Page 33 - ADT NOVEMBER - DECEMBER 2022 Online Magazine
P. 33

 COLUMN


































        MEETING COMPLIANCE


        SHOULD NOT

        BE A STRUGGLE





        Last month, the Cyber Security Agency (CSA) announced that it
        established an interagency counter-ransomware task force to tackle
        a growing concern in Singapore. The task force’s mission is to develop
        and make recommendations on policies, operational plans, and
        capabilities to improve the country’s counter-ransomware efforts.

        Establishing the task force aligns with another CSA effort launched
        earlier this year to protect the long-term security of Singaporean
        businesses. The Cybersecurity Code of Practice for Critical Information   Jeremy Ho,  Managing Director for Southeast Asia,
        Infrastructure – Second Edition, built on the Cybersecurity Act 2018,   Hong Kong, and Taiwan at SentinelOne
        published new requirements for Critical Information Infrastructure
        owners (CIIO). CIIOs must proactively search for signs of malicious   maritime, land transport, healthcare, banking
        activity within a Critical Information Infrastructure (CII), which they   and finance, water, security, emergency, and
        call threat hunting.                                           media companies.

        CSA believes that detection requirements like threat hunting will help
        the CIIO understand and implement the required people, processes,  WHAT IS THREAT HUNTING?
        and technology needed to detect malicious activity and vulnera-
        bilities. This includes the monitoring of traffic and logs, as well as a   According to the legislation, threat hunting is “a
        search for any signs of malicious activity.                    proactive effort to search for signs of malicious
                                                                       activities that have evaded security defences
        From July 2022 onwards, all CIIs operating in Singapore are required   within the CII.” Threat hunters are able to
        to conduct threat hunting once every 24 months. This is applica-  uncover hidden threats that may be waiting
        ble to all services rendered, including any outsourced activities to   to execute an attack or find events that have
        a third-party vendor. The CIIO is accountable for the entire CII’s   already compromised the environment.
        cybersecurity posture, and has 12 months to comply with the regula-
        tion. CIIs include government agencies, Infocomm, energy, aviation,   Effective threat hunting helps uncover hidden
        ASIAN DEFENCE TECHNOLOGY                                                    NOVEMBER-DECEMBER 2022 | 33
   28   29   30   31   32   33   34   35   36