Loading
-
CISOs today are confronted with complex, constantly evolving cybersecurity challenges. At GovWare Focus, cybersecurity leaders met with their peers, partners, and policymakers to discuss a broad range of topics, including the importance of collaborative defence, automation, and focusing on the basics when securing networks. -
Complying with relevant cybersecurity standards and best practices can significantly bolster an organisation's cybersecurity posture. But how can businesses ensure that their plans are correctly implemented, and how can they tell when standards or best practices are not correctly applied? We speak with Siddharth Deshpande of Palo Alto Networks on how organisations can operationalise cyber best practices and establish trust with internal stakeholders.
-
The cybersecurity standards of tomorrow
5 min readCybersecurity standards are hardly new and are used by organisations to enhance their security posture and mitigate cybersecurity risks. We speak to a CISO and a Director of Digital Policy to learn how regular stakeholder communication, adopting a common language, and fostering an environment of trust are essential when deploying cybersecurity standards. -
As Southeast Asian countries digitise and deploy Operational Technology (OT) for managing critical infrastructure, the interconnected nature of these systems poses potential risks. What proactive measures can organisations and governments take to mitigate these dangers? Andre Shori, APAC CISO of Schneider Electric explains the dangers and offers some suggestions on how smart cities can enhance their readiness and resilience.
-
Closing the gap in OT security
5 min readAttacks against OT networks have not abated but have instead grown in sophistication and impact. How can we increase the security of OT systems and where do we start? John Lee, the Managing Director of the Global Resilience Federation shares his insights about the escalating risks and offers potential solutions to fortify OT security in our interconnected world. -
The data impact of AI and the road ahead
5 min readThe rise of artificial intelligence in various applications has put the spotlight on the importance of data protection. As artificial intelligence becomes increasingly integrated into a range of applications, from chatbots to decision systems, Professor Lam Kwok-Yan highlights the need for robust data protection measures to address potential risks in the ever-evolving AI environment. He talks about the importance of maintaining a balance between innovation and security, and how organisations can successfully navigate the evolving AI landscape while safeguarding their valuable information. -
The AI threat to cybersecurity
5 min readAI technologies like ChatGPT pose significant cybersecurity risks, including deep fakes, enhanced phishing attacks, and disruption of operational systems, says Luis F. Gonzalez, the Chief Data and AI Officer at Aboitiz Power. And CISOs who remain uninformed about the capabilities of AI risk being caught unprepared. He speaks to us about how cybersecurity leaders must adapt quickly to AI-enabled threats, develop an understanding of AI, and utilise it as a defense mechanism to effectively protect their organisations. -
Collaboration between the public sector and private companies is essential for effective cybersecurity. But how are public-private partnerships relevant, and how can the cybersecurity industry band together against new threats? At the CXO Plenary held at GovWare 2022, representatives from Google Cloud, Eclypsium, and the Cyber Security Agency of Singapore (CSA) shared their thoughts about the erosion of the traditional perimeter and the role of partnerships in this era of digital transformation.
-
Zero Trust and why organisations need it
5 min readWhy do security problems seem to be getting worse despite years of increasing spending on cyber security solutions? Can a Zero Trust approach help organisations deliver better outcomes? Drawing on his 25 years of experience in the cyber security industry, Gary Gardiner lays out what is Zero Trust, common misconceptions, and why we should seriously consider implementing it. Read about it here. -
Identity as the new perimeter: Why enterprises must act now
Branded Content | 5 min readAs employees increasingly shuttle between the home and office, the new perimeter is not bounded by the network, but by each employee in the organisation – wherever they might be. To stay secure, businesses must move beyond a perimeter security mentality and take steps to strengthen their cybersecurity posture through solutions that incorporate identity and access management (IAM) and governance control. Find out more here.