Deploying genAI tools for defence

Issue 6 2023 AI & Data Analytics, Information Security

Inflation, digital and technology, and cyber risks have been identified as the top three risks being prioritised for mitigation over the next 12 months by organisations in South Africa, Africa and globally.

These key findings are reflected in PwC's Global Digital Trust Insights Survey 2023: South Africa Report, which is an annual survey conducted to obtain the views of senior executives on the challenges and opportunities to improve and transform cybersecurity within their organisation in the next 12 to 18 months.

The survey was conducted in 19 different languages across 71 territories, with 3876 participants (business, technology and security executives). The questions covered six key areas: cyber risk management, working with hyperscalers, regulations, defence GPT: gen-AI-powered cyber tool, portfolio rationalisation and cyber fit for growth, and cyber transformation and technical solutions.

Hamil Bhoora, PwC Africa's Cybersecurity Leader, says, "Our latest report shows that companies are shifting towards using mostly digital supply chains and, as this happens, new risks are posed to cybersecurity. Each time business leaders try something new, they face new challenges to keep information safe. The latest insights from our 2023 report reveal that the field of cybersecurity is in a state of constant evolution, swiftly adapting to keep pace with business inventiveness."

Key report observations

Survey results show that digital and technology risks are most interconnected with cyber risks. In South Africa, 47% of respondents are most concerned about attacks on connected devices, compared to 42% in Africa and globally, while 53% of local respondents are most concerned about cyberattacks damaging their company brand. "This requires Chief Information Security Officers (CISOs) and tech leaders to position themselves at the epicentre of innovation in their organisations," Bhoora says.

The proportion of costly cyber breaches (those equating to more than $1 m) has also increased since last year. In South Africa, 27% of respondents were affected by data breaches, costing in the region of $1 m to $9 m. "What's evident is that cyber investments are becoming a bigger priority for business leaders, with 79% of organisations planning to increase their cyber budget in 2024," Bhoora says. "Those who experienced a cyber breach of $1m or greater are those who are more likely to increase their cyber budget."

When allocating cyber budgets in the next 12 months, the majority of business leaders in South Africa, Africa and globally said they are going to prioritise the modernisation of technology and optimisation with their cyber investments. Wandile Mcanyana, PwC South Africa Cybersecurity Partner, says, "This increased area of focus and investment is needed as 56% of respondents in South Africa (40% in Africa) said they do not have enough cybersecurity technology solutions. Further to this, many companies are reporting activities to transform cyber in their organisations, but only about a quarter are realising the benefits."

When assessing the top priorities for organisations in their cyber talent strategy over the next 12 months, 76% of respondents in South Africa (79% in Africa; 69% globally) said this was upskilling their current workforce fast enough to keep up with their organisation's demands, and rebalancing between in-house and outsourced or managed services.

On matters relating to DefenseGPT (the rise of generative AI in relation to cybersecurity), organisation leaders said they are gearing up to deploy generative AI (genAI) tools for cyber defence. However, more knowledge about the cyber risks associated with various technologies is needed locally, as only 29% of respondents in South Africa (18% in Africa), said they understand the risks posed by genAI, and 32% (25% in Africa) understand the risks posed by virtual environment tools. Mcanyana says, "Gaining this understanding is important as AI governance is needed to harness enthusiasm for genAI applications to grow the business and have more productive workers."

"Considering the findings of our latest report, it is evident that CISOs are taking the lead in their organisations," Bhoora says. "It is important for them to be empowered to step beyond their traditional roles as independent cybersecurity experts, and instead forge partnerships, not only with selected executives, but with the entire C-suite and board. This collaborative approach will ensure a comprehensive and unified front against emerging threats, safeguarding the integrity and trust of businesses in today's dynamic digital landscape."

Download the report at https://www.securitysa.com/ex/PWC-23_Global_Digital_Trust.pdf




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
New agent gateway to mitigate shadow MCP risk
AI & Data Analytics
Agent Gateway, a new capability in the Tray AI Orchestration platform, gives IT power to develop approved MCP tools with policies, permissions, versioning and compliance, then publish them via MCP for secure agent use.

Read more...
AI and automation are rewriting the cloud security playbook
Technews Publishing AI & Data Analytics
Old-school security relied on rules-based systems that flagged only what was already known. AI flips the script: it analyses massive volumes of data in real-time, spotting anomalies that humans or static rules would miss.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
neaMetrics 2025: Year in review
AI & Data Analytics
With a stronger team, a broader portfolio, and a clear vision for what’s next, neaMetrics is well positioned to continue delivering smarter, more connected security solutions in 2026 and beyond.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.