Welcome to the home of the Digital Defence Dojo.

Dthree is a digital meeting group, which operates in a structured way to address cybersecurity best practices and share hot topics. Led by a team of our experts, referencing the NIST Cybersecurity Framework and Retail Cyber Intelligence Sharing Centre, we share a common vision to educate each other in the interests of safer business.

Dthree is product agnostic, instead focussing on peer learning where individuals can also share their own expertise. We meet twice a month for 2 hours per session, or slightly longer as needed. The meetings consist of groups of up to 15 people, hosted by one of our specialists. Each participant only requires a broadband connection (2 Mbps or higher recommended), Chrome or Firefox web browser, audio (built-in or headset), and a webcam. The meetings follow frameworks that deal with a wide range of cybersecurity topics. This includes practices for “Identify”, “Protect”, “Defend”, “Respond”, and “Recover”, as well as policies and processes to mitigate the risk of a cyber event.

As a cyber defence council of peers, our mission is to help each participant prevent the following in their own organisations:

Disruption to business

If your business is not running normally, there will be financial repercussions. An attack can see all resources re-deployed from their normal tasks to that of fighting, fixing and cleaning up after a cyber event.

Negative impact on customer relationships

Customer relationships could be significantly damaged by an attack, with customers losing trust in the business and moving to a competitor because they believe you are not protecting their information adequately.

Loss of revenue

When a business is not running, it is losing money. When your customers are unable to get what they expect from you, they will go elsewhere. They may not even come back after you have recovered.

Increase in insurance costs

Your premiums will most likely increase after a claim against business losses. If you can’t prove you have strengthened your defences, you may not even be able to get coverage.

Loss of intellectual property

When criminals get hold of your business ideas, strategies or your designs, they can be directly used to compete against you or much more.

  • Web Application Front-ends (WAFs)
  • Cloud Security
  • IoT Security
  • VPN Security
  • Full disk encryption of laptops
  • DMZ’s and access control
  • Email cyber threat prevention
  • The Payment Card Industry Data Security Standard (PCI-DSS)
  • User account management, passwords and related security
  • Coding for security
  • SQL Injection
  • Buffer overrun mitigation
  • Anti-virus shortcomings
  • South African Law
    • POPI
    • RICPCI
    • ECT
  • South African Cybersecurity Bill

Andrew Smith

Andrew is a senior systems-engineer with over 20 years experience in corporate and small business environments. This includes consulting for large ICT service providers. He has supported systems at every level in the organization, including infrastructure, operating systems, applications, and perimeter protection. He also collaborates with software development teams on web, database, and infrastructure security. Andrew has co-founded multiple ICT businesses, where he advises on cybersecurity strategies and policies. Andrew has a 3-year National Diploma in Electronics (light current).

Hein Mulder

Hein is a cybersecurity specialist with over 25 years of experience. He is a certified Information Systems Security Specialist (CISSP), a Technical Trainer (CTT) and is currently busy with a MSc in Information Security. He has worked on a large number of information security advisory engagements involving the management of security risks at both strategic and tactical levels. He has been teaching IT security to both new and experienced IT professionals for over 15 years.

Riaan du Preez

Riaan is a cybersecurity professional at a leading retailer. He started his career in Information Security in the South African Defence Force, and then moved to EDS (an HP Company) as an incident manager for BP Global. He has worked for cybersecurity service providers, where he engaged with many reputable financial service and retail companies, as well as state owned entities. He is currently working towards his CISSP (Certified Information Systems Security Professional) and CCSP (Certified Cloud Security Professional).

Cybersecurity talent shortage remains a serious global issue. Dthree is our answer to this challenge as we help individuals to:

  • Identify the data points that matter in their business
  • Understand how this data is handled and protected
  • Understand the various layers of security
  • Understand the impact of online fraud and measures to prevent it
  • Learn and share policy development
  • Learn and share on how to make employees more vigilant
  • Learn and share on how cybersecurity receives investment attention
  • Retain ongoing awareness on emerging cybersecurity threats
  • Benefit from peer support for better decision making

Dthree also provides its members with:

  • prepared agendas that encourage focus;
  • a calendar with the online-meeting dates;
  • a moderated forum where members can share content, hot topics, and ask / answer questions;
  • and blog publishing on Dthree for member credit.

The first session is free without any obligation. Should you wish to continue with us, there will be a monthly fee upon application.

Join our experts and benefit from the power of crowd to remain in the front-line of cyber defense practice.