Table of contents exchange of letters with the minister executive summary



Download 5.91 Mb.
View original pdf
Page208/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   204   205   206   207   208   209   210   211   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019

COI Report – Part VII
Page 248 of 425

budgetary resources. Gen. Alexander explained that a conflict of interest may arise if an organisation’s Chief Information Security Officer is made to report to its Chief Information Officer. Similar conflicts may arise if these functions are held by the same personas appears to be the case with the SingHealth GCIO. b) Is an IHiS employee. Potential conflicts may arise from this fact as the GCIO functions are shaped by IHiS and his KPIs are measured by IHiS.
719. To address the above challenges and to ensure that SingHealth senior management has appropriate oversight on cybersecurity risks, an alternative would be to appoint an independent and dedicated CISO for SingHealth with a direct reporting line to SingHealth senior management. A dedicated CISO for
SingHealth will not only have depth and breadth of knowledge about the threat landscape, protective approaches, tools and techniques to protect infrastructure and information, but a unique perspective on how to analyse and mitigate cybersecurity risks. This is consistent with Gen. Alexander’s recommendation that each company should appoint a CISO. The Committee notes that MOH is undertaking a horizontal review and assessment on IT governance, policies, standards and processes of MOH, MOHH, SingHealth and IHiS, and this issue maybe considered.



COI Report – Part VII
Page 249 of 425

37 RECOMMENDATION #2: THE CYBER STACK MUST BE
REVIEWED TO ASSESS IF IT IS ADEQUATE TO DEFEND
AND RESPOND TO ADVANCED THREATS
#PREVENTION DETECTION #RESPONSE
720. It is imperative for organisations to give sufficient prominence to technology when formulating and implementing an overall cybersecurity strategy. Of course, it is important that the correct governance structure and policies are in place – technology cannot replace those elements. However, no matter how sophisticated, no paper document or process will thwart an attack until you have strong IT security technologies in place.
721. In Gen. Alexander’s expert opinion, a comprehensive cybersecurity capability should be deployed and implemented, as cybersecurity teams cannot protect against threats that they cannot see and that are not detected by the cyber tools they are using. His vision of such a capability is one that not only includes the current set of cyber tools, but also leverages an expert system, behavioural analytics (which is rigorously tested and proven in the networks) and a collective security capability. In his opinion, such a capability would have been important in detecting the theft of credentials, lateral movement in the network, and data exfiltration in the Cyber Attack. Dr Lim echoes the sentiment that organisations like SingHealth need to subscribe to more effective cyber tools to analyse and detect more advanced and sophisticated cyber attacks.

Download 5.91 Mb.

Share with your friends:
1   ...   204   205   206   207   208   209   210   211   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page