of effective information protection
By IIPGH0Information Security Governance (ISG) refers to the system through which an organization directs and controls its Information Security (InfoSec) activities. Just like corporate governance, ISG seeks to protect the interest…

Social Engineering; The Greatest Catalyst for Successful Cyber Attacks
By IIPGH0Social Engineering (SE) is the process of deceiving an individual or a group of people to take a certain action(s) or disclose sensitive information in favour of the perpetrator. According…