SlideShare a Scribd company logo
1 of 15
Dr. Ts. Aswami Ariffin
(Dr.AA)
SeniorVP, CSRS, CSM
President, DFRS
aswami@cybersecurity.my
#DigitalForensicsMalaysia
www.dfrs.my
Digital Transformation,
Risk and Cybersecurity
Initiatives in Malaysia
Copyright © 2021 CSM & DFRS
Digital 2021 April Statshot Report — DataReportal – Global Digital Insights
MALAYSIA
WE ARE MOVING INTO A MORE INTERCONNECTED CYBERSPACE
Copyright © 2021 CSM & DFRS
#Digital Economy, Digital Transformation &
Smart City
Copyright © 2021 CSM & DFRS
#Digital Risk & “Cyber Flood Gate”
Copyright © 2021 CSM & DFRS
CYBER TERRORISM
NATION-STATES CYBER-ATTACKS
CYBERCRIMINALS
HACKTIVIST
INSIDER THREATS
PRANKSTER
CYBER THREATS BECOMING MORE
ACTIVE AND EVOLVING
THE MORE WE’RE INTERCONNECTED TO THE CYBER
SPACE
THE MORE WE ARE AT RISK TO CYBER THREATS
Copyright © 2021 CSM & DFRS
#Cyber Defence Strategy
{CyberFIT (people), CyberACT (process), CyberDEF (technology/services)}
Copyright © 2021 CSM & DFRS
Copyright © 2021 CSM & DFRS
Effective Governance
and Management
Strengthening
Legislative Framework
and Enforcement Catalyzing World Class
Innovation, Technology,
R&D and Industry
• Enhancing National Cyber
Security Governance and
Ecosystem
• Improving Organization
Management and
Business Operation
(Government, CNII and
Business)
• Strengthening Cyber
Security Incident
Management and Active
Cyber Defence
• Enhancing Malaysia’s
Cyber Laws to Address
Current and Emerging
Threats
• Enhancing the Capacity
and Capability of
Cybercrime
Enforcement
• Spurring National Cyber
Security R&D Programmed
• Promoting a Competitive
Local Industry and
Technology
Enhancing Capacity &
Capability Building,
Awareness and Education
• Enhancing National Cyber
Security Capacity and
Capability Building
• Enhancing Cyber Security
Awareness
• Nourishing Cyber Security
Knowledge Through Education
StrengtheningGlobal
Collaboration
• Strengthening
International Collaboration
and Cooperation in Cyber
Security Affairs
• Demonstrating Malaysia's
Commitment in Promoting
Secure, Stable and
Peaceful Cyberspace to
Uphold International
Security
5 PILLARS
12 Strategies
ADDRESSING DATA
PROTECTION THROUGH
POLICY
#CSM Vision & Mission
• Provision of quality and impactful services
• Frontier-expanding cyber knowledge and technical
supremacy
• Continuous nurturing of talent and expertise
VISION World-class cyber security specialist agency
MISSION Leading the development of a safer and more resilient
cyber ecosystem to enhance national security,
economic prosperity and social harmony through
Copyright © 2021 CSM & DFRS
VISION
To produce a high-quality research and
development through strong coordination of
digital forensics academia and industry
practitioners
MISSION
To provide a sharing platform among the
academia and industry practitioners in
digital forensics research and development
#DFRS Vision & Mission
Copyright © 2021 CSM & DFRS
#Cyber Defence Strategy
{CyberFIT (people), CyberACT (process), CyberDEF (technology/services)}
Copyright © 2021 CSM & DFRS
#Cyber Defence Strategy
{CyberFIT (people), CyberACT (process), CyberDEF (technology/services)}
Copyright © 2021 CSM & DFRS
#Cyber Defence Strategy
{CyberFIT (people), CyberACT (process), CyberDEF (technology/services)}
Copyright © 2021 CSM & DFRS
CYBERSAFE program is primarily
carried out by CyberSecurity
Malaysia focusing
public awareness
on increasing
and knowledge
on cyber safety and how to mitigate
online threats.
Sharing Tips for
Youth, Parents, Kids
and Organisations
Copyright © 2021 CSM & DFRS
CONCLUSION
and
WAY FORWARD
v To prevent bigger cybersecurity problems.
There is a need to ensure for a secure, resilient and
trusted cyber environment in order to sustain
progression and prosperity. In this regards, a more
innovative and proactive adaptive security
approach is required to address such situations.
Adaptive cybersecurity encompasses predictive,
detective, responsive and corrective capabilities.
v In addition, our approach also has to be adaptive,
dynamic and innovative covering people, process
and technology.
v Strengthening Public-Private-Academia Partnership
and International Collaboration.
v Being prepared is the key; coordination.
v Awareness is vital for individuals.
Copyright © 2021 CSM & DFRS
https://my.linkedin.com/in/dr-ts-
aswami-ariffin-dr-aa-b0814120
https://twitter.com/drasw
amiariffin?lang=en
#Thank You
Copyright © 2021 CSM & DFRS

More Related Content

Similar to Digital Cyber Risk Security Malaysia.pptx

40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
TopCyberNewsMAGAZINE
 
Building Cybersecurity Ecosystems in Africa: A Prescription for Resilience
Building Cybersecurity Ecosystems in Africa: A Prescription for ResilienceBuilding Cybersecurity Ecosystems in Africa: A Prescription for Resilience
Building Cybersecurity Ecosystems in Africa: A Prescription for Resilience
Moses Kemibaro
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)
Rhys A. Mossom
 
Top Cyber News MAGAZINE. Dr. Bradford L. Sims. Capitol Technology University
Top Cyber News MAGAZINE. Dr. Bradford L. Sims. Capitol Technology UniversityTop Cyber News MAGAZINE. Dr. Bradford L. Sims. Capitol Technology University
Top Cyber News MAGAZINE. Dr. Bradford L. Sims. Capitol Technology University
TopCyberNewsMAGAZINE
 

Similar to Digital Cyber Risk Security Malaysia.pptx (20)

Insights success the 10 most trusted cyber security companies in 2nd nov 2017
Insights success the 10 most trusted cyber security companies in 2nd nov 2017Insights success the 10 most trusted cyber security companies in 2nd nov 2017
Insights success the 10 most trusted cyber security companies in 2nd nov 2017
 
The 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providersThe 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providers
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
 
Building Cybersecurity Ecosystems in Africa: A Prescription for Resilience
Building Cybersecurity Ecosystems in Africa: A Prescription for ResilienceBuilding Cybersecurity Ecosystems in Africa: A Prescription for Resilience
Building Cybersecurity Ecosystems in Africa: A Prescription for Resilience
 
CDS_2015_PER(1)
CDS_2015_PER(1)CDS_2015_PER(1)
CDS_2015_PER(1)
 
Cybersecurity in Sudan: Challenges & Opportunities
Cybersecurity in Sudan: Challenges & OpportunitiesCybersecurity in Sudan: Challenges & Opportunities
Cybersecurity in Sudan: Challenges & Opportunities
 
2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew Rosenquist2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew Rosenquist
 
securing-the-digital-frontier-a-guide-to-cyber-security
securing-the-digital-frontier-a-guide-to-cyber-securitysecuring-the-digital-frontier-a-guide-to-cyber-security
securing-the-digital-frontier-a-guide-to-cyber-security
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
Personal Digital Hygiene
Personal Digital HygienePersonal Digital Hygiene
Personal Digital Hygiene
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)
 
India's Leading Cyber Security Companies to Watch.pdf
India's Leading Cyber Security Companies to Watch.pdfIndia's Leading Cyber Security Companies to Watch.pdf
India's Leading Cyber Security Companies to Watch.pdf
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
 
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdf
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdfMost Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdf
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdf
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Best Of 5 Cyber Forensic Companies.pdf
Best Of 5 Cyber Forensic Companies.pdfBest Of 5 Cyber Forensic Companies.pdf
Best Of 5 Cyber Forensic Companies.pdf
 
Top Cyber News MAGAZINE. Dr. Bradford L. Sims. Capitol Technology University
Top Cyber News MAGAZINE. Dr. Bradford L. Sims. Capitol Technology UniversityTop Cyber News MAGAZINE. Dr. Bradford L. Sims. Capitol Technology University
Top Cyber News MAGAZINE. Dr. Bradford L. Sims. Capitol Technology University
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information security
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Digital Cyber Risk Security Malaysia.pptx

  • 1. Dr. Ts. Aswami Ariffin (Dr.AA) SeniorVP, CSRS, CSM President, DFRS aswami@cybersecurity.my #DigitalForensicsMalaysia www.dfrs.my Digital Transformation, Risk and Cybersecurity Initiatives in Malaysia Copyright © 2021 CSM & DFRS
  • 2. Digital 2021 April Statshot Report — DataReportal – Global Digital Insights MALAYSIA WE ARE MOVING INTO A MORE INTERCONNECTED CYBERSPACE Copyright © 2021 CSM & DFRS
  • 3. #Digital Economy, Digital Transformation & Smart City Copyright © 2021 CSM & DFRS
  • 4. #Digital Risk & “Cyber Flood Gate” Copyright © 2021 CSM & DFRS
  • 5. CYBER TERRORISM NATION-STATES CYBER-ATTACKS CYBERCRIMINALS HACKTIVIST INSIDER THREATS PRANKSTER CYBER THREATS BECOMING MORE ACTIVE AND EVOLVING THE MORE WE’RE INTERCONNECTED TO THE CYBER SPACE THE MORE WE ARE AT RISK TO CYBER THREATS Copyright © 2021 CSM & DFRS
  • 6. #Cyber Defence Strategy {CyberFIT (people), CyberACT (process), CyberDEF (technology/services)} Copyright © 2021 CSM & DFRS
  • 7. Copyright © 2021 CSM & DFRS Effective Governance and Management Strengthening Legislative Framework and Enforcement Catalyzing World Class Innovation, Technology, R&D and Industry • Enhancing National Cyber Security Governance and Ecosystem • Improving Organization Management and Business Operation (Government, CNII and Business) • Strengthening Cyber Security Incident Management and Active Cyber Defence • Enhancing Malaysia’s Cyber Laws to Address Current and Emerging Threats • Enhancing the Capacity and Capability of Cybercrime Enforcement • Spurring National Cyber Security R&D Programmed • Promoting a Competitive Local Industry and Technology Enhancing Capacity & Capability Building, Awareness and Education • Enhancing National Cyber Security Capacity and Capability Building • Enhancing Cyber Security Awareness • Nourishing Cyber Security Knowledge Through Education StrengtheningGlobal Collaboration • Strengthening International Collaboration and Cooperation in Cyber Security Affairs • Demonstrating Malaysia's Commitment in Promoting Secure, Stable and Peaceful Cyberspace to Uphold International Security 5 PILLARS 12 Strategies ADDRESSING DATA PROTECTION THROUGH POLICY
  • 8. #CSM Vision & Mission • Provision of quality and impactful services • Frontier-expanding cyber knowledge and technical supremacy • Continuous nurturing of talent and expertise VISION World-class cyber security specialist agency MISSION Leading the development of a safer and more resilient cyber ecosystem to enhance national security, economic prosperity and social harmony through Copyright © 2021 CSM & DFRS
  • 9. VISION To produce a high-quality research and development through strong coordination of digital forensics academia and industry practitioners MISSION To provide a sharing platform among the academia and industry practitioners in digital forensics research and development #DFRS Vision & Mission Copyright © 2021 CSM & DFRS
  • 10. #Cyber Defence Strategy {CyberFIT (people), CyberACT (process), CyberDEF (technology/services)} Copyright © 2021 CSM & DFRS
  • 11. #Cyber Defence Strategy {CyberFIT (people), CyberACT (process), CyberDEF (technology/services)} Copyright © 2021 CSM & DFRS
  • 12. #Cyber Defence Strategy {CyberFIT (people), CyberACT (process), CyberDEF (technology/services)} Copyright © 2021 CSM & DFRS
  • 13. CYBERSAFE program is primarily carried out by CyberSecurity Malaysia focusing public awareness on increasing and knowledge on cyber safety and how to mitigate online threats. Sharing Tips for Youth, Parents, Kids and Organisations Copyright © 2021 CSM & DFRS
  • 14. CONCLUSION and WAY FORWARD v To prevent bigger cybersecurity problems. There is a need to ensure for a secure, resilient and trusted cyber environment in order to sustain progression and prosperity. In this regards, a more innovative and proactive adaptive security approach is required to address such situations. Adaptive cybersecurity encompasses predictive, detective, responsive and corrective capabilities. v In addition, our approach also has to be adaptive, dynamic and innovative covering people, process and technology. v Strengthening Public-Private-Academia Partnership and International Collaboration. v Being prepared is the key; coordination. v Awareness is vital for individuals. Copyright © 2021 CSM & DFRS