APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Cyber Security
    Editor's Pick (1 - 4 of 8)
    left
    IAM May Help Secure Data, But It Needs to be Protected as Well

    Marc Ashworth, Chief Information Security Officer, First Bank

    The Changing Landscape of Cyber Security

    Scott Brandt, CIO & Director of IT, Texas Office of the Secretary of State

    Cyber Security - Integrated enterprise approach required to address the multifaceted challenges

    Sumit Puri, CIO, Max Healthcare

    Leadership Framework for Building Elite Teams

    Douglas Duncan, CIO, Columbia Insurance Group

    Four Cybersecurity Weak Spots You Should Care About When Others Don't

    Marc Probst, CIO & VP, Intermountain Healthcare

    Enterprise Security And The Elusive

    Andre' Allen, CISO, City of Houston

    Secure Text Messaging in an Academic Medical Center - Experience and Lessons

    Kari Cassel, SVP & CIO, UF Health

    It's Time to Turn Security Inside Out

    Gilad Raz, CIO, Varonis

    right

    Redefining cyber security with man & machines

    Bill Chang, CEO of Group Enterprise, Singtel

    Tweet
    content-image

    Bill Chang, CEO of Group Enterprise, Singtel

    Our digital economy is rapidly evolving with more enterprises introducing new and more efficient ways of doing business while building their innovation capabilities. As our digital footprint expands, the risk of cyber-attacks and breaches against many enterprises is fast rising. Take the worldwide cyber-attack in May this year, caused by the WannaCry ransomware which affected more than 230,000 computers in 150 countries. The ransomware disrupted healthcare providers and crippled emergency room operations at U.K. hospitals. A number of global logistics firms and shipping lines were also affected, causing them to go manual and use spreadsheets to run their businesses for weeks. That adversely impacted overall productivity. In September, Equifax, a US-based consumer credit scoring firm, lost the personal identifiable information (PII) of 143 million Americans. The unprecedented cyber-attack compromised the personal data of half the US population, triggering a management shake-up and calls for a Congressional inquiry.

    All these alarming developments in cyber security breaches create significant challenges in cyber defence. Clearly, organisations can no longer depend on the traditional ways of handling critical information security that primarily rely on cyber security personnel. We currently lack more than one million cyber security professionals globally. This problem will worsen over the next few years as global demand outstrips supply of well-trained cyber security professionals. Cyber hackers also have much more sophisticated capabilities that utilise resources like advanced computing and automation which allow them to launch new malware strains at record pace and being introduced at more than a few hundred thousand strains a month globally.

    With the fast-paced development of cyber malware, a number of legacy defences would prove ineffective against these attacks. Compounding this challenge, the amount of data and "surface area" that the cyber defenders have to secure are exponentially increasing as more and more businesses become digital and devices get increasingly interconnected.

    With the fast-paced development of cyber malware, a number of legacy defences would prove ineffective against these attacks

    There needs to be a more scalable and sustainable way for organisations to deal with these serious challenges, one that relies not only on highly-trained cyber professionals, but requires global threat telemetry capabilities, a strong eco-system partnership and state-of-the-art computing machines to help augment their cyber professionals.

    Innovations in cyber defence now include the combined use of cyber analytics, automation and even the use of Artificial Intelligence (AI) to augment capabilities of cyber security defenders so they can stay ahead of the cyber attackers. The use of cyber analytics allow organisations to analyse billions of events every day to identify the key events that need to be investigated in-depth, real-time, and at a much quicker pace. That’s in contrast to the traditional way of relying on cyber professionals who manually analyse the volume of data that need to be investigated at regular intervals. The automation of cyber threat correlation and responses look promising, based on what has been uncovered through advanced data analytics. Being able to respond much faster to cyber threats is crucial as this will enable organizations to narrow the gap between identifying the threat and launching the necessary counter measures, thereby reducing the loss of critical information.

    AI through machine learning holds great promise in the field of cyber defence. Machines that continuously learn from cyber attacker patterns, user behaviour anomalies and are able to launch rapid counter measures with greater speed and scalability with the use of AI will be one of the hallmarks of the cyber defence going forward. The rapid deployment of machines in cyber defence, whether be it in cyber analytics, automation and the use of AI, however, cannot replace the cyber professional, the key link at the heart of it all. The key question is what are new skill sets needed by cyber professionals to stay relevant in the world where cyber threats evolve so rapidly? There definitely is a continuous need to upgrade the skills of the cyber defenders while machines take on a number of tasks traditionally done by humans. Companies have to continuously develop and hone the skills of their cyber defenders to higher value added areas like incident response, consulting, smart automation development, and analysis of the big data gathered.

    In 2016, the average time when cyber defenders identify a cyber-breach within their companies was about 200 days with another 90 days to put in the necessary counter measures in place. This is still too slow as significant critical data would have already been lost within days between the time the breach is detected and the mitigation response is made. In the case of Equifax, the company lost the PII data of half the US population in about 60 days. It is hoped that with well-trained cyber professionals using global threat telemetry, cyber analytics, automation, and AI as "force multipliers" would help reduce the cyber threat detection and response time to minutes, strengthening overall cyber defences, and giving the industry a more sustainable approach to combating future cyber-attacks.

    tag

    Cyber Threats

    Big Data

    Information Security

    Machine Learning

    Weekly Brief

    loading
    Top 10 Cyber Security Companies in APAC - 2024
    ON THE DECK

    Cyber Security 2024

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Why Compliance Needs a Seat at the Strategy Table

    Why Compliance Needs a Seat at the Strategy Table

    David Koh, Head, Legal & Compliance (Singapore) and Operational Risk Management Country Lead, Perpetual Limited
    Streamlining Operations and Empowering Teams in Facilities Management

    Streamlining Operations and Empowering Teams in Facilities Management

    Shaye Rogers, Workflow Support Manager, Cushman & Wakefield
    Technocreativity: The Synergy Of Technology And Creativity

    Technocreativity: The Synergy Of Technology And Creativity

    Tran Nguyen Phi Long, Group Head Of Retail Marketing, Pnj Group
    Leading It And Digital Transformation At Ikea: Insights From An Industry Veteran

    Leading It And Digital Transformation At Ikea: Insights From An Industry Veteran

    Sigit Triwibowo, Head Of It And Digital, Chief Technology And Digital, Ikea
    Executive Leadership And Digital Transformation In The Global Fashion Industry

    Executive Leadership And Digital Transformation In The Global Fashion Industry

    Eiko Ando, E-Commerce And Digital Director, Pvh Corporation
    Digital Transformation in Fashion Retail - From Efficiency to Experience

    Digital Transformation in Fashion Retail - From Efficiency to Experience

    Le Van, CTO, YODY Fashion
    Driving IT Transformation at Lactalis Australia

    Driving IT Transformation at Lactalis Australia

    Sabina Janstrom, Chief Information Officer, Lactalis Australia
    AI Adoption in Hospitality: Striking the Balance Between Innovation, Excellence and Trust

    AI Adoption in Hospitality: Striking the Balance Between Innovation, Excellence and Trust

    Phiphat Khanonwet, Head of IT, Onyx Hospitality Group
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://cyber-security.apacciooutlook.com/cxoinsights/redefining-cyber-security-with-man-machines-nwid-4612.html