SlideShare a Scribd company logo
1 of 25
Cyber Resilience – Strengthening
Cybersecurity Posture & Preparedness
Philip Victor
Head of Market Development (APAC), (ISC)2
pvictor@isc2.org
The Threat Landscape in SE Asia
• Enterprises in Asia spent about $230 billion in
2014 to deal with issues caused by malware
deliberately loaded onto pirated software,
according to IDC and the National
University of Singapore.
– Of $230 billion: $59 billion to deal with security
issues
– $170 billion for data breaches
C-suite Attitude towards Security
A survey released in Nov 2014 by Vanson Bourne, sponsored by BT Global, reveals
that the wrong attitude about security, starting at the top and trickling downwards, is
putting organizations at serious risks.
Uptake of BYOD (Bring Your Own Device) and COPE (Corporately Owned
Personally-Enabled) devices at workplace
Strengthening Cyber Resilience
• Understand the security
architecture
• Access the environment
• Risk assessment
• Understand the business
• Monitor the environment
• Qualified, certified security
personnel
Understand Security Architecture
• Use of appropriate
technologies to
provide/protect
architecture
• Protect your
network
• Content inspection
Assess the Environment
• Risk Assessment
• Continuous Vulnerability
Assessment
Risk Assessment
Understand internal
(on premise) vs. use
of cloud solutions.
Understand Your Business
Monitor
People
People
• User Education/Awareness
• Qualified, Certified Security Personnel
• Ethics
DoD 8570 Approved Baseline
Certifications
DoD 8140
DoD 8140 model which is based on the U.S. National Institute of Standard and Technology
(NIST) National Initiative for Cybersecurity Education (NICE) standard
USA’s National Initiative for Cybersecurity
Education (NICE)
Cybersecurity Workforce Framework
Federal Information Security Management Act
CAP Domains:
• Risk Management Framework (RMF)
• Categorization of Information Systems
• Selection of Security Controls
• Security Control Implementation
• Security Control Assessment
• Information System Authorization
• Monitoring of Security Controls
Executive Order 13636
Cybersecurity Framework
NICCS Portal
NICF Framework in Singapore
• The National Infocomm Competency Framework
(NICF) developed by Infocomm Development
Authority of Singapore (iDA) and Singapore
Workforce Development Agency (WDA)
• The NICF Overview Map is a snapshot of the
Infocomm sector
• Serves as a reference for career progression and
corresponding training pathways leading to NICF
qualifications.
• Similar to DoD 8140 model
National Infocomm Competency
Framework Map
You can go to the interactive map to learn more
http://www.nicf.sg/NicfOverview/InteractiveMap.aspx
Infocomm Security
• Involves in
protecting
hardware,
software,
network and
services of an
organization
against
unauthorized
access,
modification,
destruction, or
disclosure
Global Academic Program
Education
Research
Outreach
Information security
professionals must be
highly adaptable in
learning and applying
new skills, technologies,
and procedures.
Critical Times Demand Critical Skills
Thank You
Philip Victor
Head of Market Development (APAC), (ISC)2
pvictor@isc2.org

More Related Content

What's hot

From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmPriyanka Aash
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalPriyanka Aash
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation centerMuhammad Sahputra
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)Ben Rothke
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
 
Security operation center
Security operation centerSecurity operation center
Security operation centerMuthuKumaran267
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1Priyanka Aash
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?manoharparakh
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation CenterS.E. CTS CERT-GOV-MD
 
Security architecture
Security architectureSecurity architecture
Security architectureDuncan Unwin
 
Sample network vulnerability analysis proposal
Sample network vulnerability analysis proposalSample network vulnerability analysis proposal
Sample network vulnerability analysis proposalDavid Sweigert
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityThe Open Group SA
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & BuildSameer Paradia
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 

What's hot (20)

From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
Security operation center
Security operation centerSecurity operation center
Security operation center
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
Security architecture
Security architectureSecurity architecture
Security architecture
 
Sample network vulnerability analysis proposal
Sample network vulnerability analysis proposalSample network vulnerability analysis proposal
Sample network vulnerability analysis proposal
 
Cyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in DepthCyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in Depth
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 

Viewers also liked

Deploying A Crisis Management and Business Continuity Approach to Product Tam...
Deploying A Crisis Management and Business Continuity Approach to Product Tam...Deploying A Crisis Management and Business Continuity Approach to Product Tam...
Deploying A Crisis Management and Business Continuity Approach to Product Tam...BCM Institute
 
Journey to cyber resilience
Journey to cyber resilienceJourney to cyber resilience
Journey to cyber resilienceAndrew Bycroft
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyScience of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyShawn Riley
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyAgus Wicaksono
 
Risk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection PowerpointRisk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection Powerpointrandalje86
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The BoardPaul Melson
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Phil Agcaoili
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boardsPaul McGillicuddy
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber SecurityFireEye, Inc.
 

Viewers also liked (14)

Deploying A Crisis Management and Business Continuity Approach to Product Tam...
Deploying A Crisis Management and Business Continuity Approach to Product Tam...Deploying A Crisis Management and Business Continuity Approach to Product Tam...
Deploying A Crisis Management and Business Continuity Approach to Product Tam...
 
Journey to cyber resilience
Journey to cyber resilienceJourney to cyber resilience
Journey to cyber resilience
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyScience of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis Methodology
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
 
Risk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection PowerpointRisk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection Powerpoint
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The Board
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boards
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 

Similar to Cyber Resilience - Strengthening Cybersecurity Posture

Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032PECB
 
Csc520 you are a senior level employee and you must tailor your deliverables ...
Csc520 you are a senior level employee and you must tailor your deliverables ...Csc520 you are a senior level employee and you must tailor your deliverables ...
Csc520 you are a senior level employee and you must tailor your deliverables ...leonardjonh145
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceNISIInstituut
 
risk assessment 27.docx
risk assessment 27.docxrisk assessment 27.docx
risk assessment 27.docxwrite5
 
Information Security Audit Consultant
Information Security Audit  ConsultantInformation Security Audit  Consultant
Information Security Audit Consultantdcs HH
 
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...lior mazor
 
Certified Information Systems Security Professional
Certified Information Systems Security ProfessionalCertified Information Systems Security Professional
Certified Information Systems Security ProfessionalHelen Njuguna
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_dsArun Gopinath
 
IDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSFDigital Bond
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network DefenderITpreneurs
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
Federal Cybersecurity: The latest challenges, initiatives and best practices
Federal Cybersecurity: The latest challenges, initiatives and best practicesFederal Cybersecurity: The latest challenges, initiatives and best practices
Federal Cybersecurity: The latest challenges, initiatives and best practicesJohn Gilligan
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Rightpvanwoud
 

Similar to Cyber Resilience - Strengthening Cybersecurity Posture (20)

Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
 
Datasheet
DatasheetDatasheet
Datasheet
 
Csc520 you are a senior level employee and you must tailor your deliverables ...
Csc520 you are a senior level employee and you must tailor your deliverables ...Csc520 you are a senior level employee and you must tailor your deliverables ...
Csc520 you are a senior level employee and you must tailor your deliverables ...
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
risk assessment 27.docx
risk assessment 27.docxrisk assessment 27.docx
risk assessment 27.docx
 
Information Security Audit Consultant
Information Security Audit  ConsultantInformation Security Audit  Consultant
Information Security Audit Consultant
 
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
 
Certified Information Systems Security Professional
Certified Information Systems Security ProfessionalCertified Information Systems Security Professional
Certified Information Systems Security Professional
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_ds
 
Move Inn Estates Case Study
Move Inn Estates Case StudyMove Inn Estates Case Study
Move Inn Estates Case Study
 
IDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech - Information security consulting
IDBI Intech - Information security consulting
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network Defender
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Federal Cybersecurity: The latest challenges, initiatives and best practices
Federal Cybersecurity: The latest challenges, initiatives and best practicesFederal Cybersecurity: The latest challenges, initiatives and best practices
Federal Cybersecurity: The latest challenges, initiatives and best practices
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Right
 

More from BCM Institute

Business Continuity and Resilience: What Lies in the Future and What Steps Ca...
Business Continuity and Resilience: What Lies in the Future and What Steps Ca...Business Continuity and Resilience: What Lies in the Future and What Steps Ca...
Business Continuity and Resilience: What Lies in the Future and What Steps Ca...BCM Institute
 
Enterprise Risk Management and Business Continuity: How Can They Work Togethe...
Enterprise Risk Management and Business Continuity: How Can They Work Togethe...Enterprise Risk Management and Business Continuity: How Can They Work Togethe...
Enterprise Risk Management and Business Continuity: How Can They Work Togethe...BCM Institute
 
Winning Over The Challenges of Implementing BCM in a BPO by Jeremias Astrero,...
Winning Over The Challenges of Implementing BCM in a BPO by Jeremias Astrero,...Winning Over The Challenges of Implementing BCM in a BPO by Jeremias Astrero,...
Winning Over The Challenges of Implementing BCM in a BPO by Jeremias Astrero,...BCM Institute
 
Operational and Business Continuity Management Strategy for Multi-type Nation...
Operational and Business Continuity Management Strategy for Multi-type Nation...Operational and Business Continuity Management Strategy for Multi-type Nation...
Operational and Business Continuity Management Strategy for Multi-type Nation...BCM Institute
 
Business Continuity Management in Healthcare by Dexter Chia, Director, GCOO's...
Business Continuity Management in Healthcare by Dexter Chia, Director, GCOO's...Business Continuity Management in Healthcare by Dexter Chia, Director, GCOO's...
Business Continuity Management in Healthcare by Dexter Chia, Director, GCOO's...BCM Institute
 
Does Your BCP Need A BCP - Outsourcing Business Continuity by Irene Lye, Ente...
Does Your BCP Need A BCP - Outsourcing Business Continuity by Irene Lye, Ente...Does Your BCP Need A BCP - Outsourcing Business Continuity by Irene Lye, Ente...
Does Your BCP Need A BCP - Outsourcing Business Continuity by Irene Lye, Ente...BCM Institute
 
The Evolving Role of BCM and its Importance in Any Industries by Dr Goh Moh H...
The Evolving Role of BCM and its Importance in Any Industries by Dr Goh Moh H...The Evolving Role of BCM and its Importance in Any Industries by Dr Goh Moh H...
The Evolving Role of BCM and its Importance in Any Industries by Dr Goh Moh H...BCM Institute
 
Experience Sharing - Risk Management, Crisis Management & BCM In An Education...
Experience Sharing - Risk Management, Crisis Management & BCM In An Education...Experience Sharing - Risk Management, Crisis Management & BCM In An Education...
Experience Sharing - Risk Management, Crisis Management & BCM In An Education...BCM Institute
 
Planning For The Haze by Jeremy Wong, , Senior Vice President of GMH Continui...
Planning For The Haze by Jeremy Wong, , Senior Vice President of GMH Continui...Planning For The Haze by Jeremy Wong, , Senior Vice President of GMH Continui...
Planning For The Haze by Jeremy Wong, , Senior Vice President of GMH Continui...BCM Institute
 
Challenges, Opportunities and Trends for BCM Profession by Dr Goh Moh Heng, P...
Challenges, Opportunities and Trends for BCM Profession by Dr Goh Moh Heng, P...Challenges, Opportunities and Trends for BCM Profession by Dr Goh Moh Heng, P...
Challenges, Opportunities and Trends for BCM Profession by Dr Goh Moh Heng, P...BCM Institute
 
DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...
DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...
DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...BCM Institute
 
Navigating The Path To BCM Excellence by Dr Suhazimah Dzazali, Deputy Directo...
Navigating The Path To BCM Excellence by Dr Suhazimah Dzazali, Deputy Directo...Navigating The Path To BCM Excellence by Dr Suhazimah Dzazali, Deputy Directo...
Navigating The Path To BCM Excellence by Dr Suhazimah Dzazali, Deputy Directo...BCM Institute
 
BCM Institute Course Schedule 2016
BCM Institute Course Schedule 2016BCM Institute Course Schedule 2016
BCM Institute Course Schedule 2016BCM Institute
 
Considerations for Developing Your Organisation’s Pandemic Plan by Jeremy Won...
Considerations for Developing Your Organisation’s Pandemic Plan by Jeremy Won...Considerations for Developing Your Organisation’s Pandemic Plan by Jeremy Won...
Considerations for Developing Your Organisation’s Pandemic Plan by Jeremy Won...BCM Institute
 
Pandemics & Infectious Diseases: Stepping Up Your Business Continuity Prepare...
Pandemics & Infectious Diseases: Stepping Up Your Business Continuity Prepare...Pandemics & Infectious Diseases: Stepping Up Your Business Continuity Prepare...
Pandemics & Infectious Diseases: Stepping Up Your Business Continuity Prepare...BCM Institute
 
Certified Crisis Management Professional Programme Brochure
Certified Crisis Management Professional Programme Brochure Certified Crisis Management Professional Programme Brochure
Certified Crisis Management Professional Programme Brochure BCM Institute
 
BCM Institute Malaysia Course Schedule 2015
BCM Institute Malaysia Course Schedule 2015 BCM Institute Malaysia Course Schedule 2015
BCM Institute Malaysia Course Schedule 2015 BCM Institute
 
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...BCM Institute
 
Stelios Aronis ISO 22301 BCMS Implementation and Sharing of BCM Best Practice...
Stelios Aronis ISO 22301 BCMS Implementation and Sharing of BCM Best Practice...Stelios Aronis ISO 22301 BCMS Implementation and Sharing of BCM Best Practice...
Stelios Aronis ISO 22301 BCMS Implementation and Sharing of BCM Best Practice...BCM Institute
 

More from BCM Institute (20)

Business Continuity and Resilience: What Lies in the Future and What Steps Ca...
Business Continuity and Resilience: What Lies in the Future and What Steps Ca...Business Continuity and Resilience: What Lies in the Future and What Steps Ca...
Business Continuity and Resilience: What Lies in the Future and What Steps Ca...
 
Enterprise Risk Management and Business Continuity: How Can They Work Togethe...
Enterprise Risk Management and Business Continuity: How Can They Work Togethe...Enterprise Risk Management and Business Continuity: How Can They Work Togethe...
Enterprise Risk Management and Business Continuity: How Can They Work Togethe...
 
Winning Over The Challenges of Implementing BCM in a BPO by Jeremias Astrero,...
Winning Over The Challenges of Implementing BCM in a BPO by Jeremias Astrero,...Winning Over The Challenges of Implementing BCM in a BPO by Jeremias Astrero,...
Winning Over The Challenges of Implementing BCM in a BPO by Jeremias Astrero,...
 
Operational and Business Continuity Management Strategy for Multi-type Nation...
Operational and Business Continuity Management Strategy for Multi-type Nation...Operational and Business Continuity Management Strategy for Multi-type Nation...
Operational and Business Continuity Management Strategy for Multi-type Nation...
 
Business Continuity Management in Healthcare by Dexter Chia, Director, GCOO's...
Business Continuity Management in Healthcare by Dexter Chia, Director, GCOO's...Business Continuity Management in Healthcare by Dexter Chia, Director, GCOO's...
Business Continuity Management in Healthcare by Dexter Chia, Director, GCOO's...
 
Does Your BCP Need A BCP - Outsourcing Business Continuity by Irene Lye, Ente...
Does Your BCP Need A BCP - Outsourcing Business Continuity by Irene Lye, Ente...Does Your BCP Need A BCP - Outsourcing Business Continuity by Irene Lye, Ente...
Does Your BCP Need A BCP - Outsourcing Business Continuity by Irene Lye, Ente...
 
The Evolving Role of BCM and its Importance in Any Industries by Dr Goh Moh H...
The Evolving Role of BCM and its Importance in Any Industries by Dr Goh Moh H...The Evolving Role of BCM and its Importance in Any Industries by Dr Goh Moh H...
The Evolving Role of BCM and its Importance in Any Industries by Dr Goh Moh H...
 
Experience Sharing - Risk Management, Crisis Management & BCM In An Education...
Experience Sharing - Risk Management, Crisis Management & BCM In An Education...Experience Sharing - Risk Management, Crisis Management & BCM In An Education...
Experience Sharing - Risk Management, Crisis Management & BCM In An Education...
 
Planning For The Haze by Jeremy Wong, , Senior Vice President of GMH Continui...
Planning For The Haze by Jeremy Wong, , Senior Vice President of GMH Continui...Planning For The Haze by Jeremy Wong, , Senior Vice President of GMH Continui...
Planning For The Haze by Jeremy Wong, , Senior Vice President of GMH Continui...
 
Challenges, Opportunities and Trends for BCM Profession by Dr Goh Moh Heng, P...
Challenges, Opportunities and Trends for BCM Profession by Dr Goh Moh Heng, P...Challenges, Opportunities and Trends for BCM Profession by Dr Goh Moh Heng, P...
Challenges, Opportunities and Trends for BCM Profession by Dr Goh Moh Heng, P...
 
DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...
DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...
DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...
 
Navigating The Path To BCM Excellence by Dr Suhazimah Dzazali, Deputy Directo...
Navigating The Path To BCM Excellence by Dr Suhazimah Dzazali, Deputy Directo...Navigating The Path To BCM Excellence by Dr Suhazimah Dzazali, Deputy Directo...
Navigating The Path To BCM Excellence by Dr Suhazimah Dzazali, Deputy Directo...
 
BCM Institute Course Schedule 2016
BCM Institute Course Schedule 2016BCM Institute Course Schedule 2016
BCM Institute Course Schedule 2016
 
Considerations for Developing Your Organisation’s Pandemic Plan by Jeremy Won...
Considerations for Developing Your Organisation’s Pandemic Plan by Jeremy Won...Considerations for Developing Your Organisation’s Pandemic Plan by Jeremy Won...
Considerations for Developing Your Organisation’s Pandemic Plan by Jeremy Won...
 
Pandemics & Infectious Diseases: Stepping Up Your Business Continuity Prepare...
Pandemics & Infectious Diseases: Stepping Up Your Business Continuity Prepare...Pandemics & Infectious Diseases: Stepping Up Your Business Continuity Prepare...
Pandemics & Infectious Diseases: Stepping Up Your Business Continuity Prepare...
 
Certified Crisis Management Professional Programme Brochure
Certified Crisis Management Professional Programme Brochure Certified Crisis Management Professional Programme Brochure
Certified Crisis Management Professional Programme Brochure
 
BCM Institute Malaysia Course Schedule 2015
BCM Institute Malaysia Course Schedule 2015 BCM Institute Malaysia Course Schedule 2015
BCM Institute Malaysia Course Schedule 2015
 
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
 
Bhakorn Vanuptikul
Bhakorn Vanuptikul Bhakorn Vanuptikul
Bhakorn Vanuptikul
 
Stelios Aronis ISO 22301 BCMS Implementation and Sharing of BCM Best Practice...
Stelios Aronis ISO 22301 BCMS Implementation and Sharing of BCM Best Practice...Stelios Aronis ISO 22301 BCMS Implementation and Sharing of BCM Best Practice...
Stelios Aronis ISO 22301 BCMS Implementation and Sharing of BCM Best Practice...
 

Recently uploaded

Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxmavinoikein
 
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...marjmae69
 
Anne Frank A Beacon of Hope amidst darkness ppt.pptx
Anne Frank A Beacon of Hope amidst darkness ppt.pptxAnne Frank A Beacon of Hope amidst darkness ppt.pptx
Anne Frank A Beacon of Hope amidst darkness ppt.pptxnoorehahmad
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@vikas rana
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringSebastiano Panichella
 
The Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationThe Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationNathan Young
 
PHYSICS PROJECT BY MSC - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC  - NANOTECHNOLOGYPHYSICS PROJECT BY MSC  - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC - NANOTECHNOLOGYpruthirajnayak525
 
James Joyce, Dubliners and Ulysses.ppt !
James Joyce, Dubliners and Ulysses.ppt !James Joyce, Dubliners and Ulysses.ppt !
James Joyce, Dubliners and Ulysses.ppt !risocarla2016
 
Event 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxEvent 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxaryanv1753
 
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular PlasticsDutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular PlasticsDutch Power
 
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸mathanramanathan2005
 
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.KathleenAnnCordero2
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSebastiano Panichella
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSebastiano Panichella
 
miladyskindiseases-200705210221 2.!!pptx
miladyskindiseases-200705210221 2.!!pptxmiladyskindiseases-200705210221 2.!!pptx
miladyskindiseases-200705210221 2.!!pptxCarrieButtitta
 
Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170Escort Service
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Krijn Poppe
 
Genshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxGenshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxJohnree4
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxFamilyWorshipCenterD
 

Recently uploaded (20)

Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptx
 
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
 
Anne Frank A Beacon of Hope amidst darkness ppt.pptx
Anne Frank A Beacon of Hope amidst darkness ppt.pptxAnne Frank A Beacon of Hope amidst darkness ppt.pptx
Anne Frank A Beacon of Hope amidst darkness ppt.pptx
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software Engineering
 
The Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationThe Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism Presentation
 
PHYSICS PROJECT BY MSC - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC  - NANOTECHNOLOGYPHYSICS PROJECT BY MSC  - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC - NANOTECHNOLOGY
 
James Joyce, Dubliners and Ulysses.ppt !
James Joyce, Dubliners and Ulysses.ppt !James Joyce, Dubliners and Ulysses.ppt !
James Joyce, Dubliners and Ulysses.ppt !
 
Event 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxEvent 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptx
 
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular PlasticsDutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
 
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
 
Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸
 
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation Track
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
 
miladyskindiseases-200705210221 2.!!pptx
miladyskindiseases-200705210221 2.!!pptxmiladyskindiseases-200705210221 2.!!pptx
miladyskindiseases-200705210221 2.!!pptx
 
Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
 
Genshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxGenshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptx
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
 

Cyber Resilience - Strengthening Cybersecurity Posture

  • 1.
  • 2. Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness Philip Victor Head of Market Development (APAC), (ISC)2 pvictor@isc2.org
  • 3.
  • 4. The Threat Landscape in SE Asia • Enterprises in Asia spent about $230 billion in 2014 to deal with issues caused by malware deliberately loaded onto pirated software, according to IDC and the National University of Singapore. – Of $230 billion: $59 billion to deal with security issues – $170 billion for data breaches
  • 5. C-suite Attitude towards Security A survey released in Nov 2014 by Vanson Bourne, sponsored by BT Global, reveals that the wrong attitude about security, starting at the top and trickling downwards, is putting organizations at serious risks. Uptake of BYOD (Bring Your Own Device) and COPE (Corporately Owned Personally-Enabled) devices at workplace
  • 6. Strengthening Cyber Resilience • Understand the security architecture • Access the environment • Risk assessment • Understand the business • Monitor the environment • Qualified, certified security personnel
  • 7. Understand Security Architecture • Use of appropriate technologies to provide/protect architecture • Protect your network • Content inspection
  • 8. Assess the Environment • Risk Assessment • Continuous Vulnerability Assessment
  • 9. Risk Assessment Understand internal (on premise) vs. use of cloud solutions.
  • 13. People • User Education/Awareness • Qualified, Certified Security Personnel • Ethics
  • 14. DoD 8570 Approved Baseline Certifications
  • 15. DoD 8140 DoD 8140 model which is based on the U.S. National Institute of Standard and Technology (NIST) National Initiative for Cybersecurity Education (NICE) standard
  • 16. USA’s National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework
  • 17. Federal Information Security Management Act CAP Domains: • Risk Management Framework (RMF) • Categorization of Information Systems • Selection of Security Controls • Security Control Implementation • Security Control Assessment • Information System Authorization • Monitoring of Security Controls
  • 20. NICF Framework in Singapore • The National Infocomm Competency Framework (NICF) developed by Infocomm Development Authority of Singapore (iDA) and Singapore Workforce Development Agency (WDA) • The NICF Overview Map is a snapshot of the Infocomm sector • Serves as a reference for career progression and corresponding training pathways leading to NICF qualifications. • Similar to DoD 8140 model
  • 21. National Infocomm Competency Framework Map You can go to the interactive map to learn more http://www.nicf.sg/NicfOverview/InteractiveMap.aspx
  • 22. Infocomm Security • Involves in protecting hardware, software, network and services of an organization against unauthorized access, modification, destruction, or disclosure
  • 24. Information security professionals must be highly adaptable in learning and applying new skills, technologies, and procedures. Critical Times Demand Critical Skills
  • 25. Thank You Philip Victor Head of Market Development (APAC), (ISC)2 pvictor@isc2.org