NEC XON appoints Armand Kruger as Head of Cybersecurity

Issue 2/3 2023 News & Events, Information Security


Armand Kruger.

NEC XON has announced the appointment of Armand Kruger as the Head of Cybersecurity. Kruger will oversee all cybersecurity offerings including cybersecurity strategy, programmes, and executive advisory.

Jason Barr, NEC XON Executive Safety Solutions says Kruger brings deep cybersecurity nous to the new role, having served as the Head of Cyber Operations at NEC XON. “His core focus has been on tactical incident response and threat hunting, and we are delighted to promote Armand into this key position given the excellent reputation he has built with us over the years,” says Barr. Before joining NEC XON, Kruger worked at Vodacom as a threat hunter, focusing on cyber threat simulations and attack scenarios.

Kruger has been involved in countless major cybersecurity incidents, including digital hands-on-keyword battles with ransomware operations. He believes that incident response can be complex, and business coordination is key, but the unspoken rule leaders tend to forget in stressful situations is to remain composed and systematically find the source of the threat.

“The contemporary demand for connecting numerous individuals in far-flung locations through interconnected systems, data sources, and storage presents a complex and extremely demanding cybersecurity landscape. This landscape comes with various competing requirements like accessibility and availability versus privacy and protection. Hackers frequently take advantage of the vulnerabilities that arise due to the intricacies of managing and maintaining these diverse environments,” says Kruger.

He harnesses a ‘hacker mind-set’ to help customers become cyber resilient. “The biggest cybersecurity risks facing companies today are embedded in the rise of the cyber economy with digital cartels driving cyber risk. It’s important to be proactive to maintain threat resistance. Constant cybersecurity housekeeping is vital to stay up to date and eliminate most threats, while intensive research into emerging threat tradecraft keeps the more serious threat actors at bay,” he says.

Methodology and security culture

Kruger believes that cybersecurity strategy stands on three legs: strategic, operational, and tactical. He sees architecture, culture, operations, mission, and direction as vital components of a successful cybersecurity programme and measures the effectiveness of these components by comparing them to industry standards and validating them through tactical simulations.

He believes that a cybersecurity culture journey is vital to balance the need for strong security measures with the need for employees to access the systems and data they need to do their jobs. He says that employees need to know why these measures are in place and align how they think, consume data and behave with that understanding. Given the move towards ecosystem business, that culture must extend beyond the company walls.

That third-party risks are a major concern for cyber leaders and Kruger emphasises that partners and third-party vendors need to understand the strategy that the business is following and the reason for the enforced security measures. Either they comply, or they don’t do business.

AI and machine learning in cybersecurity

Kruger sees artificial intelligence and machine learning playing a major role in the future of cybersecurity, especially around automated security operations. He says that cybersecurity skills will always be essential, but that AI has the potential to augment cyber capabilities if used correctly.

To stay informed about changes to regulations and standards related to cybersecurity, Kruger personally invests in research and industry communication. He evaluates the strategic direction of change, compares it to the clients’ business goals and embeds them into the cybersecurity strategies he implements.

For more information, go to www.nec.xon.co.za


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Gallagher Security’s Integrate Roadshow
Gallagher News & Events
Gallagher Security recently teamed up with nine technology partners to showcase the latest integrated security capabilities at the Integrate Roadshow in Durban, bringing together about 60 attendees, including end users, channel partners, consultants, and other industry professionals.

Read more...
Ransomware impersonates employees and self-spreads
News & Events
Following a recent incident, the Kaspersky Global Emergency Response team is shedding light on an attack where adversaries crafted their own variant of encryption malware equipped with self-propagation capabilities.

Read more...
Level of RDP abuse unprecedented
Sophos News & Events
Cybercriminals abused Remote Desktop Protocol (RDP) in 90% of attacks handled by Sophos Incident Response in 2023, Sophos’ newest Active Adversary Report finds. External remote services were the number-one way attackers’ initially breached networks.

Read more...
Hexagon rebrands Qognify
News & Events
Hexagon’s Safety, Infrastructure & Geospatial division announced that Qognify has officially adopted the Hexagon corporate identity and fully integrated into the division as the physical security business unit.

Read more...
Five efficiency strategies for your security installation business
Securex South Africa News & Events
A recent conversation with one Securex South Africa 2024 exhibitor, led to the event organisers being able to share some advice on helping security installers make their businesses more efficient.

Read more...
Digital transformation in mines
NEC XON Technews Publishing Mining (Industry)
Digital transformation has been hyped to death, but is a reality all companies in all industries need to address, including the mining sector. BCX and NEC XON weigh in on the challenges mines face.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Sales basics for security installers
News & Events
Being the best security business in South Africa means little if no one uses your services. Your business success is only partly linked to how good you are at security installations.

Read more...