Orient Magazine Issue 67 - July 2018 | Page 19

Orient - The Official Magazine of the British Chamber of Commerce Singapore - Issue 67 July 2018 - Page 19
MATTERS OF OPINION:
FACING UP TO THE CYBER SECURITY CHALLENGE

intelligence solutions to better inform
us of emerging threats
• Start to think like the attacker - use
security testing services that allow a
vision of our vulnerabilities as the
attacker sees them

So, we see that whilst new technology presents some of the risks it can also contribute to the protective solutions. It’s really a combination of people, process and technology working together with good information sharing that will provide the answer.
The UK has developed a deep and productive dialogue with Singapore’s Cyber Security Agency and we share information and know-how across our governments. We also continue to work together in our shared pursuit of a free, well-regulated international cyberspace. The UK is also assisting other ASEAN States in increasing their cyber security capabilities.
Reuben Sinclair is a UK Government cyber security industry representative to Singapore and South East Asia. He advises public and private organisations on cyber security focusing on the strength of the UK cyber offer.

Reuben is pleased to be supporting UK cyber security firms exhibiting at Singapore International Cyber Week in September and encourages you to meet these with companies on the DIT Pavilion and hear how they are helping organisations with their cyber security challenges. You can contact him at
[email protected]

Michael Montoya,
Chief Cybersecurity Officer, Microsoft Asia

“Organisations – from businesses to governments function best where there is trust. Our global economy is on the cusp of creating entirely new markets for driverless cars, commercial space exploration, artificial intelligence, green energy, etc. Without trust, we impose limits on what we’re comfortable allowing technology to do for us. Digital transformation has made the need for safe and trusted technology a front-and-center factor for business success. As companies embrace the opportunities presented by cloud and mobile computing to connect with customers and optimize operations, they take on new risks. To succeed and thrive as digital enterprises in the years to come, organizations must leverage cybersecurity as a business enabler – a critical part of the natural flow of their business processes and cycles. Microsoft is empowering businesses in Asia Pacific to take advantage of digital transformation by enabling them to embrace the technology that’s available to them, securely through its secure platform of products and services, combined with unique intelligence and broad industry partnerships.”

Henry Tan,
Managing Director, NexiaTS Group

"How can cyber security help us? With the ever-changing tug-of-war between cyber attacks and cyber security products, today’s game-changer can be obsolete tomorrow. As entities grow in size and expand overseas, the identification and management of cyber assets becomes a significant challenge to organisations. How are you going to stay ahead
of the curve and ensure that you are making worthwhile investments to tackle your
cyber security concerns? In addition, the human element is the linchpin in making
or breaking a cyber security framework – have you ensured that your workforce
are in the best position for your cyber security solution to succeed?"

John Bittleston,
Founder & Chair,
Terrific Mentors International Pte Ltd

"Every consultant wakes up daily wondering if valuable data has been hacked. There are always some who find it is their turn for attention. Access to and interference with clients records is the greatest cyber worry. Intellectual property
and development programmes also rank high on the
list of cyber security needs. Protection of these should
be first to attract attention in SICW. Stronger and less cumbersome methods of protecting data than
passwords comes next in the need for better
cyber security. All passwords can be broken,
not all can be remembered. ‘Collective password’ programmes are vulnerable to decryption. A key
issue for cyber security is the ability to edit lists
of files that have been duplicated as part of a
backup system. There also needs to be attention
to the possibility of a one-system security token
running several different and discreet access
points and deactivated by an unexplained
change in environment."