response to cyber security threat nie s approach to
play

Response to Cyber Security Threat NIEs Approach to Information - PowerPoint PPT Presentation

Response to Cyber Security Threat NIEs Approach to Information Security Background NTU / NIE is corporatized in April 2006 (Not requires to comply with IM8) Mission - To provide effective ICT resources, services and


  1. Response to Cyber Security Threat

  2. NIE’s Approach to Information Security • Background – NTU / NIE is corporatized in April 2006 (Not requires to comply with IM8) • Mission - To provide effective ICT resources, services and infrastructure that would enable NIE to be an Institute of Distinction Strategy – Risk-based approach to manage NIE cyber security •

  3. Journey of NIE Information Security • Getting buy-in from senior management • Setting up information security team – Covers both ICT and non-ICT security risk • Adoption of standard and framework – Implementation of process centric information security management – ISO 27001 as the standard for managing information security – Continuous improvement (PDCA) being core to the standard

  4. Response to Cyber Security Threat • Identify – Understand the critical business function and possible business and IT risk – Review cyber security profile and incident regularly • Protect – Patch management – Mitigation controls

  5. Response to Cyber Security Threat (cont) • Detect – Manage security event and information holistically – Dedicate resources to response to cyber security incident • Respond – Conduct incident response (cyber security) exercise on a periodic basis – Awareness and training – Collaborate with industry partners such as Cyber Security Agency, Singapore Police Force, cyber security experts (Incident response and forensics), etc • Recover – Business continuity exercise – Engage legal and cyber security insurance services

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend