We can help with SG Cyber Safe Certification

PrivaBroadcast

Application Program Interface (API) Security

Modern Application program interfaces (APIs) have been providing developers more options to deliver efficient products/services in minimal time. Sources such as ProgrammableWeb provides a great directory to choose from over 15,000 APIs. However, with more data comes more security concerns. Businesses use APIs to connect services and transfer data and a robust API security strategy is key to improving an organisation’s security posture.

Privasec’s GRC Consultant featured in Symes Group Leadership of our time Report 2019.

Image Source: The Symes Report – Leadership of our times. (2019) Issue 5. Privasec’s GRC Consultant Vivienne Mutembwa was featured in Symes Group’s Leadership of our time Report 2019 – Women in Leadership. Read more here:   1) Can you describe your role/work and where and what you studied? I am a Consultant in the field of …

Privasec’s GRC Consultant featured in Symes Group Leadership of our time Report 2019. Read More »

Cyber Security in Aviation Industry

Just like many other industries, the aviation industry has reaped benefits of substantial digital transformation. But with more digitalisation comes more risk. The Atlantic Council recently published a report regarding aviation cybersecurity, based on a global survey of 244 respondents. In this report, the two main sets of challenges highlighted are:

1. Attempt to weave aviation cybersecurity into flight safety, security, and enterprise information technology has proven difficult.
2. The second challenge is third-party risk management. There seems to be an issue between suppliers and customers regarding cybersecurity, with many finding it difficult to incorporate best practices into purchases, as well as difficulties in developing consensus on adequate cybersecurity risk management and transparency.

Incident Management and Response

Cyber-attacks are inevitable to any business. But during a cyber-attack incident, there is no time to waste. Just like a 911 call, your cyber-security partner should start providing immediate remote support upon notification to assess the gravity of the incident and work to contain it.

Red Team + Blue Team = Purple Team

Traditionally, the Offenders (Red Team) and Defenders (Blue Team) have been considered two sides of the same security coin. While the Red team emulate an attacker exploiting a vulnerability in an organisation’s systems, the Blue team is responsible for building security controls to defend against the attackers. As both the activities are integral in improving the cyber security posture of a company, an integration between both mindsets is crucial in achieving the desired business objectives. Purple teaming process involves consistent knowledge sharing between both the Red and Blue teams for continuous process improvements:

– Defence informs the offence about their controls, monitoring and how to respond to the security incidents.
– Offence on the other hand, informs defence about TPPs (Techniques, Tactics and Procedures).

Putting a Dollar Value to Cyber Risks

Is it possible to calculate the return of investment on cybersecurity controls?

Traditionally, organisations have struggled to calculate the financial losses from cyberattacks/ fraud and prioritise security investments based on Return of investment (ROI). Frameworks such as APRA CPS 234 demand regulated entities to maintain information security capability commensurate with information security vulnerabilities and threats. However, the APRA CPS 234 framework doesn’t provide enough information to articulate cyber risks in financial metrics with which business executives and board are familiar with. FAIR is one framework that helps quantify the risks and measure the expected financial loss due to a cyber attack.

Scroll to Top