SlideShare une entreprise Scribd logo
1  sur  25
Cyber Resilience – Strengthening
Cybersecurity Posture & Preparedness
Philip Victor
Head of Market Development (APAC), (ISC)2
pvictor@isc2.org
The Threat Landscape in SE Asia
• Enterprises in Asia spent about $230 billion in
2014 to deal with issues caused by malware
deliberately loaded onto pirated software,
according to IDC and the National
University of Singapore.
– Of $230 billion: $59 billion to deal with security
issues
– $170 billion for data breaches
C-suite Attitude towards Security
A survey released in Nov 2014 by Vanson Bourne, sponsored by BT Global, reveals
that the wrong attitude about security, starting at the top and trickling downwards, is
putting organizations at serious risks.
Uptake of BYOD (Bring Your Own Device) and COPE (Corporately Owned
Personally-Enabled) devices at workplace
Strengthening Cyber Resilience
• Understand the security
architecture
• Access the environment
• Risk assessment
• Understand the business
• Monitor the environment
• Qualified, certified security
personnel
Understand Security Architecture
• Use of appropriate
technologies to
provide/protect
architecture
• Protect your
network
• Content inspection
Assess the Environment
• Risk Assessment
• Continuous Vulnerability
Assessment
Risk Assessment
Understand internal
(on premise) vs. use
of cloud solutions.
Understand Your Business
Monitor
People
People
• User Education/Awareness
• Qualified, Certified Security Personnel
• Ethics
DoD 8570 Approved Baseline
Certifications
DoD 8140
DoD 8140 model which is based on the U.S. National Institute of Standard and Technology
(NIST) National Initiative for Cybersecurity Education (NICE) standard
USA’s National Initiative for Cybersecurity
Education (NICE)
Cybersecurity Workforce Framework
Federal Information Security Management Act
CAP Domains:
• Risk Management Framework (RMF)
• Categorization of Information Systems
• Selection of Security Controls
• Security Control Implementation
• Security Control Assessment
• Information System Authorization
• Monitoring of Security Controls
Executive Order 13636
Cybersecurity Framework
NICCS Portal
NICF Framework in Singapore
• The National Infocomm Competency Framework
(NICF) developed by Infocomm Development
Authority of Singapore (iDA) and Singapore
Workforce Development Agency (WDA)
• The NICF Overview Map is a snapshot of the
Infocomm sector
• Serves as a reference for career progression and
corresponding training pathways leading to NICF
qualifications.
• Similar to DoD 8140 model
National Infocomm Competency
Framework Map
You can go to the interactive map to learn more
http://www.nicf.sg/NicfOverview/InteractiveMap.aspx
Infocomm Security
• Involves in
protecting
hardware,
software,
network and
services of an
organization
against
unauthorized
access,
modification,
destruction, or
disclosure
Global Academic Program
Education
Research
Outreach
Information security
professionals must be
highly adaptable in
learning and applying
new skills, technologies,
and procedures.
Critical Times Demand Critical Skills
Thank You
Philip Victor
Head of Market Development (APAC), (ISC)2
pvictor@isc2.org

Contenu connexe

Tendances

Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 

Tendances (20)

Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
Cyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDICyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDI
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Leveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common LanguageLeveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common Language
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
Meaningfull security metrics
Meaningfull security metricsMeaningfull security metrics
Meaningfull security metrics
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat Landscapefinal
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 

En vedette

Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
Department of Defense
 

En vedette (15)

Deploying A Crisis Management and Business Continuity Approach to Product Tam...
Deploying A Crisis Management and Business Continuity Approach to Product Tam...Deploying A Crisis Management and Business Continuity Approach to Product Tam...
Deploying A Crisis Management and Business Continuity Approach to Product Tam...
 
Journey to cyber resilience
Journey to cyber resilienceJourney to cyber resilience
Journey to cyber resilience
 
Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyScience of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis Methodology
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
 
Risk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection PowerpointRisk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection Powerpoint
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The Board
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boards
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 

Similaire à Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Philip Victor, Head of Market Development (APAC), (ISC)2

Information Security Audit Consultant
Information Security Audit  ConsultantInformation Security Audit  Consultant
Information Security Audit Consultant
dcs HH
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_ds
Arun Gopinath
 

Similaire à Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Philip Victor, Head of Market Development (APAC), (ISC)2 (20)

Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
 
Datasheet
DatasheetDatasheet
Datasheet
 
Csc520 you are a senior level employee and you must tailor your deliverables ...
Csc520 you are a senior level employee and you must tailor your deliverables ...Csc520 you are a senior level employee and you must tailor your deliverables ...
Csc520 you are a senior level employee and you must tailor your deliverables ...
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
risk assessment 27.docx
risk assessment 27.docxrisk assessment 27.docx
risk assessment 27.docx
 
Information Security Audit Consultant
Information Security Audit  ConsultantInformation Security Audit  Consultant
Information Security Audit Consultant
 
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
 
Certified Information Systems Security Professional
Certified Information Systems Security ProfessionalCertified Information Systems Security Professional
Certified Information Systems Security Professional
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_ds
 
Move Inn Estates Case Study
Move Inn Estates Case StudyMove Inn Estates Case Study
Move Inn Estates Case Study
 
IDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech - Information security consulting
IDBI Intech - Information security consulting
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network Defender
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Federal Cybersecurity: The latest challenges, initiatives and best practices
Federal Cybersecurity: The latest challenges, initiatives and best practicesFederal Cybersecurity: The latest challenges, initiatives and best practices
Federal Cybersecurity: The latest challenges, initiatives and best practices
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Right
 

Plus de BCM Institute

Plus de BCM Institute (20)

Business Continuity and Resilience: What Lies in the Future and What Steps Ca...
Business Continuity and Resilience: What Lies in the Future and What Steps Ca...Business Continuity and Resilience: What Lies in the Future and What Steps Ca...
Business Continuity and Resilience: What Lies in the Future and What Steps Ca...
 
Enterprise Risk Management and Business Continuity: How Can They Work Togethe...
Enterprise Risk Management and Business Continuity: How Can They Work Togethe...Enterprise Risk Management and Business Continuity: How Can They Work Togethe...
Enterprise Risk Management and Business Continuity: How Can They Work Togethe...
 
Winning Over The Challenges of Implementing BCM in a BPO by Jeremias Astrero,...
Winning Over The Challenges of Implementing BCM in a BPO by Jeremias Astrero,...Winning Over The Challenges of Implementing BCM in a BPO by Jeremias Astrero,...
Winning Over The Challenges of Implementing BCM in a BPO by Jeremias Astrero,...
 
Operational and Business Continuity Management Strategy for Multi-type Nation...
Operational and Business Continuity Management Strategy for Multi-type Nation...Operational and Business Continuity Management Strategy for Multi-type Nation...
Operational and Business Continuity Management Strategy for Multi-type Nation...
 
Business Continuity Management in Healthcare by Dexter Chia, Director, GCOO's...
Business Continuity Management in Healthcare by Dexter Chia, Director, GCOO's...Business Continuity Management in Healthcare by Dexter Chia, Director, GCOO's...
Business Continuity Management in Healthcare by Dexter Chia, Director, GCOO's...
 
Does Your BCP Need A BCP - Outsourcing Business Continuity by Irene Lye, Ente...
Does Your BCP Need A BCP - Outsourcing Business Continuity by Irene Lye, Ente...Does Your BCP Need A BCP - Outsourcing Business Continuity by Irene Lye, Ente...
Does Your BCP Need A BCP - Outsourcing Business Continuity by Irene Lye, Ente...
 
The Evolving Role of BCM and its Importance in Any Industries by Dr Goh Moh H...
The Evolving Role of BCM and its Importance in Any Industries by Dr Goh Moh H...The Evolving Role of BCM and its Importance in Any Industries by Dr Goh Moh H...
The Evolving Role of BCM and its Importance in Any Industries by Dr Goh Moh H...
 
Experience Sharing - Risk Management, Crisis Management & BCM In An Education...
Experience Sharing - Risk Management, Crisis Management & BCM In An Education...Experience Sharing - Risk Management, Crisis Management & BCM In An Education...
Experience Sharing - Risk Management, Crisis Management & BCM In An Education...
 
Planning For The Haze by Jeremy Wong, , Senior Vice President of GMH Continui...
Planning For The Haze by Jeremy Wong, , Senior Vice President of GMH Continui...Planning For The Haze by Jeremy Wong, , Senior Vice President of GMH Continui...
Planning For The Haze by Jeremy Wong, , Senior Vice President of GMH Continui...
 
Challenges, Opportunities and Trends for BCM Profession by Dr Goh Moh Heng, P...
Challenges, Opportunities and Trends for BCM Profession by Dr Goh Moh Heng, P...Challenges, Opportunities and Trends for BCM Profession by Dr Goh Moh Heng, P...
Challenges, Opportunities and Trends for BCM Profession by Dr Goh Moh Heng, P...
 
DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...
DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...
DR Plan Implementation Experience: A Government Agency's Perspective by Inthr...
 
Navigating The Path To BCM Excellence by Dr Suhazimah Dzazali, Deputy Directo...
Navigating The Path To BCM Excellence by Dr Suhazimah Dzazali, Deputy Directo...Navigating The Path To BCM Excellence by Dr Suhazimah Dzazali, Deputy Directo...
Navigating The Path To BCM Excellence by Dr Suhazimah Dzazali, Deputy Directo...
 
BCM Institute Course Schedule 2016
BCM Institute Course Schedule 2016BCM Institute Course Schedule 2016
BCM Institute Course Schedule 2016
 
Considerations for Developing Your Organisation’s Pandemic Plan by Jeremy Won...
Considerations for Developing Your Organisation’s Pandemic Plan by Jeremy Won...Considerations for Developing Your Organisation’s Pandemic Plan by Jeremy Won...
Considerations for Developing Your Organisation’s Pandemic Plan by Jeremy Won...
 
Pandemics & Infectious Diseases: Stepping Up Your Business Continuity Prepare...
Pandemics & Infectious Diseases: Stepping Up Your Business Continuity Prepare...Pandemics & Infectious Diseases: Stepping Up Your Business Continuity Prepare...
Pandemics & Infectious Diseases: Stepping Up Your Business Continuity Prepare...
 
Certified Crisis Management Professional Programme Brochure
Certified Crisis Management Professional Programme Brochure Certified Crisis Management Professional Programme Brochure
Certified Crisis Management Professional Programme Brochure
 
BCM Institute Malaysia Course Schedule 2015
BCM Institute Malaysia Course Schedule 2015 BCM Institute Malaysia Course Schedule 2015
BCM Institute Malaysia Course Schedule 2015
 
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
Dr Goh Moh Heng Building Your Organization Business Continuity Management Com...
 
Bhakorn Vanuptikul
Bhakorn Vanuptikul Bhakorn Vanuptikul
Bhakorn Vanuptikul
 
Stelios Aronis ISO 22301 BCMS Implementation and Sharing of BCM Best Practice...
Stelios Aronis ISO 22301 BCMS Implementation and Sharing of BCM Best Practice...Stelios Aronis ISO 22301 BCMS Implementation and Sharing of BCM Best Practice...
Stelios Aronis ISO 22301 BCMS Implementation and Sharing of BCM Best Practice...
 

Dernier

If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
Sheetaleventcompany
 

Dernier (20)

My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 

Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Philip Victor, Head of Market Development (APAC), (ISC)2

  • 1.
  • 2. Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness Philip Victor Head of Market Development (APAC), (ISC)2 pvictor@isc2.org
  • 3.
  • 4. The Threat Landscape in SE Asia • Enterprises in Asia spent about $230 billion in 2014 to deal with issues caused by malware deliberately loaded onto pirated software, according to IDC and the National University of Singapore. – Of $230 billion: $59 billion to deal with security issues – $170 billion for data breaches
  • 5. C-suite Attitude towards Security A survey released in Nov 2014 by Vanson Bourne, sponsored by BT Global, reveals that the wrong attitude about security, starting at the top and trickling downwards, is putting organizations at serious risks. Uptake of BYOD (Bring Your Own Device) and COPE (Corporately Owned Personally-Enabled) devices at workplace
  • 6. Strengthening Cyber Resilience • Understand the security architecture • Access the environment • Risk assessment • Understand the business • Monitor the environment • Qualified, certified security personnel
  • 7. Understand Security Architecture • Use of appropriate technologies to provide/protect architecture • Protect your network • Content inspection
  • 8. Assess the Environment • Risk Assessment • Continuous Vulnerability Assessment
  • 9. Risk Assessment Understand internal (on premise) vs. use of cloud solutions.
  • 13. People • User Education/Awareness • Qualified, Certified Security Personnel • Ethics
  • 14. DoD 8570 Approved Baseline Certifications
  • 15. DoD 8140 DoD 8140 model which is based on the U.S. National Institute of Standard and Technology (NIST) National Initiative for Cybersecurity Education (NICE) standard
  • 16. USA’s National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework
  • 17. Federal Information Security Management Act CAP Domains: • Risk Management Framework (RMF) • Categorization of Information Systems • Selection of Security Controls • Security Control Implementation • Security Control Assessment • Information System Authorization • Monitoring of Security Controls
  • 20. NICF Framework in Singapore • The National Infocomm Competency Framework (NICF) developed by Infocomm Development Authority of Singapore (iDA) and Singapore Workforce Development Agency (WDA) • The NICF Overview Map is a snapshot of the Infocomm sector • Serves as a reference for career progression and corresponding training pathways leading to NICF qualifications. • Similar to DoD 8140 model
  • 21. National Infocomm Competency Framework Map You can go to the interactive map to learn more http://www.nicf.sg/NicfOverview/InteractiveMap.aspx
  • 22. Infocomm Security • Involves in protecting hardware, software, network and services of an organization against unauthorized access, modification, destruction, or disclosure
  • 24. Information security professionals must be highly adaptable in learning and applying new skills, technologies, and procedures. Critical Times Demand Critical Skills
  • 25. Thank You Philip Victor Head of Market Development (APAC), (ISC)2 pvictor@isc2.org