Governments and regulators around the world are taking a closer look at nefarious activities
occurring across
the metaverse, bridging criminal endeavours of both the physical world and the digital world as the
realms
merge into one.
While crimes in the physical world often pertain to loss of life, loss of property,
or both,
cybercrimes or virtual crimes largely entail the loss of data, cyberattacks, and compromised private
information, all of which can cost enterprises and individuals a huge sum.
Because the digital world
knows no
borders, countries have united to fight against cyber criminals on a global scale.
Mordor Intelligence, a leading market research consulting firm, valued the Global Incident Response
Services
market at USD 3.48 billion in 2020 and expected it to reach USD 10.13 billion by 2026, at a compound
annual
growth rate of approximately 20.53%, between 2021 and 2026, signalling towards the rise in probable
security
breaches in future.
The report further emphasises that the Asia Pacific market will see a spike for
the
following reasons:
- 1- The Asia Pacific accounts for nearly one-third of the world’s population
- 2- Steady economic growth and increased stability in the region
The Mordor Intelligence report indicates that the thefts are primarily targeted at personally
identifiable
information (PII) because APAC is an abundant source of human capital.
Cybersecurity: A global responsibility
As cyber threats evolve and become increasingly complex, our world’s borderless digital space
remains
vulnerable to cyberattacks. Cybercriminals continue to identify new ways to disrupt the systems that
allow
global business to function. As expected and according to a recent Forbes contributor column, the
number of
cyberattacks in 2021 surpassed those in 2020, including attacks on financial portals as well as
Solar Wind
and Colonial Pipeline.
The Australian government has recently unveiled a ransomware action plan for businesses in
Australia. The
plan includes businesses mandatorily reporting ransomware incidence.
What is cyber threat incident response?
In general terms, cyber threat incident response is the process to respond to cyber threats. PCI DSS
specifies the steps that organisations should follow as part of the incident response plan. The
steps are
established in requirement 12 and include:
- 12.10.2–Test incident response plan at least annually
- 12.10.3–Assign certain employees to be available 24/7 to deal with incidences
- 12.10.4–Properly and regularly train the staff with incident response responsibilities
- 12.10.5–Set up alerts from intrusion-detection, intrusion-prevention, and file-integrity
monitoring
systems
- 12.10.6–Implement a process to update and manage the incident response plan per industry and
organizational changes
Preparedness and initiatives across APAC
Governments play a crucial role in creating and shaping the economy; when it comes to securing the
population and their interests, they leave no stone unturned, whether it involves deploying
personnel to
fight known threats (security, healthcare, judiciary) or developing protocols and policies to fight
the
unknown. One key element is the establishment and promotion of cybersecurity standards or
frameworks. Some
of the government-managed cyber security organisations across the APAC region include :
- Australia: Australian Cyber Security Center (ACSC) is responsible for monitoring and
responding
to the cyberthreats targeting Australian interests. ASCS also provides a set of guidelines
that can help
an organisation's employees detect, respond, and recover from a cybersecurity breach.
- China: The Cyberspace Administration of China, also known as the Office of the
Central
Cyberspace Affairs Commission, is the central Internet regulator, censor, oversight, and
control agency
for the People's Republic of China.
- Hong Kong: The Office of the Government Chief Information Officer (OGCIO) ensures
that the
Government provides the public with information and services they need efficiently and
conveniently by
using IT appropriately, and supports bureaux/departments to make the best use of IT to
achieve their
policy objectives.
- India: The National Cyber Coordination Centre (NCCC) is an operational cybersecurity
and
e-surveillance agency in India.
- New Zealand: National Cyber Security Centre (NCSC) protects and provides incident
response for
New Zealand’s most significant public and private sector organisations from cyber threats.
- Singapore: Cyber Security Agency (CSA) is the national agency overseeing
cybersecurity
strategy, operations, education, outreach, and ecosystem development.
PDCA for cybersecurity
Stringent policies coupled with defined processes can help organisations prepare against cyber
threats.
“Plan, Do, Check, Act” (PDCA) can help get answers to most of the questions and ensure preparedness.
PDCA is
recognised across industries and by various regulatory and industry bodies for effectively reducing
risk. In
respect to securing the organisation against cyber threats, International Organization for
Standardization
(ISO) recommends PDCA as:
- Plan: Establish policies, objectives, processes, and procedures relevant to managing risk
and
improving information security to deliver results following an organisation’s overall
policies and
objectives.
- Do: Implement and operate the ISMS policy, controls, processes, and procedures.
- Check: Assess and, where applicable, measure process performance against ISMS policy,
objectives, and
practical experience and report the results to management for review.
- Act: Take corrective and preventive actions, based on the results of the internal ISMS audit
and
management review or other relevant information, to achieve continual improvement of the
ISMS.
It's an iterative process, and it evolves with new information and stronger processes.
While the regions’ governments are proactive and are educating the public at large, individual and
organisational preparedness will help minimise the agony and loss - Is your law firm ready?
Disclaimer: The views and opinions expressed in this article do not necessarily reflect the official
policy
or position of Novum Learning or Legal Practice Intelligence (LPI). While every attempt has been
made to
ensure that the information in this article has been obtained from reliable sources, neither Novum
Learning
or LPI nor the author is responsible for any errors or omissions, or for the results obtained from
the use
of this information, as the content published here is for information purposes only. The article
does not
constitute a comprehensive or complete statement of the matters discussed or the law relating
thereto, and
does not constitute professional and/or financial advice.