Resolve Systems was a showcase sponsor at the M.Tech Security Exchange event to discuss best practices and automation use cases for enterprise-wide security incident response. Primarily speaking to the audience, Resolve Systems explained how to help comply to the omnibus cybersecurity law protecting the 11 Critical Information Infrastructure (CII) sectors: Aviation, financial services, energy, public, healthcare, information and communications services, land and martime transport, security and emergency services, water supply, and media.
“The Act also rightly places the responsibility of cyber security on CII owners by clarifying their responsibility to conduct audits, risk assessments and participate in exercises. These are critical for the effective implementation of good cybersecurity policies and practices,” said David Koh, Cyber Security Agency of Singapore (CSA) CEO and Singapore’s Cybersecurity Commissioner.
Want more information of Singapore’s omnibus legislation? Read the Definitive Guide now.
Attendees of this event play a critical role in security incident response, spanning the 11 sectors most at risk. The Resolve Systems team was able to discuss the 3 most important needs to accelerate security incident response to help comply with the regulation and protect CII.
As discussed at the event, and confirmed in a recent ServiceNow/Ponemon report, Singapore is struggling with insufficient resources to keep up with cybersecurity vulnerabilities. In fact, 78% of Singapore businesses report they can’t stay ahead of just patch volume, which is a leading cause of breaches.
With a security incident response automation and orchestration platform, you can:
An automation solution that can do a health check to assess software updates and patching issues takes this time consuming task off the plate of the security engineers so they can focus on more pressing issues, while mitigating the risk of a breach.
Security Incident Response and triage requires input from multiple domain experts, from network to IT to security operations, for an effective security incident response plan. Collaboration difficulties between security, IT, and other technical groups choke incident response progress. Regardless of your industry, there is an influx of emerging technology, but how can you connect and extend legacy systems?
Regain the time lost coordinating across these technical and knowledge silos by breaking down the obstacles between security and IT with an enterprise-wide solution. Can the security operations team continue to succeed with only informal, ad hoc support from other technical teams? You’ll see this in the news headlines – the answer is no.
For effective security incident response, look at a solution like Resolve for a single pane of glass view that allows a security analyst to partner with system administrators in the relevant/affected technical team.
For more information about how Security Incident Response needs to reach beyond the SOC to achieve resolution, read the white paper now.
Since adding cybersecurity talent may not be possible as research suggests cybersecurity skills shortage is in fact getting worse, adding cybersecurity talent may not be possible. Just in Singapore alone, cyberattack volume increased by 14% last year, the severity of which increased by 25%! When you add to this the compounding issues of process gaps – in particular, when 57% say critical data and information for effective response is neglected because emails and spreadsheets are used to manage processes – what can be done?
“Cyber threats show no sign of abating,” said Mr. Koh.
To aide cybersecurity awareness, Singapore’s CSA launched a new campaign called Cyber Tips 4 You, which focuses on:
These 4 targets are part of a larger plan to improve awareness and increase the resiliency of Singapore. An average of 10 days was lost to Singapore’s security operations teams due to manually coordinating activies across teams and 60% say manual processes put them at a disadvantage with vulnerabilities.
What can be done? Prioritize the response effort with a security incident response plan focused on continuous improvement and automating one step at a time, and always have a contingency plan.
58% of cybersecurity professionals in Singapore attribute the root cause of data breaches in their organization to human errors. There are many vulnerabilities when responding to incidents; is there a way to mitigate the risk of human oversight?
A few steps can be taken to mitigate a breach, unite IT and security teams, and instill process improvement with automation:
If you’re looking to reduce MTTR and do more with less through automation and orchestration, read more about Resolve’s security incident response solution.
Learn more about the top 3 challenges and how to overcome them.
Find out how the Cognitive NOC has become the driving force in network management.
How to make your NOC performance reach its full potential.