During the ConnectGov Leader Summit held in Bhutan earlier this year, a panel of CIOs and technology partners came together to discuss pertinent issues in security as CIOs look to ride the wave of disruption in their own industries.
Businesses are being urged to share information on cyber attacks so that others can identify similar methods of digital incursions.
âIndustry will collectively benefit from this exchangeâ, said Mr. Sean Duca of Palo Alto Networks.
âCyber criminals are already sharing information like attack methods and vulnerabilities among themselves. They are benefitting from this exchange. So why donât businesses do the same to fight them?â Mr. Duca continued, he was a panelist on cyber security held at the recent ConnectGov summit in Bhutan.
Chief executive officer of CyberSecurity Malaysia Dr. Amirudin bin Abdul Wahab stressed that no one can work alone in cyber security.
âYou need to share information, threat intelligence, and situational awareness so that everyone gets a bigger picture of whatâs happening. Then you can start protecting yourself,â said Dr. Amirudin who was also on the cyber security panel.
Other panelists were Mr. Kunal Sehgal, head of Information Security for Schroders, Asia Pacific; Mr Murari Kalyanaramani, head of information security at a global bank; Mr Leonard Kleinman, RSAâs chief cyber security advisor Asia-Pacific and Japan; and Ms Cynthia Lee, regional director, Asean for CyberArk and Mr Derek Gooh, chief information security officer of Singaporeâs Ministry of National Development. The panel was moderated by Dr. Madan Oberoi, director for cyber innovation and outreach, Interpol Global Complex for Innovation, which is headquartered in Singapore. The topic of discussion was Re-thinking Cyber Security.
Security â Fighting the Invisible Beast.
According to Juniper research, the rapid digitisation of consumersâ lives and enterprise records will increase the cost of data breaches to US$2.1 trillion globally by 2019, up by almost four times the estimated cost of breaches in 2015.
âWhat cyber criminals are looking to steal are personal details of consumers.â, said Mr. Sehgal. For example, the Dark Web offers credit card information for US$5 each while personal details are worth US$1 each.
Given this scenario, the panelists suggested different ways companies could safeguard themselves. Mr. Kalyanaramani identified broadening threat intelligence as a way to identify potential attacks.
âWe need some common sense. Not everything is a technical threat. You also need a high level of situational awareness of whatâs happening outside the organization that can impact your companyâs information security well-being,â he suggested, and continued to encourage the group, âWork with different departments like the corporate affairs team to highlight events of interest.â
âIs there a large population of consumers complaining against the company, will it have the potential to escalate the threat level against the organisation? Are there moral issues with external that could the attention of hackers?â
âIn mergers and acquisitions activities, is the organization investing in a company whose projects are objectionable to others? For example, if the company being acquired is potentially destroying the environment, then an environmental group may decide to hack you,â he said.
RSAâs Mr. Kleinman reiterated that getting visibility on potential threats allow security defenders to make informed decisions on protection. âAnother factor organisations should focus on is the security hygiene factor,â said Mr. Gooh of Singaporeâs Ministry of National Development. “About 70 percent of his teamâs time is spent on doing boring but critical stuff like ensuring anti-virus software is up-to-date and patching of security holes in software. Time is also spent educating users not to download software and information from unauthorized sites and to ensure that the USB ports on employeesâ computers are locked down”, he added. He believes that attacks are inevitable so response capability is crucial.
âWhen the attack happens, how do you respond to limit impact? Organisations need to conduct table-top exercises so that when attacks happen, everyone knows how to react,â he added.
“Looking forward, it is important for organisations to do something different in cyber security”, said Mr. Duca.
âIn this instance, Singapore has taken a rare and unusual step to unhook 100,000 public servants from the Internet from May next yearâ, said Mr. Gooh. Their work computers will not be connected to the Internet but they will be given terminals to access the Internet. They can also access the Internet from their own private devices.
In an earlier TV report on Channel News Asia, Singapore Prime Minister Lee Hsien Loong had revealed that the Republic has seen very sophisticated attacks on the Governmentâs Internet system. The threats have become even more severe, he added. Which is why the Government is making the move after having put it off for as long as possible.
The blocking of Internet access or providing an âair gapâ between government networks and the Internet is not new. Singapore Ministry of Defence implemented this process many years ago. âCompanies should also identify what are their digital crown jewelsâ, said CyberArkâs Ms. Lee.
âData is the new crown jewel. But companies are still protecting personal identities when there has been a shift to data which is increasingly being used by businesses for competitive advantage,â she said.
However, cyber security ultimately boils down to people who are the weakest link in the cyber security defence.
Mr. Gooh highlighted: âGovernments can do what they can for the public sector. There also needs to be a cyber crime action plan to educate all citizens so that people can use the Internet safely.â âSingapore will be beefing up the scam alerts as well as strengthen the regulations. Cyber crime is transnational and it is important to ensure laws remain relevant.â
Closing the discussion, Interpolâs Dr. Oberoi singled out information sharing s as a powerful way to combat cyber crimes.
Sharing can begin with vertical industries and then spread to across all industries, he said.
âIt is not the breach that companies need to know. How did the intruders invade the networks, what did they do, which servers and data centers did they attack? Such information is useful because it paints a picture of the attacker. Other companies can use this picture to identify potential culprits.â
By CIO Academy Asia