Story image

Singapore Govt leads massive cyber training exercise for CIIs

19 Jul 17

The Cyber Security Agency of Singapore (CSA) put the government’s incident management and emergency response plans to the test yesterday, as part of the second trial of ‘Exercise Cyber Star’.

The exercise, part of an effort to improve the response times across all 11 designated critical information infrastructure (CII) sectors in Singapore.

More than 200 participants including sector leads and CII owners from the eleven sectors participated in the exercise. The sectors included aviation, healthcare, land transport, maritime, media, security & emergency, water, banking, finance, energy, government and infocomm sectors.

The exercises covered simulated cyber attack scenarios that covered different areas, such as web defacement, widespread data exfiltration malware, ransomware, DDoS attacks and cyber-physical attacks.

CSA chief executive David Koh says, “These exercises are important in bringing all our critical sectors together to strengthen our incident response plans and enable better cross-sector coordination. With greater interconnectivity, and proliferation of cyber threats, the ability of our critical sectors to respond promptly to attacks is vital”.

The exercise also included a series of complex scenatio planning sessions, workshops and tabletop discussions, in addition to the final exercise that was held yesterday.

Deputy Prime Minister Teo Chee Hean attended the exercise, alongside Minister-in-Charge of Cybersecurity, Dr Yaacob Ibrahim and Senior Minister of State for Communications, Information and Education, Dr Janil Puthucheary.

All three ministers were briefed on the exercise and watched Singapore’s National Cyber Incident Response Teams (NCIRTs) undergo technical validation exercises in a cyber range.

The NCIRTs comprise representatives from the CSA, Govtech, MHA and MINDEF incident response teams, and are part of the Tier 1 and Tier 2 response under the national cyber response plan.

Last week the CSA announced that it is seeking feedback on a proposed bill to put more onus on the owners of CIIs in regards to cyber threats, meaning owners have a responsibility to protect the assets from cyber attacks before they occur.

The CSA is also seeking more control over cyber threat and incident management and to licence regulation of penetration testing and managed security operations services.

“Against the backdrop of proliferating cyber incidents globally and locally, it is imperative that we take a more pro-active and holistic approach to strengthen our resilience against cyber-attacks, especially for CIIs. New cybersecurity legislation is needed so that we can take pro-active measures to protect our CIIs, respond expediently to cyber threats and incidents and facilitate sharing of cybersecurity information across critical sectors”.

Interested parties have until 5pm, 3 August 2017 to submit feedback.

Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.
What disaster recovery will look like in 2019
“With nearly half of all businesses experiencing an unrecoverable data event in the last three years, current backup solutions are no longer fit for purpose."
Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”
McAfee named Leader in Magic Quadrant an eighth time
The company has been once again named as a Leader in the Gartner Magic Quadrant for Security Information and Event Management.
Symantec and Fortinet partner for integration
The partnership will deliver essential security controls across endpoint, network, and cloud environments.
Is Supermicro innocent? 3rd party test finds no malicious hardware
One of the larger scandals within IT circles took place this year with Bloomberg firing shots at Supermicro - now Supermicro is firing back.
25% of malicious emails still make it through to recipients
Popular email security programmes may fail to detect as much as 25% of all emails with malicious or dangerous attachments, a study from Mimecast says.