SlideShare a Scribd company logo
z
6.53
Cybersecurity and
National Security in
Southeast Asia
Benjamin Ang
Centre of Excellence for National Security
RSIS / NTU Singapore
Twitter @benjaminang
z
Key Questions
What are the greatest
concerns (cyber threats)?
What are the most
important weaknesses in
cyber security?
What initiatives are being
taken by countries in SEA
to build cyber resiliency?
z
Cyber Threats Facing Southeast Asia
(ASEAN)
3
Benjamin Ang | Centre of Excellence for National Security | RSIS
Cybersecurity and National Security
z
Incidents in ASEAN 2018-2019
 Singapore
 2,400 MINDEF/ SAF personnel,
by phishing a 3rd party vendor
 Singapore
 14,200 people diagnosed with
HIV, taken by ex-lover of a doctor
with access
 Thailand and Vietnam
 Toyota customer data, no details
given
 Philippines
 82,150 customers of Wendy’s
 Philippines
 900,000 customers of pawnshop
Cebuana
 Thailand
 45,000 customers of True Corp
mobile
 Malaysia
 46 million mobile subscribers’ data
 [source: CSO Online]
z
APTs and their targets in Asia
APT Target countries Target entities
FunnyDream
(C)
Malaysia, Philippines,
Thailand, Vietnam
High-level government
organisations; political parties
Platinum Indonesia, Malaysia,
Vietnam
Diplomatic and government
entities
Cycldek (C) Laos, Philippines,
Thailand, Vietnam
Government, defence, and
energy sectors
HoneyMyte Myanmar, Singapore,
Vietnam
Government organisations
Finspy Indonesia, Myanmar,
Vietnam
Individuals
PhantomLance Indonesia, Malaysia,
Vietnam
Entities
Zebrocy (R) Malaysia, Thailand Entities [source: Kaspersky]
Economic and
Geopolitical
intelligence
gathering
z
Cybercrime in ASEAN
INTERPOL ASEAN Cybercrime
Operations Desk reported
increase in 2019
 Botnets
 Phishing
 Business email compromise
(BEC)
 Banking malware
 Ransomware
 Cryptojacking
Vulnerability is due to
 Quicker digital transactions
 Greater internet connectivity
 Growing digital economies
 Asia becoming digital asset
hub
 Lacking cybersecurity
investment
 Low awareness
Source: INTERPOL
z
Cybercrime has risen since the
COVID-19 Pandemic started
 Sharp increase in Cybercrime
cases in Singapore 2019-
2020
 Global increase in
 COVID-19 themed phishing
emails impersonating
government and health
authorities
 Ransomware on hospitals
0
2000
4000
6000
8000
10000
12000
14000
16000
18000
2019 2020
Cybercrime Cases
2019 2020
Source: INTERPOL, CSA and CNA
z
z
ASEAN targets of phishing
8
Benjamin
Ang
Cybersecurity
and
National
Security
z
z
ASEAN
targets of
ransomware
9
z
Recent developments in ASEAN that
accelerated cyber threats
Changes
 Pandemic WFH + HBL
 Pandemic forced digital
transformation
 More IOT (Smart everything)
 US-China Great Power
Competition
Impact
 More targets online
 More data on insecure
systems
 More reliance on networks
 Impact on supply chains
Benjamin Ang | Centre of Excellence for National Security | RSIS
Cybersecurity and National Security
zChallenges and Weaknesses in ASEAN
Differences in
Concepts
• What is Cyber:
Technology or
Information?
• What are the
core values:
Freedom? Law
and order?
Differences in
Threat Perception
• Who is a Cyber
Threat?
• Can I tolerate
their actions
(e.g., breach,
espionage)?
Differences in
Cyber Maturity
• Who is in
charge?
• What Cyber
problem do I fix
first?
• What resources
or skills do I
have?
Benjamin Ang | Centre of Excellence for National Security | RSIS
Cybersecurity and National Security
z
ASEAN needs cyber
capacity building
 ASEAN needs Cyberspace, because
Digital Transformation can bring
economic progress for all Member
States
 BUT Member States have different
levels of cyber maturity
 Cyber attackers will attack ASEAN
through the weakest Member States
because of high connectivity
 Role of private sector?
z
What ASEAN is doing
Capacity Building
 ASEAN-Singapore Cyber Centre
of Excellence (US $22 million)
 ASEAN-Japan Cybersecurity
Capacity Building Centre in
Thailand
 ADMM Cyber and Information
Centre of Excellence (ACICE) in
Singapore
 UN-Singapore Cyber Diplomacy
Training
 ASEAN-Japan Cyber Capacity
Development Projects
Joint Exercises
 ACID Drill for CERTS
 ASEAN-Japan Cyber Exercises
 Sharing cyber threat information
(between CERTS)
 Contact list
Benjamin Ang | Centre of Excellence for National Security | RSIS
Cybersecurity and National Security
z
What next?
14
Southeast Asian states
 Are large and growing digital
markets
 Need cyber capacity building
 Want to balance Great
Powers
Who will step in?
Benjamin Ang | Centre of Excellence for National Security | RSIS
Cybersecurity and National Security
@benjaminang

More Related Content

What's hot

Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...
Benjamin Ang
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
ZaiffiEhsan
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
mohamed nasri
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)mmubashirkhan
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
Intellipaat
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
Adv Prashant Mali
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
Prachi Mishra
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
Theko Moima
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
Kumar Gaurav
 
Threat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert HurlbutThreat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert Hurlbut
DevSecCon
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
S.E. CTS CERT-GOV-MD
 
Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence Workshop
Priyanka Aash
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
Benjamin Ang
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Parab Mishra
 
Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddos
kalyan kumar
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Arshad Khan
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
Panda Security
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
Alex Rudie
 
Cyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General AudienceCyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General Audience
Tom K
 

What's hot (20)

Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)
 
Cyber security
Cyber securityCyber security
Cyber security
 
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
Threat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert HurlbutThreat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert Hurlbut
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
 
Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence Workshop
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddos
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
 
Cyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General AudienceCyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General Audience
 

Similar to Cybersecurity and National Security in Southeast Asia 2022.pdf

Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In India
IRJET Journal
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
xosap
 
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Benjamin Ang
 
Internet threats- How to protect the Africa consumer
 Internet threats- How to protect the Africa consumer  Internet threats- How to protect the Africa consumer
Internet threats- How to protect the Africa consumer
Self
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Benjamin Ang
 
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Benjamin Ang
 
Understanding Cyber Security Risks in Asia
Understanding Cyber Security Risks in AsiaUnderstanding Cyber Security Risks in Asia
Understanding Cyber Security Risks in Asia
Team Finland Future Watch
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa
Team Finland Future Watch
 
What's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - Cybersecurity
Row Murray
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
itnewsafrica
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Ivanti
 
188
188188
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook Kristin Judge
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity index
ShivamSharma909
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptx
Nakhoudah
 
Cybersecurity- Role of FinTech
Cybersecurity- Role of FinTech Cybersecurity- Role of FinTech
Cybersecurity- Role of FinTech
Harshit Verma
 
Infosecurity magazine webinar v2
Infosecurity magazine webinar v2Infosecurity magazine webinar v2
Infosecurity magazine webinar v2
Mark Skilton
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
GGV Capital
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
Business Finland
 

Similar to Cybersecurity and National Security in Southeast Asia 2022.pdf (20)

Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In India
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
 
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
 
Internet threats- How to protect the Africa consumer
 Internet threats- How to protect the Africa consumer  Internet threats- How to protect the Africa consumer
Internet threats- How to protect the Africa consumer
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
 
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
 
Understanding Cyber Security Risks in Asia
Understanding Cyber Security Risks in AsiaUnderstanding Cyber Security Risks in Asia
Understanding Cyber Security Risks in Asia
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa
 
presCyberNISC2015
presCyberNISC2015presCyberNISC2015
presCyberNISC2015
 
What's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - Cybersecurity
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
 
188
188188
188
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity index
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptx
 
Cybersecurity- Role of FinTech
Cybersecurity- Role of FinTech Cybersecurity- Role of FinTech
Cybersecurity- Role of FinTech
 
Infosecurity magazine webinar v2
Infosecurity magazine webinar v2Infosecurity magazine webinar v2
Infosecurity magazine webinar v2
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 

More from Benjamin Ang

International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...
Benjamin Ang
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdf
Benjamin Ang
 
Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...
Benjamin Ang
 
Technology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdfTechnology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdf
Benjamin Ang
 
Why Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdfWhy Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdf
Benjamin Ang
 
Cybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdfCybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdf
Benjamin Ang
 
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Benjamin Ang
 
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine NarrativesDisinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Benjamin Ang
 
Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...
Benjamin Ang
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the Law
Benjamin Ang
 
Contract law - an infographic view
Contract law - an infographic viewContract law - an infographic view
Contract law - an infographic view
Benjamin Ang
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Benjamin Ang
 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Benjamin Ang
 
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Benjamin Ang
 
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Benjamin Ang
 
Public education - enhancing the first line of defence against fake news - ...
Public education -   enhancing the first line of defence against fake news - ...Public education -   enhancing the first line of defence against fake news - ...
Public education - enhancing the first line of defence against fake news - ...
Benjamin Ang
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
Benjamin Ang
 
Internet Society Singapore Chapter AGM 2019 and update for 2020
Internet Society Singapore Chapter AGM 2019 and update for 2020Internet Society Singapore Chapter AGM 2019 and update for 2020
Internet Society Singapore Chapter AGM 2019 and update for 2020
Benjamin Ang
 
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Benjamin Ang
 
Introduction to ICT supply chain (Cyber norms awareness)
Introduction to ICT supply chain (Cyber norms awareness) Introduction to ICT supply chain (Cyber norms awareness)
Introduction to ICT supply chain (Cyber norms awareness)
Benjamin Ang
 

More from Benjamin Ang (20)

International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdf
 
Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...
 
Technology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdfTechnology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdf
 
Why Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdfWhy Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdf
 
Cybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdfCybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdf
 
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
 
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine NarrativesDisinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
 
Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the Law
 
Contract law - an infographic view
Contract law - an infographic viewContract law - an infographic view
Contract law - an infographic view
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
 
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
 
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
 
Public education - enhancing the first line of defence against fake news - ...
Public education -   enhancing the first line of defence against fake news - ...Public education -   enhancing the first line of defence against fake news - ...
Public education - enhancing the first line of defence against fake news - ...
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
 
Internet Society Singapore Chapter AGM 2019 and update for 2020
Internet Society Singapore Chapter AGM 2019 and update for 2020Internet Society Singapore Chapter AGM 2019 and update for 2020
Internet Society Singapore Chapter AGM 2019 and update for 2020
 
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
 
Introduction to ICT supply chain (Cyber norms awareness)
Introduction to ICT supply chain (Cyber norms awareness) Introduction to ICT supply chain (Cyber norms awareness)
Introduction to ICT supply chain (Cyber norms awareness)
 

Recently uploaded

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 

Recently uploaded (20)

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 

Cybersecurity and National Security in Southeast Asia 2022.pdf

  • 1. z 6.53 Cybersecurity and National Security in Southeast Asia Benjamin Ang Centre of Excellence for National Security RSIS / NTU Singapore Twitter @benjaminang
  • 2. z Key Questions What are the greatest concerns (cyber threats)? What are the most important weaknesses in cyber security? What initiatives are being taken by countries in SEA to build cyber resiliency?
  • 3. z Cyber Threats Facing Southeast Asia (ASEAN) 3 Benjamin Ang | Centre of Excellence for National Security | RSIS Cybersecurity and National Security
  • 4. z Incidents in ASEAN 2018-2019  Singapore  2,400 MINDEF/ SAF personnel, by phishing a 3rd party vendor  Singapore  14,200 people diagnosed with HIV, taken by ex-lover of a doctor with access  Thailand and Vietnam  Toyota customer data, no details given  Philippines  82,150 customers of Wendy’s  Philippines  900,000 customers of pawnshop Cebuana  Thailand  45,000 customers of True Corp mobile  Malaysia  46 million mobile subscribers’ data  [source: CSO Online]
  • 5. z APTs and their targets in Asia APT Target countries Target entities FunnyDream (C) Malaysia, Philippines, Thailand, Vietnam High-level government organisations; political parties Platinum Indonesia, Malaysia, Vietnam Diplomatic and government entities Cycldek (C) Laos, Philippines, Thailand, Vietnam Government, defence, and energy sectors HoneyMyte Myanmar, Singapore, Vietnam Government organisations Finspy Indonesia, Myanmar, Vietnam Individuals PhantomLance Indonesia, Malaysia, Vietnam Entities Zebrocy (R) Malaysia, Thailand Entities [source: Kaspersky] Economic and Geopolitical intelligence gathering
  • 6. z Cybercrime in ASEAN INTERPOL ASEAN Cybercrime Operations Desk reported increase in 2019  Botnets  Phishing  Business email compromise (BEC)  Banking malware  Ransomware  Cryptojacking Vulnerability is due to  Quicker digital transactions  Greater internet connectivity  Growing digital economies  Asia becoming digital asset hub  Lacking cybersecurity investment  Low awareness Source: INTERPOL
  • 7. z Cybercrime has risen since the COVID-19 Pandemic started  Sharp increase in Cybercrime cases in Singapore 2019- 2020  Global increase in  COVID-19 themed phishing emails impersonating government and health authorities  Ransomware on hospitals 0 2000 4000 6000 8000 10000 12000 14000 16000 18000 2019 2020 Cybercrime Cases 2019 2020 Source: INTERPOL, CSA and CNA
  • 8. z z ASEAN targets of phishing 8 Benjamin Ang Cybersecurity and National Security
  • 10. z Recent developments in ASEAN that accelerated cyber threats Changes  Pandemic WFH + HBL  Pandemic forced digital transformation  More IOT (Smart everything)  US-China Great Power Competition Impact  More targets online  More data on insecure systems  More reliance on networks  Impact on supply chains Benjamin Ang | Centre of Excellence for National Security | RSIS Cybersecurity and National Security
  • 11. zChallenges and Weaknesses in ASEAN Differences in Concepts • What is Cyber: Technology or Information? • What are the core values: Freedom? Law and order? Differences in Threat Perception • Who is a Cyber Threat? • Can I tolerate their actions (e.g., breach, espionage)? Differences in Cyber Maturity • Who is in charge? • What Cyber problem do I fix first? • What resources or skills do I have? Benjamin Ang | Centre of Excellence for National Security | RSIS Cybersecurity and National Security
  • 12. z ASEAN needs cyber capacity building  ASEAN needs Cyberspace, because Digital Transformation can bring economic progress for all Member States  BUT Member States have different levels of cyber maturity  Cyber attackers will attack ASEAN through the weakest Member States because of high connectivity  Role of private sector?
  • 13. z What ASEAN is doing Capacity Building  ASEAN-Singapore Cyber Centre of Excellence (US $22 million)  ASEAN-Japan Cybersecurity Capacity Building Centre in Thailand  ADMM Cyber and Information Centre of Excellence (ACICE) in Singapore  UN-Singapore Cyber Diplomacy Training  ASEAN-Japan Cyber Capacity Development Projects Joint Exercises  ACID Drill for CERTS  ASEAN-Japan Cyber Exercises  Sharing cyber threat information (between CERTS)  Contact list Benjamin Ang | Centre of Excellence for National Security | RSIS Cybersecurity and National Security
  • 14. z What next? 14 Southeast Asian states  Are large and growing digital markets  Need cyber capacity building  Want to balance Great Powers Who will step in? Benjamin Ang | Centre of Excellence for National Security | RSIS Cybersecurity and National Security @benjaminang