JT Jeeraphun – stock.adobe.com
Singapore is shoring up its defences against a growing number of cyber security threats aimed at operational technology (OT) systems used in critical sectors such as healthcare and utilities.
Speaking at the OT Cybersecurity Expert Panel (OTCEP) Forum 2022 on 12 July, Singapore’s minister for communications and information, Josephine Teo, outlined the government’s approach in countering OT threats, starting with building a talent pool of OT security professionals.
To that end, she said the Cyber Security Agency of Singapore (CSA) will be funding 80 scholarships over three years for science, technology, engineering and maths (STEM) professionals to pursue the Master of Science in Security by Design at the Singapore University of Technology and Design (SUTD).
SUTD operates a cyber security research centre that hosts industrial testbeds to simulate critical infrastructure, providing scholars with access to some of the world’s best research, design, and training facilities for cyber-physical systems, she added.
The scholarship programme follows the launch of the OT Cybersecurity Competency Framework last year that details OT security roles with the corresponding technical skills and core competencies. Teo said through the framework, “we can better design programmes to support the training of cyber security professionals in OT, and the training of OT professionals in cyber security”.
Amid the rapidly evolving threat landscape, processes to mitigate threats against OT systems must be updated regularly. In that regard, the CSA recently revised the Cybersecurity Code-of-Practice, which specifies the minimum security requirements that operators of critical infrastructure should implement under Singapore’s Cybersecurity Act.
“Applicable to both IT and OT systems that are designated as critical information infrastructure, the Code-of-Practice has been updated to keep pace with developments in the cyber threat landscape, taking into account learning from its first iteration,” Teo said.
One of the challenges with OT security is that OT systems cannot be patched easily and readily because of the applications that come with them, especially those that still use outdated operating systems. Security evaluation is thus important to ensure that OT systems are not rife with vulnerabilities.
Noting that researchers and product evaluators need to work together to figure out how they can improve security evaluation technology, Teo said CSA and Nanyang Technological University launched Singapore’s National Integrated Centre for Evaluation in May 2022 to provide a one-stop facility for cyber security evaluation and certification.
Besides providing advanced equipment and conducting professional training courses, Teo added that the facility brings together different players in the security evaluation ecosystem to form a community of practice that will learn together and advance the field.
John Lee, managing director of Singapore-based Operational Technology Information Sharing and Analysis Center (OT-ISAC), which facilitates sharing of information related to OT security threats, noted that even as countries like Singapore have mandated minimum baseline security for critical sectors, there are still ways for attackers to compromise OT systems under the guise of third-party suppliers or by compromising other parts of the supply chain.
“Cyber security is a continuous process. OT operators should always be prepared to assume that a breach has occurred – which means that they are in response mode and will have to put in the controls that they may not have considered before,” he said.
The end of Amazon Care and acquisition of One Medical means Amazon is turning from employee health to direct to consumer.
Sustainability as a business initiative has rocketed up the priority list as investors, consumers and legislators demand …
Latest PPI data reveals a 3.1% month-over-month uptick for host computers and servers, while storage prices drop slightly and …
Hornetsecurity researchers say newly introduced safety measures from Microsoft have driven cybercriminals away from using Excel …
As cryptocurrency interest soars, cybercriminals are cashing in on the immaturity of some DeFi platforms and stealing hundreds of…
Looking to advance your cybersecurity career? Here are the skills you’ll need to win that CISO job, land a gig as a threat hunter…
Discover how modern application delivery controllers and web application firewalls can improve network provisioning processes and…
Bandwidth and throughput both indicate network performance. The terms are often used together, but bandwidth refers to capacity, …
The authors of a Cisco DevNet Professional DEVCOR study guide provide insights about the growth of network automation, CI/CD and …
File classification with File Server Resource Manager enables admins to classify and organize data. This tutorial shows how to …
Even with government money soon headed their way, top-tier semiconductor companies will still have to deal with a range of …
Blockchain has been a significant contributor to the global chip shortage. Explore the role this rising technology has played.
The vendor launched the Alation Cloud Service for Snowflake designed to enable Snowflake users to more easily use Alation’s data …
The vendor raised new money to continue to grow its database technology as the applications for analytics databases have expanded…
The leading commercial backer behind the open source Milvus database project is looking to advance the technology to build out a …
All Rights Reserved, Copyright 2000 – 2022, TechTarget
Privacy Policy
Cookie Preferences
Do Not Sell My Personal Info