Close this search box.

We are creating some awesome events for you. Kindly bear with us.

EXCLUSIVE – OpenGov Insight session on tackling cyberthreats for government IT ecosystems

On 24 May, OpenGov in
collaboration with Kaspersky Lab organised an engaging Breakfast Insight
session to explore the growing importance of cybersecurity and discuss how well-prepared
the agencies are in combating this ever-growing threat in today’s digital

closed-door, invitation-only interactive session gathered over 30 senior
technology executives from a wide range of government agencies, financial
institutions, and universities. The event took place at the Grand Hyatt Erawan Bangkok, Thailand.

‍Mr Mohit Sagar, Managing Director and Editor-in-Chief of OpenGov Asia

Mohit Sagar, Managing Director and Editor-in-Chief of OpenGov Asia kicked off
the session by highlighting the essential role of Chief Information Security
Officer in keeping the organisation digitally secure.

his opening address, Mr Sagar spoke about the looming danger of unpreparedness
against the sophisticated cyberattacks happening across the world and
Asia-Pacific region. He spoke about the damages and disproportionality in
cyberattacks –  while the average time
for hackers to cause a cybersecurity breach is less than 5 hours, organisations
take an average of over 200 days to detect the breach and another 55 days from
discovery to containment

his discussion on cyberthreat intelligence, he mentioned that technology
leaders must understand what constitutes as a cybersecurity threat – actor,
intent, capability, and opportunity. He also pointed out that human error
continues to be a major cybersecurity vulnerability. In view of the
fast-changing cybersecurity landscape, Mr Sagar called for an increased
cybersecurity awareness and collaboration to build a secure cyber space.

‍Mr Yeo Siang Tiong, General Manager, South East Asia, Kaspersky Lab

was followed by a welcome address delivered by Mr Yeo Siang Tiong, General
Manager, South East Asia, Kaspersky Lab.

Yeo emphasised that people and their devices are highly vulnerable and prone to
cybersecurity attacks. In Asia, advanced persistent threat (APT) attacks are
common challenges for government agencies in the region. The attacks can come in
different forms such as emails and documents. The cyberthreats can remain
dormant in the systems to affect more systems in the network to get access to
keystrokes, sensitive files and even passwords to secured systems.

needs to be fought at all fronts,” Mr Yeo reiterated.

defend against cybersecurity threats, other than ensuring the proper use of the
technology itself, Mr Yeo also highlighted the importance of cybersecurity
awareness, process and policy.

is not just the users who are using the technology. As regulators, as CISO, as
critical infrastructure owners in this country, you play a very important
part,” he said to the delegates.

serve as a learning platform for the public sector participants, OpenGov’s
Breakfast Insight session featured a scenario simulation of cyberattacks where
attendees learnt practical cybersecurity management skills through an
interactive gamification process.

Kaspersky Interactive Protection Simulation
(KIPS) is an exercise designed to place senior management teams from
government agencies into a realistic simulated environment facing a series of
unexpected cyberthreats, while trying to protect classified information and
computerised systems.

‍Mr Oleg Abdurashitov,
Head of Public Affairs, Asia Pacific, Kaspersky Lab

simulation exercise was facilitated by Mr Oleg Abdurashitov, Head of Public Affairs, Asia Pacific, Kaspersky

objective of the simulation is to build a cyber defence strategy by making
choices from amongst the best proactive and reactive controls available. The
simulation aims to boost awareness among delegates on how to strengthen cyber
defences of their organisations and make the security infrastructure more

This simulation is a dynamic awareness program
based on the idea of learning by doing. To defend their agency, each team had
to take strategic, managerial and technical decisions while taking operational
constraints into account and maintaining a high level of citizen-centric
service delivery levels. In the process, the team built cooperation while competition
under tight timeframe fostered deeper understanding of the nature of cybersecurity.

were divided into groups to participate in this simulation game where they
compete in running a set of public web services for the citizens in a public
sector agency’s data centre with modern computerised systems.

teams were presented with a series of cybersecurity scenarios during the game.
The goal of the teams is to provide citizen-centric public services in a timely
manner, while protecting sensitive personal information of citizens.

the cybersecurity scenarios unfold in which hackers target the systems’
vulnerabilities, the teams had to make decisions on how they would react to the
cybersecurity challenge and what strategy or solution to adopt. Every reaction
made by the teams would affect the ability of their agencies in the game in
protecting sensitive information from cyberattacks.

performance of each team in generating public welfare or state outcomes was
determined by the team’s choice of action. After each round, an evaluation was
given to analyse and discuss the best practises and typical errors in
cybersecurity incident response procedures. 

The winning team

Polling session and insights

the simulation exercise, Mr Sagar led a polling session to gauge participants’
views and concerns in cybersecurity.

50% of the participants are from public sector organisations with over 1,000
head counts in total. However, more than 60% of them have an annual IT budget
between $1 million to $15 million.

the simulation result into consideration, 37% of the participants stated that
appropriate amount of budget and its effective utilisation affects an
organisation most in securing their assets, followed by 23% who voted for the
capability to handle targeted attacks and another 20% who voted for risk

the discussion of their organisations’ key concern in cybersecurity, over half
of them pointed to employee education in IT security, while close to 20% chose
cloud security or data centre security. 13% of the attendees also named APT
attacks as their key cybersecurity concern.

terms of the effectiveness of cybersecurity architecture, 48% of the delegates
said the cybersecurity architecture of their organisation has the ability to
conform tor regulatory compliance levels and another 42% were confident that
the cybersecurity architecture of their organisation has the ability to respond
effectively to impending cyberthreats. The remaining 10% said the effectiveness
of their cybersecurity architecture has not been formally evaluated.

asked to rate their organisations’ level of preparedness to cyberthreats, close
to 60% of them are confident that their organisations are well-prepared but are
unsure if they can withstand an infiltration. While 11% of the participants
said that their organisations are “very well-prepared and there is no room for
an infiltration”, it is contrasted by another 32% who said their organisations
are not well-prepared.

all delegates, 48% of them were interested in finding out more about expert
services such as penetration testing, application security assessment, payment
systems security assessment, and telecom network assessment, 28% of them were
interested in data centre security solutions for virtualisation and storage
security, and 10% of them would like to explore security solutions related to
private security networks.


the engaging Breakfast Insight session, attendees came to the important takeaways
that without effective solutions to strengthen cyber defence, government
agencies are at the mercy of cyberattacks that leave confidential data of citizens exposed
and delivery of public services hindered.

can impair the normal functioning, causing serious data breach and
citizens to lose faith in government agencies. Such reputational damage could
be much costlier than an effective security budget to protect the organisation.
This highlighted the need for the top management to address cybersecurity, as
well as cross-departmental collaboration to ensure cybersecurity success.


Qlik’s vision is a data-literate world, where everyone can use data and analytics to improve decision-making and solve their most challenging problems. A private company, Qlik offers real-time data integration and analytics solutions, powered by Qlik Cloud, to close the gaps between data, insights and action. By transforming data into Active Intelligence, businesses can drive better decisions, improve revenue and profitability, and optimize customer relationships. Qlik serves more than 38,000 active customers in over 100 countries.


As a Titanium Black Partner of Dell Technologies, CTC Global Singapore boasts unparalleled access to resources.

Established in 1972, we bring 52 years of experience to the table, solidifying our position as a leading IT solutions provider in Singapore. With over 300 qualified IT professionals, we are dedicated to delivering integrated solutions that empower your organization in key areas such as Automation & AI, Cyber Security, App Modernization & Data Analytics, Enterprise Cloud Infrastructure, Workplace Modernization and Professional Services.

Renowned for our consulting expertise and delivering expert IT solutions, CTC Global Singapore has become the preferred IT outsourcing partner for businesses across Singapore.


Planview has one mission: to build the future of connected work. Our solutions enable organizations to connect the business from ideas to impact, empowering companies to accelerate the achievement of what matters most. Planview’s full spectrum of Portfolio Management and Work Management solutions creates an organizational focus on the strategic outcomes that matter and empowers teams to deliver their best work, no matter how they work. The comprehensive Planview platform and enterprise success model enables customers to deliver innovative, competitive products, services, and customer experiences. Headquartered in Austin, Texas, with locations around the world, Planview has more than 1,300 employees supporting 4,500 customers and 2.6 million users worldwide. For more information, visit


SIRIM is a premier industrial research and technology organisation in Malaysia, wholly-owned by the Minister​ of Finance Incorporated. With over forty years of experience and expertise, SIRIM is mandated as the machinery for research and technology development, and the national champion of quality. SIRIM has always played a major role in the development of the country’s private sector. By tapping into our expertise and knowledge base, we focus on developing new technologies and improvements in the manufacturing, technology and services sectors. We nurture Small Medium Enterprises (SME) growth with solutions for technology penetration and upgrading, making it an ideal technology partner for SMEs.


HashiCorp provides infrastructure automation software for multi-cloud environments, enabling enterprises to unlock a common cloud operating model to provision, secure, connect, and run any application on any infrastructure. HashiCorp tools allow organizations to deliver applications faster by helping enterprises transition from manual processes and ITIL practices to self-service automation and DevOps practices. 


IBM is a leading global hybrid cloud and AI, and business services provider. We help clients in more than 175 countries capitalize on insights from their data, streamline business processes, reduce costs and gain the competitive edge in their industries. Nearly 3,000 government and corporate entities in critical infrastructure areas such as financial services, telecommunications and healthcare rely on IBM’s hybrid cloud platform and Red Hat OpenShift to affect their digital transformations quickly, efficiently and securely. IBM’s breakthrough innovations in AI, quantum computing, industry-specific cloud solutions and business services deliver open and flexible options to our clients. All of this is backed by IBM’s legendary commitment to trust, transparency, responsibility, inclusivity and service.