[ad_1]
Resolve vulnerabilities
Mr Heng explained that proactive efforts before the event included identifying its digital footprint and cybersecurity risk areas, scanning vendor websites and examining business systems and applications used by the event, and developing cybersecurity incident escalation and reporting processes.
He added that event organizers must address any vulnerabilities discovered through these inspections before the event.
Mr Wang noted that his reply applied to all such incidents and did not refer to any particular incident, highlighting the differences between the types of communication lines used.
He said the security measures were implemented for “meetings of a sensitive nature organized in Singapore – government meetings, military meetings – that are communications sensitive” and that they were different from the open platforms used by the public.
“Participants in international events and conferences, including those attended by military personnel, government leaders and officials, generally do not expect the host country to provide secure means of communication,” Mr Wang said.
“Even if host countries provide such means, it is questionable whether foreign actors would be willing to use it.”
He said foreign guests who need to transmit sensitive information usually arrange their own security measures, such as encryption hardware or software, commercial security or embassy lines and other security measures.
“This is the practice when officials from the Ministry of Defense and the Singapore Armed Forces attend overseas meetings,” Mr Ong added.
[ad_2]
Source link