• About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    EU Data Breach Notifications Surge as GDPR Reform Looms

    EU Data Breach Notifications Surge as GDPR Changes Loom

    WinRAR, CVE-2025-8088, Nation-State Actors

    Nation-State Hackers, Cybercriminals Weaponize Patched WinRAR Flaw Despite Six-Month-Old Fix

    Proxy Network, Google, Google Threat Intelligence, Nation-State Actors,

    Google Dismantles Massive Proxy Network That Hid Espionage, Cybercrime for Nation-State Actors

    internal cybersecurity warning

    Acting CISA Chief Flagged for Uploading Sensitive Government Files Into ChatGPT

    Malicious Open Source Software Packages Neared 500,000 in 2025

    Malicious Open Source Software Packages Neared 500,000 in 2025

    Cyber Preparedness in Healthcare

    AHA Releases New Guides to Strengthen Hospital Emergency and Cyber Preparedness

    ATM jackpotting

    US Charges 87 in Major ATM Jackpotting Scheme Linked to Tren de Aragua

    CVE-2025-55182

    Hackers Exploit React2Shell Vulnerability to Deploy Miners and Botnets Worldwide

    cyberattack on Delta

    Major Cyberattack Cripples Russia’s Alarm and Vehicle Security Provider Delta

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Proxy Network, Google, Google Threat Intelligence, Nation-State Actors,

    Google Dismantles Massive Proxy Network That Hid Espionage, Cybercrime for Nation-State Actors

    Data Privacy Week 2026

    Canada Marks Data Privacy Week 2026 as Commissioner Pushes for Privacy by Design

    European Commission investigation into Grok AI

    European Commission Launches Fresh DSA Investigation Into X Over Grok AI Risks

    Phishing Toolkits, Vishing, Okta, Okta Threat Intelligence

    Phishing Kits Now Sync With Live Phone Scammers to Defeat Multifactor Authentication

    social media ban for children

    UK Turns to Australia Model as British Government Considers Social Media Ban for Children

    Grok AI Image Abuse

    Grok Image Abuse Prompts X to Roll Out New Safety Limits

    RedVDS, RedVDS Tool, RedVDS Infrastructure, Microsoft, Fraud, Scam

    Microsoft Crushes Cybercrime Subscription Service Behind $40 Million Fraud Spree

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    U.S. Senators Push Apple and Google to Review Grok AI

    After EU Probe, U.S. Senators Push Apple and Google to Review Grok AI

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    Coupang CEO Resigns

    Coupang CEO Resigns After Massive Data Breach Exposes Millions of Users

    Black Friday

    Black Friday Cybersecurity Survival Guide: Protect Yourself from Scams & Attacks

    Cyble and BOCRA Sign MoU

    Cyble and BOCRA Sign MoU to Strengthen Botswana’s National Cybersecurity Framework

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    EU Data Breach Notifications Surge as GDPR Reform Looms

    EU Data Breach Notifications Surge as GDPR Changes Loom

    WinRAR, CVE-2025-8088, Nation-State Actors

    Nation-State Hackers, Cybercriminals Weaponize Patched WinRAR Flaw Despite Six-Month-Old Fix

    Proxy Network, Google, Google Threat Intelligence, Nation-State Actors,

    Google Dismantles Massive Proxy Network That Hid Espionage, Cybercrime for Nation-State Actors

    internal cybersecurity warning

    Acting CISA Chief Flagged for Uploading Sensitive Government Files Into ChatGPT

    Malicious Open Source Software Packages Neared 500,000 in 2025

    Malicious Open Source Software Packages Neared 500,000 in 2025

    Cyber Preparedness in Healthcare

    AHA Releases New Guides to Strengthen Hospital Emergency and Cyber Preparedness

    ATM jackpotting

    US Charges 87 in Major ATM Jackpotting Scheme Linked to Tren de Aragua

    CVE-2025-55182

    Hackers Exploit React2Shell Vulnerability to Deploy Miners and Botnets Worldwide

    cyberattack on Delta

    Major Cyberattack Cripples Russia’s Alarm and Vehicle Security Provider Delta

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Proxy Network, Google, Google Threat Intelligence, Nation-State Actors,

    Google Dismantles Massive Proxy Network That Hid Espionage, Cybercrime for Nation-State Actors

    Data Privacy Week 2026

    Canada Marks Data Privacy Week 2026 as Commissioner Pushes for Privacy by Design

    European Commission investigation into Grok AI

    European Commission Launches Fresh DSA Investigation Into X Over Grok AI Risks

    Phishing Toolkits, Vishing, Okta, Okta Threat Intelligence

    Phishing Kits Now Sync With Live Phone Scammers to Defeat Multifactor Authentication

    social media ban for children

    UK Turns to Australia Model as British Government Considers Social Media Ban for Children

    Grok AI Image Abuse

    Grok Image Abuse Prompts X to Roll Out New Safety Limits

    RedVDS, RedVDS Tool, RedVDS Infrastructure, Microsoft, Fraud, Scam

    Microsoft Crushes Cybercrime Subscription Service Behind $40 Million Fraud Spree

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    U.S. Senators Push Apple and Google to Review Grok AI

    After EU Probe, U.S. Senators Push Apple and Google to Review Grok AI

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    Coupang CEO Resigns

    Coupang CEO Resigns After Massive Data Breach Exposes Millions of Users

    Black Friday

    Black Friday Cybersecurity Survival Guide: Protect Yourself from Scams & Attacks

    Cyble and BOCRA Sign MoU

    Cyble and BOCRA Sign MoU to Strengthen Botswana’s National Cybersecurity Framework

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Firewall Daily

Transparency of Your Cybersecurity Tools is Pivotal

AI will play a critical role in how we combat cyber crimes. But a lot depends on how it is being implemented and utilized within the organizations.

thecyberexpress by thecyberexpress
March 15, 2024
in Firewall Daily, Interviews
0
Transparency of Your Cybersecurity Tools is Pivotal
638
SHARES
3.5k
VIEWS
Share on LinkedInShare on Twitter

In an exclusive conversation with The Cyber Express, Celia Mantshiyane discusses various aspects of cybersecurity, the role women play in STEM and how the cyber space has changed in the past two decades.

Q1: How did the journey begin? How did you come to stumble upon this domain of cybersecurity, which is basically pretty rare?

I normally say to people cybersecurity chose me; I never chose security. I started off my career in finance. I have always been a business, always been crushing the numbers. Then I got an opportunity to join Auditor General, which is an audit firm for South Africa. I started working in IT and met an incredible leader mean. Literally, I was taught IT, and within a short period of time, I was at the office of the CIO.

And then, obviously, cybersecurity was just one of those buzzwords that was coming up as a concern for organizations at that time. And because I’m a person that likes to learn, I said to the boss, you know what, let me give a stab at it. I enjoyed it. Because every day brings in challenges every day, you learn something new, and you actually get to engage with business, which is quite nice.

Q2: There are just there 24% women in the entire cybersecurity industry. The participation of women has gone up only in the recent past. So, how do you think this changed? For you, was that a kind of impediment that you had to pause

Even now, we don’t have many women in the cyberspace. There’s a lot of things and programs that we’re currently running to ensure that obviously, we get more women into the space, but it’s mainly male driven.

report-ad-banner

Finding a mentor, whether it’s a man or woman, as long as they are in that space, because earlier there were not qualifications for cybersecurity. Back in the days we had to learn firewalls and all. Now, you can go to university and register for a course, to better yourself.

But at the same time, there are internships that are currently running just for cybersecurity. MTN currently is running a massive intern program of just women as well in Google today. Currently in my own team, we are hiring women in the cyber space. It’s about us as leaders doing something, but as well partnering with organizations to ensure that we have equality within the space.

Q3: In which year did you become the CISO for the first time and when did you get into this role?

It was in 2017-2018 at Coca-Cola. That was my first CISO role. Coke was very exciting, a global organization, well grounded. You need to learn how to actually engage with different people from different cultures, but at the same time, speak the same language, which is cyber.

The love of cyber literally from Coke, I think I matured in the company very well. And hence, it was quite easy for me to transition into a network organization as well, which is MTN.

But in terms of security itself, it started more than 10 years ago. But mostly at that time, it was governance. Little did I know that I was moving into cyber bit by bit as I am today.

Q4: How has cybersecurity changed over the past 20 years?

Governance is quite important, whether it’s audit or governing on monthly basis. However, cyber security has literally increased in organization. You have to be an organization that moves away from technology security to more business security, and that’s how it has evolved.

Back in the days, we used to sit and discuss with IT the server risks that are out there currently. As a CISO, I discuss with businesses. I have to show the cybersecurity strategy that I have to align with the business strategy.

And then you become a trusted adviser, on how we actually make use of our cyber risks within the organization. So that’s one area where it has changed.

As a CISO, your personality and trustworthiness is of importance. You can’t be a cybersecurity leader and the next thing is that people don’t want to engage with you.

You need to be healthy, have better language that is business language driven. You can’t be talking IP addresses. So that has also changed.

From a technical point of view, security by design, back in the days, we used to patch just a bit and, it was firewalls at the end. But now there are processes and procedures that we are currently embedding into the process.

The party risk management needs to be very proactive in terms of how you actually ensure that security by design is embedded into every system, every project within the organization.

You could never have enough resources for all of it. Hence, becoming your trusted advisor and ensuring that you can speak to different stakeholders to ensure that they understand your policies, your processes, your baselines and standards, and they actually complying to those is quite important.

As a cybersecurity officer or office, you actually need to work with other people to deliver what you need to deliver for the organization.

So that’s where the trust comes from. The integrity comes from. So as a leader, that’s what you need to be. People need to trust you so that they’re able to perform, whether you do or not.

Q5. South Africa ranks sixth among the global cybercrime deaths. It also cost around 2.2 billion annually. The cybercrime catastrophe in the region is pretty high. What are the reasons for the trend? And is there a change in this? Is there a sense of employment? Is there no more policing down here?

One of the reasons, which is quite obvious is the lack of investment into the cyber security and environment. If you look at our budget, cyber security is to feature 0.02% budget of IT. In most organization, it was never a priority. It was always IT and how to better our systems and our tools.

But the pandemic changed that, obviously, with all these increased attacks that have been happening in South Africa, the CISOs, the business, the executives, the CEO, they now understand the importance of it.

And as much as we are paying technological debt of cybersecurity, but the improving as a country to ensure that, we are preparing for the global standard. Currently in South Africa, there is a cyber law that has just been passed. There’s a whole lot of things committees, forums, that we attending conferences, just to ensure that we all bettering ourselves.

Also lack of knowledge. In South Africa alone, not only do we have organizations that have the budget, we also have small organizations that don’t have the budget.

So you’ll find that in those committees in the forums that we have, we give advices, we partner with them to advise on what basic things they should have, as a minimum. Don’t just pretend that you want the help the matter of when are you ready.

Can you respond in these things should do. Knowledge sharing is quite important, which is something that we’re doing currently. And it’s working quite well.

And I must be honest, our controls and our standards are global. It’s a matter of which ones can you afford to implement. Or which ones can you afford to maintain. Because implementing is one thing, but in cybersecurity, you need maintain the status quo.

One minute, you could be very secure tomorrow, but not be secure because of a phishing email. So cyber awareness is quite important for all of us big or small organizations.

Q.6: Do you think the advancements in AI will play a crucial role in cybersecurity in 2023?

I believe that the cyber hackers literally are using AI to attack us. But how much are we using to combat that, from an organizational point of view is still in their infancy.

However, there are tools that are providing as AI capabilities. But how well are they integrated. Because AI needs to be integrated into other tools for you to make an informed decision or to then respond quite quickly.

AI will play a critical role and still plays a critical role into how we combat cyber crimes and fits within our organization. But how it’s implemented is the problem, and how it is actually being utilized within the organizations also quite important.

In my own organization, I mean, we’ve implemented a lot of AI, but even sitting in different tools, or it’s not integrated is not giving you the outcomes that you want. So also, the implementation, the architecture of it needs to be needs to be quite informed and understood.

In terms of the relevancy of it, it is quite critical into how we are currently performing as organizations. I mean, we could never combat all these threats that we have manually, there is no way.

With all the tools, we have source, all the technologies that we have for AI, we need that automation to actually integrate to other tools for me to make informed decisions that are quite crude from an executive interview. From a technical point of view, AI is perfect.

Q:7 What are the key metrics that you have in mind whenever you’re using a security tool or you’re going to invest in a security tool?

For me, it’s that integration of different tools. As a leader, it is essential to know what is going on What I should concentrate on so that when I communicate to the board, I know exactly what I’m talking about. It’s about making informed decisions regarding my reporting.

From my point of view, the board would want to be weighed would be predictions. Where would we suffer forward the most in the next six months? Then by the trends that are actually happening within the organization, I can actually anticipate that, based on what I see, looks like I need to allocate all my resources that are working on the green projects, to the red projects.

If we are implementing a new tool, most of the resources would be sitting in a project mode. But what is the use of implementing a new tool if your current environment is not up to date?

Hence, it is quite important for me to understand my greens, my oranges and my reds. I literally just need an executive dashboard, what is wrong, where is it wrong. And then I actually analyze on how to allocate budget and resources.

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Reddit (Opens in new window) Reddit
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • More
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp

Related

Tags: International Women's Daywomen in cybersecurityWomen's Day 2023
Previous Post

Online Platforms to Learn Cybersecurity in 2023 | Free and Paid

Next Post

KelvinSecurity Tries to Sell Information from the Ecuador Armed Forces Data Breach

Next Post
Ecuador Armed Forces Data

KelvinSecurity Tries to Sell Information from the Ecuador Armed Forces Data Breach

Threat Landscape Reports 2025

❮ ❯
Cyble-Vision


Follow Us On Google News

Latest Cyber News

EU Data Breach Notifications Surge as GDPR Reform Looms
Cyber News

EU Data Breach Notifications Surge as GDPR Changes Loom

January 29, 2026
WinRAR, CVE-2025-8088, Nation-State Actors
Vulnerabilities

Nation-State Hackers, Cybercriminals Weaponize Patched WinRAR Flaw Despite Six-Month-Old Fix

January 29, 2026
Bumble
Cyber News

Bumble, Panera Bread, Match Group, and CrunchBase Hit by New Wave of Cyberattacks

January 29, 2026
Proxy Network, Google, Google Threat Intelligence, Nation-State Actors,
Espionage

Google Dismantles Massive Proxy Network That Hid Espionage, Cybercrime for Nation-State Actors

January 29, 2026

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information