Sign in to view Faizal’s full profile
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Faizal’s full profile
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Singapore
Sign in to view Faizal’s full profile
Faizal can introduce you to 7 people at DACTA Global
Join with email
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
382 followers
380 connections
Sign in to view Faizal’s full profile
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Faizal
Faizal can introduce you to 7 people at DACTA Global
Join with email
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Faizal
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Faizal’s full profile
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
About
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Activity
382 followers
-
Faizal Jufri shared this🔒 Shaping a Secure Future: Insights on Recent Data Breach at Poh Heng Jewellery Company, Singapore I’d like to shed light on a recent incident that has sparked important conversations around #cybersecurity within our industry. The implications of this breach serve as a stark reminder of the ever-evolving #threatlandscape and the importance of #proactivemeasures to safeguard sensitive data. The breach underscores the critical need for organizations, regardless of size or industry, to prioritize robust #cybersecurity measures and #governance. #Cyberhygiene and best practices are not mere buzzwords; they are the cornerstone of a resilient #securityposture. Organizations must adopt a proactive approach, implementing comprehensive security frameworks, regular assessments, and continuous monitoring to thwart potential threats. With my extensive experience and expertise in Governance, Risk, and Compliance (GRC) alongside Security Assessments, I am specialize in empowering organizations to fortify their defenses against #cyberthreats. Through my comprehensive suite of services, which includes #GRCconsulting and meticulous #SecurityAssessments, I work collaboratively with businesses to identify vulnerabilities, mitigate risks, and establish robust security protocols Now more than ever, it’s imperative for organizations to invest in cybersecurity measures to safeguard their #reputation, #customertrust, and bottom line. I invite you to connect with me to explore how we can collaborate to bolster your organization’s security posture and mitigate the risk of data breaches. Let’s prioritize security together and pave the way for a safer digital landscape.Poh Heng Jewellery hit by data breach, customers' personal information may have been compromisedPoh Heng Jewellery hit by data breach, customers' personal information may have been compromised
-
Faizal Jufri reposted thisFaizal Jufri reposted thisISO 27001 Audit Checklist - by Ministry of Security
-
Faizal Jufri reposted thisFaizal Jufri reposted this🚨 Must-Read: How to Deal With Smart Ransomware in 2024 🚨 Jump into the tricky world of 2024's ransomware with our newest study, made by our experts. Find out important things from our detailed report: 🔍 AI and Ransomware: Learn how smart technology and ransomware are changing together, making bigger threats. 🔐 Easy Tools for Anyone: Learn about simple ransomware tools on the Tor market that make hacking easier for everyone. 🚀 Warning from NCSC about AI: Read about the UK's cybersecurity warnings on how AI can be used for good and bad, and why we need safe AI development. 🎯 DeepLocker - A Sneaky New Virus: Discover how DeepLocker uses smart tech to hit specific targets, showing a new kind of threat. 🛡️ Fighting Back with Heimdal®: Get to know Heimdal's smart defense system, which uses AI to protect us better and faster. Be at the cutting edge of fighting cyber threats and arm yourself with the knowledge to beat smart ransomware. Check out our report for a full view of what's happening in cybersecurity and how to defend yourself with the latest technology. Stay informed, stay secure with DACTA. 🔗 https://lnkd.in/e7B8XXWH #Cybersecurity #AI #Ransomware #HeimdalSecurity #StaySafeOnline #SmartSecurity #InfoSec
-
Faizal Jufri reposted thisFaizal Jufri reposted this🚨 26 Billion Records Leaked from Prominent Digital Platforms 🚨 In a digital era where data is as valuable as currency, a monumental breach has surfaced, affecting global platforms such as Twitter, Dropbox, and LinkedIn. Termed the 'Mother of All Breaches' (MOAB for short), this leak could set a new precedent for cyber vulnerabilities. 💥 Breach Impact: - Extent: Over 26 billion records potentially compromised. - High-Profile Platforms: Among the affected are Twitter, Dropbox, LinkedIn. - Cybercrime Alert: This breach significantly raises the stakes for potential cybercrime. 🔍 What You Need to Do: - Head to Cybernews' leak checker: https://lnkd.in/dTJh59Xm. - Also, check Have I Been Pwned: haveibeenpwned.com for any previous leaks. Though the MOAB data isn't yet in these databases, they're your digital security guards, alerting you to breaches past and present. 🛡️ Protect Yourself: - Upgrade Your Passwords: Craft strong, unique passwords for each account and consider using a reputable password manager for optimal security management. - Regular Updates: Ensure that all your software, including antivirus and operating systems, are up-to-date to protect against the latest vulnerabilities and threats. - Stay Vigilant: Regularly monitor your accounts for any unusual activities. Remember, recognizing and acting on anomalies promptly is key to safeguarding your digital presence. Worried about your online presence? We've got your back. Visit our website for a free cyber consultation and let us secure your data fortress. #DataBreach #MOAB #CyberSecurity #CyberAwareness #OnlineSafety #CyberNews
-
Faizal Jufri reposted thisFaizal Jufri reposted thisWe are pleased to announce the business combination between DACTA Global (DACTA SG Pte Ltd) and DGL Investments No. 1 Inc. DACTA Global is a cybersecurity company headquartered in Singapore, specializing in end-to-end cybersecurity solutions for enterprises and government entities. ARC Group is acting as DACTA Global’s sole advisor in connection with this transaction. Thank you to Carlos Lopez, Joshua Mann, Nigel W. and the team who made it possible. • Read the full news article here: https://lnkd.in/dGVw2my4DACTA SG Pte. Ltd announces Business Combination with DGL Investments No. 1 Inc.DACTA SG Pte. Ltd announces Business Combination with DGL Investments No. 1 Inc.
-
Faizal Jufri reposted thisFaizal Jufri reposted this📣 Join Us for a Special Cybersecurity Webinar with Felicia King and Andrei Hinodache to kick off 2024, courtesy of Heimdal®! 📆 Mark Your Calendars 🔹 Date: January 18th, 2024 🔹 Time: 10 AM CST / 5 PM CET 🔹 Reserve Your Seat Today: https://lnkd.in/egc63Ffd Get ready to dive into the future of cybersecurity with us! DACTA is thrilled to invite you to a transformative online event that promises to reshape your security outlook for 2024! Why This Is a Game-Changer for You: 🔍 Exclusive Insights: Get a first look at the cybersecurity trends shaping 2024. 🛡️ Expert Strategies: Learn from the masters of cyber resilience. 💡 Practical Tips: Elevate your cyber readiness with top-notch practices. 💬 Join the Conversation: Engage the experts in an interactive live Q&A session. Meet Your Cybersecurity Heroes: • Felicia King: The vCISO who doesn't follow but leads, renowned for tackling tech giants and crafting security masterpieces. • Andrei Hinodache: The Cybersecurity Community Leader championing the digital realm with wisdom that only comes from years in the cybersecurity trenches. 🛑 Even if you can't make the live event, don't let that stop you! The on-demand recording can be accessed by registering. Keep the knowledge at your fingertips and the power in your hands. We look forward to having you there! #Cybersecurity #HeimdalSecurity #DACTA #DigitalSecurity #Webinar #vCISO #SecOps #InfoSec #FutureReady
-
Faizal Jufri reposted thisFaizal Jufri reposted thisAny Run Interactive Malware Sandbox To Analyse malware behavior : Try Free Trial https://lnkd.in/eEAfA3J5
-
Faizal Jufri liked thisFaizal Jufri liked thisCompleting my first half marathon yesterday was a meaningful personal milestone and a powerful reminder of the value of grit, discipline, and resilience. It challenged me to push beyond my comfort zone, test my limits, and stay focused through moments that felt both physically and mentally demanding. What made the experience especially significant other than the distance, is the decision to take on something difficult that I had never done before — and to see it through. Experiences like this reinforce an important truth: growth often comes from stretching beyond what feels familiar. Progress is built through consistency, perseverance, and the willingness to keep moving forward even when the path becomes hard. This first half marathon was a reminder that we are often capable of more than we realize when we commit fully, stay disciplined, and embrace the challenge.
-
Faizal Jufri liked thisFaizal Jufri liked thisIt was a pleasure to welcome Anitha C. to the office during her visit to Singapore. Thank you for your continued support and partnership and for making time to connect.
-
Faizal Jufri liked thisFaizal Jufri liked thisCS4CA & ManuSec: OT Security Summits by QG Media APAC 2026 left me thinking. Not about the slides. Not even the tech. But about the responsibility. Across every session, different industries, different countries, even government voices, the same message kept coming up: We’re securing systems that were never meant to be this connected. And the impact isn’t the same everywhere. In IT, it’s disruption. In OT, it can be safety. Real-world consequences. That hit me. A few things that really stayed with me: • IT and OT are no longer separate, but many still treat them that way • Resilience is becoming just as critical as prevention • Governments are stepping in more, shaping how critical infrastructure is secured • The biggest gap isn’t tools, it’s making all of this actually work in operations But honestly, what made the event memorable wasn’t just the content. It was the people. Grateful to have connected with Daisuke Mashima, Samantha Jawing, Ranjeet Chhapola, Leo P., Vijayaraj Suriyakumar, Vignesh V, Ikshvakoo Vaid, Shilpy Banerjee, David P. and many others I had the chance to meet. Those conversations made everything feel real. Because at the end of the day… We’re not just securing systems. We’re part of something that affects people more directly than we realise. And that’s something I’ll carry with me. #CS4CAAPAC #otsecurity #icssecurity #cpssecurity #iotsecurity #scada #criticalinfrastructure #cybersecurity
-
Faizal Jufri liked thisGood recognition for DXC. But the bigger story is this: AI is moving past experimentation. The bar now is simple — can it deliver real, scalable, and trusted outcomes? That’s where innovation starts to matter.Faizal Jufri liked this🏆 We’re proud to share DXC has been recognized for the first time on Fortune’s America’s Most Innovative Companies list. It's a milestone that reflects the momentum behind our AI‑first strategy and the impact our teams are delivering for customers. This fourth annual list highlights 300 companies leading the way in product innovation, process innovation, and innovation culture. Being included is a powerful validation of the work happening across DXC. As Holly Grant, SVP of Strategy & Innovation, puts it: “This recognition comes at a moment when the enterprise AI conversation is shifting from experimentation to real operational impact. That is exactly where DXC plays.” This recognition belongs to every team across DXC pushing innovation forward and helping customers move from AI ambition to enterprise‑scale outcomes. Learn more: https://dxc.to/4dFBkcv #DXCXponentialFortune's America's Most Innovative Companies 2026Fortune's America's Most Innovative Companies 2026
-
Faizal Jufri liked thisFaizal Jufri liked thisWe’re HIRING!!! Security Delivery Lead If you’re passionate about leading cybersecurity delivery, driving end-to-end outcomes, shaping strategic roadmaps, influencing stakeholders, and translating complex cybersecurity and business challenges into clear, actionable security solutions, Let's connect... https://lnkd.in/gtvdd9A8
-
Faizal Jufri liked thisPassed my OSCP (OffSec Certified Professional)! 🎉 This one has been on my list since 2019, when I first started out in cybersecurity. I didn't feel ready then, and for a long time, I genuinely thought I might never get around to it. After a lot of honest conversations with friends, I finally decided to stop waiting and just go for it. The OSCP exam is 24 hours, and I cleared the 70 points needed to pass in about five to six hours (with roughly an hour's break in between). I kept going, hit 90 points, and wrapped up. All for the love of the game. 𝘋𝘦𝘧𝘪𝘯𝘪𝘵𝘦𝘭𝘺 not because I had a 30% assessment due the next day that I hadn't touched yet and needed to get to. All in, exam and report took me around 11 hours. My partner put it best: "Wah, you waited 7 years to clear the exam in less than 7 hours." Bear with the broken record here, but doing OSWP first was genuinely one of the better decisions I made. It gave me the chance to get familiar with the proctoring system, get comfortable resetting my machine mid-exam, and get a feel for what exam conditions would look like. So when OSCP came around, my exam opened on a smooth note, and that early momentum made a real difference to my headspace. A huge thank you to my friends who lent resources, talked through techniques with me, checked in, or simply cheered me on. Special shoutout to Glendon, Shannen, Brandon, Wei Feng, Charlene, Yen Hao, Sim Yee, Ivan, Hong Xuan Lim, Yin Kit, Ivan, Axel, Jing Hui, Andre! Looking back, I took my exam just 1.5 weeks after getting my OffSec account. Genuinely one of the more unhinged decisions I've made, but here we are. My partner keeps asking what I'm taking next. My friends say I'm taking a break. I'll let you decide which camp is right 🤪OffSec Certified Professional+ (OSCP+) • Zara Teo Xiao Xuan • OffSecOffSec Certified Professional+ (OSCP+) • Zara Teo Xiao Xuan • OffSec
-
Faizal Jufri liked thisFaizal Jufri liked thisAnd the momentum continues for DXC APJ! Great to have Chris Drumgoole, DXC’s President for Global Infrastructure Services, visit our team in Australia last week. The message was clear; our customers trust the stability we’ve built, and with our AI‑native innovation and Customer Zero approach, they’re relying on DXC Technology to help simplify tech complexity and build digital solutions. Chris’s visit follows closely after Ramnath Venkataraman’s, DXC’s President for DXC Consulting and Engineering Services - it's great being so popular! Thanks for making the trip, Chris and Ramnath — strong alignment, clear direction and a real opportunity ahead.
-
Faizal Jufri liked thisFaizal Jufri liked thisWishing our valued clients, partners, and colleagues a joyous and peaceful Hari Raya Aidilfitri. May this festive season bring prosperity, success, and renewed energy to your endeavours. Selamat Hari Raya! 🌙✨
-
Faizal Jufri reacted on thisFaizal Jufri reacted on thisNot all security assessments are the same. Using the wrong one at the wrong time wastes budget and leaves real gaps. Here are 11 types — and exactly when to use each: 1. Enterprise Risk Assessment → Board needs visibility on cyber risk and ROI 2. Compliance & Gap Assessment → Preparing for ISO 27001, POPIA, GDPR or PCI DSS 3. Vulnerability Assessment → Monthly hygiene to reduce your attack surface 4. Penetration Test → Annual deep validation or before major releases 5. Red Team Exercise → Test your SOC and detection under real attack conditions 6. Cloud Security Assessment → Scaling cloud or running hybrid environments 7. Application Security Review → Before launching apps that handle sensitive data 8. Architecture Security Review → Building new platforms or integrating AI systems 9. Phishing & Human Risk Assessment → Measure how vulnerable your people actually are 10. Incident Response Readiness → Annually or after any major organisational change 11. Third-Party & Supply Chain Risk → You rely on vendors or SaaS platforms for critical operations The best security programmes don't do all of these at once. They do the right one at the right time. Save this for your next security planning conversation. ♻️ Repost to help someone who needs to know the difference. #Cybersecurity #GRC #RiskManagement #ISO27001 #NISTCSF #POPIA #PenTesting #SecurityAssessment #Compliance #InformationSecurity
Experience & Education
-
DACTA Global
************** * *** * ************* ********
-
********
****** ******** **********
-
***********
** ******** *******
-
******* **********
***** ******** *** *********** ******** ******** *** *********** ******* ******************** ********* undefined
-
-
******** ***********
*********** **********
-
View Faizal’s full experience
See their title, tenure and more.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Licenses & Certifications
View Faizal’s full profile
-
See who you know in common
-
Get introduced
-
Contact Faizal directly
Other similar profiles
-
Joel Platek
Joel Platek
As a Senior Compromise Recovery Cybersecurity Consultant at Microsoft, I have over six years of experience in planning and executing the eviction of adversaries from compromised environments. I work with a global team of experts who collaborate with the DaRT IR team to deliver effective and efficient solutions for our clients. I am certified in MCSE, MCSA, and MCPS, and have a master's degree in cybersecurity.<br><br>My mission is to help customers adopt and integrate Microsoft solutions with a security-focused mindset, aligning them with business processes and compliance requirements. I am passionate about leveraging cloud technologies such as Azure and O365, and facilitating the transition to a DevOps framework and a continuous delivery approach. I also focus on educating C-level executives, board members, and key stakeholders about the threats and opportunities in the cyber landscape, and how to mitigate and capitalize on them.
2K followersSingapore
Explore more posts
-
Secuna
2K followers
🚨 Security First: Threat Insights Secuna’s Monthly Cyber Threat Intelligence Brief Cyber threats are evolving faster than ever across the Philippines and beyond. Yet many organizations struggle to turn complex reports into real security action. Security First: Threat Insights is Secuna’s structured monthly brief built to cut through the noise and translate intelligence into action. It distills major incidents, emerging attack techniques, newly disclosed vulnerabilities, and regulatory developments into insights that leaders can immediately act on. Each edition provides: • A structured summary of major global and local cyber incidents • Clear explanations of emerging attack trends and vulnerabilities • Practical implications for organizations in the Philippine threat landscape • Expert commentary grounded in Secuna’s offensive security perspective As a company built on the principle of putting Security First, Secuna is committed not only to identifying vulnerabilities, but also to empowering organizations with the knowledge to anticipate and mitigate risk. 🛡️ Because informed organizations are resilient organizations. #Cybersecurity #CyberThreatIntelligence #CyberSecurityPH #ThreatInsights
1
-
Innov8 Labs, Brunei
625 followers
Compliance is mandatory. Qualified leadership isn’t optional. As organisations prepare for requirements under the Brunei Cybersecurity Act 2024, one key question will continue to surface: Who is accountable for your cybersecurity strategy — and are they equipped to lead it? The ISACA Certified Information Security Manager (CISM) remains the global standard for professionals managing enterprise information security programmes. And the good news — registration is still open! Innov8 Labs, Brunei’s accredited training provider under ISACA, is bringing this internationally recognised certification programme this May. 📅 Date: 4 – 8 May 2026 ⏰ Time: 8:00 AM – 5:00 PM 📍 Venue: Innov8 Labs Office Why CISM is critical right now? ✅ Strengthens leadership for enterprise-wide cybersecurity programmes ✅ Supports governance frameworks aligned with national requirements ✅ Enhances incident response and organisational resilience ✅ Demonstrates capability during CII compliance assessments ✅ Bridges cybersecurity strategy with business and regulatory priorities Designed for cybersecurity officers, IT security managers, risk and compliance professionals, and decision-makers responsible for protecting CII environments. Seats are filling up — don’t miss the opportunity to lead with confidence in CII cybersecurity compliance. 🔗 Register here or scan the QR code: https://lnkd.in/gMnd-iWF Contact us for official quotations, group registrations, or corporate packages.
1
-
Snode Technologies
7K followers
Snode’s Cyber Threat Intelligence Advisory is published weekly to assist security teams in maintaining awareness of the evolving threat landscape. That’s because cyber defence improves when intelligence is shared. The latest advisory is available below. Read through the Advisory by scrolling through the post below. Stay informed. Stay prepared. Defend As One. #Cybersecurity #cyberthreatintelligence #CTI #cybersecurity #informationsecurity
9
-
The Art of Service Pty Ltd
633 followers
Singapore's Cybersecurity Act 2018 designates Critical Information Infrastructure sectors and sets strict expectations for incident reporting and penetration testing. 15 controls across 5 domains. Organizations operating in Singapore or handling Singapore-critical systems need clarity on CII obligations. We've mapped this framework to 819,000+ control relationships. Assess your Singapore cybersecurity compliance now. https://lnkd.in/gBbqMCkB
-
Eurofins Electrical and Electronics (E&E)
2K followers
National cyber marks may soon be required for sensitive contracts Singapore’s monetary authority (MAS) and cyber security agency (CSA) have signalled a regulatory shift that could soon require vendors to obtain national cybersecurity certifications Cyber Essentials or Cyber Trust marks before they can secure licences or participate in government tenders involving access to sensitive systems or data. This proactive stance comes in response to growing concerns about third-party supply chain risks. 📈 Business impact for across cybersecurity ecosystem - Mandatory compliance likely: Certification may become a prerequisite for vendors bidding for public contracts or engaging in regulated sectors such as finance. - Increased assurance standards: Businesses will need to align with the frameworks outlined under the Cyber Essentials (for SMEs) or Cyber Trust (for high-risk operations) marks both now expanded to include cloud, AI, and OT security. - Readiness assessment urged: Organisations handling sensitive data or seeking partnerships with public or regulated entities in Singapore should begin evaluating their current cybersecurity posture against certification requirements. - Competitive advantage: Early adopters may gain a distinct edge in procurement and licensing by signalling stronger cybersecurity governance and trustworthiness. - Government support available: CSA’s co-funded CISO-as-a-service programme supports eligible SMEs working towards cyber essentials compliance. At Eurofins Electrical & Electronics, we provide cybersecurity testing, standards compliance assessments, and technical validation services to help businesses prepare for mandatory certifications. Whether aligning with national frameworks or international benchmarks, our expertise supports secure, future-ready digital operations. 🔗 Get ahead of cybersecurity regulations and build digital trust from the ground up. Explore our cybersecurity and regulatory assessment services: https://lnkd.in/gG9_VnMm #CyberSecurityCertification #SupplyChainSecurity #CyberEssentials #CyberTrust #MAS #CSA #ThirdPartyRisk #DigitalTrust #RegulatoryCompliance #Eurofins #TestingForLife
1
-
Erudite Risk
3K followers
Critical information infrastructure owners must report suspected advanced cyberattacks under new rules: Josephine Teo Singapore will implement new regulations requiring owners of critical information infrastructure (CII) to report any suspected incidents involving advanced persistent threats (APTs) to the Cyber Security Agency of Singapore (CSA). These rules will take effect later in 2025 amid an increased National Cyber Threat Alert Level due to an ongoing attack by the UNC3886 group, described by cybersecurity firm Mandiant as a China-linked espionage entity targeting strategic organizations worldwide. Minister for Digital Development and Information Josephine Teo emphasized the importance of early reporting to enable coordinated national responses and prevent organizations from confronting attackers alone. She highlighted the rising threat from APTs, which use sophisticated methods to gain prolonged access to critical systems, often for espionage or to develop capabilities to disrupt essential services. APT activity in Singapore has increased more than fourfold from 2021 to 2024. The CSA has engaged CII CEOs through classified briefings on the evolving threat landscape, underscoring the necessity of heightened vigilance and improved cyber hygiene. Mrs Teo stressed that cyber defense requires collective action, as attackers do not adhere to established rules. She cited international incidents where cyberattacks disrupted critical public utilities, pointing to the serious societal and economic risks. To strengthen defense capabilities, the CSA will collaborate with ST Engineering to enhance access to advanced cybersecurity tools and expertise, and support the formation of an Operational Technology special interest group under ISACA. CSA chief executive David Koh reaffirmed the agency’s commitment to working with local and global partners to share information and respond effectively to cyber threats. #AsiaRisk #CriticalInfrastructureFailure #Singapore https://lnkd.in/gSUDWBnF
1 Comment -
ATET Security
277 followers
🔐 Why ICT Vendors Should Care About Cyber Essentials and Cyber Essentials Mark In Singapore’s cybersecurity landscape, the Cyber Security Agency (CSA) Cyber Essentials programme defines a practical baseline for organisations to build basic cyber hygiene and resilience against common threats. While often discussed in the context of internal enterprise initiatives, its relevance is equally — and increasingly — important for ICT vendors that supply technology solutions, platforms, or services to customers. 🧠 What Is an ICT Vendor? An ICT (Information and Communications Technology) vendor is any organisation that provides technology products or services — whether software, platforms, managed services, cloud solutions, or hardware — to other businesses or government agencies. These vendors often integrate deeply into customers’ systems, serve as data processors or enablers, and have elevated access to customer environments. Why Cyber Essentials Matters for ICT Vendors ? 🔸 Demonstrates Foundational Security Cyber Essentials focuses on key controls like access management, patching, malware defences, and incident readiness — all fundamental to building secure products and services. 🔸Reduces Risk to Customer Environments Vendors with strong baseline security reduce the likelihood of being the weak link exploited in supply chain attacks — a real concern in modern cyber risk models. 🔸Signals Trust and Assurance to Customers Achieving the Cyber Essentials Mark provides a visible badge of cybersecurity commitment, boosting confidence among clients evaluating ICT partners. 🔸Aligns with Contractual & Regulatory Expectations Many customers — especially those in regulated industries — now expect vendors to demonstrate basic cyber controls as part of onboarding, procurement, and risk assessment. What ICT Vendors Should Do Next? ✅ Start with a baseline assessment of existing controls against the Cyber Essentials framework ✅ Prioritise fixes in high-impact areas — identity, patch management, and incident preparedness ✅ Integrate continuous monitoring and auditability into service delivery ✅ Educate internal teams on secure development/supply practices ✅ Engage professional cybersecurity consultancy and guidance - to prepare for certification - to close gaps effectively - to bake security into product lifecycles and service operations Cybersecurity isn’t just an internal safeguard — for ICT vendors, it’s a service differentiator and risk mitigator that matters to every customer interaction. 📌 Learn more about CSA’s Cyber Essentials framework and mark: • Cyber Essentials Mark: https://lnkd.in/gaZ8kzW7 #CyberSecurity #ICTVendors #CyberEssentials #CSA #SupplyChainSecurity #SMEs #RiskManagement #CyberGovernance #CyberResilience
-
Sunnic
2K followers
🔒End-to-End Encryption with Sunnic E-Trust Plus – Simplifying MAS TRM Compliance Protecting sensitive data at every stage is a clear expectation in the MAS TRM Guidelines. Sunnic’s E-Trust Plus End-to-End Encryption delivers application-level encryption for both data-at-rest and data-in-motion, ensuring confidential information remains secure and unreadable to unauthorized parties. 👉 Read the full article below for details! #EndToEndEncryption #DataProtection #Compliance #MAS #TRM #FinancialServices #Cybersecurity #ABPGroup #Sunnic #ETrustPlus
9
-
Cyber Asia
4K followers
Companies should stop using NRIC numbers to authenticate individuals or as passwords due to the risks of impersonation and data breaches, according to a formal advisory by PDPC and CSA. CNA Personal Data Protection Commission (PDPC) Ministry of Digital Development and Information #cybersecurity #datasecurity #databreach #singapore
5
2 Comments -
LNM Corporate Solutions Pte Ltd
35 followers
New measure under the Cybersecurity Act to be implemented later in 2025. The new measure requires mandatory reporting by operators of critical systems, such as those that manage Singapore’s energy, water and transportation services, to Singapore’s Cyber Security Agency of Singapore (CSA) of suspected advanced persistent threat (APT) attacks. Source: https://lnkd.in/gaYxWtjw Feel free to contact us for professional advice at +65 66363691, +65 9326 2271 or info@lnmsolutions.com! #dataprivacy #dataprotection #ITSecurity #Networksecurity #corporatesolutions #cybersecurity #cybersecuritynews #Singapore #LNMSolutions
2
-
Silvia Lam Ihensekhien
Swire Coca-Cola • 5K followers
Tuesday's reading - Cybersecurity Report 2024 by Hong Kong’s Cyber Security and Technology Crime Bureau (CSTCB) — a landmark publication that offers a thorough analysis of the evolving cyber threat landscape both globally and within Hong Kong. As cyber threats grow in scale and sophistication, this report shared the key challenges facing governments, businesses, and individuals in today’s digital age. It explores emerging risks such as AI-powered attacks, supply chain vulnerabilities, and deepfake scams. It also highlighted the critical importance of protecting our digital infrastructure and personal data. Beyond identifying threats, the report emphasizes proactive defense strategies, legislative advancements, and the vital role of collaboration between law enforcement, industry, and the public. It presents actionable insights to help organisations strengthen their cybersecurity posture and cultivate resilience against an ever-changing array of cyber risks. For anyone invested in understanding the future of cybersecurity and building safer digital ecosystems, this report is an essential resource that underscores the collective effort required to safeguard our interconnected world. https://lnkd.in/g-yKHY3P #Cybersecurity #CSTCB #HongKong #DigitalSecurity #CyberThreats #AI #CyberResilience
43
2 Comments -
Medico-Legal Society of Malaysia (MLSM)
6K followers
Critical infrastructure operators in Singapore will soon be required to report suspected advanced persistent threat (APT) attacks under new measures introduced in an amended Cybersecurity Act. The move, reported by The Straits Times, was announced by Minister for Digital Development and Information Josephine Teo at a cybersecurity forum on Monday. She said the requirement — part of broader changes to the law — is expected to take effect later in 2025 and will mandate reporting to the Cyber Security Agency of Singapore (CSA). The amendment follows the recent July 18 disclosure of state-linked cyber-espionage activity by group UNC3886, believed by experts to be China-linked. It’s among several APT actors whose targeting of Singapore’s critical systems has surged more than four-fold between 2021 and 2024. “If organisations suspect they’ve been targeted, they cannot and should not confront the attackers on their own,” said Teo during the fifth Operational Technology Cybersecurity Expert Panel forum. “These requirements will support the early detection of APT activities, and enable CSA to take more timely actions, together with other government agencies, to defend CII owners against the attacks.” APT actors are often state-sponsored and operate with significant resources, using stealthy tools to infiltrate high-value networks, steal data, or disrupt essential services. Singapore’s 11 critical information infrastructure (CII) sectors include energy, water, land transport, healthcare, and government systems. Other sectors are aviation, maritime, security and emergency services, banking and finance, maritime, as well as infocomm. The Act was previously amended in 2024 to expand CSA’s oversight to cloud and supply chain risks. CII operators are now required to report not only direct attacks but also any disruption stemming from service providers or third parties. With the latest revision, temporary systems supporting major events — such as vaccine distribution or international summits — will also fall under CSA’s purview. This marks the first time Singapore has publicly acknowledged specific APT threats. “We want the public to know these threats are real,” said Teo, citing recent global incidents including a Ukrainian malware attack that cut heating to 600 homes, and a breach in Norway that caused a dam to release seven billion litres of water. “The threats you face are no longer simple ransomware attacks. APTs have you in their sights,” she warned CII operators. In response to the heightened threat level, CSA has convened a closed-door briefing with CII leaders and is ramping up collaboration across sectors. #medicolegal #healthcare #mlsm
1
-
Karl DiMascio
The Cybersecurity and AI… • 22K followers
IntroSecurity ASEAN Warns Enterprises of Emerging Cybersecurity Risks from ChatGPT-5 The release of ChatGPT-5 has generated excitement, but also new cybersecurity risks that organisations cannot afford to overlook. Independent research has already revealed weaknesses in jailbreak resistance, model routing, and zero-click exfiltration attacks, alongside wider ecosystem threats such as malware disguised as ChatGPT apps. At IntroSecurity ASEAN, we believe it is critical for business leaders and CISOs across Southeast Asia to understand these risks now - before adversaries exploit them at scale. We’ve published a press release outlining the key concerns and our recommendations for how enterprises can defend against these emerging threats. Read more here https://lnkd.in/dKzfZrNR
6
-
softScheck APAC
10K followers
TB-CERT Cybersecurity Annual Conference 2025 – A Strong Close with Practical Fraud Defense 🇹🇭 Day 2 of the TB-CERT Cybersecurity Annual Conference 2025 concluded with a well-attended and oversubscribed workshop delivered by SoftScheck APAC’s Director of Enterprise Security, Tyler Tang: “Designing Cyber Resilience: Addressing Fraud through Threat Modeling.” In this interactive session, participants examined real-world fraud cases where millions were lost and regulations tightened, before diving into how threat modeling can be applied to identify vulnerabilities, outthink fraud tactics, and design resilient controls that strengthen enterprise defences. This workshop equipped attendees with not only the tools to reassess their current fraud-prevention strategies, but also practical frameworks that can be embedded into their day-to-day security operations. The close of Day 2 highlighted the conference’s central theme: cyber resilience as the cornerstone of trust in the digital economy. By combining innovation, collaboration, and practical strategies, organisations can better prepare for evolving threats and secure long-term growth. SoftScheck is proud to have played a role in these important conversations, and we look forward to continuing our mission of building stronger, more resilient organisations across the Asia-Pacific region. #softScheckAPAC #Cybersecurity #CyberResilience #ThreatModeling #FraudPrevention #EnterpriseSecurity #FinancialServicesSecurity #TBcert2025 #AI #SGCybersecurity
30
-
Batuta
19K followers
Cybersecurity losses don’t start with headlines 🚨 They start with a phishing email, a weak password, or an unpatched system 🔓 Today, the average cost of a breach exceeds USD 4.8M, and in large organizations it can reach USD 15M per incident 💸 Yet many companies still act only after the damage is done. In our latest blog, “Avoid multimillion-dollar losses: the power of prevention in cybersecurity,” Alejandra Vázquez and María Fernanda Márquez share their analysis—using data from the last five years—on why a proactive security strategy delivers measurable ROI 📊 From cost comparisons between proactive vs. reactive models to real savings in operational time, the numbers are clear: prevention is not an expense, it’s a business decision. If your organization depends on digital operations (and it does), this read is for you. 👉 Read our blog: ESP: https://lnkd.in/et34k98z ENG: https://lnkd.in/ek57Avm8 #Batuta #Cybersecurity #ProactiveSecurity #EndpointSecurity #RiskManagement #BusinessContinuity
12
-
Munther Al Hasani
high-level government… • 438 followers
🚨 New Nation-State Threat Alert 🚨 A Chinese APT group has been observed deploying EggStreme, a sophisticated fileless malware, to infiltrate Philippine military systems. 🔎 Key Insights: • Fileless malware like EggStreme operates in-memory, leaving minimal forensic footprints. • Targets critical defense infrastructure, aiming for long-term persistence and intelligence gathering. • Reflects the growing trend of APTs leveraging stealthier techniques to evade traditional defenses. 💡 Takeaway for Security Leaders: This campaign highlights the urgent need for behavioral detection, memory monitoring, and threat hunting capabilities beyond signature-based tools. 🌍 In today’s threat landscape, cyber warfare and geopolitics are inseparable — making national defense and enterprise security more intertwined than ever. #Cybersecurity #APT #ThreatIntelligence #Malware #FilelessAttack #Philippines #CyberDefense
2
1 Comment -
Sage Shield Safety Consultants Pte Ltd
37 followers
IT General Controls (ITGC) are the backbone of your organisation's digital resilience. Whether you're preparing for an audit or strengthening your cybersecurity posture, understanding ITGC is essential for businesses operating in Singapore. Our latest guide covers: → What ITGC means and why it matters → The 5 core domains every business should address → How ITGC connects to the Cyber Security Agency (CSA) standards → Practical steps to implement controls → Common gaps Singapore SMEs face Strong IT controls aren't just about compliance — they protect your data, your clients, and your reputation. Read the full guide: https://lnkd.in/g48K4sUw #ITGC #ITGovernance #CyberSecurity #SingaporeBusiness #RiskManagement #DigitalResilience #SME #Compliance #SageShield
-
Secwiser
137 followers
GenixCMS Faces SQL Injection Threat: Stay Protected Samuel Parlindungan Ulysses, eJPT, eWPT, CEH certified, discusses GenixCMS SQL Injection in this update. Stay informed on cybersecurity threats and mitigation strategies. Read more on Medium for detailed insights into this vulnerability and how to protect your systems effectively. Read more: https://lnkd.in/ghXXKsWu Discover the app: https://lnkd.in/gdNHWUru #ApplicationSecurity #WebSecurity #OWASP #VulnerabilityManagement #CyberSecurity #InfoSec #DataProtection #ThreatMitigation #AI #CloudSecurity #Secwiser
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More