Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Benjamin Ang
The document discusses Singapore's cybersecurity strategy, which has four pillars: developing its cybersecurity capabilities, using cybersecurity to build its economy, strengthening international partnerships, and building capacity in Southeast Asian countries as the region faces different levels of cyber maturity. It also examines Singapore's Cybersecurity Act and roles for critical infrastructure owners, as well as the country's efforts to enhance cyber coordination within ASEAN through forums, capacity building programs, and confidence building measures.
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
The document outlines a plan to improve cybersecurity and resilience through acquisition reform. It discusses:
1) The need for acquisition reform to address cybersecurity risks that persist throughout an acquired item's lifespan. Currently, varied practices make consistently managing risks difficult.
2) An executive order directing agencies to provide stronger protections for critical systems. A joint working group was formed to prepare recommendations.
3) The working group's final report, which recommends six acquisition reforms, including instituting baseline cybersecurity requirements and developing common definitions. The White House supported moving quickly to an implementation plan with milestones.
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020Benjamin Ang
This public, 90-minute session examined the prevalence of cyber threats in the Indo-Pacific region based on some of the high-profile cyber-attacks and data leaks, as well as advanced persistent threat campaigns. It assessed the growing prominence of information warfare, especially in the current pandemic. The session highlighted the most common tactics, techniques and procedures used by malicious actors, and the countermeasures that governments and the private sector have undertaken to fortify their cyber defenses in the emerging data-driven economy. This session then examined the role played by the US and Singapore in enhancing regional cybersecurity as well as clarify the points of convergence and divergence between Singapore and the US to improve future cooperation.
Overview of national cybercrime strategiesBenjamin Ang
This is an overview of national cybercrime strategies, presented at the INTERPOL ASEAN Cyber Capacity Development Project’s (ACCDP) Decision Makers Meeting. It reviews best practices in developing national cybersecurity and cybercrime strategies, key pillars to consider, the life-cycle of the strategy process, stakeholders to engage, and best practices.
Singapore's National Cyber Security StrategyBenjamin Ang
Singapore's national cyber security strategy has 4 pillars: 1) Protect critical infrastructure through assessments, information sharing, and security by design. 2) Combat cybercrime through education, law enforcement capabilities, and partnerships. 3) Develop a professional cybersecurity workforce and support startups to extend Singapore's advantage. 4) Forge international cooperation to counter cyber threats through ASEAN initiatives and host exchanges on cyber norms. The strategy aims to secure essential services, respond to threats, and establish Singapore as a trusted hub through a whole-of-nation approach.
New developments in cyber law - Singapore and beyondBenjamin Ang
New developments in the Computer Misuse and Cybersecurity Act, Singapore; actions by the Personal Data Protection Commission under the Personal Data Protection Act (PDPA); thought on the upcoming Cybersecurity Act 2017
Cybersecurity legislation in Singapore (2017)Benjamin Ang
Reviewing the Personal Data Protection Act (PDPA), Computer Misuse and Cybersecurity Act (CMCA), and the draft Cybersecurity Act Cybersecurity Bill of Singapore, correct up to November 2017
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Benjamin Ang
The document discusses Singapore's cybersecurity strategy and legal framework. It has 4 pillars: (1) enhancing Singapore as a trusted hub, (2) promoting collective responsibility, (3) using cybersecurity as an advantage, and (4) national cyber R&D. The Cybersecurity Act designates critical infrastructure and gives the Cyber Security Agency powers to investigate incidents. The strategy aims to strengthen cyber defenses, educate the public, and develop Singapore as a cybersecurity hub in Asia.
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Benjamin Ang
The document discusses Singapore's cybersecurity strategy, which has four pillars: developing its cybersecurity capabilities, using cybersecurity to build its economy, strengthening international partnerships, and building capacity in Southeast Asian countries as the region faces different levels of cyber maturity. It also examines Singapore's Cybersecurity Act and roles for critical infrastructure owners, as well as the country's efforts to enhance cyber coordination within ASEAN through forums, capacity building programs, and confidence building measures.
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
The document outlines a plan to improve cybersecurity and resilience through acquisition reform. It discusses:
1) The need for acquisition reform to address cybersecurity risks that persist throughout an acquired item's lifespan. Currently, varied practices make consistently managing risks difficult.
2) An executive order directing agencies to provide stronger protections for critical systems. A joint working group was formed to prepare recommendations.
3) The working group's final report, which recommends six acquisition reforms, including instituting baseline cybersecurity requirements and developing common definitions. The White House supported moving quickly to an implementation plan with milestones.
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020Benjamin Ang
This public, 90-minute session examined the prevalence of cyber threats in the Indo-Pacific region based on some of the high-profile cyber-attacks and data leaks, as well as advanced persistent threat campaigns. It assessed the growing prominence of information warfare, especially in the current pandemic. The session highlighted the most common tactics, techniques and procedures used by malicious actors, and the countermeasures that governments and the private sector have undertaken to fortify their cyber defenses in the emerging data-driven economy. This session then examined the role played by the US and Singapore in enhancing regional cybersecurity as well as clarify the points of convergence and divergence between Singapore and the US to improve future cooperation.
Overview of national cybercrime strategiesBenjamin Ang
This is an overview of national cybercrime strategies, presented at the INTERPOL ASEAN Cyber Capacity Development Project’s (ACCDP) Decision Makers Meeting. It reviews best practices in developing national cybersecurity and cybercrime strategies, key pillars to consider, the life-cycle of the strategy process, stakeholders to engage, and best practices.
Singapore's National Cyber Security StrategyBenjamin Ang
Singapore's national cyber security strategy has 4 pillars: 1) Protect critical infrastructure through assessments, information sharing, and security by design. 2) Combat cybercrime through education, law enforcement capabilities, and partnerships. 3) Develop a professional cybersecurity workforce and support startups to extend Singapore's advantage. 4) Forge international cooperation to counter cyber threats through ASEAN initiatives and host exchanges on cyber norms. The strategy aims to secure essential services, respond to threats, and establish Singapore as a trusted hub through a whole-of-nation approach.
New developments in cyber law - Singapore and beyondBenjamin Ang
New developments in the Computer Misuse and Cybersecurity Act, Singapore; actions by the Personal Data Protection Commission under the Personal Data Protection Act (PDPA); thought on the upcoming Cybersecurity Act 2017
Cybersecurity legislation in Singapore (2017)Benjamin Ang
Reviewing the Personal Data Protection Act (PDPA), Computer Misuse and Cybersecurity Act (CMCA), and the draft Cybersecurity Act Cybersecurity Bill of Singapore, correct up to November 2017
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Benjamin Ang
The document discusses Singapore's cybersecurity strategy and legal framework. It has 4 pillars: (1) enhancing Singapore as a trusted hub, (2) promoting collective responsibility, (3) using cybersecurity as an advantage, and (4) national cyber R&D. The Cybersecurity Act designates critical infrastructure and gives the Cyber Security Agency powers to investigate incidents. The strategy aims to strengthen cyber defenses, educate the public, and develop Singapore as a cybersecurity hub in Asia.
Singapore. industry 4.0 and cybersecurity Yuri Anisimov
For all critical sectors to establish robust and systematic cyber risk management processes and capabilities
Systematic cyber risk management framework
risk assessments, vulnerability assessments and system reviews;
well-informed and conscious trade-offs in security, cost and functionality
sound systems and procedures to mitigate and manage these risks, including disaster recovery and business continuity plans;
effective implementation that encompasses awareness building and training across the organisation
continuous measurement of performance through process audits and cyber-security exercises.
Singapore Cybersecurity Strategy and Legislation (2018)Benjamin Ang
A primer on Singapore's Cybersecurity Strategy, and the laws of Singapore relating to Cybersecurity (Computer Misuse Act, Personal Data Protection Act, Cybersecurity Act 2018). Also contains a summary of the results of the Public Consultation on the Cybersecurity Bill
This document summarizes Ghana's efforts to curb cyber threats and enhance cybersecurity. It provides an overview of Ghana's growing internet connectivity and interactions online. It then outlines common cyber attacks faced and targets at different levels. Ghana's key critical infrastructure sectors are identified. The document discusses Ghana's draft national cybersecurity policy and strategy, which focuses on governance, legal frameworks, technology, awareness, and international cooperation. It also describes three special initiatives - a national cybersecurity awareness program, establishing a Computer Emergency Response Team, and plans for a National Cyber Security Centre. The document concludes by calling for discussion on further interventions, stakeholder roles, models for public-private partnership, and needed capacity building.
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Benjamin Ang
Covers 1. Cyber threats to ASEAN and recent incidents, 2. International Law relating to cyber conflict, Gaps in IHL and LOAC, 3. UN and ASEAN steps to prevent cyber warfare. Lecture for the National Defense College of the Philippines (NDCP), government’s highest center for education, training, and research on defense and national security, in the National Security Studies Program (NSSP) for Armed Forces of the Philippines (AFP) officers.
Security and Privacy in Pegulated EnvironmentsFrancis Amaning
Cyber security aims to protect private and public sector interests in cyberspace by safeguarding digital networks and leveraging opportunities in cyberspace. Key challenges include increasing cybercrime, data leakage, intellectual property loss, and vulnerabilities from cloud computing, mobile devices, and web applications. Ghana's critical national information infrastructure sectors include national defense, banking and finance, information and communications, energy, transportation, water, health services, government, emergency services, and food and agriculture. Regulated environments like internet service providers, mobile network operators, and financial operators must protect subscribers, clients, and implement regulatory provisions for cyber security, data protection, and data aging policies.
The document outlines India's national cyber security policy and strategies. It aims to build a secure and resilient cyberspace for citizens, businesses, and government. The key objectives are to create a secure cyber ecosystem, strengthen regulatory frameworks, enhance mechanisms for information gathering and response, protect critical information infrastructure, develop indigenous security technologies, and create a cybersecurity workforce. The strategies to achieve these objectives include designating agencies to coordinate cybersecurity efforts, encouraging adoption of best practices, developing testing and certification processes, and fostering public-private partnerships and cooperation.
This document summarizes Ghana's Universal Service Fund (GIFEC). It outlines GIFEC's vision to bridge the digital divide, and its mission to provide basic telecom services to underserved communities. It describes GIFEC's management structure and various programs to connect schools, libraries, and communities to the internet through cyber labs and community information centers. The document also discusses GIFEC's achievements in connectivity and ongoing challenges around sustainability and ownership.
Lessons learned from the SingHealth Data Breach COI ReportBenjamin Ang
16 recommendations for better cybersecurity, digested from the 454 page COI (Committee of Inquiry) report on Singapore's biggest data breach to date (1.5 million patients' records), presented at Cyber Resilience and Risk Forum 2019, Singapore. Useful info for board directors, managers, CSOs, CISOs, cybersecurity professionals
Strenthening Critical Internet InfrastructureFrancis Amaning
This document outlines Ghana's critical national internet infrastructure and proposes strengthening it. It discusses automating Ghana's .gh domain name registry and establishing a governing body. It also proposes deploying root servers through joint efforts of the registry and internet exchange point. The document outlines Ghana's national cybersecurity organization CERT-GH and an IPv4 to IPv6 transition task force. It describes Ghana's internet exchange point and need for a national internet backbone plan. The document proposes locating key infrastructure elements at Ghana's new national data center to foster synergies between national internet resources.
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Benjamin Ang
Lecture on the different cyber norms frameworks for responsible state behaviour in cyberspace - describing Paris Call, Charter of Trust, Microsoft Digital Geneva Convention, Tech Accord, GCSC, Shanghai SCO, UN GGE, UN OEWG - explaining each of the 11 cyber norms from the UN GGE 2015 meeting, and concluding with a case study on ASEAN's approach to international law in cyber operations
The document outlines India's 2013 National Cyber Security Policy. The policy aims to build a secure cyber ecosystem in India by protecting information infrastructure, reducing cyber threats and vulnerabilities, and developing cyber security capabilities. It identifies strategic objectives and approaches across areas such as creating assurance frameworks, strengthening regulatory structures, developing threat monitoring and response mechanisms, securing e-governance, protecting critical infrastructure, fostering research and workforce development, and enhancing domestic and international cooperation. The overarching goal is to secure cyberspace for citizens, businesses and the government of India.
This is my attempt to summarize the policy with salient points. For detailed verbose policy please visit http://deity.gov.in/hindi/sites/upload_files/dithindi/files/ncsp_060411.pdf
This presentation presentated by Mohd Shamir B Hasyim, Vice President Government and Multilateral Engagement, Cyber Security Malaysia, 10th September 2013 on #IISF2013
An Integrated Approach For Cyber Security And Critical Information Infrastructure Protection
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Benjamin Ang
Lecture outline
1. Comparative analysis of cyber threats and their evolution in South East Asia
2. Digitization of critical infrastructure and growing security risks
3. Conceiving of and preparing for cyber warfare
Delivered to the French Institute for International Relations
Cybersecurity for Critical National Information InfrastructureDr David Probert
This document discusses cybersecurity for critical national infrastructure. It covers evolving cyber threats facing different critical sectors like government, banking/finance, energy and transportation. It also discusses some national and international plans for critical infrastructure protection from countries like the US, Canada, UK, Germany, and international bodies like the UN and OECD. The presentation explores integrating cybersecurity with physical security to protect critical infrastructure.
The document discusses strengthening international cooperation to address evolving cyber threats. It introduces IMPACT, an international cybersecurity alliance, and its role in operationalizing initiatives through the ITU's Global Cybersecurity Agenda. IMPACT brings together governments, industry, and academia to facilitate capacity building, technical assistance, training, research, and policy development efforts across 191 countries.
Review of national cyber security policy 2013 by chintan pathakChintan Pathak
The document provides a review of India's National Cyber Security Policy from 2013. It discusses the following key points:
- The policy aims to create a framework to enhance cyber security in India through specific actions and programs. Its vision is to build a secure and resilient cyber space for citizens, businesses, and government.
- The policy seeks to protect information and infrastructure, build cyber security capabilities, reduce vulnerabilities, and minimize damage from incidents. It also aims to establish a national cyber security agency and legal framework.
- While the policy addresses many important issues, it is silent on some key areas like cloud computing, citizen privacy, social media governance, and balancing citizen liberty with national security.
- For the policy
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...at MicroFocus Italy ❖✔
The UK is one of the world’s leading
digital nations. Much of our prosperity
now depends on our ability to secure our
technology, data and networks from the
many threats we face.
Yet cyber attacks are growing more
frequent, sophisticated and damaging when
they succeed. So we are taking decisive
action to protect both our economy and the
privacy of UK citizens.
Our National Cyber Security Strategy sets out
our plan to make Britain confident, capable
and resilient in a fast-moving digital world.
Over the lifetime of this five-year strategy,
we will invest £1.9 billion in defending
our systems and infrastructure, deterring
our adversaries, and developing a wholesociety
capability – from the biggest
companies to the individual citizen.
From the most basic cyber hygiene, to the
most sophisticated deterrence, we need a
comprehensive response.
We will focus on raising the cost of
mounting an attack against anyone in the
UK, both through stronger defences and
better cyber skills. This is no longer just
an issue for the IT department but for the
whole workforce. Cyber skills need to reach
into every profession.
The new National Cyber Security Centre will
provide a hub of world-class, user-friendly
expertise for businesses and individuals, as
well as rapid response to major incidents.
Government has a clear leadership role,
but we will also foster a wider commercial
ecosystem, recognising where industry
can innovate faster than us. This includes
a drive to get the best young minds into
cyber security.
The cyber threat impacts the whole of our
society, so we want to make very clear
that everyone has a part to play in our
national response. It’s why this strategy is
an unprecedented exercise in transparency.
We can no longer afford to have this
discussion behind closed doors.
Ultimately, this is a threat that cannot be
completely eliminated. Digital technology
works because it is open, and that
openness brings with it risk. What we
can do is reduce the threat to a level that
ensures we remain at the vanguard of the
digital revolution. This strategy sets out how.
Development of National Cybersecurity Strategy and OrganisationDr David Probert
3-Day Master Class given at the University of Technology (UTECH) Kingston, Jamaica - 13th to 15th September 2010 - in Partnership with the UN/ITU Centres of Excellence Network for the Caribbean Region - International Telecommunications Union - Global Cybersecurity Agenda.
The document summarizes international and regional cyber security initiatives. It discusses the UK Cyber Security Strategy vision of enabling citizens, businesses and government to benefit from a safe and resilient cyber space. It outlines the UK Office for Cyber Security's role in coordinating international engagement on cyber issues and providing guidance. The document also lists some international partnerships and information sharing initiatives, as well as resources from the European Union and a global repository of regional cyber security efforts.
The document discusses the roles and challenges of Government CIOs (GCIOs) in Thailand. It outlines how Thailand has established a GCIO program to appoint CIOs in each ministry and department. The core roles of GCIOs include formulating ICT master plans, approving budgets, and monitoring ICT projects. GCIOs face challenges such as promoting e-government services, establishing inter-agency collaboration, and promoting ICT literacy. The document also provides examples of successful e-government projects led by GCIOs in Thailand.
Singapore. industry 4.0 and cybersecurity Yuri Anisimov
For all critical sectors to establish robust and systematic cyber risk management processes and capabilities
Systematic cyber risk management framework
risk assessments, vulnerability assessments and system reviews;
well-informed and conscious trade-offs in security, cost and functionality
sound systems and procedures to mitigate and manage these risks, including disaster recovery and business continuity plans;
effective implementation that encompasses awareness building and training across the organisation
continuous measurement of performance through process audits and cyber-security exercises.
Singapore Cybersecurity Strategy and Legislation (2018)Benjamin Ang
A primer on Singapore's Cybersecurity Strategy, and the laws of Singapore relating to Cybersecurity (Computer Misuse Act, Personal Data Protection Act, Cybersecurity Act 2018). Also contains a summary of the results of the Public Consultation on the Cybersecurity Bill
This document summarizes Ghana's efforts to curb cyber threats and enhance cybersecurity. It provides an overview of Ghana's growing internet connectivity and interactions online. It then outlines common cyber attacks faced and targets at different levels. Ghana's key critical infrastructure sectors are identified. The document discusses Ghana's draft national cybersecurity policy and strategy, which focuses on governance, legal frameworks, technology, awareness, and international cooperation. It also describes three special initiatives - a national cybersecurity awareness program, establishing a Computer Emergency Response Team, and plans for a National Cyber Security Centre. The document concludes by calling for discussion on further interventions, stakeholder roles, models for public-private partnership, and needed capacity building.
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Benjamin Ang
Covers 1. Cyber threats to ASEAN and recent incidents, 2. International Law relating to cyber conflict, Gaps in IHL and LOAC, 3. UN and ASEAN steps to prevent cyber warfare. Lecture for the National Defense College of the Philippines (NDCP), government’s highest center for education, training, and research on defense and national security, in the National Security Studies Program (NSSP) for Armed Forces of the Philippines (AFP) officers.
Security and Privacy in Pegulated EnvironmentsFrancis Amaning
Cyber security aims to protect private and public sector interests in cyberspace by safeguarding digital networks and leveraging opportunities in cyberspace. Key challenges include increasing cybercrime, data leakage, intellectual property loss, and vulnerabilities from cloud computing, mobile devices, and web applications. Ghana's critical national information infrastructure sectors include national defense, banking and finance, information and communications, energy, transportation, water, health services, government, emergency services, and food and agriculture. Regulated environments like internet service providers, mobile network operators, and financial operators must protect subscribers, clients, and implement regulatory provisions for cyber security, data protection, and data aging policies.
The document outlines India's national cyber security policy and strategies. It aims to build a secure and resilient cyberspace for citizens, businesses, and government. The key objectives are to create a secure cyber ecosystem, strengthen regulatory frameworks, enhance mechanisms for information gathering and response, protect critical information infrastructure, develop indigenous security technologies, and create a cybersecurity workforce. The strategies to achieve these objectives include designating agencies to coordinate cybersecurity efforts, encouraging adoption of best practices, developing testing and certification processes, and fostering public-private partnerships and cooperation.
This document summarizes Ghana's Universal Service Fund (GIFEC). It outlines GIFEC's vision to bridge the digital divide, and its mission to provide basic telecom services to underserved communities. It describes GIFEC's management structure and various programs to connect schools, libraries, and communities to the internet through cyber labs and community information centers. The document also discusses GIFEC's achievements in connectivity and ongoing challenges around sustainability and ownership.
Lessons learned from the SingHealth Data Breach COI ReportBenjamin Ang
16 recommendations for better cybersecurity, digested from the 454 page COI (Committee of Inquiry) report on Singapore's biggest data breach to date (1.5 million patients' records), presented at Cyber Resilience and Risk Forum 2019, Singapore. Useful info for board directors, managers, CSOs, CISOs, cybersecurity professionals
Strenthening Critical Internet InfrastructureFrancis Amaning
This document outlines Ghana's critical national internet infrastructure and proposes strengthening it. It discusses automating Ghana's .gh domain name registry and establishing a governing body. It also proposes deploying root servers through joint efforts of the registry and internet exchange point. The document outlines Ghana's national cybersecurity organization CERT-GH and an IPv4 to IPv6 transition task force. It describes Ghana's internet exchange point and need for a national internet backbone plan. The document proposes locating key infrastructure elements at Ghana's new national data center to foster synergies between national internet resources.
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Benjamin Ang
Lecture on the different cyber norms frameworks for responsible state behaviour in cyberspace - describing Paris Call, Charter of Trust, Microsoft Digital Geneva Convention, Tech Accord, GCSC, Shanghai SCO, UN GGE, UN OEWG - explaining each of the 11 cyber norms from the UN GGE 2015 meeting, and concluding with a case study on ASEAN's approach to international law in cyber operations
The document outlines India's 2013 National Cyber Security Policy. The policy aims to build a secure cyber ecosystem in India by protecting information infrastructure, reducing cyber threats and vulnerabilities, and developing cyber security capabilities. It identifies strategic objectives and approaches across areas such as creating assurance frameworks, strengthening regulatory structures, developing threat monitoring and response mechanisms, securing e-governance, protecting critical infrastructure, fostering research and workforce development, and enhancing domestic and international cooperation. The overarching goal is to secure cyberspace for citizens, businesses and the government of India.
This is my attempt to summarize the policy with salient points. For detailed verbose policy please visit http://deity.gov.in/hindi/sites/upload_files/dithindi/files/ncsp_060411.pdf
This presentation presentated by Mohd Shamir B Hasyim, Vice President Government and Multilateral Engagement, Cyber Security Malaysia, 10th September 2013 on #IISF2013
An Integrated Approach For Cyber Security And Critical Information Infrastructure Protection
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Benjamin Ang
Lecture outline
1. Comparative analysis of cyber threats and their evolution in South East Asia
2. Digitization of critical infrastructure and growing security risks
3. Conceiving of and preparing for cyber warfare
Delivered to the French Institute for International Relations
Cybersecurity for Critical National Information InfrastructureDr David Probert
This document discusses cybersecurity for critical national infrastructure. It covers evolving cyber threats facing different critical sectors like government, banking/finance, energy and transportation. It also discusses some national and international plans for critical infrastructure protection from countries like the US, Canada, UK, Germany, and international bodies like the UN and OECD. The presentation explores integrating cybersecurity with physical security to protect critical infrastructure.
The document discusses strengthening international cooperation to address evolving cyber threats. It introduces IMPACT, an international cybersecurity alliance, and its role in operationalizing initiatives through the ITU's Global Cybersecurity Agenda. IMPACT brings together governments, industry, and academia to facilitate capacity building, technical assistance, training, research, and policy development efforts across 191 countries.
Review of national cyber security policy 2013 by chintan pathakChintan Pathak
The document provides a review of India's National Cyber Security Policy from 2013. It discusses the following key points:
- The policy aims to create a framework to enhance cyber security in India through specific actions and programs. Its vision is to build a secure and resilient cyber space for citizens, businesses, and government.
- The policy seeks to protect information and infrastructure, build cyber security capabilities, reduce vulnerabilities, and minimize damage from incidents. It also aims to establish a national cyber security agency and legal framework.
- While the policy addresses many important issues, it is silent on some key areas like cloud computing, citizen privacy, social media governance, and balancing citizen liberty with national security.
- For the policy
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...at MicroFocus Italy ❖✔
The UK is one of the world’s leading
digital nations. Much of our prosperity
now depends on our ability to secure our
technology, data and networks from the
many threats we face.
Yet cyber attacks are growing more
frequent, sophisticated and damaging when
they succeed. So we are taking decisive
action to protect both our economy and the
privacy of UK citizens.
Our National Cyber Security Strategy sets out
our plan to make Britain confident, capable
and resilient in a fast-moving digital world.
Over the lifetime of this five-year strategy,
we will invest £1.9 billion in defending
our systems and infrastructure, deterring
our adversaries, and developing a wholesociety
capability – from the biggest
companies to the individual citizen.
From the most basic cyber hygiene, to the
most sophisticated deterrence, we need a
comprehensive response.
We will focus on raising the cost of
mounting an attack against anyone in the
UK, both through stronger defences and
better cyber skills. This is no longer just
an issue for the IT department but for the
whole workforce. Cyber skills need to reach
into every profession.
The new National Cyber Security Centre will
provide a hub of world-class, user-friendly
expertise for businesses and individuals, as
well as rapid response to major incidents.
Government has a clear leadership role,
but we will also foster a wider commercial
ecosystem, recognising where industry
can innovate faster than us. This includes
a drive to get the best young minds into
cyber security.
The cyber threat impacts the whole of our
society, so we want to make very clear
that everyone has a part to play in our
national response. It’s why this strategy is
an unprecedented exercise in transparency.
We can no longer afford to have this
discussion behind closed doors.
Ultimately, this is a threat that cannot be
completely eliminated. Digital technology
works because it is open, and that
openness brings with it risk. What we
can do is reduce the threat to a level that
ensures we remain at the vanguard of the
digital revolution. This strategy sets out how.
Development of National Cybersecurity Strategy and OrganisationDr David Probert
3-Day Master Class given at the University of Technology (UTECH) Kingston, Jamaica - 13th to 15th September 2010 - in Partnership with the UN/ITU Centres of Excellence Network for the Caribbean Region - International Telecommunications Union - Global Cybersecurity Agenda.
The document summarizes international and regional cyber security initiatives. It discusses the UK Cyber Security Strategy vision of enabling citizens, businesses and government to benefit from a safe and resilient cyber space. It outlines the UK Office for Cyber Security's role in coordinating international engagement on cyber issues and providing guidance. The document also lists some international partnerships and information sharing initiatives, as well as resources from the European Union and a global repository of regional cyber security efforts.
The document discusses the roles and challenges of Government CIOs (GCIOs) in Thailand. It outlines how Thailand has established a GCIO program to appoint CIOs in each ministry and department. The core roles of GCIOs include formulating ICT master plans, approving budgets, and monitoring ICT projects. GCIOs face challenges such as promoting e-government services, establishing inter-agency collaboration, and promoting ICT literacy. The document also provides examples of successful e-government projects led by GCIOs in Thailand.
The Business Council of Mongolia (BCM) is an independent non-profit organization established in 2007 to advocate for economic freedom and a competitive business environment in Mongolia. It has over 240 member organizations from various sectors. The BCM pursues its vision through policy advocacy, knowledge sharing sessions, and networking events. It has 6 working groups focused on key industries that develop policy recommendations and initiatives. The Growth and Innovation working group aims to raise awareness of digital transformation benefits. The BCM provides value to members through information sharing, research, training programs, and member discounts.
The Business Council of Mongolia (BCM) is an independent non-profit organization established in 2007 to advocate for economic freedom and property rights. It aims to provide value to members, employees, and the public. The BCM has over 240 member organizations from various sectors. It works to equip members with information, develop policy recommendations, and provide networking services. The BCM is organized into a Board of Directors, Executive Committee, and six working groups focused on key issues. The Growth and Innovation working group promotes digital transformation in Mongolia through events and engagement. The BCM has seen strong growth and now reaches over 1,400 subscribers through various knowledge sharing and advocacy efforts.
IIM 2023 Events and Training Calendar on Data Science, Data Analytics, Document Control, Information Science, Advanced Records and
Information Management, Assured Records
Management, Chief Data Officer (CDO), Document Scanning and
Digitization, Improving your Information
& Records Management Using Existing Tools, Information Security
Assurance, Risk Management, Data & Information
Governance, Business Process
Management
DIU ISACA Student Group
Recognized in
Department of Software Engineering
Daffodil International University
ISACA is an international professional association focused on IT Governance.
Previously known as the Information Systems Audit and Control
Association ISACA) now goes by its acronym only.
This document is a resume for Muhammad Kushairy Masdi summarizing his education and experience. He has a Bachelor's degree in Computer Science with a focus on Networking and Security. He has skills in application development, programming, computer networking, and office tools. He is looking for career opportunities that allow growth in computer science fields related to networking and security.
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017Benjamin Ang
These slides summarize the activities of the Internet Society Singapore from 2015 to 2016, and were presented at the Annual General Meeting on 24 August 2016
The document discusses an upcoming BCI Italy Forum meeting on January 25, 2018 and introduces the forum leader Gianna Detoni. It also provides information on the new board structure for the BCI Italy Forum committee including members. Additionally, it announces that the 2018 BCI European Awards will take place in Milan on May 10th and provides a link for entries. Finally, it shares the calendar for the 2018 BCI Certification Course (CBCI) which will be held in multiple locations across Europe.
The document announces an international conference on Blockchain and Data Science to be held August 14-15, 2019 in Tokyo, Japan. The conference will focus on the theme of "Unbinding the Visibility of Blockchain Technology and Data Science" and bring together business professionals, experts, and researchers to exchange ideas and network. Key topics will include blockchain applications, cryptocurrency, data science, artificial intelligence, and blockchain in banking. The conference aims to identify future directions in research and feature peer-reviewed publications.
Blockchain Summit in Tokyo, Japan during August 14-15, 2019 aims to organize the symposium, workshop, seminar, special session, poster presentation and oral presentation session to involve the blockchain communities, organizations, industries and experts to share their thought, vision and idea for the future enterprises' technology
Global Expert Mission Report “Cybersecurity Global Expert Mission Singapore 2...KTN
Innovate UK’s Global Missions Programme is one of its most important tools to support the UK’s Industrial Strategy’s ambition for the UK to be the international partner of choice for science and innovation. Global collaborations are crucial in meeting the Industrial Strategy’s Grand Challenges and will be further supported by the launch of a new International Research and Innovation Strategy.
The Global Expert Missions, led by the Knowledge Transfer Network (KTN), play an important role in building strategic partnerships, providing deep insight into the opportunities for UK innovation and shaping future programmes.
Singapore has been experiencing an exponential growth in technology start-ups combined with innovation and digital transformation in its core industries. This phenomenon has led to cybersecurity becoming a national priority. The city-state has identified four pillars to innovation: digital economy, sustainable technology, defence and security, and education. The Expert Mission to Singapore in October 2019 aimed to better understand the cybersecurity landscape, the roles played by the various stakeholders within the local ecosystem (public and private), the key priorities and most importantly the opportunities and mechanisms for collaboration between Singapore and the UK.
The Cybersecurity 2019 Expert Mission travelled to Singapore in October 2019 and in the publication, KTN share the information and insights gathered during the delegation’s time there.
Find out more: https://ktn-uk.co.uk/news/new-report-published-for-ktn-cybersecurity-2019-global-expert-mission-to-singapore
This document is a curriculum vitae for Meljun P. Cortes that summarizes his personal and professional details in 3 paragraphs or less. It includes his contact information, 23 years of experience as an IT and computer science instructor, and educational background that includes multiple master's degrees. It also lists technical skills, licenses, work history primarily as a professor, and references. The CV demonstrates extensive qualifications for an IT or educational role.
NTU has undertaken several initiatives to improve digital practice, including adopting a digital framework to provide a common vocabulary, embedding the framework throughout courses and programs, and developing a digital induction process for new students and staff. A key focus is using the digital framework to enable meaningful conversations about empowering individuals in their digital skills and practice. The presentation provides examples of how NTU is working to foster a culture of innovative digital practice across the university.
The Singapore FinTech Association (SFA) is a non-profit organization that supports the development of the FinTech industry in Singapore. It facilitates collaboration between FinTech stakeholders and represents members from early-stage companies to large financial institutions. SFA partners with other associations globally on FinTech initiatives and organizes educational events for members. It has an executive committee, subcommittees, and shared service groups to carry out its goals of connecting, collaborating and co-creating for the FinTech community in Singapore.
The Singapore FinTech Association (SFA) is a non-profit organization that supports the development of the FinTech industry in Singapore. It facilitates collaboration between FinTech stakeholders and represents FinTech members. SFA partners with other associations globally on FinTech initiatives. It has an elected Executive Committee and subcommittees that focus on areas like membership, education, and policy. SFA provides networking opportunities and benefits to its members.
The document provides a summary of the APSIG2018 conference. It discusses the introduction and orientation sessions that outlined APSIG's objectives and growth. It also summarizes several workshops presented on youth engagement in internet governance. Key recommendations include introducing mandatory online internet governance courses, mentorship programs, and more case studies and interactive sessions to better engage youth.
Similaire à Internet Society Singapore Chapter AGM 2019 and update for 2020 (20)
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Benjamin Ang
Lecture on cybersecurity in ASEAN and Singapore
- Definitions of cybersecurity in ASEAN (vs western definitions)
- Cyber threat landscape in ASEAN / types of cyber incidents and cyber crime in ASEAN
Why ASEAN is vulnerable
- Characteristics of ASEAN in cyberspace
non-interference, sovereignty
non-attribution of cyber attackers
- ASEAN cooperation in cyberspace
AMCC (ASEAN Ministers Cyber Conference)
ACICE (ADMM Cyber Info Centre of Excellence)
INTERPOL
International Cooperation to Impose Consequences for Malicious Cyber Activity...Benjamin Ang
Session 4 - International Cooperation to Impose
Consequences on Malicious Cyber Activities
Many states are concerting joint efforts to impose costs for irresponsible behaviors in
cyberspace by sharing information, jointly disclosing attribution, or issuing joint statements with allies, partners, or like-minded states. Being aware of the importance of the roles played by private sectors for national cybersecurity, states are seeking ways to induce cooperation from private sectors as well.
Session 4 covers cooperation efforts at the international level for imposing consequences on irresponsible state behavior in cyberspace. Speakers are expected to address the following
points.
H. Introduce cases where costs for irresponsible state behavior in cyberspace are effectively
imposed with joint efforts among states.
I. Introduce cases where cooperation between private and public sectors has contributed to
impose costs for irresponsible state behavior in cyberspace.
J. Underscore specific areas where efforts for international cooperation need to be concerted
to effectively impose consequences for irresponsible state behavior in cyberspace.
[Panel]
Moderator: Caitriona Heinl (Azure Forum for Contemporary Security Strategy)
Speaker: James Lewis (Center for Strategic and International Studies)
Speaker: Benjamin Ang (Nanyang Technological University)
Speaker: Karsten Geier (Centre for Humanitarian Dialogue)
[12:00-13:30, KST (GMT+9)] Luncheon
Changing Domains - The Cyber Info Realm 2023.pdfBenjamin Ang
CYBERSPACE: A global domain within the information environment consisting of the interdependent networks of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.
Definition
Foreign interference occurs when a foreign entity (state or non-state actor),
with hostile intent,
takes actions to deliberately, covertly and deceptively
disrupt the politics and policies of the target state
Source: Fog of war: how the Ukraine conflict transformed the cyber threat landscape, published by Google TAG (Threat Analysis Group)
Overview
1. Russian government-backed attackers have engaged in an aggressive, multi-pronged effort to gain a decisive wartime advantage in cyberspace, often with mixed results.
2. Moscow has leveraged the full spectrum of IO – from overt state-backed media to covert platforms and accounts – to shape public perception of the war.
3. The invasion has triggered a notable shift in the Eastern European cybercriminal ecosystem that will likely have long term implications for both coordination between criminal groups and the scale of cybercrime worldwide.
Sources: Defending Ukraine: Early Lessons from the Cyber War (Microsoft)*
Defense against a military invasion now requires for most countries the ability to disburse and distribute digital operations and data assets across borders and into other countries.
Recent advances in cyber threat intelligence and end-point protection have helped Ukraine withstand a high percentage of destructive Russian cyberattacks.
As a coalition of countries has come together to defend Ukraine, Russian intelligence agencies have stepped up network penetration and espionage activities targeting allied governments outside Ukraine.
In coordination with these other cyber activities, Russian agencies are conducting global cyber-influence operations to support their war efforts.
This calls for a coordinated and comprehensive strategy to strengthen defenses against the full range of cyber destructive, espionage, and influence operations.
The Strontium group was targeting Ukrainian institutions, media organizations, and government institutions and think tanks in the United States and the European Union
Microsoft got court orders 16 times to redirect internet traffic from Strontium domains into a ‘sinkhole’
How to defend the information domain
Public coverage and exposure
Clear counter-messages
Legislation
Build media and digital literacy
Work with citizens, influencers
Detect and expose fake accounts
Active measures
Work strategically, not reactively
Build a strong narrative that is more attractive than the adversary
Cooperation between ASEAN military civil academic in international cybersecur...Benjamin Ang
3 areas of cooperation
Council for Security Cooperation in the Asia Pacific (CSCAP)
Track II Network of ASEAN Defence and Security Institutions (NADI)
UN OEWG Open-ended Working Group on security of and in the use of information and communications technologies
Council for Security Cooperation in the Asia Pacific (CSCAP)
non-governmental (second track) process for dialogue on security issues in the Asia Pacific
informal mechanism for scholars, officials and others in their private capacities
to discuss political and security issues and challenges facing the region
provides policy recommendations to inter-governmental bodies
convenes regional and international meetings
establishes linkages with institutions and organisations in other parts of the world
exchanges information, insights and experiences in the area of regional political-security cooperation.
Track II Network of ASEAN Defence and Security Institutions (NADI)
Secretariat is RSIS
Aims of the forum
network and to build confidence and familiarity among the Asean think tanks and research institutions to facilitate closer cooperation.
policy analysts specialising in defence and security issues, academics researching security cooperation and defence officials to discuss issues of security cooperation that the Asean Summit and Asean Defence Ministers have raised
participants to think beyond their governments’ positions and to provide timely fresh ideas and relevant recommendations for the Asean defence track to consider.
UN OEWG on Cyber
Open-ended Working Group on security of and in the use of information and communications technologies
The group is mandated to
further develop the rules, norms and principles of responsible behaviour of States;
consider initiatives of States aimed at ensuring security in the use of information and communications technologies;
establish, under the auspices of the United Nations, regular institutional dialogue with the broad participation of States;
continue to study, with a view to promoting common understandings, existing and potential threats in the sphere of information security, inter alia, data security, and possible cooperative measures to prevent and counter such threats, and how international law applies to the use of information and communications technologies by States,
as well as confidence-building measures and capacity-building.
Technology Disruption Digital Inclusion and the Law.pdfBenjamin Ang
What is technology disruption?
A new technology that changes
The way things are done
Expectations and behaviors
Market or industry
Uber/Grab vs taxi business
Airbnb vs hotel business
Netflix vs TV, DVD, cinemas
Blockchain vs financial institutions
Google vs books, libraries
ChatGPT vs Google
How can technology disrupt the Law?
DoNotPay
https://donotpay.com/
Bizibot
https://www.btlnet.co.uk/digital-transformation-solutions-overview/bizibot
WeVorce
https://www.wevorce.com
OCBC Online Will Generator
https://www.ocbc.com/personal-banking/lifegoals/willgenerator/#/
Transcripts
https://fortherecord.com/transcript-express/
Law firms using Blockchain
https://www.raconteur.net/technology/blockchain/blockchain-revolutionising-legal-sector/
LawGeex AI vs human lawyers, on reviewing standard contracts
Accuracy
Time taken to review contract
Courts used technology to deliver justice during COVID
But litigants with resources had the advantage
https://www.pewtrusts.org/en/research-and-analysis/reports/2021/12/how-courts-embraced-technology-met-the-pandemic-challenge-and-revolutionized-their-operations
Disruption has no ethics. But we do.
Must bridge the Digital Divide
Parties may need help
https://www.ncsc.org/__data/assets/pdf_file/0026/53738/PPP-Technology-Digital-Divide-Considerations.pdf
Using AI for judgments
Benefits
Exclude legally irrelevant factors
Standardise decisions
Help courts to prioritise cases, increase efficiency
Encourage parties to settle if success is predicted to be unlikely
https://www.cppr.in/articles/predictive-justice-using-ai-for-justice-introduction
Risks
Over reliance on machine decisions
Algorithmic bias: bad history = bad future
Bad data feedback into bad data
Inability to explain decisions: bad for rule of law
https://www.suls.org.au/citations-blog/2020/9/25/predictive-judicial-analytics-implications-for-rule-of-law-and-the-legal-profession
Cases of AI bias in justice system
COMPAS (for probation)
Black defendants were 2x wrongly predicted to be high risk of recidivism
White defendants were 2x wrongly predicted to be low risk of recidivism
Black defendants were 2x more likely to be misclassified as high risk of violent recidivism
White violent recidivists were 63% more likely to have been misclassified as low risk
https://www.propublica.org/article/how-we-analyzed-the-compas-recidivism-algorithm
Public Safety Assessment (for bail)
More likely to recommend high bail for males than females
https://venturebeat.com/ai/study-finds-crime-predicting-judicial-tool-exhibits-gender-bias/
How does this type of AI work?
How does this type of AI work?
Where did the ML (Machine Learning) come from?
Garbage In = Garbage Out
Always check what’s going in and what’s coming out
Rand Report on Protecting Individuals using tech in the Justice
Why Application of International Law Applies to ASEAN.pdfBenjamin Ang
There is no international definition of these concepts in cyberspace
Armed attack
Use of force
Act of war
Traditional definitions require physical damage or physical injury
Rules of Law of Armed Conflict / International Humanitarian Law(but in cyber?)
Distinction – must distinguish between civilians and military targets
Proportionality – must avoid excessive harm to civilians / objects
Military necessity – allows force that is reasonable, lawful (see above), and operationally justified
Limitation – prohibits tactics that cause unnecessary suffering
Humane treatment – e.g., of captured prisoners
Do we need a Binding Legal Instrument?
US - No new international legal instrument needed, can interpret existing law
China - States must reach international consensus, new international legal instruments
EU - No new international legal instrument needed, can interpret existing law
ASEAN chooses its own terms on norms/law
ASEAN supported both UNGGE and OEWG tracks in 2018 – Indonesia, Singapore, and the Philippines said both processes were not incompatible
ASEAN has always followed its instinct of creating an internationally agreed, rules-based order based on its own interests, which is consistent with other arenas where international law or rules are unsettled
ASEAN may even consider plurilateral treaties
What ASEAN states need to move forward
Common language related to cyberspace
Legislation that can be translated across members
Capacity building in
Cyber issues, policy making, critical infrastructure protection (ASCCE) and
Military operations (ADMM Cyber and Information COE)
Confidence building measures e.g., CERT-CERT communications, contact lists
More participation from states, academia, and civil society
What is Cybersecurity – C, I, A?
Cybersecurity or Information Security?
Activities of foreign political, economic, military, intelligence, and information entities
The striving of countries toward dominance in the world information space
Development (by states) of information war concepts that create means for dangerous attack on the information spheres of other countries
Infringing the state’s control over information flows and public opinion (called “cyber sovereignty”)
ASEAN leaders
Value the principles of “mutual respect” and “non-interference”
View sovereignty as sacrosanct principle among ASEAN member states
Do not define ‘sovereignty’ – this provides flexibility in foreign and domestic policy
ASEAN member states also attach great importance to the creation of an international rules-based order,
which includes forming and adhering to international law and norms.
like the UN Convention of the Law of the Sea or UNCLOS.
Lessons learned from Capacity Building on International Cyber Norms in Southe...Benjamin Ang
Capacity building is recognized as a key to promote the adoption and implementation of international norms of responsible state behaviour in cyberspace. States at varying levels of cyber maturity benefit from these efforts, to develop a shared understanding of how international cyber norms support the stability of cyberspace, and to grow their own capacity and capabilities to implement these norms. This presentation draws on the experiences of the academics and practitioners who have been conducting cyber capacity building activities in southeast Asia and beyond, to derive lessons of what has (or has not) worked, some potential best practices, and to provide suggestions on how cyber capacity building can provide more value to the further growth of international cyber norms in the world.
UNGGE 2015 Cyber Norms
UN Open Ended Working Group (UN OEWG)
UN Singapore Cyber Programme (UNSCP)
Norms Implementation Checklist
RAP Matrix
ASEAN Ministers Cyber Conference (AMCC)
Capacity building
Confidence Building Measures (CBMs)
Cybersecurity and National Security in Southeast Asia 2022.pdfBenjamin Ang
The document discusses cybersecurity threats and challenges facing Southeast Asian countries. It notes that cybercrime and cyber attacks have increased in Southeast Asia, targeting both government and private entities. Advanced persistent threat groups have targeted several Southeast Asian countries to conduct espionage. The COVID-19 pandemic further accelerated cyber threats as more systems moved online. Southeast Asian countries also have differing maturity levels and approaches to cybersecurity. The document outlines various cyber capacity building initiatives underway in ASEAN to help address weaknesses, but more cooperation is still needed as cyber threats increasingly target the region.
Cybersecurity and Geopolitical Risk.pdfBenjamin Ang
Two mistaken views of Cybersecurity and Geopolitical Risk:
1. “It doesn’t affect me because I’m not a government entity or major target”
2. “There’s nothing I can do about it anyway”
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...Benjamin Ang
Slides from a talk given to Eunoia Junior College, Singapore
-------------------
Cyber Warfare questions
Are the concerns about cyber warfare overblown?
Why should young people care about cyber warfare?
What are the national/international systems or structures currently in place to protect us from cyber warfare? Are these protections adequate?
Considering that Singapore is a small country, is there really anything we can do in the face of the challenges posed by cyber warfare?
-------------------
Cybercrime Questions
How do scammers make Singaporeans lower their guard despite them already knowing that scams are prevalent in our society? Why do you think people still fall for scams?
By the time new types of scams are reported, new types of scams are already being created. How do you think the Singapore government can break this cycle?
How hard is it to find out criminals behind cyber attacks?
-----------
Information Operations questions
The Russo-Ukraine War, what are your thoughts on it being publicized on social media unlike many wars from the past?
Are there any political implications regarding the publication of the war on TikTok? Could posting the war on TikTok create any social issues?
Disinformation in Southeast Asia and Pro Russian Anti Ukraine NarrativesBenjamin Ang
Case studies of disinformation and misinformation from Southeast Asia including Asian examples of Pro-Russia Anti-Ukraine narratives at the start of the Russian invasion of the Ukraine. Presented at the Conference on Disinformation and Cybersecurity of the War Studies University, Warsaw Poland, in 2022. Refers to the RSIS Framework on Information, Influence and Interference, from the Centre of Excellence for National Security at the S Rajaratnam School of International Studies (RSIS) at Nanyang Technological University (NTU) Singapore
Foreign Interference and National Security - Law Society Public Law conferenc...Benjamin Ang
[ To read and download the Policy Report that this presentation is based on, see https://www.rsis.edu.sg/rsis-publication/cens/cases-of-foreign-interference-in-asia/ ]
The Public and International Law Committee of the Law Society of Singapore invites you to join us for the Public Law Conference 2021 which aims to promote interest in the administrative and constitutional law of Singapore, highlight new judicial decisions, and facilitate discussion of recent developments.
To be held online on 15 September, we are pleased to have the Minister for Home Affairs and Law, Mr K Shanmugam, deliver a keynote speech on the public law issues relating to online harms and foreign interference. These issues are important and topical as they have a significant impact on society today, not just in Singapore, but worldwide. This will be followed by a panel that will analyse and develop the themes raised in the keynote, as well as discuss possible solutions, including legislative solutions, to such issues, in the context of public law. The panellists will comprise the Honourable Minister himself, practitioners, legal officers and academics active in the fields of administrative and constitutional law.
This conference provides a platform to hear from legal experts, and for different sectors of the legal industry to share ideas. We hope it will be relevant to all legal practitioners, government decision-makers, public-sector policy makers, academics and law students interested in public law.
Technology Disruption in the New Normal, Digital Inclusion and the LawBenjamin Ang
Technology disruption has swept through legal practice and the justice system, as it has in every other aspect of life in our new normal of remote work and online access. While digital transformation has been hugely beneficial to our society, there are new legal and cybersecurity questions that we need to grapple with as we continue to serve the public. Among the public, varying levels of digital capability and access raise new issues of digital inclusion for us to address in policy and operations. This talk seeks to raise awareness of these issues and to develop ideas for practical application.
Infographic of the flow of Contract Law
Formation of Valid Contract
Offer, Acceptance, Consideration, Intention
Vitiating Factors which make a contract not valid
Misrepresentation, Mistake, Minor
Terms of Contract
Promises, Representations vs Warranties
Express vs Implied Terms
Discharge of Contract
Discharge by Breach - Actual and Anticipatory
Discharge by Agreement, Frustration of Contract
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)Benjamin Ang
The document discusses the vision and future of legal technology and how it can be used in one's career. It introduces Fiona, who is starting a business matching freelancers to clients, and how she uses legal tech like contract and agreement templates to help with her business. It then discusses how law firms and legal professionals are at a crossroads regarding technology, and how they can either fight it, ignore it, or use it to succeed. Finally, it outlines a 4-prong approach for the legal sector and legal tech providers involving identifying a baseline, improving technology, adapting/innovating, and inventing new legal tech.
Public education - enhancing the first line of defence against fake news - ...Benjamin Ang
This document discusses the role of public education in combating fake news. It begins by noting that over 25% of Singaporeans report encountering false news on social media. It then outlines various disinformation campaigns related to the coronavirus pandemic targeting different countries. The document explores why people create and spread disinformation, as well as how it spreads. It argues that public education around media literacy and critical thinking can strengthen defenses against online falsehoods. Specifically, it says education can help people discern truth from fake news and support grassroots initiatives. The document concludes by emphasizing the important role of public education in responding to disinformation.
Introduction to ICT supply chain (Cyber norms awareness) Benjamin Ang
The document discusses securing the ICT supply chain from cyber threats. It provides examples of past cyber attacks that targeted software supply chains, such as the Xcode Ghost attack in 2015 that compromised the iOS app developer toolchain. The document also discusses the risks of hardware supply chains being compromised through tactics like planting spy chips during the manufacturing and distribution process, as was reported done by the NSA on Cisco routers and servers from Amazon and Apple. It advocates breaking the cyber kill chain and securing different components of the ICT supply chain from chips to end customers to help stop threats.
Cyber norms (b) and (c) United Nations Singapore Cyber Programme 2019Benjamin Ang
This presentation explains two of the elevent Norms proposed by the UNGGE in 2015
Cyber Norm (b) States should not knowingly allow their territory to be used for internationally wrongful acts using ICTs; and
Cyber Norm (c) States should consider all relevant information, including the larger context of the event, the challenges of attribution in the ICT environment and the nature and extent of the consequences
Crime sensing with big data - Singapore perspectiveBenjamin Ang
This presentation examines the Potentials and Limitations of Using Big Data for Crime Estimation. Singapore laws discussed include Personal Data Protection Act (PDPA), Penal Code, Criminal Procedure Code (CPC). Topics covered include Crime Analysis, Crime Prediction, Algorithm Bias, and other risks. The video of this presentation can be found at https://youtu.be/kctB3lRLh2U
Fake news is merely the visible part of information operations / information warfare - disinformation tactics used by hostile states to destabilize their adversaries. This set looks at some of the tactics, why they work, and what we can do. First presented at the NTU Did You Know lecture series 2018.
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
United Nations World Oceans Day 2024; June 8th " Awaken new dephts".Christina Parmionova
The program will expand our perspectives and appreciation for our blue planet, build new foundations for our relationship to the ocean, and ignite a wave of action toward necessary change.
AHMR is an interdisciplinary peer-reviewed online journal created to encourage and facilitate the study of all aspects (socio-economic, political, legislative and developmental) of Human Mobility in Africa. Through the publication of original research, policy discussions and evidence research papers AHMR provides a comprehensive forum devoted exclusively to the analysis of contemporaneous trends, migration patterns and some of the most important migration-related issues.
The Antyodaya Saral Haryana Portal is a pioneering initiative by the Government of Haryana aimed at providing citizens with seamless access to a wide range of government services
RFP for Reno's Community Assistance CenterThis Is Reno
Property appraisals completed in May for downtown Reno’s Community Assistance and Triage Centers (CAC) reveal that repairing the buildings to bring them back into service would cost an estimated $10.1 million—nearly four times the amount previously reported by city staff.
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC CharlotteCori Faklaris
Working with data is a challenge for many organizations. Nonprofits in particular may need to collect and analyze sensitive, incomplete, and/or biased historical data about people. In this talk, Dr. Cori Faklaris of UNC Charlotte provides an overview of current AI capabilities and weaknesses to consider when integrating current AI technologies into the data workflow. The talk is organized around three takeaways: (1) For better or sometimes worse, AI provides you with “infinite interns.” (2) Give people permission & guardrails to learn what works with these “interns” and what doesn’t. (3) Create a roadmap for adding in more AI to assist nonprofit work, along with strategies for bias mitigation.
How To Cultivate Community Affinity Throughout The Generosity JourneyAggregage
This session will dive into how to create rich generosity experiences that foster long-lasting relationships. You’ll walk away with actionable insights to redefine how you engage with your supporters — emphasizing trust, engagement, and community!
karnataka housing board schemes . all schemesnarinav14
The Karnataka government, along with the central government’s Pradhan Mantri Awas Yojana (PMAY), offers various housing schemes to cater to the diverse needs of citizens across the state. This article provides a comprehensive overview of the major housing schemes available in the Karnataka housing board for both urban and rural areas in 2024.
Food safety, prepare for the unexpected - So what can be done in order to be ready to address food safety, food Consumers, food producers and manufacturers, food transporters, food businesses, food retailers can ...
Internet Society Singapore Chapter AGM 2019 and update for 2020
1. + Update on ISOC Activities 2020
Annual General Meeting
(Singapore Chapter)
isocsg@gmail.com
www.isocsg.org
Slides on Twitter @isocsingapore
27 Nov 2019
Presentation title – Client name
2. Programme
2
Attendance and Quorum
Confirm previous minutes from AGM 2018, and note matters arising from
previous AGM
Report on Statement of Accounts for FY2018/2019 (1 Jun 2018 – 31 Oct
2019)
Secretariat Update and Report of Activities FY2018/2019
To elect Committee Members, and Honorary Auditors FY 2019/2020
FY2019/2020 Planning
AOB
7. November 2019: Sponsored Day Pass to IETF 106 and meeting
with Andrew Sullivan, Chairman of ISOC
7
8. Election
8
POSITION 2018-2019 2019-2020
President Sofia Morales
Vice President Jay Nagarajan
Secretary Sanjeev Gupta
Treasurer Ankur Gupta
Programme Chair Benjamin Ang
Communication Chair
Education Chair
External Liaison Chair
Honorary Auditors Ang Peng Hwa
Bryan Tan
10. Upcoming Workshops
11
1. Promoting the Internet way of
networking
2. Extending encryption
3. Securing global routing
4. Increasing time security
5. Open standards and protocols
6. Building Community Networks
7. Fostering infrastructure and
technical communities
8. Measuring the Internet
9. Contract for the Web (Sir Tim
Berners-Lee plan to save Web)
https://contractfortheweb.org/
10. Update on UN OEWG and IGF
11. Targeted Programs
12
Aim: to connect individuals to vibrant
communities helping to build the
global Internet
- ISOC Policy Fellows to the
Internet Engineering Task Force
(IETF) (not taking applications at
the moment)
- Youth at the Internet Governance
Forum (IGF)
https://www.intgovforum.org/multili
ngual/content/youth-initiatives
14. internetsociety.org
@internetsociety
Get involved.
Quai de l’île 13
1204 Genève
Switzerland
+41 22 807 1444
11710 Plaza America Drive
Suite 400
Reston, VA 20190 USA
+1 703 439 2120
There are many ways to support
the Internet. Find out today how
you can make an impact.
15