LADIES TALK CYBER SERIES - March SERIES

Introducing women with a deep interest in cybersecurity

I am the Ministry Chief Information Security Officer (MCISO) in the Ministry of Sustainability and the Environment (MSE). My role involves providing cybersecurity leadership to the Agency CISO in MSE HQ and the agencies in the MSE family (namely PUB, NEA and SFA) in charting the development of cyber and data security goals, strategies and action plans.

What brought you to the cybersecurity industry?

I started out in IT development and Project Management. After years of rushing out systems and code deployments, it suddenly struck me during a quiet moment, to question whether our common practice of leveraging open source codes and libraries would pose robustness and security issues for the systems we had developed. This aha moment piqued my interest to read up more on computer security and the rest was history.

What were your defining moments in this industry, and factors or guidance that helped you achieve them?

While IT Security had been around for decades with an established industrial capability and workforce, Industrial Control Systems (ICS) Security was a relatively new and niche area. A few classic ICS security incidents include the Stuxnet in 2010, where malicious code targeted the Supervisory Control and Data Acquisition Systems (SCADA) and Programmer Logic Controllers (PLC) in the ICS, causing severe explosion and damage to the Iranian’s Nataanz nuclear facility; the Black Energy attack in 2016 leading to the catastrophic shut down of the Ukraine power grid; and the Triton attack of a Saudi Arabian petrochemical plant in 2017.

A few years before the Cybersecurity Act was passed, we started to concentrate our focus on the cybersecurity resilience of our Critical Information Infrastructures (CII) and ICS. MSE was one of the ministries charged with overseeing the CII and ICS in its agencies, where my prior humble knowledge in ICS Security was put to good use. That ICS Security foundation had allowed me to subsequently further my ICS Security know-how and established good relationships and trusts with my stakeholders in the MSE family and CSA. My bosses and fellow MCISOs in the GovTech’s Cyber Security Group also played a large part to inspire me to strengthen my competency in other Cybersecurity areas.

What is it that you love most about your role?

I would attribute my work motivation to my job role as well as the people who I worked with.

The work responsibilities provide good opportunities for me to pick up new skills in the evolving realm of IT, ICS and data security, and in both breadth and depth. In particular, there are numerous cross sharing at the Whole of Government (WoG) level by both CSA and GovTech where I get to learn from cyber incidents and defensive measures beyond MSE. Such continuous stream of learnings make me feel confident and grounded in my work.

Colleagues often approach me for cybersecurity advices, even for non-work-related cyber hygiene. My bosses in MSE and GovTech have also been very supportive of my recommendations and action plans. Such gestures demonstrate the trust they have in me and create that positive reinforcement on why I love my work.

Prominent Cybersecurity trends:

What are some of the trends you have seen in the market lately, and what do you think will emerge in the future?

Software Supply Chain is going to pose a difficult cybersecurity challenge moving forward. We have already encountered the episodes of Node.js, SolarWinds and very recently, the Apache log4j vulnerability that have rocked the world’s IT industry and almost every enterprise that owns an IT system.

Modern IT systems run predominantly on software that comprised mainly external codes from open sources or Commercial-Off-The-Shelf (COTS) products. Typically, only a small fraction of the codes is bespoke and developed in-house, especially when code share, code reuse and development efficiency have always been a virtue of software development. This makes it lucrative for malicious actors to compromise popular open-source code repository or hijack software updates in widely-used commercial products, to create high impact and large-scale system vulnerabilities. Development team will therefore have to leverage on Software Composition Analysis (SCA) tools to continuously identify, mitigate and monitor the system and software risks associated with the embedded external codes.

Females in Cyber Security

What can we do to encourage more women to join the cybersecurity sector?

There are many disciplines within cybersecurity to fit different interests and numerous avenues to sample or explore an interesting career in cybersecurity. Take a cybersecurity elective in your in school or university curriculum; attend cybersecurity workshops, programs, activities and forums organised by SCS and AiSP; join a cybersecurity interest group, reach out and talk to professionals and female mentors in the cybersecurity industry; or participate in SSG’s SkillsFuture training and WSG’s Career Transition Program for mid-careerists.

Final thoughts

How can you debunk the myth that cybersecurity is only for men? Is there any indication this stereotyping is changing?

Cybersecurity is not a “high wall”, but it is a “long run”. It requires passion, regardless of gender, to continue the journey as technology changes quickly and cyber threats are always evolving. It is not a job that muscular strength has its advantage. What it needs is mental grit and resilience.