COI Report – Part VII
Page
249 of
425 37 RECOMMENDATION #2: THE CYBER STACK MUST BE REVIEWED TO ASSESS IF IT IS ADEQUATE TO DEFEND AND RESPOND TO ADVANCED THREATS #PREVENTION DETECTION #RESPONSE
720. It is imperative for organisations to give sufficient prominence to technology when formulating and implementing an overall cybersecurity strategy. Of course, it is important that the correct governance structure and policies are in place – technology cannot replace those elements. However,
no matter how sophisticated, no paper document or process will thwart an attack until you have strong IT security technologies in place.
721. In Gen. Alexander’s expert opinion, a comprehensive cybersecurity capability should be deployed and implemented, as cybersecurity teams cannot protect against threats that they cannot see and that are not detected by the cyber tools they are using. His vision of such a capability is one that not only includes
the current set of cyber tools, but also leverages an expert system, behavioural analytics (which is rigorously tested and proven in the networks) and a collective security capability. In his opinion, such a capability would have been important in detecting
the theft of credentials, lateral movement in the network, and data exfiltration in the Cyber Attack. Dr Lim echoes the sentiment that organisations like SingHealth need to subscribe to more effective cyber tools to analyse and detect more advanced and sophisticated cyber attacks.
Share with your friends: