APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Digital Infrastructure
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    Editor's Pick (1 - 4 of 8)
    left
    Impact of Digital Transformation in Insurance

    Mohammed Sadiq, Head of Digital Analytics, BI & Automation at Al Rajhi Takaful.

    Cheers To Digital Partnerships In The Corporate World

    Pierre-Yves Calloc’h, Chief Digital Officer, Pernod Ricard

    How Being A Product Guy Is Shaping My Digital Marketing Mindset

    Pratama Agus Nugroho, Head Of Digital Marketing, Mnc Media Indonesia

    Beyond Digital Transformation

    EDWIN SUGIANTO, CHIEF OPERATING AND MARKETING OFFICER OF MANDIRI AXA GENERAL INSURANCE [EPA: CS]

    Digital Transformation: Is Change the Only Real Constant?

    Tim Glover, Head of Digital Technology, Countdown, New Zealand.

    How to Build A Successful Identity and Access Management (IAM) Program?

    Carlos Rodriguez, Director, IT Security & Risk, Citizens Property Insurance

    Securing Telco Cloud for the 5G Era

    Srinivas Bhattiprolu, Head of Advanced Consulting Service, Nokia Software

    Towards achieving Vision 2041: Shaping upICT infrastructure to expedite digitalization

    Rade Kovacevic, Chief Tehcnology Officer, Grameenphone

    right

    Preempting Future Risks with Advanced Security Technologies

    TzerYeu Pang, Head of Information Security Office, Mediacorp

    Tweet
    content-image

    TzerYeu Pang, Head of Information Security Office, Mediacorp

    The Continual Increase in Cybersecurity Risks in Today’s World

    The corona virus pandemic has hit cyber security hard. In implementing remote working arrangements to protect employees during this period, companies are now facing a situation where the amount of work processed outside the safety of internal company networks has increased. In fact, the sheer volume of data that needs to be secured with traditional perimeter defence methods has exploded. Not surprisingly, cyber actors have taken advantage of the situation, almost doubling the number of ransomware attacks alongside a sharp increase in critical and high vulnerabilities in security solutions such as VPNs over the past year.

    At the same time, companies continue to look at accelerating their digitalisation with the adoption of cloud computing, 5G, and maturing technologies like edge computing. While such rapid innovations will allow companies to adapt quickly to secure market opportunities, better engage consumers, and personalise services at scale, potential security breaches from digital innovation is real. Data breaches, for example, can result in the potential loss of consumer trust and result in long term negative impact on companies.

    Staying Ahead of the Game with Advanced Security Technologies

    Regardless of where a company is on the technology curve and how it is unlocking new concepts of working and service delivery, companies need to stay ahead of the game by canvassing forward-looking solutions to fulfil the adage of ‘security by design’.

    To achieve this, companies should undertake a fundamental overhaul of their network and security architecture. Perimeter defences, which are designed for the traditional office core and branch construct, are no longer adequate. Adopting prevailing concepts such as the zero-trust paradigm and pro-active defense should be adopted.

    That said, most companies cannot afford to start with a clean slate. In such circumstances, I recommend starting right with a zero-trust approach: this involves nailing down to-be architecture with a vision of cybersecurity for the company that looks at the usage of various technologies to be used and maps out how they are to be secured.

    Having robust identity and access management is also critical to establishing good security and is usually a good way to begin one’s organisational transformation. Companies can look at secure access security edge (SASE) solutions that combine network and security functions with wide area network (WAN) capabilities to support their dynamic, secure-access needs.

    The benefits of a SASE solution are also more easily identifiable to the company’s stakeholders. SASE reduces complexity in connecting diverse employees with multiple different devices and scenarios to SaaS, cloud, and on-premise resources, allowing for more consistent enforcement of security policies. SASE’s single-service model enables internal teams to focus on security effectiveness rather than the integration of various security functions. As a cloud service, SASE is readily scaled up or down and billed according to usage. This is an excellent feature, especially when companies need to experiment and fail quickly, and repeatedly, with new services for innovation. I believe this will provide more a sustainable solution to an organisation’s innovation needs.

    The next step is to build pro-active defences to address future risks with good risk assessment practices. Using a threat modelling tool is useful to quantify and visualise the threats and enable risk assessments to be conducted with speed and at scale.

    Standing Guard against Future Threats

    Lastly, review the threat models whenever there is new threat intelligence on the cyber actors in your industry or TTPs (Tactics, Techniques and Procedures) of threat actors which your company is worried about. Adapt and improve your defence by closing any vulnerable links. De-prioritise a patch when a vulnerable asset is less at risk. A threat modelling tool allows for near-continuous risk assessment that enables intelligence-driven defence.

    • The issue of cybersecurity has come to the fore in recent times with remote working being the norm for many people across the globe. In this environment of heightened risk, I discuss ways in which organisations can strengthen their guard against cybersecurity threats beyond traditional perimeter defence systems, and how adopting a zero-trust approach is key to achieving this.

    Better yet, add on a breach assault simulation (BAS) tool to verify the defences continuously. A BAS automatically probes for security holes caused by misconfigurations or other factors, thereby freeing up human expertise to focus on more critical areas. Besides constantly improving security, threat modelling and BAS tools are excellent ways to communicate risks and the value of new controls to the board.

    As Mediacorp’s Chief Information Security Officer (CISO), I have invested a significant amount of time and effort to build up models of the company’s networks, starting from the critical ones. I define various connection archetypes and associated security policies upfront, thus allowing users to simply pick the most suitable ones and proceed. This is much simpler than having to study every new requirement to provide a suitable security solution, which is especially important when you anticipate the need for many experiments to innovate work processes. Certainly in Mediacorp’s case, this approach enables more jobs, such as news editing or radio broadcasting, to be done remotely during these times. With this, I believe that consumers can look forward to better engagement through more high quality, interactive content that is delivered to them.

    tag

    Information Security

    Cloud Computing

    SaaS

    Identity and Access Management

    review

    Weekly Brief

    loading
    Top 10 Digital Infrastucture Solutions Companies - 2022
    ON THE DECK

    Digital Infrastructure 2022

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Cultivating a Sustainable Future through Collaboration

    Cultivating a Sustainable Future through Collaboration

    Jiunn Shih, Chief Marketing, Innovation & Sustainability Officer, Zespri International
    Mastering Digital Marketing Strategies

    Mastering Digital Marketing Strategies

    Tasya Aulia, Director of Marketing and Communications, Meliá Hotels International
    Building a Strong Collaborative Framework for Artificial Intelligence

    Building a Strong Collaborative Framework for Artificial Intelligence

    Boon Siew Han, Regional Head of Humanoid Component Business & R&D (Apac & Greater China), Schaeffler
    From Legacy to Agility Through Digital Transformation

    From Legacy to Agility Through Digital Transformation

    Athikom Kanchanavibhu, EVP, Digital & Technology Transformation, Mitr Phol Group
    Change Management for Clinical Ancillary Teams: Aligning Practice with Policy and Progress

    Change Management for Clinical Ancillary Teams: Aligning Practice with Policy and Progress

    Ts. Dr. James Chong, Chief Executive Officer, Columbia Asia Hospital – Tebrau
    Digital Transformation: A Journey Beyond Technology

    Digital Transformation: A Journey Beyond Technology

    John Ang, Group CTO, EtonHouse International Education Group
    Building A Strong Data Foundation: The Key To Successful Ai Integration In Business

    Building A Strong Data Foundation: The Key To Successful Ai Integration In Business

    Richa Arora, Senior Director Of Data Governance, Cbre
    Transforming Tollways Through People, Data and Digital Vision

    Transforming Tollways Through People, Data and Digital Vision

    Carlo Cagalingan, Chief Digital Officer and Chief Information Officer, Metro Pacific Tollways Corporation
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://digital-infrastructure.apacciooutlook.com/cxoinsights/preempting-future-risks-with-advanced-security-technologies-nwid-8919.html