Skip to Content

Web Content Display Web Content Display

Web Content Display Web Content Display

Thought Leadership
Stay Ahead at the Cutting Edge
Wondering what is the next wave of changes or breakthroughs in the ever-dynamic Infocomm industry. Get the first-hand insights and knowledge from leading companies and thought leaders and stay ahead!

Web Content Display Web Content Display

Sun Zi's Art of War is the globally recognized as the best bible for winning. But its wisdom is applicable to accomplishing projects successfully with maximized benefits and minimized costs and risks.

The Winners’ Attitudes 

Kiasuism

- Foresee and manage threats first and then exploit the opportunities

- Always go for Maximized Net-Returns at Minimized Risks 

 

Be cool, calm and objective – The Essence of Project Management

- Calculation&Evidencebaseddecisionmaking. 计 – 计划, 计算
- Collect intelligence and information to find out the hidden intentions and agendas besides the observable facts. 

 

The bad attitudes to avoid 

- Never be proud, but be humble and prudent to examine all factors objectively.

- Nevergoforfortunetelling,butbytheevidencesandreasoning.

- Never hope for the best nor be too optimistic, but by calculation and logical deduction only.

- Never do it for the glory, but choose to do those that you can succeed easily.

- Never go for revenge or for the wrong reasons.

- Never be easily angered, which leads to irrationality and failure.

- Neverbetrickednorbetemptedbythebenefits,desires,disguises, hearsays, distraction etc. Watch out for scope creeps a little by little due to the above wrong attitudes.

 

 

 Attitudes and Principles
 Management and Leadership

It is clear that cybersecurity legislation is a ground breaking one and it would be unrealistic to expect the legislation to be perfect the first time around.

 

Introduction

Cybercrime and cybersecurity have increasingly become a concern to both the public and government. The number and severity of incidents has increased tremendously and it almost seems that, on a weekly basis, there are reported incidences of cybercrime and cybersecurity breaches. These incidences have come from many different angles; criminals exploiting computer systems for financial gain, leaks of personal and sensitive data to be used for nefarious purposes and sometimes even for political objectives. The total bill of damages arising from these incidences continues to rise and the situation is further complicated by the presence of entities like WikiLeaks and Anonymous that leak and expose cyber breaches by governmental actors.

 

In Singapore, we are not spared from these developments. We have had a number of cases involving data breaches and now, hacking and tempering of government servers. All these have led to call for further regulation and the building up of resources to counter these threats in the future. Therefore it's worth while to review the cybercrime and cybersecurity scene in Singapore and to prepare for the upcoming changes.

 

Current Laws

Singapore cybercrime and cybersecurity laws are currently encompassed largely in a single piece of legislation called the Computer Misuse and Cybersecurity Act ("CMCA"). the CMCA is unique that in its short history, it has become one of the most frequently amended legislation. When the CMCA was first enacted in 1993, it was enacted as the Computer Misuse Act. During that time, the key worries were hacking of computers, unauthorised use and access to computers. In 1998, amendments were made to the Act to cover unauthorised modification and interception and to introduce the concept of protected computers.

 

 

 Cybersecurity
 Cybercrime

 

Web Content Display Web Content Display