{"id":45168,"date":"2017-10-06T13:00:28","date_gmt":"2017-10-06T20:00:28","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=45168"},"modified":"2017-10-06T11:13:11","modified_gmt":"2017-10-06T18:13:11","slug":"looking-back-singapore-international-cyber-week-power-global-community-partnerships","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/10\/looking-back-singapore-international-cyber-week-power-global-community-partnerships\/","title":{"rendered":"Looking Back on Singapore International Cyber Week: The Power of Global Community and Partnerships"},"content":{"rendered":"<p>I had the privilege to participate in <a href=\"https:\/\/www.sicw.sg\/about-event.html\" rel=\"nofollow,noopener\" >Singapore International Cyber Week 2017 (SICW)<\/a> at the Suntec Singapore International Convention and Exhibition Centre between September 18 and 21. The event also included big conferences such as the 26th <a href=\"https:\/\/www.sicw.sg\/govware\/about.html\" rel=\"nofollow,noopener\" >GovernmentWare, or GovWare<\/a>, the region\u2019s premier conference and exhibition on cybersecurity, and the <a href=\"https:\/\/www.sicw.sg\/amcc\" rel=\"nofollow,noopener\" >ASEAN Ministerial Conference on Cybersecurity<\/a>.<\/p>\n<p>This year\u2019s theme was \u201cBuilding a Secure and Resilient Digital Future through Partnership\u201d to reflect the Singapore government\u2019s strong commitment to deepen regional and global collaboration. The event attracted <a href=\"https:\/\/www.networksasia.net\/article\/singapore-international-cyber-week-2017-building-secure-and-resilient-digital-future-through\" rel=\"nofollow,noopener\" >more than 6,000 international and regional thought leaders from governments, academia and industry<\/a>, which showcases growing interests in cybersecurity and international cooperation.<\/p>\n<p>The <a href=\"https:\/\/www.sicw.sg\/govware\/distinguished\/speakers.html\" rel=\"nofollow,noopener\" >distinguished speakers for GovWare<\/a> were diverse, including representatives from Australia, China, France, Indonesia, Israel, Japan, Malaysia, the United Kingdom and the United States. I was pleased to see they all emphasized the importance of partnerships to tackle complex cybersecurity issues, and that all the countries are taking action.<\/p>\n<p>Partnerships also require the appreciation and inclusion of diversified cultures and views from different countries, sectors and organizations. One of the distinguished speakers, <a href=\"https:\/\/www.sicw.sg\/govware\/distinguished\/speakers.html?speaker=nakamitsu\" rel=\"nofollow,noopener\" >Izumi Nakamitsu<\/a>, under-secretary-general and high representative for disarmament affairs, United Nations, recognized that diversity is crucial in cybersecurity and that the community needs more women. She encouraged the audience to keep an open dialogue on the topic and seek thought diversity.<\/p>\n<p>Palo Alto Networks had two speakers at GovWare this year. <a href=\"https:\/\/www.youtube.com\/watch?v=S1bPiM_qzds\" rel=\"nofollow,noopener\" >Rick Howard, chief security officer<\/a>, and <a href=\"https:\/\/www.sicw.sg\/govware\/conference\/speakers\/d.html\" rel=\"nofollow,noopener\" >Sean Duca, chief security officer for Asia-Pacific<\/a>. In his GovWare keynote, \u201cThe Next Government Evolution: Automatic Enterprise Security Orchestration \u2014 A Radical Change in Direction,\u201d Rick shed light on how resilience can be achieved through automation and a cybersecurity platform. He explained why defense in depth is no longer effective to defend our networks. Security practitioners have tried to transition to the attack lifecycle model as a replacement, but their efforts have not borne fruit \u2013 there are too many tools to defend, it\u2019s too complex, too much time is wasted, and the model is inefficient in crossing the last mile with threat intelligence.<\/p>\n<p>Rick offered two new perspectives with automatic orchestration and the <a href=\"https:\/\/www.paloaltonetworks.com\/products\/innovations\/application-framework\">Application Framework<\/a>. First, automatic orchestration allows organizations to replace two old best practices, vendor in depth and best in breed, with the new best practice of a cybersecurity platform to gain complete visibility, reduce the attack surface, prevent known threats and discover unknown threats. Second, the Application Framework, announced five months ago, will help third-party vendors to deliver their applications to new customers and enable them to easily consume the latest technologies.<\/p>\n<p>Sean drilled down on utilizing cyberthreat intelligence to improve cybersecurity in his GovWare session, <a href=\"https:\/\/www.sicw.sg\/govware\/conference\/speakers\/d.html?speaker=duca\" rel=\"nofollow,noopener\" >\u201cThe Power of the Crowd, in the Cloud,\u201d<\/a> on GovWare\u2019s Cyber Threat Landscape &amp; Intelligence track. He stressed that, in today\u2019s complex cyberthreat environment, no organization can win alone against adversaries\u2019 rapidly changing playbooks. Stovepipe efforts are costly and inefficient. We must leverage the force of a community to share cyberthreat intelligence across the industry in near-real time, via cloud, to allow organizations work with the growing volume of threats, look at similar known threats and uncover unknown threats.<\/p>\n<p>Of course, sharing cyberthreat intelligence is easier said than done. We first have to build trust and talk about the capability and value this brings. Conversations around cyberthreat intelligence cloud sharing easily start with a flat \u201cno,\u201d rather than analyzing what prohibits an organization from sharing what and why. With such trust established, organizations can start addressing cyberthreats based on shared intelligence, not in isolation.<\/p>\n<p>To address privacy concerns, Sean explained, Palo Alto Networks launched the <a href=\"https:\/\/www.paloaltonetworks.com\/company\/press\/2017\/palo-alto-networks-unveils-apac-wildfire-cloud-singapore\">APAC WildFire cloud, located in Singapore<\/a>. This allows customers in the Asia-Pacific region to benefit from Palo Alto Networks WildFire cloud-based threat analysis and prevention capabilities via an APAC-based cloud.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/08\/gov-cso-palo-alto-networks-meets-pentagon-international-officials-west-coast-trip\/\">As a company, Palo Alto Networks believes the private sector has the technical ability and responsibility, as security innovation leaders, to collaborate with governments and thought leaders<\/a>. We look forward to continuing to contribute to stronger and wider cybersecurity partnerships, and to coming back to SICW and GovWare next year.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mihoko Matsubara looks back on Singapore International Cyber Week.<\/p>\n","protected":false},"author":189,"featured_media":45171,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133],"tags":[2763],"coauthors":[1920],"class_list":["post-45168","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events","tag-govware"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/10\/social-graphic-temp-Sept-EP-MM-Linkedin-698x400.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/45168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/189"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=45168"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/45168\/revisions"}],"predecessor-version":[{"id":45201,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/45168\/revisions\/45201"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/45171"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=45168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=45168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=45168"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=45168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}