16 recommendations for better cybersecurity, digested from the 454 page COI (Committee of Inquiry) report on Singapore's biggest data breach to date (1.5 million patients' records), presented at Cyber Resilience and Risk Forum 2019, Singapore. Useful info for board directors, managers, CSOs, CISOs, cybersecurity professionals
Insight is one of the best security operation center that influences all the necessary things that reduce the advanced threats and security risk all over your company and protects your network infrastructure across the organization. https://insightmsp.co.in/soc-as-service.php
Threat intelligence is information that informs enterprise defenders of adversarial elements to stop them.
It is information that is relevant to the organization, has business value, and is actionable.
If you having all data and feeds then data alone isn’t intelligence.
#Threat #Intelligence #Forensics #ELK #Forensics #VAPT #SOC #SIEM #Incident #D3pak
Secrets to managing your Duty of Care in an ever- changing world.
How well do you know your risks?
Are you keeping up with your responsibilities to provide Duty of Care?
How well are you prioritising Cybersecurity initiatives?
Liability for Cybersecurity attacks sits with Executives and Board members who may not have the right level of technical security knowledge. This session will outline what practical steps executives can take to implement a Cybersecurity Roadmap that is aligned with its strategic objectives.
Led by Krist Davood, who has spent over 28 years implementing secure mission critical systems for executives. Krist is an expert in protecting the interconnectedness of technology, intellectual property and information systems, as evidenced through his roles at The Good Guys, Court Services Victoria and Schiavello.
The seminar will cover:
• Fiduciary responsibility
• How to efficiently deal with personal liability and the threat of court action
• The role of a Cybersecurity Executive Dashboard and its ability to simplify risk and amplify informed decision making
• How to identify and bridge the gap between your Cybersecurity Compliance Rating and the threat of court action
Insight is one of the best security operation center that influences all the necessary things that reduce the advanced threats and security risk all over your company and protects your network infrastructure across the organization. https://insightmsp.co.in/soc-as-service.php
Threat intelligence is information that informs enterprise defenders of adversarial elements to stop them.
It is information that is relevant to the organization, has business value, and is actionable.
If you having all data and feeds then data alone isn’t intelligence.
#Threat #Intelligence #Forensics #ELK #Forensics #VAPT #SOC #SIEM #Incident #D3pak
Secrets to managing your Duty of Care in an ever- changing world.
How well do you know your risks?
Are you keeping up with your responsibilities to provide Duty of Care?
How well are you prioritising Cybersecurity initiatives?
Liability for Cybersecurity attacks sits with Executives and Board members who may not have the right level of technical security knowledge. This session will outline what practical steps executives can take to implement a Cybersecurity Roadmap that is aligned with its strategic objectives.
Led by Krist Davood, who has spent over 28 years implementing secure mission critical systems for executives. Krist is an expert in protecting the interconnectedness of technology, intellectual property and information systems, as evidenced through his roles at The Good Guys, Court Services Victoria and Schiavello.
The seminar will cover:
• Fiduciary responsibility
• How to efficiently deal with personal liability and the threat of court action
• The role of a Cybersecurity Executive Dashboard and its ability to simplify risk and amplify informed decision making
• How to identify and bridge the gap between your Cybersecurity Compliance Rating and the threat of court action
Security Operations Center (SOC) Essentials for the SMEAlienVault
Closing the gaps in security controls, systems, people and processes is not an easy feat, particularly for IT practitioners in smaller organizations with limited budgets and few (if any) dedicated security staff. So, what are the essential security capabilities needed to establish a security operations center and start closing those gaps?
Join Javvad Malik of 451 Research and Patrick Bedwell, VP of Product Marketing at AlienVault for this session covering:
*Developments in the threat landscape driving a shift from preventative to detective controls
*Essential security controls needed to defend against modern threats
*Fundamentals for evaluating a security approach that will work for you, not against you
*How a unified approach to security visibility can help you get from install to insight more quickly
Building a Next-Generation Security Operations Center (SOC)Sqrrl
So, you need to build a Security Operations Center (SOC)? What does that mean? What does the modern SOC need to do? Learn from Dr. Terry Brugger, who has been doing information security work for over 15 years, including building out a SOC for a large Federal agency and consulting for numerous large enterprises on their security operations.
Watch the presentation with audio here: http://info.sqrrl.com/sqrrl-october-webinar-next-generation-soc
SOC presentation- Building a Security Operations CenterMichael Nickle
Presentation I used to give on the topic of using a SIM/SIEM to unify the information stream flowing into the SOC. This piece of collateral was used to help close the largest SIEM deal (Product and services) that my employer achieved with this product line.
From SIEM to SOC: Crossing the Cybersecurity ChasmPriyanka Aash
You own a SIEM, but to be secure, you need a Security Operations Center! How do you cross the chasm? Do you hire staff or outsource? And what skills are needed? Mike Ostrowski, a cybersecurity industry veteran, will review common pitfalls experienced through the journey from SIEM to SOC, the pros and cons of an all in-house SOC vs. outsourcing, and the benefits of a hybrid SOC model.
Learning Objectives:
1: You own a SIEM, but to be secure, you need a SOC. How do you cross the chasm?
2: What are the pros and cons of in-house, fully managed and hybrid security?
3: What considerations go into deciding whether to employ a hybrid strategy?
(Source: RSA Conference USA 2018)
Information Security Awareness, Petronas Marketing SudanAhmed Musaad
A two hours security awareness session that I presented for Petronas Marketing Sudan employees. The session includes -- but not limited to -- many topics like Passwords, Email Security, Social Networks Security, Physical Security, and Laptop Security.
You can use this as an introductory session for your security awareness training, but not as a sufficient one time session at all.
Your comments, feedback, and suggestions are much appreciated.
Advanced Persistent Threats (APTs) are a serious concern as they represent a threat to an organization’s intellectual property, financial assets and reputation. In some cases, these threats target critical infrastructure and government institutions, thereby threatening the country’s national security itself.
Talking about Next-Gen Security Operation Center for IDNIC+APJII as representative from IDSECCONF. People-Centric SOC requires lot of investment on human in terms of quantity and quality, unfortunately, (good) IT security people are getting rare these days. Organisation need to put their investments more on technology, as in Industry 4.0, machines are getting more advanced to support Human on doing continuous and repetitive task.
Moving from “traditional” to next-gen SOC require proper plan, thats what this talk was about.
Original air date: Aug. 29, 2017
Rebroadcast and recording info at http://www.mhmcpa.com
Cybercriminals don’t discriminate when it comes to valuable data. Not-for-profit organizations are just as vulnerable to technology-related risks as for-profit organizations. Robust cybersecurity and information technology controls can help not-for-profits keep sensitive information secure, and as data breaches become more common, information technology controls are increasingly vital to your operations.
In our webinar, we'll discuss some of the most common technology risks for not-for-profits and what management can do to mitigate those risks.
Security Operations Center (SOC) Essentials for the SMEAlienVault
Closing the gaps in security controls, systems, people and processes is not an easy feat, particularly for IT practitioners in smaller organizations with limited budgets and few (if any) dedicated security staff. So, what are the essential security capabilities needed to establish a security operations center and start closing those gaps?
Join Javvad Malik of 451 Research and Patrick Bedwell, VP of Product Marketing at AlienVault for this session covering:
*Developments in the threat landscape driving a shift from preventative to detective controls
*Essential security controls needed to defend against modern threats
*Fundamentals for evaluating a security approach that will work for you, not against you
*How a unified approach to security visibility can help you get from install to insight more quickly
Building a Next-Generation Security Operations Center (SOC)Sqrrl
So, you need to build a Security Operations Center (SOC)? What does that mean? What does the modern SOC need to do? Learn from Dr. Terry Brugger, who has been doing information security work for over 15 years, including building out a SOC for a large Federal agency and consulting for numerous large enterprises on their security operations.
Watch the presentation with audio here: http://info.sqrrl.com/sqrrl-october-webinar-next-generation-soc
SOC presentation- Building a Security Operations CenterMichael Nickle
Presentation I used to give on the topic of using a SIM/SIEM to unify the information stream flowing into the SOC. This piece of collateral was used to help close the largest SIEM deal (Product and services) that my employer achieved with this product line.
From SIEM to SOC: Crossing the Cybersecurity ChasmPriyanka Aash
You own a SIEM, but to be secure, you need a Security Operations Center! How do you cross the chasm? Do you hire staff or outsource? And what skills are needed? Mike Ostrowski, a cybersecurity industry veteran, will review common pitfalls experienced through the journey from SIEM to SOC, the pros and cons of an all in-house SOC vs. outsourcing, and the benefits of a hybrid SOC model.
Learning Objectives:
1: You own a SIEM, but to be secure, you need a SOC. How do you cross the chasm?
2: What are the pros and cons of in-house, fully managed and hybrid security?
3: What considerations go into deciding whether to employ a hybrid strategy?
(Source: RSA Conference USA 2018)
Information Security Awareness, Petronas Marketing SudanAhmed Musaad
A two hours security awareness session that I presented for Petronas Marketing Sudan employees. The session includes -- but not limited to -- many topics like Passwords, Email Security, Social Networks Security, Physical Security, and Laptop Security.
You can use this as an introductory session for your security awareness training, but not as a sufficient one time session at all.
Your comments, feedback, and suggestions are much appreciated.
Advanced Persistent Threats (APTs) are a serious concern as they represent a threat to an organization’s intellectual property, financial assets and reputation. In some cases, these threats target critical infrastructure and government institutions, thereby threatening the country’s national security itself.
Talking about Next-Gen Security Operation Center for IDNIC+APJII as representative from IDSECCONF. People-Centric SOC requires lot of investment on human in terms of quantity and quality, unfortunately, (good) IT security people are getting rare these days. Organisation need to put their investments more on technology, as in Industry 4.0, machines are getting more advanced to support Human on doing continuous and repetitive task.
Moving from “traditional” to next-gen SOC require proper plan, thats what this talk was about.
Original air date: Aug. 29, 2017
Rebroadcast and recording info at http://www.mhmcpa.com
Cybercriminals don’t discriminate when it comes to valuable data. Not-for-profit organizations are just as vulnerable to technology-related risks as for-profit organizations. Robust cybersecurity and information technology controls can help not-for-profits keep sensitive information secure, and as data breaches become more common, information technology controls are increasingly vital to your operations.
In our webinar, we'll discuss some of the most common technology risks for not-for-profits and what management can do to mitigate those risks.
The presentation I use to introduce the post-grad module on information security and governance I teach at Edinburgh Napier University. If you want to find out more, google for 'INF11109' on the napier.ac.uk site.
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
Everyone should now understand that no bank or financial institution is immune from cyber risk. Many are now ready to move forward with improving their cyber risk posture but do not know what to do next or how to prioritize their resources. Recognizing that cybersecurity is an overall business risk issue that must be properly managed to comply with many laws and regulations governing banks and financial institutions, this presentation will provide a strategy for how to better understand and manage such risks by:
(1) Providing an overview of the legal and regulatory framework;
(2) Examining the most likely real-world risks; and
(3) Providing strategies for how to manage such risks, including cyber insurance and the development and implementation of an appropriate cyber risk management program (which is not as difficult as it sounds).
Shawn E. Tuma, cybersecurity and data privacy attorney at Spencer Fane, LLP, delivered the presentation titled Cybersecurity: Cyber Risk Management for Banks & Financial Institutions (and Attorneys Who Represent Them) at the Southwest Association of Bank Counsel 42nd Annual Convention on September 20, 2018 (formerly, Texas Association of Bank Counsel).
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...RedZone Technologies
This webinar was developed in response to new developments with PCI 3.0, Omnibus HIPAA, BAAs, New Bank Regs, NCUA regs we reviewed important approaches to managing what I consider to be ground shaking changes with IT Security Processes, Capabilities, Communications, and Budgeting.
The content focused on what our customers are getting from regulators and banks as the deleterious effects of IT Security events over the past 12 months start to percolate into the market.
Topics :
1. How to Build Process Flows, Checklists, Reporting Structures, Assessment tools, to score IT Security risk for the CIO, CEO and Board.
2. How do you communicate risk across broad ranges of IT systems complexity accurately.
3. How to use a Scoreboard tool to communicate readiness of your IT Security Program from Tech staff, to CIO, to CEO and Board.
4. How do you balance IT Security risk and priorities so that decision makers can understand without losing them in the technical weeds.
5. How to simplify and manage your security architecture and design.
6. How to make managing security easily and simply when there is over lapping functionality?
7. How you can use these tools, processes, and risk scoring to build your IT Security Roadmap for 2015.
8. How to build a Data Governance and Risk communication plan for your IT Security portfolio.
Marked by record-breaking data breaches and an explosion of increasingly complex, sophisticated attacks, 2014 was challenging year for security professionals. Can the industry find relief in 2015? Bruce Schneier & Jon Oltsik evaluate how we did in 2014 from an incident response perspective, as well as offer predictions for what lies ahead in 2015.
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19Citrin Cooperman
To help not-for-profit entities protect their information during these unprecedented times, this webinar will cover challenges organizations face in preventing, detecting, and responding to cybersecurity-related activities. We discussed recent cyber breaches within not-for-profit organizations and considerations and actions you can take.
Georgie Collins and Dan Hedley, Irwin Mitchell LLP presented, "Data breaches and the law, a practical guide" at Flight East 2018. For more information on Black Duck by Synopsys, please visit our website at www.blackducksoftware.com.
APT or not - does it make a difference if you are compromised?Thomas Malmberg
This is my presentation from the Cyber Security Summit held in Prague 2015 at the Boscolo Prague Spa Hotel. For the missing slides and further information, contact me directly.
When a Data Breach Happens, What's Your Plan?Edge Pereira
Ashley Madison, Sony, Kapersky Labs, LastPass, CentreLink, G20 event in Brisbane…What do they all have in common? They were victims of data breaches. And as you probably know by now, some were handled better than others. In this session we will talk about strategies, from mitigation to handling, used when a data breach happens (not “if”) and what controls do we have if you are using Office 365.
A lecture given by Naor Penso to emergency & disaster management masters students @ Tel-Aviv University to educate them on cybersecurity crisis management.
Cybersecurity: Cyber Risk Management for Lawyers and ClientsShawn Tuma
Shawn E. Tuma, cybersecurity and data privacy attorney at Spencer Fane, LLP, delivered the presentation titled "Cybersecurity: Cyber Risk Management for Lawyers and Clients" at the Texas Bar CLE's 16th Annual Advanced Business Law Course on November 8, 2018.
Similar to Lessons learned from the SingHealth Data Breach COI Report (20)
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Benjamin Ang
Lecture on cybersecurity in ASEAN and Singapore
- Definitions of cybersecurity in ASEAN (vs western definitions)
- Cyber threat landscape in ASEAN / types of cyber incidents and cyber crime in ASEAN
Why ASEAN is vulnerable
- Characteristics of ASEAN in cyberspace
non-interference, sovereignty
non-attribution of cyber attackers
- ASEAN cooperation in cyberspace
AMCC (ASEAN Ministers Cyber Conference)
ACICE (ADMM Cyber Info Centre of Excellence)
INTERPOL
International Cooperation to Impose Consequences for Malicious Cyber Activity...Benjamin Ang
Session 4 - International Cooperation to Impose
Consequences on Malicious Cyber Activities
Many states are concerting joint efforts to impose costs for irresponsible behaviors in
cyberspace by sharing information, jointly disclosing attribution, or issuing joint statements with allies, partners, or like-minded states. Being aware of the importance of the roles played by private sectors for national cybersecurity, states are seeking ways to induce cooperation from private sectors as well.
Session 4 covers cooperation efforts at the international level for imposing consequences on irresponsible state behavior in cyberspace. Speakers are expected to address the following
points.
H. Introduce cases where costs for irresponsible state behavior in cyberspace are effectively
imposed with joint efforts among states.
I. Introduce cases where cooperation between private and public sectors has contributed to
impose costs for irresponsible state behavior in cyberspace.
J. Underscore specific areas where efforts for international cooperation need to be concerted
to effectively impose consequences for irresponsible state behavior in cyberspace.
[Panel]
Moderator: Caitriona Heinl (Azure Forum for Contemporary Security Strategy)
Speaker: James Lewis (Center for Strategic and International Studies)
Speaker: Benjamin Ang (Nanyang Technological University)
Speaker: Karsten Geier (Centre for Humanitarian Dialogue)
[12:00-13:30, KST (GMT+9)] Luncheon
Changing Domains - The Cyber Info Realm 2023.pdfBenjamin Ang
CYBERSPACE: A global domain within the information environment consisting of the interdependent networks of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.
Definition
Foreign interference occurs when a foreign entity (state or non-state actor),
with hostile intent,
takes actions to deliberately, covertly and deceptively
disrupt the politics and policies of the target state
Source: Fog of war: how the Ukraine conflict transformed the cyber threat landscape, published by Google TAG (Threat Analysis Group)
Overview
1. Russian government-backed attackers have engaged in an aggressive, multi-pronged effort to gain a decisive wartime advantage in cyberspace, often with mixed results.
2. Moscow has leveraged the full spectrum of IO – from overt state-backed media to covert platforms and accounts – to shape public perception of the war.
3. The invasion has triggered a notable shift in the Eastern European cybercriminal ecosystem that will likely have long term implications for both coordination between criminal groups and the scale of cybercrime worldwide.
Sources: Defending Ukraine: Early Lessons from the Cyber War (Microsoft)*
Defense against a military invasion now requires for most countries the ability to disburse and distribute digital operations and data assets across borders and into other countries.
Recent advances in cyber threat intelligence and end-point protection have helped Ukraine withstand a high percentage of destructive Russian cyberattacks.
As a coalition of countries has come together to defend Ukraine, Russian intelligence agencies have stepped up network penetration and espionage activities targeting allied governments outside Ukraine.
In coordination with these other cyber activities, Russian agencies are conducting global cyber-influence operations to support their war efforts.
This calls for a coordinated and comprehensive strategy to strengthen defenses against the full range of cyber destructive, espionage, and influence operations.
The Strontium group was targeting Ukrainian institutions, media organizations, and government institutions and think tanks in the United States and the European Union
Microsoft got court orders 16 times to redirect internet traffic from Strontium domains into a ‘sinkhole’
How to defend the information domain
Public coverage and exposure
Clear counter-messages
Legislation
Build media and digital literacy
Work with citizens, influencers
Detect and expose fake accounts
Active measures
Work strategically, not reactively
Build a strong narrative that is more attractive than the adversary
Cooperation between ASEAN military civil academic in international cybersecur...Benjamin Ang
3 areas of cooperation
Council for Security Cooperation in the Asia Pacific (CSCAP)
Track II Network of ASEAN Defence and Security Institutions (NADI)
UN OEWG Open-ended Working Group on security of and in the use of information and communications technologies
Council for Security Cooperation in the Asia Pacific (CSCAP)
non-governmental (second track) process for dialogue on security issues in the Asia Pacific
informal mechanism for scholars, officials and others in their private capacities
to discuss political and security issues and challenges facing the region
provides policy recommendations to inter-governmental bodies
convenes regional and international meetings
establishes linkages with institutions and organisations in other parts of the world
exchanges information, insights and experiences in the area of regional political-security cooperation.
Track II Network of ASEAN Defence and Security Institutions (NADI)
Secretariat is RSIS
Aims of the forum
network and to build confidence and familiarity among the Asean think tanks and research institutions to facilitate closer cooperation.
policy analysts specialising in defence and security issues, academics researching security cooperation and defence officials to discuss issues of security cooperation that the Asean Summit and Asean Defence Ministers have raised
participants to think beyond their governments’ positions and to provide timely fresh ideas and relevant recommendations for the Asean defence track to consider.
UN OEWG on Cyber
Open-ended Working Group on security of and in the use of information and communications technologies
The group is mandated to
further develop the rules, norms and principles of responsible behaviour of States;
consider initiatives of States aimed at ensuring security in the use of information and communications technologies;
establish, under the auspices of the United Nations, regular institutional dialogue with the broad participation of States;
continue to study, with a view to promoting common understandings, existing and potential threats in the sphere of information security, inter alia, data security, and possible cooperative measures to prevent and counter such threats, and how international law applies to the use of information and communications technologies by States,
as well as confidence-building measures and capacity-building.
Technology Disruption Digital Inclusion and the Law.pdfBenjamin Ang
What is technology disruption?
A new technology that changes
The way things are done
Expectations and behaviors
Market or industry
Uber/Grab vs taxi business
Airbnb vs hotel business
Netflix vs TV, DVD, cinemas
Blockchain vs financial institutions
Google vs books, libraries
ChatGPT vs Google
How can technology disrupt the Law?
DoNotPay
https://donotpay.com/
Bizibot
https://www.btlnet.co.uk/digital-transformation-solutions-overview/bizibot
WeVorce
https://www.wevorce.com
OCBC Online Will Generator
https://www.ocbc.com/personal-banking/lifegoals/willgenerator/#/
Transcripts
https://fortherecord.com/transcript-express/
Law firms using Blockchain
https://www.raconteur.net/technology/blockchain/blockchain-revolutionising-legal-sector/
LawGeex AI vs human lawyers, on reviewing standard contracts
Accuracy
Time taken to review contract
Courts used technology to deliver justice during COVID
But litigants with resources had the advantage
https://www.pewtrusts.org/en/research-and-analysis/reports/2021/12/how-courts-embraced-technology-met-the-pandemic-challenge-and-revolutionized-their-operations
Disruption has no ethics. But we do.
Must bridge the Digital Divide
Parties may need help
https://www.ncsc.org/__data/assets/pdf_file/0026/53738/PPP-Technology-Digital-Divide-Considerations.pdf
Using AI for judgments
Benefits
Exclude legally irrelevant factors
Standardise decisions
Help courts to prioritise cases, increase efficiency
Encourage parties to settle if success is predicted to be unlikely
https://www.cppr.in/articles/predictive-justice-using-ai-for-justice-introduction
Risks
Over reliance on machine decisions
Algorithmic bias: bad history = bad future
Bad data feedback into bad data
Inability to explain decisions: bad for rule of law
https://www.suls.org.au/citations-blog/2020/9/25/predictive-judicial-analytics-implications-for-rule-of-law-and-the-legal-profession
Cases of AI bias in justice system
COMPAS (for probation)
Black defendants were 2x wrongly predicted to be high risk of recidivism
White defendants were 2x wrongly predicted to be low risk of recidivism
Black defendants were 2x more likely to be misclassified as high risk of violent recidivism
White violent recidivists were 63% more likely to have been misclassified as low risk
https://www.propublica.org/article/how-we-analyzed-the-compas-recidivism-algorithm
Public Safety Assessment (for bail)
More likely to recommend high bail for males than females
https://venturebeat.com/ai/study-finds-crime-predicting-judicial-tool-exhibits-gender-bias/
How does this type of AI work?
How does this type of AI work?
Where did the ML (Machine Learning) come from?
Garbage In = Garbage Out
Always check what’s going in and what’s coming out
Rand Report on Protecting Individuals using tech in the Justice
Why Application of International Law Applies to ASEAN.pdfBenjamin Ang
There is no international definition of these concepts in cyberspace
Armed attack
Use of force
Act of war
Traditional definitions require physical damage or physical injury
Rules of Law of Armed Conflict / International Humanitarian Law(but in cyber?)
Distinction – must distinguish between civilians and military targets
Proportionality – must avoid excessive harm to civilians / objects
Military necessity – allows force that is reasonable, lawful (see above), and operationally justified
Limitation – prohibits tactics that cause unnecessary suffering
Humane treatment – e.g., of captured prisoners
Do we need a Binding Legal Instrument?
US - No new international legal instrument needed, can interpret existing law
China - States must reach international consensus, new international legal instruments
EU - No new international legal instrument needed, can interpret existing law
ASEAN chooses its own terms on norms/law
ASEAN supported both UNGGE and OEWG tracks in 2018 – Indonesia, Singapore, and the Philippines said both processes were not incompatible
ASEAN has always followed its instinct of creating an internationally agreed, rules-based order based on its own interests, which is consistent with other arenas where international law or rules are unsettled
ASEAN may even consider plurilateral treaties
What ASEAN states need to move forward
Common language related to cyberspace
Legislation that can be translated across members
Capacity building in
Cyber issues, policy making, critical infrastructure protection (ASCCE) and
Military operations (ADMM Cyber and Information COE)
Confidence building measures e.g., CERT-CERT communications, contact lists
More participation from states, academia, and civil society
What is Cybersecurity – C, I, A?
Cybersecurity or Information Security?
Activities of foreign political, economic, military, intelligence, and information entities
The striving of countries toward dominance in the world information space
Development (by states) of information war concepts that create means for dangerous attack on the information spheres of other countries
Infringing the state’s control over information flows and public opinion (called “cyber sovereignty”)
ASEAN leaders
Value the principles of “mutual respect” and “non-interference”
View sovereignty as sacrosanct principle among ASEAN member states
Do not define ‘sovereignty’ – this provides flexibility in foreign and domestic policy
ASEAN member states also attach great importance to the creation of an international rules-based order,
which includes forming and adhering to international law and norms.
like the UN Convention of the Law of the Sea or UNCLOS.
Lessons learned from Capacity Building on International Cyber Norms in Southe...Benjamin Ang
Capacity building is recognized as a key to promote the adoption and implementation of international norms of responsible state behaviour in cyberspace. States at varying levels of cyber maturity benefit from these efforts, to develop a shared understanding of how international cyber norms support the stability of cyberspace, and to grow their own capacity and capabilities to implement these norms. This presentation draws on the experiences of the academics and practitioners who have been conducting cyber capacity building activities in southeast Asia and beyond, to derive lessons of what has (or has not) worked, some potential best practices, and to provide suggestions on how cyber capacity building can provide more value to the further growth of international cyber norms in the world.
UNGGE 2015 Cyber Norms
UN Open Ended Working Group (UN OEWG)
UN Singapore Cyber Programme (UNSCP)
Norms Implementation Checklist
RAP Matrix
ASEAN Ministers Cyber Conference (AMCC)
Capacity building
Confidence Building Measures (CBMs)
Cybersecurity and Geopolitical Risk.pdfBenjamin Ang
Two mistaken views of Cybersecurity and Geopolitical Risk:
1. “It doesn’t affect me because I’m not a government entity or major target”
2. “There’s nothing I can do about it anyway”
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...Benjamin Ang
Slides from a talk given to Eunoia Junior College, Singapore
-------------------
Cyber Warfare questions
Are the concerns about cyber warfare overblown?
Why should young people care about cyber warfare?
What are the national/international systems or structures currently in place to protect us from cyber warfare? Are these protections adequate?
Considering that Singapore is a small country, is there really anything we can do in the face of the challenges posed by cyber warfare?
-------------------
Cybercrime Questions
How do scammers make Singaporeans lower their guard despite them already knowing that scams are prevalent in our society? Why do you think people still fall for scams?
By the time new types of scams are reported, new types of scams are already being created. How do you think the Singapore government can break this cycle?
How hard is it to find out criminals behind cyber attacks?
-----------
Information Operations questions
The Russo-Ukraine War, what are your thoughts on it being publicized on social media unlike many wars from the past?
Are there any political implications regarding the publication of the war on TikTok? Could posting the war on TikTok create any social issues?
Disinformation in Southeast Asia and Pro Russian Anti Ukraine NarrativesBenjamin Ang
Case studies of disinformation and misinformation from Southeast Asia including Asian examples of Pro-Russia Anti-Ukraine narratives at the start of the Russian invasion of the Ukraine. Presented at the Conference on Disinformation and Cybersecurity of the War Studies University, Warsaw Poland, in 2022. Refers to the RSIS Framework on Information, Influence and Interference, from the Centre of Excellence for National Security at the S Rajaratnam School of International Studies (RSIS) at Nanyang Technological University (NTU) Singapore
Foreign Interference and National Security - Law Society Public Law conferenc...Benjamin Ang
[ To read and download the Policy Report that this presentation is based on, see https://www.rsis.edu.sg/rsis-publication/cens/cases-of-foreign-interference-in-asia/ ]
The Public and International Law Committee of the Law Society of Singapore invites you to join us for the Public Law Conference 2021 which aims to promote interest in the administrative and constitutional law of Singapore, highlight new judicial decisions, and facilitate discussion of recent developments.
To be held online on 15 September, we are pleased to have the Minister for Home Affairs and Law, Mr K Shanmugam, deliver a keynote speech on the public law issues relating to online harms and foreign interference. These issues are important and topical as they have a significant impact on society today, not just in Singapore, but worldwide. This will be followed by a panel that will analyse and develop the themes raised in the keynote, as well as discuss possible solutions, including legislative solutions, to such issues, in the context of public law. The panellists will comprise the Honourable Minister himself, practitioners, legal officers and academics active in the fields of administrative and constitutional law.
This conference provides a platform to hear from legal experts, and for different sectors of the legal industry to share ideas. We hope it will be relevant to all legal practitioners, government decision-makers, public-sector policy makers, academics and law students interested in public law.
Technology Disruption in the New Normal, Digital Inclusion and the LawBenjamin Ang
Technology disruption has swept through legal practice and the justice system, as it has in every other aspect of life in our new normal of remote work and online access. While digital transformation has been hugely beneficial to our society, there are new legal and cybersecurity questions that we need to grapple with as we continue to serve the public. Among the public, varying levels of digital capability and access raise new issues of digital inclusion for us to address in policy and operations. This talk seeks to raise awareness of these issues and to develop ideas for practical application.
Infographic of the flow of Contract Law
Formation of Valid Contract
Offer, Acceptance, Consideration, Intention
Vitiating Factors which make a contract not valid
Misrepresentation, Mistake, Minor
Terms of Contract
Promises, Representations vs Warranties
Express vs Implied Terms
Discharge of Contract
Discharge by Breach - Actual and Anticipatory
Discharge by Agreement, Frustration of Contract
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Benjamin Ang
Covers 1. Cyber threats to ASEAN and recent incidents, 2. International Law relating to cyber conflict, Gaps in IHL and LOAC, 3. UN and ASEAN steps to prevent cyber warfare. Lecture for the National Defense College of the Philippines (NDCP), government’s highest center for education, training, and research on defense and national security, in the National Security Studies Program (NSSP) for Armed Forces of the Philippines (AFP) officers.
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Benjamin Ang
Lecture on the different cyber norms frameworks for responsible state behaviour in cyberspace - describing Paris Call, Charter of Trust, Microsoft Digital Geneva Convention, Tech Accord, GCSC, Shanghai SCO, UN GGE, UN OEWG - explaining each of the 11 cyber norms from the UN GGE 2015 meeting, and concluding with a case study on ASEAN's approach to international law in cyber operations
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Benjamin Ang
Lecture outline
1. Comparative analysis of cyber threats and their evolution in South East Asia
2. Digitization of critical infrastructure and growing security risks
3. Conceiving of and preparing for cyber warfare
Delivered to the French Institute for International Relations
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020Benjamin Ang
This public, 90-minute session examined the prevalence of cyber threats in the Indo-Pacific region based on some of the high-profile cyber-attacks and data leaks, as well as advanced persistent threat campaigns. It assessed the growing prominence of information warfare, especially in the current pandemic. The session highlighted the most common tactics, techniques and procedures used by malicious actors, and the countermeasures that governments and the private sector have undertaken to fortify their cyber defenses in the emerging data-driven economy. This session then examined the role played by the US and Singapore in enhancing regional cybersecurity as well as clarify the points of convergence and divergence between Singapore and the US to improve future cooperation.
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Benjamin Ang
lecture for Columbia University - Cyber Conflict and Cybersecurity in East Asia course (Prof Adam Segal) on the challenges for cybersecurity in South East Asia, and ASEAN efforts to develop robust cyber norms
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)Benjamin Ang
This lecture covers the The Legal Technology Vision which is a five-year roadmap to help the legal industry in Singapore to leverage technology to enhance their practice. It is also a call to action for legal technology providers to engage in public-private collaboration for the building of a legal tech ecosystem. You can find it at https://www.sal.org.sg/Resources-Tools/Legal-Technology-Vision
You can follow Benjamin Ang on Twitter for updates and commentary on technology policy and legal issues at http://twitter.com/benjaminang
Thinking of a career as a paralegal, lawyer, prosecutor, in-house counsel, or even outside the legal industry, or starting your own business as an entrepreneur? You'll be surprised what Legal Technology could mean for your future.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
2. PreviousNext
2
ICYMI
W h a t h a p p e n e d
1.5 million patients' non-medical personal data stolen
160,000 dispensed medicines' records taken
Including the Prime Minister
Singapore’s most serious
breach of public data to date
11. PreviousNext
11
#1
R e c o m m e n d a t i o n
• View Cybersecurity as a risk management issue,
and not only a technical issue
• Get top management to balance between security,
operational requirements, and cost.
• Adopt “defence-in-depth”
• Address gaps between policy and practice
Enhance security structure
and readiness
12. PreviousNext
12
#2
R e c o m m e n d a t i o n
• Identify gaps - map layers of the IT stack
• Get endpoint and network forensics
• Enhance network security to disrupt the
‘Command and Control’ and ‘Actions on Objective’
phases of the Cyber Kill Chain.
• Improve application security for email
Review the cyber stack
14. PreviousNext
14
#3
R e c o m m e n d a t i o n
• Improve cyber hygiene
• Security Awareness Programme
• Give IT staff with sufficient knowledge
Improve staff awareness
15. PreviousNext
15
#4
R e c o m m e n d a t i o n
• Conduct vulnerability assessments
• Safety reviews, evaluation, and certification of
vendor products
• Penetration testing
• Red teaming
• Threat hunting
Conduct enhanced
security checks
17. PreviousNext
17
#5
R e c o m m e n d a t i o n
• inventory
• two-factor authentication
• passphrases instead of passwords
• Password policies
• Centrally manage server local administrator
accounts across the IT network.
• Control service accounts with high privileges
Monitor privileged
admin accounts
18. PreviousNext
18
#6
R e c o m m e n d a t i o n
• Test regularly
• Define modes of communication
• Balance containment, remediation, and
eradication, and monitor the attacker, and
preserving evidence
• Set up Advanced Security Operation Centre or
Cyber Defence Centre
Improve incident response
19. PreviousNext
19
#7
R e c o m m e n d a t i o n
• Share threat intelligence
Partner between industry and
government
21. PreviousNext
21
#8
R e c o m m e n d a t i o n
Take security risk assessments
and audit processes seriously
22. PreviousNext
22
#9
R e c o m m e n d a t i o n
• Create a clear policy on confidentiality, integrity,
and accountability of sensitive records
• Monitor databases
• Restrict access to sensitive data
Protect sensitive records
23. PreviousNext
23
#10
R e c o m m e n d a t i o n
Secure domain controllers
• Harden operating system
• Limit login access
• Use two-factor authentication
24. PreviousNext
24
#11
R e c o m m e n d a t i o n
• Patch regularly
• Patch regularly
• Patch regularly
Patch regularly
26. PreviousNext
26
The incident response plan must clearly state that
an attempt to compromise a system is a
reportable security incident.
What is the problem here:
People, Process, or
Technology?
28. PreviousNext
28
“(I)n my view, when a security incident is reported,
this is not a trivial matter, and it activates a whole
team, including the Cluster ISO, GCIO and senior
management. Everyone will have to attend to the
security incident. If a security incident is declared
when it turns out there is no security incident,
this may look bad on the person who made the
declaration.”
Hann Kwang (Ernest’s reporting officer)
29. PreviousNext
29
“as mentioned, we need to isolate, contain and
defend first...our tightening by infra is not strong
enough.. even if we report now bring down the
experts, they'll say our tightening is not well
done...once we escalate to mgt, there will be no
day no night... everyone I meant everyone in IHiS
will be working non-stop on this case...”
Ernest the SIRM
30. PreviousNext
30
“In fact, I thought to myself, “If I report the matter,
what do I get?” If I report the matter, I will simply
get more people chasing me for more updates. If
they are chasing me for more updates, I need to
be able to get more information to provide to
them.”
Ernest the SIRM
31. PreviousNext
31
“I avoided reporting the matter as soon as it
occurred to me to report it, because the clock will
start ticking. Having to provide these updates on
these timelines puts a lot of pressure on my team -
CSA, CSG, MOH, IHiS and SingHealth senior
management, GCIO and CISO will all want more
information, and all of this pressure will be on my
team…”
Ernest the SIRM
34. PreviousNext
34
RESILIENCE
• Availability
• Switch to back up systems?
• Integrity
• Restore your back up data?
• Confidentiality
• How to restore Confidentiality?
• How will your BUSINESS bounce back?
Can you bounce back?