The TeamOur success has been due to an energetic, inspired, visionary and diverse team built on five key pillars, which is trust, integrity, accountability, commitment and passion. Together with the above pillars common goals, interests, values and complementary talents create the magic and the synergy effect at I’curity.
We have a flat organisational structure to foster the above principles. We drive authority via individual accountability. We have seen this as a major attraction to those looking to join I’Curity.
“Coming together is a beginning. Keeping together is progress. Working together success.” –Henry Ford
Our combined experience spans to over 35 years in IT security across various industry sectors. The extensive experience comes from delivering projects across the continent and abroad utilising different vendor technologies to deliver end to end solutions. We have worked in the following industries:
- Banking and Finance
Our team is made up of qualified professionals who possess top industry recognised certifications.
Certified Information System Security Professional (CISSP)
CISSP is a vendor-neutral cyber security qualification with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organisations from growing sophisticated attacks.
The Open Group TOGAF 9 certification is: Used by the world’s leading enterprises to certify a common body of core knowledge about the methodology and framework.
Research in Digital Identity Theft
MBA research titled: DIGITAL IDENTITY THEFT AND THE CHOICE OF THE ONLINE SERVICE PROVIDER
The research focused on cyber-security knowledge specifically how digital identity theft plays a significant role in selecting online services (including digital platforms) and their providers in South Africa. It further reveals the extent to which the public users are educated about digital identity theft and other related cyber-crimes. Some of the related questions answered include: what digital identity theft is, how it is perpetuated and prevented as well as a detailed assessment of other factors that could play apart in this space.
Internet of Things. Business Implications and Opportunities
MIT Sloan School of Management program focusing on 6 areas of IoT, namely; Demystifying the Internet of Things, Leading IoT: Levels of Mastery, Leadership Capabilities, An Overview of IoT Technologies, Aligning IoT and Strategy, Creating an IoT Roadmap for the Future.
Certified Cloud Security Professional (CCSP)
As CCSPs we are responsible for cloud security architecture, design, operations, and/or service orchestration. CCSP is most appropriate for those whose day-to-day responsibilities involve procuring, securing and managing cloud environments or purchased cloud services. In other words, CCSPs are heavily involved with the cloud.
Is the only business framework for the governance and management of enterprise IT. It is the product of a global task force and development team from ISACA, a non-profit, independent association of more than 140,000 governance, security, risk and assurance professionals in 187 countries.
Digital Transformation Strategy
Boston University Questrom School of Business program focusing on 6 areas of Digital Transformation, namely; Every Business is (Becoming) Digital, Digitisation of Industries & Companies, Digital Matrix for Business Transformation, The Digital Matrix in Action: Cars as Computers on Wheels Connected to the Cloud, Three Winning Moves, Transformations in Action & Synthesis.
We specialize in cyber-security solutions across different industry verticals. Our core value proposition is our ability to deliver robust, transformative and visionary identity platforms to enable and secure your digital transformation strategies.