Mr Speaker, the cyberspace is transnational and borderless. This means that cyberattacks can by conducted by anyone, from anywhere in the world. Regardless who the malicious actor is, putting in place cyber resilience measures to protect ourselves is key.
2021 put cybersecurity under the spotlight with a spate of cyberattacks and serious vulnerabilities discovered around the world; the most recent event of concern being the Log4Shell vulnerability found in an open-source Java package that is widely used by software developers. When there are known incidents and vulnerabilities, the Cyber Security Agency (CSA) takes immediate steps to ensure that our Critical Information Infrastructure (CII) and enterprises are secure.
In the case of Log4Shell, CSA called for two emergency meetings with CII sectors to issue technical details and mitigation solutions, and heightened monitoring for unusual activity. Public advisories and alerts were issued; trade associations and chambers were also briefed on the urgency for enterprises to implement the mitigation measures.
To strengthen our cybersecurity, CSA encourages adopting a “zero-trust” posture. This comprises two key principles: first, do not trust any activity on your networks without first verifying it and second, ensure constant monitoring and vigilance for suspicious activities. To raise standards, CSA is developing the CII Supply Chain Programme to ensure that CII owners and their vendors adhere to international best practices for supply chain risk management. At the same time, CSA also developed actionable cybersecurity toolkits and resources for businesses under the SG Cyber Safe Programme to improve their cyber defences. These toolkits and resources can be found on CSA’s website.
CSA has consistently advocated that the best defence against cyberattacks is a population that is vigilant and adopts good cyber practices. Businesses and organisations are responsible for their own cybersecurity and must take action to strengthen their posture. This includes regularly updating their software and systems, and practising incident response and business continuity plans to ensure that employees are well-prepared when incidents happen. Individuals should practise good cyber hygiene and stay vigilant against phishing links. We must all strengthen our defences to participate in the digital domain safely and securely.