SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
Cyber
Security
The not-so-obvious skill all

professionals must learn

orelse…
Darwin Jayson Mariano

Dealing with cyber security in the government sector is a high stakes game,
especially if the attack could affect thousands, if not millions of individuals, being
served by a particular government agency or department. To combat cyber-attacks
most effectively, cyber security professionals can no longer just be equipped with
IT security skills, according to Naeem Musa, Chief Information Security Officer
for Federal Energy Regulatory Commission, US Government. They also need to
learn a skill many IT professionals don’t even consider.

Q
A

How would you characterize the current level of cyber-attacks in the USA?
What strategies do you employ to address these?
Naeem Musa: Not only has there been an increased level of attack, we’ve also noticed
an increase in the level of sophistication of these attacks. Whether it’s state sponsored
or triggered by criminals looking to achieve financial gain, we need to stay vigilant. In
the United States, we depend on IT systems in almost every aspect of our lives so we
have to make sure that we have the means to keep our IT systems safe and secure.

For more information about 4th Annual Cybersecurity for Government Asia,
visit www.cybersecurityasia.com, email enquiry@iqpc.com.sg or call +65 6722 938
My role obviously involves protecting our infrastructure to ensure that our data
remains confidential. However, lately, we see a heightened level of attacks on our
financial institutions, mostly driven by organised crime whose objective is to commit
financial fraud and identity theft. There are state sponsored attacks that our government
is also obviously addressing but that is not something I’m directly involved in.
In addressing these issues, one of the most effective strategies is to educate the user
community. But in dealing with the larger issue of cyber security, it is important to be
aware of this “three-legged stool” strategy, which is: 1) technology, 2) process and 3)
people. You really have to focus on each of those areas.
You have to have a streamlined process and procedures in place to respond to an
incident. You have to have the right level of technology in terms of the right firewalls
and Trojan infection mechanisms. However, all of that would be futile if you’re not
educating your user community. In our case, we’re doing a lot of education to the user
level to ensure that when those people are targeted by phishing attacks, whether by
unscrupulous individuals targeting them or them visiting different websites, potentially
getting infected, they know how to respond and act in a way that will not compromise
our IT security.
We’re also trying to create mechanisms to prevent people from going to the wrong
sites so the chance of getting infected is minimised. We have this whitelisting and
blacklisting of sites, we deploy all kinds of technologies to prevent unauthorised
executables on the entire network. At the same time, we monitor and scan our network
regularly to see if there is any anomaly and then we try to detect, analyse and figure
out if those anomalies can pose a threat or if they are within the tolerance level.
So, really, a combination of the three: focus on the technology, focus on the processes
and creating awareness in the user community.

Q
A

From your perspective, how can governments in Asia, given the relative
uniqueness of this region, address issues related to cyber security?

Q
A

Given the nature of these attacks, should special emphasis be put on public
sector as opposed to private sector?

Naeem Musa: I think the cyber world is borderless. Organised crime does not
discriminate and will always go after the gain. They could launch targeted attacks in
Malaysia, Southeast Asia, Canada, Australia or the USA. As long as there’s a gain to be
had, they’re going to go after it. So in that regard, everybody is facing the same set of
challenges, especially from organised crime and state-sponsored espionage. We’ve
also heard in the news how specific countries are even targeting telecommunications
companies within the European continent. Bottom line is: the same potential for
attacks exists for everybody regardless of the region and physical geography.

Naeem Musa: Yes, certainly. Because the public sector is engaged in services to citizens,
any time there are attacks or disruptions; it impacts the level of services you give to the
public. In addition, you need to deal with whether it’s critical infrastructure that is at
risk or national security information that is at stake, which could potentially harm the
country. So you definitely have to have more focus on the public sector to ensure that
the information’s confidentiality, integrity and availability are protected.

For more information about 4th Annual Cybersecurity for Government Asia,
visit www.cybersecurityasia.com, email enquiry@iqpc.com.sg or call +65 6722 938
Q
A

What are the best practices that you use to implement a robust cyber security
program for government agencies?
Naeem Musa: I think every security professional has to understand that security is
a journey, not a destination. That means you could never do enough as the level of
sophistication of attacks increases at a very rapid pace. The bad guys are always one
step ahead. So the best strategy is to understand that it’s a continuous process,
a journey.
You have to continuously implement measures and put mitigating procedures in place.
You need to emphasise awareness among your employees and staff and get them the
right training. You have to practise incident response and be able to understand where
your data is in order to protect and assess the damage in case that data is compromised.
I think data leak prevention technology is maturing with time and if put in place, it
will help aid security professionals discover attacks. In the end, it all boils down to
combination of people, process and technology.
The other important thing that you need to ensure is buy-in from management.
Educate your management, don’t scare them. Educating and convincing your
management to be on your side is a lot better than using fear tactics.
Cyber security professionals are no longer just IT professionals, they are politicians. You
have got to be smart, be able to sell your ideas, lobby and be able to get support for
what you’re trying to implement. It is important to be able to get the funding that you
need for your programs because just like anybody else, you need budget. And it’s not
going to come easy unless you have the sophistication to lobby and sell your ideas to
the CFO or the agency that will fund you.

Naeem Musa, Chief Information Security Officer,
Federal Energy Regulatory Commission, USA ,
will be speaking about “Preventing Government Data
Leaks in an Increasingly Connected World” at the
4th Annual Cybersecurity for Government Asia
happening on 5-6 March 2014 in Malaysia. For more
information, visit www.cybersecurityasia.com

For more information about 4th Annual Cybersecurity for Government Asia,
visit www.cybersecurityasia.com, email enquiry@iqpc.com.sg or call +65 6722 938

Weitere ähnliche Inhalte

Mehr von Darwin Jayson Mariano

Inside Shanghai Tower - Exclusive interview with Chief Architect, Marshall St...
Inside Shanghai Tower - Exclusive interview with Chief Architect, Marshall St...Inside Shanghai Tower - Exclusive interview with Chief Architect, Marshall St...
Inside Shanghai Tower - Exclusive interview with Chief Architect, Marshall St...
Darwin Jayson Mariano
 
The Best Strategy for Asset Integrity
The Best Strategy for Asset Integrity The Best Strategy for Asset Integrity
The Best Strategy for Asset Integrity
Darwin Jayson Mariano
 
Aiming for Alpha - Opportunities and Challenges for ETF Investors in Asia
Aiming for Alpha - Opportunities and Challenges for ETF Investors in AsiaAiming for Alpha - Opportunities and Challenges for ETF Investors in Asia
Aiming for Alpha - Opportunities and Challenges for ETF Investors in Asia
Darwin Jayson Mariano
 
6 Game-Changing Tips to Deal with Risk Management and Drug Safety Audit
6 Game-Changing Tips to Deal with Risk Management and Drug Safety Audit6 Game-Changing Tips to Deal with Risk Management and Drug Safety Audit
6 Game-Changing Tips to Deal with Risk Management and Drug Safety Audit
Darwin Jayson Mariano
 
How effective is double skin façade in preventing building heat loss
How effective is double skin façade in preventing building heat lossHow effective is double skin façade in preventing building heat loss
How effective is double skin façade in preventing building heat loss
Darwin Jayson Mariano
 
Nagging Dilemmas in Airport Expansion (and how to deal with them)
Nagging Dilemmas in Airport Expansion (and how to deal with them)Nagging Dilemmas in Airport Expansion (and how to deal with them)
Nagging Dilemmas in Airport Expansion (and how to deal with them)
Darwin Jayson Mariano
 
The 3-Tier Process to Keep Pavements and Runways in Top Form
The 3-Tier Process to Keep Pavements and Runways in Top Form The 3-Tier Process to Keep Pavements and Runways in Top Form
The 3-Tier Process to Keep Pavements and Runways in Top Form
Darwin Jayson Mariano
 
Latin America vs Southeast Asia: The Race for Private Equity Supremacy
Latin America vs Southeast Asia: The Race for Private Equity SupremacyLatin America vs Southeast Asia: The Race for Private Equity Supremacy
Latin America vs Southeast Asia: The Race for Private Equity Supremacy
Darwin Jayson Mariano
 
The Best Private Equity Exit Strategy
The Best Private Equity Exit StrategyThe Best Private Equity Exit Strategy
The Best Private Equity Exit Strategy
Darwin Jayson Mariano
 
What you don’t know about Membrane Solutions
What you don’t know about Membrane SolutionsWhat you don’t know about Membrane Solutions
What you don’t know about Membrane Solutions
Darwin Jayson Mariano
 

Mehr von Darwin Jayson Mariano (20)

Cash Forecasting Trends in Asia
Cash Forecasting Trends in Asia Cash Forecasting Trends in Asia
Cash Forecasting Trends in Asia
 
The India BPO Industry Report 2013
The India BPO Industry Report 2013The India BPO Industry Report 2013
The India BPO Industry Report 2013
 
Inside Shanghai Tower - Exclusive interview with Chief Architect, Marshall St...
Inside Shanghai Tower - Exclusive interview with Chief Architect, Marshall St...Inside Shanghai Tower - Exclusive interview with Chief Architect, Marshall St...
Inside Shanghai Tower - Exclusive interview with Chief Architect, Marshall St...
 
The Best Strategy for Asset Integrity
The Best Strategy for Asset Integrity The Best Strategy for Asset Integrity
The Best Strategy for Asset Integrity
 
Aiming for Alpha - Opportunities and Challenges for ETF Investors in Asia
Aiming for Alpha - Opportunities and Challenges for ETF Investors in AsiaAiming for Alpha - Opportunities and Challenges for ETF Investors in Asia
Aiming for Alpha - Opportunities and Challenges for ETF Investors in Asia
 
6 Game-Changing Tips to Deal with Risk Management and Drug Safety Audit
6 Game-Changing Tips to Deal with Risk Management and Drug Safety Audit6 Game-Changing Tips to Deal with Risk Management and Drug Safety Audit
6 Game-Changing Tips to Deal with Risk Management and Drug Safety Audit
 
Designing a Super Tall Skyscraper
Designing a Super Tall Skyscraper Designing a Super Tall Skyscraper
Designing a Super Tall Skyscraper
 
How effective is double skin façade in preventing building heat loss
How effective is double skin façade in preventing building heat lossHow effective is double skin façade in preventing building heat loss
How effective is double skin façade in preventing building heat loss
 
Nagging Dilemmas in Airport Expansion (and how to deal with them)
Nagging Dilemmas in Airport Expansion (and how to deal with them)Nagging Dilemmas in Airport Expansion (and how to deal with them)
Nagging Dilemmas in Airport Expansion (and how to deal with them)
 
The 3-Tier Process to Keep Pavements and Runways in Top Form
The 3-Tier Process to Keep Pavements and Runways in Top Form The 3-Tier Process to Keep Pavements and Runways in Top Form
The 3-Tier Process to Keep Pavements and Runways in Top Form
 
Latin America vs Southeast Asia: The Race for Private Equity Supremacy
Latin America vs Southeast Asia: The Race for Private Equity SupremacyLatin America vs Southeast Asia: The Race for Private Equity Supremacy
Latin America vs Southeast Asia: The Race for Private Equity Supremacy
 
The Best Private Equity Exit Strategy
The Best Private Equity Exit StrategyThe Best Private Equity Exit Strategy
The Best Private Equity Exit Strategy
 
What you don’t know about Membrane Solutions
What you don’t know about Membrane SolutionsWhat you don’t know about Membrane Solutions
What you don’t know about Membrane Solutions
 
7 Most Significant Underground Projects in Asia Today [Infograph]
7 Most Significant Underground Projects in Asia Today [Infograph]7 Most Significant Underground Projects in Asia Today [Infograph]
7 Most Significant Underground Projects in Asia Today [Infograph]
 
Process Safety Blind Spots: EXPOSED [Infographic]
Process Safety Blind Spots: EXPOSED [Infographic]Process Safety Blind Spots: EXPOSED [Infographic]
Process Safety Blind Spots: EXPOSED [Infographic]
 
SKY HIGH - The 7 Most Remarkable Tall Building Projects in the World
SKY HIGH - The 7 Most Remarkable Tall Building Projects in the WorldSKY HIGH - The 7 Most Remarkable Tall Building Projects in the World
SKY HIGH - The 7 Most Remarkable Tall Building Projects in the World
 
The Changing Face of Asia's Geospatial Intelligence
The Changing Face of Asia's Geospatial Intelligence The Changing Face of Asia's Geospatial Intelligence
The Changing Face of Asia's Geospatial Intelligence
 
Battle of Mega Bridges - The 7 Highly Notable Mega Bridge Projects
Battle of Mega Bridges - The 7 Highly Notable Mega Bridge Projects Battle of Mega Bridges - The 7 Highly Notable Mega Bridge Projects
Battle of Mega Bridges - The 7 Highly Notable Mega Bridge Projects
 
TRAILBLAZING: Shared Services and Outsourcing Trends in Asia 2013
TRAILBLAZING: Shared Services and Outsourcing Trends in Asia 2013 TRAILBLAZING: Shared Services and Outsourcing Trends in Asia 2013
TRAILBLAZING: Shared Services and Outsourcing Trends in Asia 2013
 
The Chinese Luxury Market - A Visual Story
The Chinese Luxury Market - A Visual Story The Chinese Luxury Market - A Visual Story
The Chinese Luxury Market - A Visual Story
 

Kürzlich hochgeladen

Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Abortion pills in Kuwait Cytotec pills in Kuwait
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 

Kürzlich hochgeladen (20)

Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 

The not-so-obvious skill that cyber security professionals must learn or else

  • 1. Cyber Security The not-so-obvious skill all professionals must learn orelse… Darwin Jayson Mariano Dealing with cyber security in the government sector is a high stakes game, especially if the attack could affect thousands, if not millions of individuals, being served by a particular government agency or department. To combat cyber-attacks most effectively, cyber security professionals can no longer just be equipped with IT security skills, according to Naeem Musa, Chief Information Security Officer for Federal Energy Regulatory Commission, US Government. They also need to learn a skill many IT professionals don’t even consider. Q A How would you characterize the current level of cyber-attacks in the USA? What strategies do you employ to address these? Naeem Musa: Not only has there been an increased level of attack, we’ve also noticed an increase in the level of sophistication of these attacks. Whether it’s state sponsored or triggered by criminals looking to achieve financial gain, we need to stay vigilant. In the United States, we depend on IT systems in almost every aspect of our lives so we have to make sure that we have the means to keep our IT systems safe and secure. For more information about 4th Annual Cybersecurity for Government Asia, visit www.cybersecurityasia.com, email enquiry@iqpc.com.sg or call +65 6722 938
  • 2. My role obviously involves protecting our infrastructure to ensure that our data remains confidential. However, lately, we see a heightened level of attacks on our financial institutions, mostly driven by organised crime whose objective is to commit financial fraud and identity theft. There are state sponsored attacks that our government is also obviously addressing but that is not something I’m directly involved in. In addressing these issues, one of the most effective strategies is to educate the user community. But in dealing with the larger issue of cyber security, it is important to be aware of this “three-legged stool” strategy, which is: 1) technology, 2) process and 3) people. You really have to focus on each of those areas. You have to have a streamlined process and procedures in place to respond to an incident. You have to have the right level of technology in terms of the right firewalls and Trojan infection mechanisms. However, all of that would be futile if you’re not educating your user community. In our case, we’re doing a lot of education to the user level to ensure that when those people are targeted by phishing attacks, whether by unscrupulous individuals targeting them or them visiting different websites, potentially getting infected, they know how to respond and act in a way that will not compromise our IT security. We’re also trying to create mechanisms to prevent people from going to the wrong sites so the chance of getting infected is minimised. We have this whitelisting and blacklisting of sites, we deploy all kinds of technologies to prevent unauthorised executables on the entire network. At the same time, we monitor and scan our network regularly to see if there is any anomaly and then we try to detect, analyse and figure out if those anomalies can pose a threat or if they are within the tolerance level. So, really, a combination of the three: focus on the technology, focus on the processes and creating awareness in the user community. Q A From your perspective, how can governments in Asia, given the relative uniqueness of this region, address issues related to cyber security? Q A Given the nature of these attacks, should special emphasis be put on public sector as opposed to private sector? Naeem Musa: I think the cyber world is borderless. Organised crime does not discriminate and will always go after the gain. They could launch targeted attacks in Malaysia, Southeast Asia, Canada, Australia or the USA. As long as there’s a gain to be had, they’re going to go after it. So in that regard, everybody is facing the same set of challenges, especially from organised crime and state-sponsored espionage. We’ve also heard in the news how specific countries are even targeting telecommunications companies within the European continent. Bottom line is: the same potential for attacks exists for everybody regardless of the region and physical geography. Naeem Musa: Yes, certainly. Because the public sector is engaged in services to citizens, any time there are attacks or disruptions; it impacts the level of services you give to the public. In addition, you need to deal with whether it’s critical infrastructure that is at risk or national security information that is at stake, which could potentially harm the country. So you definitely have to have more focus on the public sector to ensure that the information’s confidentiality, integrity and availability are protected. For more information about 4th Annual Cybersecurity for Government Asia, visit www.cybersecurityasia.com, email enquiry@iqpc.com.sg or call +65 6722 938
  • 3. Q A What are the best practices that you use to implement a robust cyber security program for government agencies? Naeem Musa: I think every security professional has to understand that security is a journey, not a destination. That means you could never do enough as the level of sophistication of attacks increases at a very rapid pace. The bad guys are always one step ahead. So the best strategy is to understand that it’s a continuous process, a journey. You have to continuously implement measures and put mitigating procedures in place. You need to emphasise awareness among your employees and staff and get them the right training. You have to practise incident response and be able to understand where your data is in order to protect and assess the damage in case that data is compromised. I think data leak prevention technology is maturing with time and if put in place, it will help aid security professionals discover attacks. In the end, it all boils down to combination of people, process and technology. The other important thing that you need to ensure is buy-in from management. Educate your management, don’t scare them. Educating and convincing your management to be on your side is a lot better than using fear tactics. Cyber security professionals are no longer just IT professionals, they are politicians. You have got to be smart, be able to sell your ideas, lobby and be able to get support for what you’re trying to implement. It is important to be able to get the funding that you need for your programs because just like anybody else, you need budget. And it’s not going to come easy unless you have the sophistication to lobby and sell your ideas to the CFO or the agency that will fund you. Naeem Musa, Chief Information Security Officer, Federal Energy Regulatory Commission, USA , will be speaking about “Preventing Government Data Leaks in an Increasingly Connected World” at the 4th Annual Cybersecurity for Government Asia happening on 5-6 March 2014 in Malaysia. For more information, visit www.cybersecurityasia.com For more information about 4th Annual Cybersecurity for Government Asia, visit www.cybersecurityasia.com, email enquiry@iqpc.com.sg or call +65 6722 938