Latest Posts

Tag archive: Cybersecurity

Tech Policy Trends 2023 | The future of AI policy

AI’s evolution could spiral into a revolution over the next 12 months. With deployments already demonstrating the ability to create...

22 Feb 2023 Latest AI Thought Leadership
Tech Policy Trends 2023 | The future of AI policy
Tech Policy Trends 2023 | The Metaverse: exploring its regulatory future

Tech Policy Trends 2023 | The Metaverse: exploring its regulatory future

The metaverse presents a unique challenge for governments and regulators. How do you legislate for an idea that is so...

20 Feb 2023 Opinion
Tech Policy Trends 2023 | US-China relations

Tech Policy Trends 2023 | US-China relations

Since taking office, the Biden Administration has shown little evidence of deviating from the era of ‘strategic competition’ with China...

13 Feb 2023 Opinion
Tech Policy Trends 2023 | Infrastructure and supply chain security in the EU

Tech Policy Trends 2023 | Infrastructure and supply chain security in the EU

Since Ursula von der Leyen introduced the idea of leading a ‘Geopolitical Commission’ in 2019, the EU has placed security...

6 Feb 2023 Opinion
Tech Policy Trends 2023

Tech Policy Trends 2023

What does 2023 have in store for technology, policy, and regulation? 2023 represents a defining year for the tech sector....

17 Jan 2023 AI Policy Lab reports
Tech Policy Trends 2023 | Web 3.0 and the next web

Tech Policy Trends 2023 | Web 3.0 and the next web

The next generation of web technologies has arrived. Blockchain and DLT systems promise to revolutionise logistics and administration through timestamping...

1 Jan 2023 Opinion
The ITU’s Plenipotentiary Conference 2022: Week Two Summary

The ITU’s Plenipotentiary Conference 2022: Week Two Summary

From 26 September to 14 October, the International Telecommunications Union (ITU) has been holding its Plenipotentiary Conference (PP-22), which occurs...

11 Oct 2022 Opinion
The State of Cybersecurity in Africa: The Chinese Effect

The State of Cybersecurity in Africa: The Chinese Effect

Introduction In Africa, core services such as communications, electric grids, transport systems, health services, and smart cities, are increasingly dependent...

23 Jun 2022 Opinion
Access Alert | The Summit of the Americas 2022: A Tech Policy Brief

Access Alert | The Summit of the Americas 2022: A Tech Policy Brief

From 6-10 June, government, businesses, civil society, and youth leaders from the Americas convened in Los Angeles, California, for the...

14 Jun 2022 Opinion
Access Alert | US Congress Makes Significant Progress on Cybersecurity Legislation

Access Alert | US Congress Makes Significant Progress on Cybersecurity Legislation

In May 2022, the United States Congress made major progress on cybersecurity legislation – particularly with regards to interagency coordination...

20 May 2022 Opinion
Access Alert | Singapore first in the world to establish Cybersecurity Licensing Scheme for Service Providers

Access Alert | Singapore first in the world to establish Cybersecurity Licensing Scheme for Service Providers

In a move widely telegraphed and consulted with the industry, the Singapore Cybersecurity Agency (CSA) has established a licensing scheme...

14 Apr 2022 Opinion
Log4j and the Need for Mandatory Cyber Incident Reporting

Log4j and the Need for Mandatory Cyber Incident Reporting

In late 2021, a major cyber vulnerability was detected in Apache Log4j, a logging function of Java that is present...

26 Jan 2022 Opinion
Masterclass: Digital Trade in ASEAN – Regulatory, Policy and Opportunity Landscape

Masterclass: Digital Trade in ASEAN – Regulatory, Policy and Opportunity Landscape

Masterclass conducted for Austrade (May 2020)

1 Jun 2020 Events
Cybersecurity, Data Protection Policies, and Cloud Adoption in APAC

Cybersecurity, Data Protection Policies, and Cloud Adoption in APAC

Webinar conducted for CSA via BrightTALK (27 May 2020)

27 May 2020 Events
Lessons from the Cathay Breach: Time to Talk Data Classification

Lessons from the Cathay Breach: Time to Talk Data Classification

“It’s not if, but when”, a phrase almost guaranteed to creep into any event with information security on the menu. Yet beyond the roundtables and fora increasingly devoted to cybersecurity and data privacy, this phrase took on a very real meaning as households in the SAR awoke on October 25th to the possibility that their personal information had been leaked along with some 9 million other Cathay Pacific accounts breached earlier this year.

29 Oct 2018 Opinion

Access Partnership to Host Workshop on ”Cybersecurity in Retail and Consumer Goods Industry” in Singapore

Join Access Partnership and JurisAsia for this workshop on 10 May to get an insight into how regulators and businesses can deal…
19 Apr 2018 Events

Access Partnership to Host WSIS 2018 Panel on Cybersecurity

On this panel, we will identify the most pressing challenges to government and industry, and discuss recommendations to address them.…
15 Mar 2018 Events
Time to Retreat?

Time to Retreat?

Is nothing safe! From next month, Singapore’s civil servants will be disconnected from the Internet.[1] And then connected again using...

1 Mar 2017 Reports
If it’s broke, don’t fix it?

If it’s broke, don’t fix it?

The Bangladesh Bank heist in March 2016 netted USD81 million when fake transfer requests were wired to the Federal Reserve...

1 Apr 2016 Reports
Is Cybersecurity an Oxymoron?

Is Cybersecurity an Oxymoron?

Many years ago I lived in one of the less secure, less affluent parts of London. It was a neighbourhood...

1 Nov 2015 Reports
Public Data at Risk: Cyber Threat to the Networked Government

Public Data at Risk: Cyber Threat to the Networked Government

Executive Summary Being a networked government can offer tremendous opportunity for governments globally to connect with their citizens, productively collect...

29 Apr 2015 Reports