Close this search box.

We are creating some awesome events for you. Kindly bear with us.

EXCLUSIVE – Prevention, Detection, Response – which is the most important element in an approach to IT Security

EXCLUSIVE - Prevention

Managing an interactive discussion table of enthusiastic Singapore health professionals can be a challenging task.  Confident and assured professionals who know their business and have well developed views that go along with it, are not easy to stop especially when they have a bit of momentum going!

Imagine wanting to introduce them to the current issues in IT Security.  You have a carefully planned, pre-conceived focus and purpose for the 20-minute interaction.  You begin sincerely by introducing the ideas of prevention, detection and response to security incidents.  You even have a small democratic ‘throw a marble in the bottle’ exercise to engage the people coming to your table.  The table members have to choose which of the bottles represent the most important issue by throwing a marble into each bottle.

Prevention, Detection, Response – which is the most important element in an approach to IT Security – the marble on glass noise permeates the room!

In the IT Security world, Prevention has failed!!  Everyone knows that we can’t build the fence high enough to keep the security bandits out!  A nice platform to talk about the options, strategies and future directions for the management of IT Security right?


Prevention of disease; Detection of disease and Response to infectious disease outbreaks are all well-known medical terms and the members of this interactive table is composed largely of people from the Singapore Health sector. Let the fun begin!!

Watching a planned discussion focus get high jacked is very funny.  Attempts to get the subject back on the IT Security track were heroic but doomed to be only partly successful.  The conversations were energetic and far ranging. The facilitators were effectively immobilized by the enthusiasm of the group.

The detection of emerging infectious diseases within the Health Ministry was discussed and the importance of IT as a detection mechanism was quickly recognized.  The topic was not about IT security but, the architecture of the risk management logic was strikingly similar.  The way in which medical practitioners think about the infectious disease risk shares the same logic used in IT security.  Even the focus on risk isolation practices – the language is the same even if the procedures are different.

The discussion delved into the management of multi-resistance bugs and the analysis tools and procedures used to include samples sent to the laboratory for cultures to be grown and analysed.  The lead time to realise there is a potential outbreak is analogous to the long lead times associated with tracking IT security attack vectors.

We want the lead time to be shortened – we want to reduce the human resource overheads associated with physically determining the nature of the attack.  We want to put the right protective measures in place as soon as we know there is an event.  The sooner we isolate the risk, the better.

What can we do, what tools do we have to quickly understand that this could be a serious event?  What are the indicators that would justify executing the isolation protocols?

Are we talking medicine or IT risk?  It really doesn’t matter – the logic is congruent.

The work being done in Singapore to use diverse information sources available to the Health Ministry involves data analytics and the development of algorithms to recognize when events are happening at unusual levels that indicate there could be a problem.

We do the same thing in IT. We use tools to look at log information and we set alerts based on unusual patterns of behavior.

Who would have thought – medical doctors are ready to take on the IT security role – they know how to do this.  I am not sure I want my IT Security specialist to manage my next medical operation mind you, but when it comes to risk management, both domains of expertise overlap in surprising ways.


Qlik’s vision is a data-literate world, where everyone can use data and analytics to improve decision-making and solve their most challenging problems. A private company, Qlik offers real-time data integration and analytics solutions, powered by Qlik Cloud, to close the gaps between data, insights and action. By transforming data into Active Intelligence, businesses can drive better decisions, improve revenue and profitability, and optimize customer relationships. Qlik serves more than 38,000 active customers in over 100 countries.


As a Titanium Black Partner of Dell Technologies, CTC Global Singapore boasts unparalleled access to resources.

Established in 1972, we bring 52 years of experience to the table, solidifying our position as a leading IT solutions provider in Singapore. With over 300 qualified IT professionals, we are dedicated to delivering integrated solutions that empower your organization in key areas such as Automation & AI, Cyber Security, App Modernization & Data Analytics, Enterprise Cloud Infrastructure, Workplace Modernization and Professional Services.

Renowned for our consulting expertise and delivering expert IT solutions, CTC Global Singapore has become the preferred IT outsourcing partner for businesses across Singapore.


Planview has one mission: to build the future of connected work. Our solutions enable organizations to connect the business from ideas to impact, empowering companies to accelerate the achievement of what matters most. Planview’s full spectrum of Portfolio Management and Work Management solutions creates an organizational focus on the strategic outcomes that matter and empowers teams to deliver their best work, no matter how they work. The comprehensive Planview platform and enterprise success model enables customers to deliver innovative, competitive products, services, and customer experiences. Headquartered in Austin, Texas, with locations around the world, Planview has more than 1,300 employees supporting 4,500 customers and 2.6 million users worldwide. For more information, visit


SIRIM is a premier industrial research and technology organisation in Malaysia, wholly-owned by the Minister​ of Finance Incorporated. With over forty years of experience and expertise, SIRIM is mandated as the machinery for research and technology development, and the national champion of quality. SIRIM has always played a major role in the development of the country’s private sector. By tapping into our expertise and knowledge base, we focus on developing new technologies and improvements in the manufacturing, technology and services sectors. We nurture Small Medium Enterprises (SME) growth with solutions for technology penetration and upgrading, making it an ideal technology partner for SMEs.


HashiCorp provides infrastructure automation software for multi-cloud environments, enabling enterprises to unlock a common cloud operating model to provision, secure, connect, and run any application on any infrastructure. HashiCorp tools allow organizations to deliver applications faster by helping enterprises transition from manual processes and ITIL practices to self-service automation and DevOps practices. 


IBM is a leading global hybrid cloud and AI, and consulting services provider, helping clients in more than 175 countries capitalize on insights from their data, streamline business processes, reduce costs and gain the competitive edge in their industries. Nearly 3,800 government and corporate entities in critical infrastructure areas such as financial services, telecommunications and healthcare rely on IBM’s hybrid cloud platform and Red Hat OpenShift to affect their digital transformations quickly, efficiently, and securely. IBM’s breakthrough innovations in AI, quantum computing, industry-specific cloud solutions and business services deliver open and flexible options to our clients. All of this is backed by IBM’s legendary commitment to trust, transparency, responsibility, inclusivity, and service. For more information, visit