Challenge

Project Details

A Multi-Stakeholder Intelligence Phase

To build a framework that worked for the entire group—not just the head office, I led an intensive discovery phase:

Stakeholder Deep-Dives

Conducted comprehensive interviews with Cyber teams, Information Security Officers (ISOs), Business Information Security Officers (BISOs) and Application Teams to name a few, across various business units to understand their specific operational constraints.

Foreign Entity Integration

Engaged with foreign branch entities to map diverse regulatory triggers ensuring the framework was legally compliant across all jurisdictions.

Regulatory Alignment

We mapped triggers across diverse African and international regulatory landscapes to ensure every business unit met its specific regional compliance mandates.

Maturity Level Assessment

We measured the maturity across four critical pillars: People, Process, Technology, and Information.

Testing Mapping & Frequency

We developed a “Testing Mapping” engine that dictates the type of test (e.g., Red Teaming, Social Engineering, OSINT) based on asset classification (Critical “Crown Jewels” to Low) and frequency (Daily to Annually).

The Impact

  • Moved the organisation from ad-hoc, siloed testing to a structured, trigger-based rhythm across all regions and business units.
  • Transformed technical pentesting data into a decision-tree model, providing the CISO and Risk Committees with real-time clarity on residual risk.
  • Bridged the gap between legacy cyber programs and modern risk requirements, fostering a culture of “security by design” rather than “security by audit.