35
Cybersecurity in ASEAN: An Urgent Call to Action
The first step is to align on business objectives and raise the profile of cybersecurity as a business
risk imperative. Second, high-value assets should be identified and prioritized. Third, a cyber
threat impact risk assessment should be conducted. Finally, it is imperative to identify cyber
capabilities needed to defend high-value assets.
“We are in the process of setting up the CISO function with
an independent mandate to report to the board, distinct
from the CIO. We have conducted cybersecurity posture
assessments across our major operating companies. This
has helped to build awareness, but there is a lot of work to
do to build a solid governance framework.”
—major regional telecoms group
In defining their strategy to enhance cyber resilience, businesses need to consider the value-at-
risk. To assess the value-at-risk, businesses could take either an asset- or liability-based view. An
asset-based view involves valuing critical assets and the potential reputational damage from an
attack. Alternatively, businesses could consider a liability-based approach, building scenarios and
quantifying the financial and reputational loss. Building potential scenarios with a combination of
historical data and judgment about the probability of a threat can create a better understanding
of the value-at-risk and help allocate resources in a more judicious manner.
Businesses should leverage industry best practices and standards such as the NIST
Cybersecurity Framework, ISO 27001, and an architecture framework based on risk-centric
security (see figure 25).
Note: NIST CF is the National Institute of Standards and Technology Cybersecurity Framework.
Source: A.T. Kearney analysis
Figure
Adopt a risk-centric approach to cybersecurity
Architecture
Architecture framework
•
Analytics
•
Application
•
Data
•
End point
•
Perimeter
•
Network
•
Platform
NISTCF
Capability framework
•
Identify
•
Protect
•
Detect
•
Respond
•
Recover
ISO/IEC
information security
standard
Process framework
•
Compliance
and policies
•
Asset management
•
Supplier relationships
•
Cybersecurity
incident management
•
Access control