
Live. Interactive polls. Live Q&A. Recording available after.
As South African businesses adopt cloud, remote work, and AI-powered tools, cyber risk is increasing rapidly.
Most organisations already have antivirus, firewalls, and security tools in place — yet still feel exposed.
The problem isn’t technology. It’s the lack of governance.
In this executive-focused session, we break cybersecurity down into a practical, non-negotiable baseline that business leaders can understand, measure, and enforce.
You’ll learn how a focused set of well-governed controls — especially in Microsoft 365 — can dramatically reduce exposure to ransomware, account compromise, and data loss.
This is not a technical deep dive.
It’s a business-level briefing on managing cyber risk with clarity and control.
Your Post-Webinar Cybersecurity Baseline Checklist
After the session, you’ll receive the South African SMB Cybersecurity Baseline Checklist. A practical, executive-level tool designed to help you turn insight into action. This is not theory. It’s a clear, structured checklist covering the core cybersecurity non-negotiables every growing business should have in place. From MFA and privileged access to backup validation and Microsoft 365 security, you’ll be able to quickly assess where you’re strong, where you’re exposed, and what needs immediate attention. It’s your starting point for moving from uncertainty to controlled, governed security.
CEOs and business owners responsible for company risk
CFOs and COOs concerned about compliance and exposure
CIOs and IT Managers in scaling or overstretched environments
Risk and compliance leaders
Businesses with 50–500 employees using Microsoft 365 and cloud platforms
CEOs and business owners responsible for company risk
IT leaders managing Microsoft environments
CFOs concerned about compliance exposure
Businesses with 20–500 employees scaling operations
A practical webinar for South African business leaders to uncover hidden IT risks and protect growth with clarity and confidence.
A clear picture of their current security baseline – and where the gaps likely are
A short, prioritised list of actions they can take in the next 90 days
A governance lens for security: what should be reported to the board, how often, and in what format
• Insight into Microsoft 365 security best practices appropriate for SMBs (MFA, privileged access, conditional access, basic data protection).
What ISO 27001 actually is (and what it is not)
Why many businesses struggle with security governance
The core principles behind effective security frameworks
How to apply ISO governance concepts without certification complexity
A practical approach to improving cybersecurity maturity
What ISO 27001 actually is (and what it is not)
Why many businesses struggle with security governance
The core principles behind effective security frameworks
How to apply ISO governance concepts without certification complexity
A practical approach to improving cybersecurity maturity
What ISO 27001 actually is (and what it is not)
Why many businesses struggle with security governance
The core principles behind effective security frameworks
How to apply ISO governance concepts without certification complexity
A practical approach to improving cybersecurity maturity

Most businesses already have them.

A structured, measurable approach to managing cyber risk.

A clear, board-visible cybersecurity baseline aligned to business risk.

John Currie helps South African mid market businesses bring clarity and control to IT costs, governance, and cybersecurity.
His work enables executives to shift from reactive decision-making to confident, board-level oversight backed by practical frameworks and measurable results.

“Before working through this framework, IT felt like a black hole. This approach finally gave us clarity on cost, risk, and priorities without adding complexity.”
— Operations Director

“For the first time, we could have a board-level conversation about IT without jargon. The focus on visibility and control made immediate sense.”
— CFO
If you’re responsible for IT decisions, spend, or risk, you probably have questions. Below are answers to the most common ones we hear from executives.
No. It’s designed for business owners and executives. The focus is clarity, priorities, and decision-making, not tools or jargon.
Yes. All registrants receive access to the recording after the session.
Yes. The webinar and the 90-Day IT Playbook are complimentary.
You’ll have the option to apply for a Free Executive IT Diagnostic if it’s relevant for your business.
But the biggest risk many companies face is misconfigured systems and unclear governance.
This session will help you understand how to simplify security and reduce exposure.
© 2026 JEC Technologies Group. All rights reserved.