Table of contents exchange of letters with the minister executive summary



Download 5.91 Mb.
View original pdf
Page313/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   309   310   311   312   313   314   315   316   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019

COI Report – Part VII
Page 398 of 425

to the Cluster ISO or GCIO. This was not covered in either of the documents mentioned above.
As such, key front line personnel like Katherine, Lum, and Sze
Chun, were unaware of who to report to when suspicious indicators were observed. This resulted in confusion and consequent delays in response. While a process for Cyber Incident Security Response was developed for IHiS staff, this relates to IHiS company systems, rather than to Cluster systems. In addition, no incident reporting process was developed for SingHealth officers.
1156. IHiS is not alone in this regard. A 2018 study
111
found that found that 77 percent of organisations surveyed did not have a formal security incident response plan. Almost half of the organisations indicated that their plan was either informal and ad hoc, or nonexistent.
49.1.1
The need for an incident response plan
1157. An effective incident response plan is critical for all levels of employees, with specific plans in place for Cluster staff and IHiS employees. This is essential because it is not a matter of if a cyber attack will happen it’s a matter of when. As CE, CSA said We need to assume the mindset that it is a matter of when, not if, our systems are breached. There is no such thing as “100% cybersecurity”, and defending our cyberspace will be a ceaseless battle
1158. The lack of an incident response plan increases the likelihood of security incidents going undetected and unreported. Even where an incident is detected, the lack of a clear and well-thought out response plan would result in confusion and fragmentation of response. This would give the attacker valuable time in The 2018 study was by the Ponemon Institute, which conducts independent research on consumer trust, privacy, data protection and emerging data security technologies.



Download 5.91 Mb.

Share with your friends:
1   ...   309   310   311   312   313   314   315   316   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page