top of page

Beyond POPIA: The Regulatory Forces Reshaping South African Cybersecurity with Chantel Johnson Downs

  • Writer: Juan Allan
    Juan Allan
  • Nov 20, 2025
  • 6 min read

Chantel Johnson-Downs analyzes South Africa's cybersecurity landscape: booming MDR demand, the acute skills gap, and why identity security (ITDR) is now essential



The relentless surge of digital transformation in South Africa, while driving economic growth, is creating a cybersecurity battlefield where the skills gap is the single most critical vulnerability, forcing a fundamental shift in how organizations defend themselves.


If this is true, then the strategies for survival and growth are no longer just about buying better technology, but about smarter resource allocation, outsourcing what you can't staff and automating what you can't outsource.


To test this, we spoke down with Chantel Johnson-Downs, a seasoned professional and Customer Success Manager immersed in the South African cyber landscape. In this interview, Chantel unpacks the complex interplay of market demand, evolving threats, and the urgent talent shortage, providing a clear-eyed view of the challenges and a practical roadmap for the future.


Interview with Chantel Johnson-Downs


Small and medium businesses are adopting managed security services the fastest. Why are they such a big opportunity right now, and what should a good MDR service include for them?


South Africa’s cyber market is growing because of rapid digital and cloud adoption, stronger data-privacy regulation, and a surge in financially-motivated attacks — which together push organisations toward MDR, identity security, cloud controls and compliance-driven spend. This are some key drivers:


Digital transformation & cloud migration: Cloud-first projects, APIs and SaaS adoption enlarge the attack surface and shift spend toward cloud security, IAM, CASB and CWPP/CSPM.


Regulatory & compliance pressure: POPIA, the Cybercrimes Act and sectoral guidance (financial joint standards) force measurable controls, logging, breach-notification and governance — organisations invest to evidence compliance.


Monetary loss from fraud & ransomware: Banking fraud, mobile-money exploitation and ransomware make security an insurance/operational priority, driving demand for MDR, backup resilience and IR services.


This are some sectors in this scenario:


  • Finance — largest absolute spend (fraud controls, payment security, joint standard compliance).

  • Telecoms / service providers — infrastructure & cloud-edge projects (5G) increase investment.

  • Public sector — rising demand but uneven maturity and constrained budgets slow rollouts; compliance obligations from national data/cloud policy push specific projects.

  • SMEs — fastest relative growth in managed services / MDR consumption because they lack in-house SOCs.


With so many attacks starting with stolen passwords, what are the top one or two things a company should do to improve its "identity hygiene" and protect against ransomware?


Phishing, identity compromise and ransomware dominate here, but South Africa also faces high fraud-as-a-service activity and critical infrastructure targeting; uneven maturity across organisations makes containment and coordinated response difficult.


Phishing & social engineering remain the top vectors for breaches and payment fraud; attackers increasingly automate targeted credential harvesting.


Ransomware & extortion are also impacting organisations of all sizes; readiness varies and backups/IR playbooks are inconsistent. At the same pace privileged account compromise and AD/cloud identity attacks are rising; hence the growth of ITDR (identity-centric detection & response).


Third-party / supply chain risk and payment/mobile-money fraud are also significant local challenges due to wide third-party integrations and informal payment ecosystems.


This is how some organisations are adapting:


  • Identity-first controls: stronger MFA, PAM for privileged accounts, and adoption of ITDR tooling to detect anomalous auths and misconfigurations.

  • Outsourcing detection/response: MSSP/MDR adoption to cover 24×7 detection and investigations where talent is scarce.

  • Governance & playbooks: tighter board oversight (King IV expectations), breach-notification readiness under POPIA, and sectoral incident-sharing for coordinated response.


I prioritise identity hygiene (ITDR + PAM + conditional access) and ensure backup + immutable storage for critical datasets, that combination measurably reduces ransomware and fraud risk.


Since it's so hard to find experienced people, what should companies look for when hiring someone with little experience but lots of potential?


The skills shortage is acute, CSIR surveys show a majority of cybersecurity roles are partly or fully unfilled, so organisations combine skilling programs with outsourcing and automation to survive.


The scale and shape of the shortage impacts directly in the nation-level data (CSIR): high vacancy rates for cyber roles, low proportions of employees having annual awareness training, and long recruitment cycles.


This is what employers do about it:


  • Upskill & pipeline programs: cadetships, university partnerships, vendor certification sponsorships and in-house academies to promote juniors into analysts.

  • Automation & ITDR/SOAR: investing in SOAR/SIEM automation and ITDR reduces manual triage burdens and lets fewer analysts do more.

  • MSSP & shared services: outsourcing 24×7 detection/IR and using MDR so in-house teams focus on strategic tasks.

  • Retention levers: career paths, certification budgets, remote work flexibility and performance-based rewards.


My recommendation is combine recruitment-for-potential with rapid on-ramping (bootcamps + SOAR playbooks) and invest in ITDR to make identity-related alerts less analyst-intensive.


With all the new regulations, how can a company simply prove it's secure to auditors and insurance companies without it becoming a huge chore?


POPIA plus the Cybercrimes Act, National Data & Cloud Policy and King IV governance expectations are converting cyber from an IT problem into a board-level compliance and business-risk imperative.


This are the key frameworks & their impacts:


  • POPIA (Protection of Personal Information Act): requires reasonable technical and organisational safeguards, breach handling/notification and records of processing — organisations are investing in DLP, encryption, logging and privacy governance to show compliance.

  • Cybercrimes Act: criminalises cyberattacks and supports law-enforcement action; it also improves obligations around preserving evidence and reporting. Enforcement and uncommenced provisions remain important to watch.

  • National Data & Cloud Policy / NCPF: pushes public-sector cloud adoption but requires baseline security and accountability — influences public sector procurement and standards alignment.

  • King IV / corporate governance: boards are expected to “apply and explain” technology governance — making cyber risk a board-level KPI and driving investment and disclosure.

  • International standards used locally: ISO/IEC 27001, NIST CSF and CIS Controls are commonly cited baselines for controls, audits and cyber insurance underwriting. ISO 27001 adoption also increases trust for service providers.


About how this changes behaviour, compliance requires demonstrable controls (logs, IR plans, DLP, identity controls). Cyber insurance underwriters increasingly require proof of MFA, backups and supplier security, pushing baseline hygiene.


My tactical recommendation is treat POPIA/King IV as a program (people, processes, tech), and use ISO 27001/NIST CSF mapping to show objective maturity to auditors and insurers.


If a company already has tools like multi-factor authentication, what is the main benefit of adding a specialized "Identity Threat Detection" (ITDR) tool?


Identity-first security (ITDR + PAM + robust IAM), cloud-native protections, AI-driven detection and SOC automation are the technologies changing the game in South Africa, with big opportunity in affordable MDR/ITDR bundles for SMEs and localised threat intel.


This are some technologies to call out:


  • ITDR (Identity Threat Detection & Response): rising fast because identity compromise is the dominant breach vector; ITDR complements IAM/MFA/PAM by detecting attacker behaviours after authentication. Gartner and major vendors now position ITDR as a core capability.

  • Cloud security (CSPM/CWPP/CASB) & identity-first access: as workloads move to cloud, visibility and secure configuration become essential.

  • AI/ML for detection & orchestration: used to triage alerts, detect anomalous auth patterns (important for ITDR) and automate repetitive SOC tasks — but adversaries will use AI too.

  • SOAR & SOC automation: a force-multiplier for scarce analysts; paired with MDR to compress response time.

  • Localized threat intelligence & fraud analytics: criminal patterns around local banking, mobile money and ID-fraud need regionally tuned telemetry and rules.


For me, this are the biggest innovation opportunities for SA:


  • MDR + ITDR packaged for SMEs (identity detection + managed response).

  • Identity telemetry fusion, correlate IAM logs, MFA telemetry, cloud auths and endpoint context to catch lateral movement early.

  • AI-assisted analyst tooling to reduce triage overhead and speed IR.


If you’re advising a buyer, prioritize an identity-first approach (ITDR + PAM + conditional access) and ensure any MDR provider can ingest identity telemetry.


Looking ahead, where will AI help the most in our fight against cyber attacks here in South Africa?


In 3–5 years we’ll see managed detection and identity-first security become table-stakes; regulation and cyber insurance will harden baseline controls, while AI will amplify both defensive scale and offensive sophistication.


The top trends and impacts are:


  • MDR + ITDR become mainstream: packaged, subscription-based detection that includes identity signals. Expect vendors to productize identity telemetry ingest + playbooks.

  • Regulatory compliance & governance pressure: POPIA enforcement, sectoral joint standards (financial) and King IV disclosure expectations will keep investment steady and push evidence-based controls.

  • AI arms race: defenders use AI for detection/automation; attackers use automation for scale, social-engineering and credential stuffing — raising the bar for behavioural detection.

  • Cyber insurance tightening: insurers demand proof of controls (MFA, backups, vulnerability management), which will drive baseline hygiene and third-party security checks.

  • Talent + automation balance: skilling pipelines will expand but automation (SOAR, AI triage, ITDR) will be required to close the operational gap.


According to my perception, invest now in identity telemetry, automated playbooks and MDR partnerships. Those are the highest-leverage buys for the next 3 years.


Comments


bottom of page