TONY MAGHIRANG
in data privacy and crossborder data sharing amongst member states.
Useful tip: The European Union’s General Data Protection Regulation is a clarion call for organizations in the APAC region to pay attention to the data they collect and store. The GDPR can be a baseline to assess current gaps in compliance and help determine overall prevention posture of businesses. It may take several years before a similar framework emerges in APAC, but businesses can already use the GDPR’s policies as a way to start minimizing unnecessary personal data collection, and in the process, helping reduce cyber risks and exposure.
Forecast for 2019 - cloudy skies ahead. few areas of security, but implementing a cloud computing strategy also means that mission-critical data and systems will sit with third parties This intertwined ecosystem has made security a much more complex undertaking, especially for organizations already dealing with the dif - rity talent and making sense of the many point products available in the market today.
Legacy security systems, made up of various point products, have proven inadequate to prevent the rising volume and sophistication of cyberattacks. Too many security tools depend heavily on manual intervention, which can’t enact new protections quickly enough. Installing integrated, automated and effective controls in place can significantly reduce cyber risks, while allowing detection as well as prevention of threats, known and unknown, at every stage of the attack lifecycle.
Critical infrastructure (CI) proves to be really critical. CI or critical infrastructure has evolved to encompass other essential sectors, such as banking and financial services, telecommunications and the media. As CI goes digital and automated, cross-pollination has made corporate and industrial networks easier targets for cybercriminals. The UK’s National Cyber Security Centre has already warned that a cyberattack in the UK is inevitable, potentially taking aim at the elections and CI targets. The World Economic Forum Global Risk Report 2018 has to be among the top causes of global disruption, coming third after natural disasters and extreme weather events.
As a start, CI owners, both public and private, will have to put in place Zero Trust systems and ensure the segregation of access. They should move away from a compliance-driven approach to security, towards a stance that lives and breathes security. Regulators and owners can cocreate a regulatory framework that works for both, while - proach that spells: Think less from the start.”