SlideShare a Scribd company logo
1 of 26
Download to read offline
The Importance of
Cybersecurity for
Digital Transformation
Martin Khoo
Principal Lecturer & Consultant
markhoob@nus.edu.sg
Copyright National University of Singapore 2
Overview of Cyber Threat Landscape
for Asia (2022-2023) Target for Cybercriminals
Asia has a rapidly evolving digital economy
and technology which also makes it a target
for cybercriminal activities
Most Attacked Region
APAC was the most attacked region in
2022: it accounted for 31% of attacks
globally.
Victims
Most frequent victims of cyberattacks were
government agencies (22% of total attacks on
organizations), industrial companies (9%), IT
companies (8%), and financial institutions (7%).
Major Threat
Ransomware poses a major threat to
businesses in the region. Its main victims were
industrial companies, which accounted for
34% of successful attacks.
Source: Cybersecurity threatscape of Asia: 2022–2023 (ptsecurity.com)
Copyright National University of Singapore 3
The Need for Stepped-Up Attention on
Cybersecurity
Source: Cybersecurity threatscape of Asia: 2022–2023 (ptsecurity.com)
Copyright National University of Singapore 4
What is Cybersecurity ? Why Bother?
• Encompasses many aspects that are needed to protect the underlying fabric of the digital transformation journey
• Digital transformation will result in the generation, processing and storage of sensitive data. E.g. customer’s
Personally Identifiable Information (PII), financial information and so forth.
• Data confidentiality, integrity and availability are the key tenets for cybersecurity
Cloud
Security
Data
Security
Copyright National University of Singapore 5
Samples of Cybersecurity Considerations for
Digital Transformation (1)
C-Suite & Board Involvement
Cybersecurity is a top-down priority with
involvement from the executive leadership
and board of directors to set tone and provide resources
Risk Assessment & Strategy Devt
Comprehensive risk assessment . Develop
cybersecurity strategy that aligns with the
organization's overall goals and objectives
Data Protection & Privacy
Implement strong data protection measures to
safeguard sensitive data. Ensure compliance
with relevant regulations
Copyright National University of Singapore 6
Samples of Cybersecurity Considerations for
Digital Transformation (2)
Vendor and 3rd Party Risk Mgmt
Assess the security practices of third-
party vendors and partners
Incident Response and Recovery
Develop a comprehensive incident
response plan and test it regularly
Continuous Monitoring & Testing
To detect and respond to security threats in
real time. Regular VAPT to identify weakness
Cybersecurity
Strategy
Doing Cybersecurity Right
Copyright National University of Singapore 8
What is a Cybersecurity Strategy?
Cybersecurity Strategy
1
2
3
4
A plan of actions designed to improve the security
and resilience of an organization's infrastructures
and services to support digital transformation
Technology agnostic and covers a time horizon of
3 to 5 years.
Review annually as cyberthreat landscape
changes rapidly and the strategy needs to adapt
and pivot where necessary
5
Position as a key decision item for the Board for
endorsement and to provide the requisite
budget
A high-level top-down approach to cybersecurity
that establishes a range of organizational
cybersecurity strategic outcomes
Copyright National University of Singapore 9
Hierarchy for Cybersecurity
Strategy
Architecture
Programs
“What” & “Why” - Aligned with the
organization’s business goals and
priorities and endorsed by management
“How” – secure design of systems, networks
and applications, governance instruments
such as policies, standards and best
practices (e.g. open source frameworks)
“Who”, “When”, “How Much” –
implementation of specific initiatives,
technologies, products with timelines, roles
and responsibilities
Copyright National University of Singapore 10
Example of Cyber Strategy Mission/Vision
(Defining the Desired Outcomes in support of Biz goals)
1 Achieve the best in breed cybersecurity
programs in support of business outcomes
2 Protect the organization’s assets from
cyberattacks
3 Mitigate cyber risks to desired levels in
accordance with the company risk appetite
and tolerance
Provide exceptional cybersecurity protection
to our clients and business partners
Align cybersecurity strategies across the
enterprise
4
5
Copyright National University of Singapore 11
Examples of Cybersecurity Strategic Objectives
(Supporting the cyber mission/vision)
1
2
3
4
Adopt a risk-based asset
protection regime
Architect multi-layered security
protection
Integrate “security by design” into the
operational & development process
Increase cybersecurity awareness
across the organisation
5
Determine future initiatives based on
risk, threats, gaps, and performance
Protect the
organization’s assets
from cyberattacks
Copyright National University of Singapore 12
Examples of Cyber Strategy Principles
(Use in the design of the architecture & development of programmes)
CIA Triad
Confidentiality, Integrity, and
Availability
Rapid Adaptability
To address emerging threats,
new technologies, and
business models
Defense in Depth
Implement multilayered
security mechanisms
Diversity
Use different products in the
defensive layers
Source: www.securereading.com
Copyright National University of Singapore 13
Linking Strategy to Programme and Initiative
(Example)
Programme
Implement a
“Detection &
Monitoring” program
covering critical
systems, networks
and applications
Initiative
Deploy a SOC
Setup a 24x7
Security Operations
Centre (SOC)
1
Strategic Outcome
Ability to monitor
and be forewarn of
impending attacks
2 3
3a
3b
Perform Threat
Analysis & Hunting
Using the logs from the
various security controls
and end points that are
sent to the SOC
Copyright National University of Singapore 14
NIST Cyber Security Framework
• A well regarded and commonly referenced framework that
addresses cybersecurity concerns. Well suited as a valuable
resource in the development of a cybersecurity strategy
5 cores, 23 categories,
108 sub-categories
Version 2.0 is planned for release in early 2024.
Will add “Governance” as a core capability amongst
other improvements
Programmes
Source: https://csf.tools/reference/nist-cybersecurity-framework/v1-1/
Managing Risks for
Digital
Transformation
Copyright National University of Singapore 16
General Risk Management Process (1)
Gather Information
Open source info,
commercial threat intel,
expert opinions. Construct
risk scenarios
Evaluate and
Analyse Risks
Evaluate the likelihood
(probability) and
severity of the potential
consequences/impact
of each identified risk
Risk Prioritisation
Rank the risks based on their
impact and likelihood
01
02
03
04
Identify Threats
Potential to cause
harm, disrupt
operations, or
negatively impact the
organization.
05
Risk
Response
Determine how to address
the risks i.e. which ones to
accept, avoid, transfer or
mitigate by comparing with
organization’s risk appetite
and tolerance
Copyright National University of Singapore 17
General Risk Management Process (2)
Implement Mitigation Strategies
Making operational changes,
updating procedures, investing
in safety equipment, or training
personnel.
Monitor and Review
Data collection, tracking
incidents; comparing the actual
outcomes with the predicted
outcomes from the risk
assessment.
Update and Improve
Continuously review and
update your risk assessment as
new information becomes
available or as conditions
change.
06
07
08
09
Develop Mitigation
Strategies
Include preventive,
detective controls, risk
transfer thru’ insurance etc
10
Communicate
and Document
Share the results of your risk
assessment with relevant
stakeholders. Proper documentation
(using a risk register) is essential for
transparency, accountability, and
regulatory compliance.
Addressing cyber risks through a Cybersecurity Strategy
Copyright National University of Singapore 18
Examples of Relevant Risks at Different
Stages of Digital Transformation
Copyright National University of Singapore 19
Initiation Phase
Financial
Risk
Budget
Constraints:
Inadequate
funding can
hinder the
planning and
initial stages.
Strategic
Risk
Lack of Clear
Strategy: Not
having a well-
defined digital
transformation
strategy can lead
to directionless
initiatives.
01 02
Organisation
Risk
Resistance to
Change:
Employees and
stakeholders
may resist
changes,
impacting
adoption.
03
Copyright National University of Singapore 20
Implementation Phase
Cybersecurity
Risk
Data Security:
As more data is
digitized, the risk
of data breaches
and cyberattacks
increases.
01
Technology
Risk
Technology
Integration:
Challenges in
integrating new
technologies with
existing systems
can disrupt
operations
02
Project
Risk
Project Delays:
Implementation
delays can result
from technical
issues or
unforeseen
complexities.
03
Capability
Risk
Skills Gap:
Insufficient staff
expertise can
hinder
successful
implementation.
04
Cybersecurity Risk - other then Data Security, other cybersecurity risks to consider will
include, systems, networks and applications. All of the cyber risks need to be addressed in
the cybersecurity strategy
Copyright National University of Singapore 21
Steady State Phase
Technology
Risk
Changing Technology Landscape:
Rapid technological advancements
can render current solutions
obsolete.
Scalability
Risk
Scalability Issues: As the
organization grows, the
digital infrastructure may
struggle to scale
effectively.
Adoption
Risk
User Adoption: Sustaining
user enthusiasm and adoption
of new digital tools can be
challenging.
01
02
03
04
Maintenance
Risk
Maintenance and
Upkeep: Keeping
newly implemented
systems up to date
and secure requires
ongoing effort.
Need for Skilled
Cybersecurity
Personnel
Copyright National University of Singapore 23
National Level Cyber Strategy
Foundational Enabler 1: Develop a Vibrant Cybersecurity Ecosystem
Foundational Enabler 2: Grow a Robust Cyber Talent Pipeline
Strategic Pillar 1
Build Resilient
Infrastructure
Strategic Pillar 2
Enable a Safer
Cyberspace
Strategic Pillar 3
Enhance International
Cyber Cooperation
CYBERSECURITY
STRATEGY
Singapore’s
Cybersecurity
Strategy:
Launched in
2016, updated
in 2021
Pillar 1
Defend critical
infrastructure
Shape market
forces to drive
security and
resilience
CYBERSECURITY
STRATEGY
Pillar 2
Disrupt and
dismantle threat
actors
Pillar 3
Pillar 4
Invest in a resilient future
Pillar 5
Forge international
partnerships
USA’s
Cybersecurity
Strategy: Launched
in Mar 2023
Source: The Singapore Cybersecurity Strategy 2021 (csa.gov.sg)
Source: National-Cybersecurity-
Strategy-2023.pdf
(whitehouse.gov)
Copyright National University of Singapore 24
The Urgent Need for Cyber Security Professionals
• The US and Singapore
governments in their respective
national cybersecurity strategies
have rightly identified the need to
boost the pool of cybersecurity
trained personnel
• NUS-ISS, as a premier training
institution, working with our
partners, fully supports the
government’s drive to uplift the
cybersecurity workforce of
Singapore through the various
cybersecurity courses and
certifications that we have on
offer.
Extract from Singapore’s Cybersecurity Strategy
Extract from USA’s Cybersecurity Strategy
SG Initiative: Talent Devt Fund (NUS-
CSA) build pipeline of cybersecurity
talent
Copyright National University of Singapore 25
Rounding Up ….
Symbiotic relationship between cybersecurity
and digital transformation is a paramount factor
in shaping the future of our digital organizations.
Cybersecurity is not merely a safeguard; it is an
enabler of innovation, a protector of trust, and a
guarantor of continuity. To implement cybersecurity
effectively entails the implementation of a
cybersecurity strategy to address risks
Potential benefits of digital transformation are
vast, but they come with an inherent set of risks
that demand our constant attention and
cybersecurity provides the oversight to address
cyber risks
facebook.com/iss.nus instagram.com/iss.nus
youtube.com/@nus-iss
linkedin.com/company/iss_nus
www.iss.nus.edu.sg
Thank you

More Related Content

What's hot

Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation CenterS.E. CTS CERT-GOV-MD
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?Ulf Mattsson
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...PECB
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Networks
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited ResourcesLogRhythm
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security PresentationAjay p
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
Information Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsInformation Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsJack Nichelson
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKMaganathin Veeraragaloo
 
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...An Overview of Best Practices for Large Scale Migrations - AWS Transformation...
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...Amazon Web Services
 
Cloud migration strategies
Cloud migration strategiesCloud migration strategies
Cloud migration strategiesSogetiLabs
 
Strategic Approach To Data Migration Project Plan
Strategic Approach To Data Migration Project PlanStrategic Approach To Data Migration Project Plan
Strategic Approach To Data Migration Project PlanSlideTeam
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access Er. Ajay Sirsat
 
cloud-migrations.pptx
cloud-migrations.pptxcloud-migrations.pptx
cloud-migrations.pptxJohn Mulhall
 
Cloud Migration Strategy and Best Practices
Cloud Migration Strategy and Best PracticesCloud Migration Strategy and Best Practices
Cloud Migration Strategy and Best PracticesQBurst
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityOlivier Busolini
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxGenericName6
 

What's hot (20)

Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Information Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsInformation Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security Metrics
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...An Overview of Best Practices for Large Scale Migrations - AWS Transformation...
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...
 
Cloud migration strategies
Cloud migration strategiesCloud migration strategies
Cloud migration strategies
 
Strategic Approach To Data Migration Project Plan
Strategic Approach To Data Migration Project PlanStrategic Approach To Data Migration Project Plan
Strategic Approach To Data Migration Project Plan
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
 
cloud-migrations.pptx
cloud-migrations.pptxcloud-migrations.pptx
cloud-migrations.pptx
 
Cloud Migration Strategy and Best Practices
Cloud Migration Strategy and Best PracticesCloud Migration Strategy and Best Practices
Cloud Migration Strategy and Best Practices
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptx
 

Similar to The Importance of Cybersecurity for Digital Transformation

Cybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdfCybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdfCiente
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...robbiesamuel
 
Defensive Cybersecurity: A Modern Approach to Safeguarding Digital Assets
Defensive Cybersecurity: A Modern Approach to Safeguarding Digital AssetsDefensive Cybersecurity: A Modern Approach to Safeguarding Digital Assets
Defensive Cybersecurity: A Modern Approach to Safeguarding Digital Assetscyberprosocial
 
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
10 Ways For Mitigating Cybersecurity Risks In Project Management.docxyoroflowproduct
 
Implementing Robust Cybersecurity Measures in IT Infrastructures
Implementing Robust Cybersecurity Measures in IT InfrastructuresImplementing Robust Cybersecurity Measures in IT Infrastructures
Implementing Robust Cybersecurity Measures in IT InfrastructuresVRS Technologies
 
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...IRJET Journal
 
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTSMANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTScsandit
 
Cyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docxCyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docxfalknoor56
 
2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - IrelandAccenture Security
 
This domain reviews the diverse areas of knowledge needed to develop and man...
This domain reviews the diverse areas of  knowledge needed to develop and man...This domain reviews the diverse areas of  knowledge needed to develop and man...
This domain reviews the diverse areas of knowledge needed to develop and man...bikheet
 
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)ijcsit
 
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)AIRCC Publishing Corporation
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience InsuranceAccenture Insurance
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxlior mazor
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber ResiliencePeter Wood
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services OfferedRachel Anne Carter
 
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...AmeliaJonas2
 

Similar to The Importance of Cybersecurity for Digital Transformation (20)

Cybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdfCybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdf
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
 
Defensive Cybersecurity: A Modern Approach to Safeguarding Digital Assets
Defensive Cybersecurity: A Modern Approach to Safeguarding Digital AssetsDefensive Cybersecurity: A Modern Approach to Safeguarding Digital Assets
Defensive Cybersecurity: A Modern Approach to Safeguarding Digital Assets
 
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
 
Implementing Robust Cybersecurity Measures in IT Infrastructures
Implementing Robust Cybersecurity Measures in IT InfrastructuresImplementing Robust Cybersecurity Measures in IT Infrastructures
Implementing Robust Cybersecurity Measures in IT Infrastructures
 
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
 
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTSMANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
 
Cyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docxCyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docx
 
2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland
 
This domain reviews the diverse areas of knowledge needed to develop and man...
This domain reviews the diverse areas of  knowledge needed to develop and man...This domain reviews the diverse areas of  knowledge needed to develop and man...
This domain reviews the diverse areas of knowledge needed to develop and man...
 
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)
 
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber Resilience
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
 

More from NUS-ISS

Designing Impactful Services and User Experience - Lim Wee Khee
Designing Impactful Services and User Experience - Lim Wee KheeDesigning Impactful Services and User Experience - Lim Wee Khee
Designing Impactful Services and User Experience - Lim Wee KheeNUS-ISS
 
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...NUS-ISS
 
How the World's Leading Independent Automotive Distributor is Reinventing Its...
How the World's Leading Independent Automotive Distributor is Reinventing Its...How the World's Leading Independent Automotive Distributor is Reinventing Its...
How the World's Leading Independent Automotive Distributor is Reinventing Its...NUS-ISS
 
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...NUS-ISS
 
Understanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix GohUnderstanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix GohNUS-ISS
 
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng TszeDigital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng TszeNUS-ISS
 
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...NUS-ISS
 
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...NUS-ISS
 
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk MunnSupply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk MunnNUS-ISS
 
Future of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdfFuture of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdfNUS-ISS
 
Future of Learning - Khoong Chan Meng
Future of Learning - Khoong Chan MengFuture of Learning - Khoong Chan Meng
Future of Learning - Khoong Chan MengNUS-ISS
 
Site Reliability Engineer (SRE), We Keep The Lights On 24/7
Site Reliability Engineer (SRE), We Keep The Lights On 24/7Site Reliability Engineer (SRE), We Keep The Lights On 24/7
Site Reliability Engineer (SRE), We Keep The Lights On 24/7NUS-ISS
 
Product Management in The Trenches for a Cloud Service
Product Management in The Trenches for a Cloud ServiceProduct Management in The Trenches for a Cloud Service
Product Management in The Trenches for a Cloud ServiceNUS-ISS
 
Overview of Data and Analytics Essentials and Foundations
Overview of Data and Analytics Essentials and FoundationsOverview of Data and Analytics Essentials and Foundations
Overview of Data and Analytics Essentials and FoundationsNUS-ISS
 
Predictive Analytics
Predictive AnalyticsPredictive Analytics
Predictive AnalyticsNUS-ISS
 
Feature Engineering for IoT
Feature Engineering for IoTFeature Engineering for IoT
Feature Engineering for IoTNUS-ISS
 
Master of Technology in Software Engineering
Master of Technology in Software EngineeringMaster of Technology in Software Engineering
Master of Technology in Software EngineeringNUS-ISS
 
Master of Technology in Enterprise Business Analytics
Master of Technology in Enterprise Business AnalyticsMaster of Technology in Enterprise Business Analytics
Master of Technology in Enterprise Business AnalyticsNUS-ISS
 
Diagnosing Complex Problems Using System Archetypes
Diagnosing Complex Problems Using System ArchetypesDiagnosing Complex Problems Using System Archetypes
Diagnosing Complex Problems Using System ArchetypesNUS-ISS
 
Satisfying the ‘-ilities’ of an Enterprise Cloud Service
Satisfying the ‘-ilities’ of an Enterprise Cloud ServiceSatisfying the ‘-ilities’ of an Enterprise Cloud Service
Satisfying the ‘-ilities’ of an Enterprise Cloud ServiceNUS-ISS
 

More from NUS-ISS (20)

Designing Impactful Services and User Experience - Lim Wee Khee
Designing Impactful Services and User Experience - Lim Wee KheeDesigning Impactful Services and User Experience - Lim Wee Khee
Designing Impactful Services and User Experience - Lim Wee Khee
 
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
 
How the World's Leading Independent Automotive Distributor is Reinventing Its...
How the World's Leading Independent Automotive Distributor is Reinventing Its...How the World's Leading Independent Automotive Distributor is Reinventing Its...
How the World's Leading Independent Automotive Distributor is Reinventing Its...
 
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
 
Understanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix GohUnderstanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix Goh
 
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng TszeDigital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
 
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
 
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
 
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk MunnSupply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
 
Future of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdfFuture of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdf
 
Future of Learning - Khoong Chan Meng
Future of Learning - Khoong Chan MengFuture of Learning - Khoong Chan Meng
Future of Learning - Khoong Chan Meng
 
Site Reliability Engineer (SRE), We Keep The Lights On 24/7
Site Reliability Engineer (SRE), We Keep The Lights On 24/7Site Reliability Engineer (SRE), We Keep The Lights On 24/7
Site Reliability Engineer (SRE), We Keep The Lights On 24/7
 
Product Management in The Trenches for a Cloud Service
Product Management in The Trenches for a Cloud ServiceProduct Management in The Trenches for a Cloud Service
Product Management in The Trenches for a Cloud Service
 
Overview of Data and Analytics Essentials and Foundations
Overview of Data and Analytics Essentials and FoundationsOverview of Data and Analytics Essentials and Foundations
Overview of Data and Analytics Essentials and Foundations
 
Predictive Analytics
Predictive AnalyticsPredictive Analytics
Predictive Analytics
 
Feature Engineering for IoT
Feature Engineering for IoTFeature Engineering for IoT
Feature Engineering for IoT
 
Master of Technology in Software Engineering
Master of Technology in Software EngineeringMaster of Technology in Software Engineering
Master of Technology in Software Engineering
 
Master of Technology in Enterprise Business Analytics
Master of Technology in Enterprise Business AnalyticsMaster of Technology in Enterprise Business Analytics
Master of Technology in Enterprise Business Analytics
 
Diagnosing Complex Problems Using System Archetypes
Diagnosing Complex Problems Using System ArchetypesDiagnosing Complex Problems Using System Archetypes
Diagnosing Complex Problems Using System Archetypes
 
Satisfying the ‘-ilities’ of an Enterprise Cloud Service
Satisfying the ‘-ilities’ of an Enterprise Cloud ServiceSatisfying the ‘-ilities’ of an Enterprise Cloud Service
Satisfying the ‘-ilities’ of an Enterprise Cloud Service
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

The Importance of Cybersecurity for Digital Transformation

  • 1. The Importance of Cybersecurity for Digital Transformation Martin Khoo Principal Lecturer & Consultant markhoob@nus.edu.sg
  • 2. Copyright National University of Singapore 2 Overview of Cyber Threat Landscape for Asia (2022-2023) Target for Cybercriminals Asia has a rapidly evolving digital economy and technology which also makes it a target for cybercriminal activities Most Attacked Region APAC was the most attacked region in 2022: it accounted for 31% of attacks globally. Victims Most frequent victims of cyberattacks were government agencies (22% of total attacks on organizations), industrial companies (9%), IT companies (8%), and financial institutions (7%). Major Threat Ransomware poses a major threat to businesses in the region. Its main victims were industrial companies, which accounted for 34% of successful attacks. Source: Cybersecurity threatscape of Asia: 2022–2023 (ptsecurity.com)
  • 3. Copyright National University of Singapore 3 The Need for Stepped-Up Attention on Cybersecurity Source: Cybersecurity threatscape of Asia: 2022–2023 (ptsecurity.com)
  • 4. Copyright National University of Singapore 4 What is Cybersecurity ? Why Bother? • Encompasses many aspects that are needed to protect the underlying fabric of the digital transformation journey • Digital transformation will result in the generation, processing and storage of sensitive data. E.g. customer’s Personally Identifiable Information (PII), financial information and so forth. • Data confidentiality, integrity and availability are the key tenets for cybersecurity Cloud Security Data Security
  • 5. Copyright National University of Singapore 5 Samples of Cybersecurity Considerations for Digital Transformation (1) C-Suite & Board Involvement Cybersecurity is a top-down priority with involvement from the executive leadership and board of directors to set tone and provide resources Risk Assessment & Strategy Devt Comprehensive risk assessment . Develop cybersecurity strategy that aligns with the organization's overall goals and objectives Data Protection & Privacy Implement strong data protection measures to safeguard sensitive data. Ensure compliance with relevant regulations
  • 6. Copyright National University of Singapore 6 Samples of Cybersecurity Considerations for Digital Transformation (2) Vendor and 3rd Party Risk Mgmt Assess the security practices of third- party vendors and partners Incident Response and Recovery Develop a comprehensive incident response plan and test it regularly Continuous Monitoring & Testing To detect and respond to security threats in real time. Regular VAPT to identify weakness
  • 8. Copyright National University of Singapore 8 What is a Cybersecurity Strategy? Cybersecurity Strategy 1 2 3 4 A plan of actions designed to improve the security and resilience of an organization's infrastructures and services to support digital transformation Technology agnostic and covers a time horizon of 3 to 5 years. Review annually as cyberthreat landscape changes rapidly and the strategy needs to adapt and pivot where necessary 5 Position as a key decision item for the Board for endorsement and to provide the requisite budget A high-level top-down approach to cybersecurity that establishes a range of organizational cybersecurity strategic outcomes
  • 9. Copyright National University of Singapore 9 Hierarchy for Cybersecurity Strategy Architecture Programs “What” & “Why” - Aligned with the organization’s business goals and priorities and endorsed by management “How” – secure design of systems, networks and applications, governance instruments such as policies, standards and best practices (e.g. open source frameworks) “Who”, “When”, “How Much” – implementation of specific initiatives, technologies, products with timelines, roles and responsibilities
  • 10. Copyright National University of Singapore 10 Example of Cyber Strategy Mission/Vision (Defining the Desired Outcomes in support of Biz goals) 1 Achieve the best in breed cybersecurity programs in support of business outcomes 2 Protect the organization’s assets from cyberattacks 3 Mitigate cyber risks to desired levels in accordance with the company risk appetite and tolerance Provide exceptional cybersecurity protection to our clients and business partners Align cybersecurity strategies across the enterprise 4 5
  • 11. Copyright National University of Singapore 11 Examples of Cybersecurity Strategic Objectives (Supporting the cyber mission/vision) 1 2 3 4 Adopt a risk-based asset protection regime Architect multi-layered security protection Integrate “security by design” into the operational & development process Increase cybersecurity awareness across the organisation 5 Determine future initiatives based on risk, threats, gaps, and performance Protect the organization’s assets from cyberattacks
  • 12. Copyright National University of Singapore 12 Examples of Cyber Strategy Principles (Use in the design of the architecture & development of programmes) CIA Triad Confidentiality, Integrity, and Availability Rapid Adaptability To address emerging threats, new technologies, and business models Defense in Depth Implement multilayered security mechanisms Diversity Use different products in the defensive layers Source: www.securereading.com
  • 13. Copyright National University of Singapore 13 Linking Strategy to Programme and Initiative (Example) Programme Implement a “Detection & Monitoring” program covering critical systems, networks and applications Initiative Deploy a SOC Setup a 24x7 Security Operations Centre (SOC) 1 Strategic Outcome Ability to monitor and be forewarn of impending attacks 2 3 3a 3b Perform Threat Analysis & Hunting Using the logs from the various security controls and end points that are sent to the SOC
  • 14. Copyright National University of Singapore 14 NIST Cyber Security Framework • A well regarded and commonly referenced framework that addresses cybersecurity concerns. Well suited as a valuable resource in the development of a cybersecurity strategy 5 cores, 23 categories, 108 sub-categories Version 2.0 is planned for release in early 2024. Will add “Governance” as a core capability amongst other improvements Programmes Source: https://csf.tools/reference/nist-cybersecurity-framework/v1-1/
  • 16. Copyright National University of Singapore 16 General Risk Management Process (1) Gather Information Open source info, commercial threat intel, expert opinions. Construct risk scenarios Evaluate and Analyse Risks Evaluate the likelihood (probability) and severity of the potential consequences/impact of each identified risk Risk Prioritisation Rank the risks based on their impact and likelihood 01 02 03 04 Identify Threats Potential to cause harm, disrupt operations, or negatively impact the organization. 05 Risk Response Determine how to address the risks i.e. which ones to accept, avoid, transfer or mitigate by comparing with organization’s risk appetite and tolerance
  • 17. Copyright National University of Singapore 17 General Risk Management Process (2) Implement Mitigation Strategies Making operational changes, updating procedures, investing in safety equipment, or training personnel. Monitor and Review Data collection, tracking incidents; comparing the actual outcomes with the predicted outcomes from the risk assessment. Update and Improve Continuously review and update your risk assessment as new information becomes available or as conditions change. 06 07 08 09 Develop Mitigation Strategies Include preventive, detective controls, risk transfer thru’ insurance etc 10 Communicate and Document Share the results of your risk assessment with relevant stakeholders. Proper documentation (using a risk register) is essential for transparency, accountability, and regulatory compliance. Addressing cyber risks through a Cybersecurity Strategy
  • 18. Copyright National University of Singapore 18 Examples of Relevant Risks at Different Stages of Digital Transformation
  • 19. Copyright National University of Singapore 19 Initiation Phase Financial Risk Budget Constraints: Inadequate funding can hinder the planning and initial stages. Strategic Risk Lack of Clear Strategy: Not having a well- defined digital transformation strategy can lead to directionless initiatives. 01 02 Organisation Risk Resistance to Change: Employees and stakeholders may resist changes, impacting adoption. 03
  • 20. Copyright National University of Singapore 20 Implementation Phase Cybersecurity Risk Data Security: As more data is digitized, the risk of data breaches and cyberattacks increases. 01 Technology Risk Technology Integration: Challenges in integrating new technologies with existing systems can disrupt operations 02 Project Risk Project Delays: Implementation delays can result from technical issues or unforeseen complexities. 03 Capability Risk Skills Gap: Insufficient staff expertise can hinder successful implementation. 04 Cybersecurity Risk - other then Data Security, other cybersecurity risks to consider will include, systems, networks and applications. All of the cyber risks need to be addressed in the cybersecurity strategy
  • 21. Copyright National University of Singapore 21 Steady State Phase Technology Risk Changing Technology Landscape: Rapid technological advancements can render current solutions obsolete. Scalability Risk Scalability Issues: As the organization grows, the digital infrastructure may struggle to scale effectively. Adoption Risk User Adoption: Sustaining user enthusiasm and adoption of new digital tools can be challenging. 01 02 03 04 Maintenance Risk Maintenance and Upkeep: Keeping newly implemented systems up to date and secure requires ongoing effort.
  • 23. Copyright National University of Singapore 23 National Level Cyber Strategy Foundational Enabler 1: Develop a Vibrant Cybersecurity Ecosystem Foundational Enabler 2: Grow a Robust Cyber Talent Pipeline Strategic Pillar 1 Build Resilient Infrastructure Strategic Pillar 2 Enable a Safer Cyberspace Strategic Pillar 3 Enhance International Cyber Cooperation CYBERSECURITY STRATEGY Singapore’s Cybersecurity Strategy: Launched in 2016, updated in 2021 Pillar 1 Defend critical infrastructure Shape market forces to drive security and resilience CYBERSECURITY STRATEGY Pillar 2 Disrupt and dismantle threat actors Pillar 3 Pillar 4 Invest in a resilient future Pillar 5 Forge international partnerships USA’s Cybersecurity Strategy: Launched in Mar 2023 Source: The Singapore Cybersecurity Strategy 2021 (csa.gov.sg) Source: National-Cybersecurity- Strategy-2023.pdf (whitehouse.gov)
  • 24. Copyright National University of Singapore 24 The Urgent Need for Cyber Security Professionals • The US and Singapore governments in their respective national cybersecurity strategies have rightly identified the need to boost the pool of cybersecurity trained personnel • NUS-ISS, as a premier training institution, working with our partners, fully supports the government’s drive to uplift the cybersecurity workforce of Singapore through the various cybersecurity courses and certifications that we have on offer. Extract from Singapore’s Cybersecurity Strategy Extract from USA’s Cybersecurity Strategy SG Initiative: Talent Devt Fund (NUS- CSA) build pipeline of cybersecurity talent
  • 25. Copyright National University of Singapore 25 Rounding Up …. Symbiotic relationship between cybersecurity and digital transformation is a paramount factor in shaping the future of our digital organizations. Cybersecurity is not merely a safeguard; it is an enabler of innovation, a protector of trust, and a guarantor of continuity. To implement cybersecurity effectively entails the implementation of a cybersecurity strategy to address risks Potential benefits of digital transformation are vast, but they come with an inherent set of risks that demand our constant attention and cybersecurity provides the oversight to address cyber risks