Skip To Content
Cybersecurity Act Fundamentals is a Program

Cybersecurity Act Fundamentals

Self-paced

Sorry! The enrollment period is currently closed. Please check back soon.

Full program description

Cybersecurity Act Fundamentals

What's In It For Me

Course Overview

The course will provide students with a good overview and understanding of the Cybersecurity Act and how it applies to organisations for their compliance. Areas covered in the training include main objectives of the Cybersecurity Act, its key legislative provisions and how it affects organisations. The course also explains how learners can help ensure compliance with the Cybersecurity Act, as well as how to prepare a management report for follow-up. 

Course Duration

1 Day / 8 Hours (including 1 hr of assessment)

Course Outline

  • Background and Circumstances on why the Act was enacted
  •  Objectives of the Act
  •  Reasons why the Act came about
  •  Global development and standards

  • Key legislative requirements of the Act
  •  Definition of what constitutes Essential Services and what makes up the Critical  Information Infrastructure
  •  Definition of what is a cybersecurity threat and cybersecurity incident
  •  Computers and systems are considered Critical Information Structure
  •  Services that are considered essential services
  •  Regulation and obligations of owners of Critical Information Infrastructure (CII)
  •  Duties of owners of CII, including
  •  Compliance with any codes of practice implemented the Commissioner
  •  Giving information relating to CII
  •  Notification obligations
  •  Carrying out risk assessments, regular audits and exercises
  •  Effect of rules of professional conduct, privilege or immunity on disclosure obligations 
  •  Appeals to the Minister
  •  Responses to cybersecurity threats and incidents
  •  Power to investigate
  •  Duties of incident response officer
  •  Statements made by persons during investigations
  •  Severe cybersecurity threats or incidents
  •  Emergency cybersecurity measures
  •  The Licensing regime for Cybersecurity Providers
  •  Cybersecurity services that need to be licensed
  •  Requirements for individuals or businesses to qualify for the license
  •  Conditions for license
  •  Record-keeping requirements
  •  Revocation and suspension of license
  •  The duties and powers of Commissioner of Cybersecurity, including the power to exercise the duty to take possession of computers and equipment
  •  Offences and penalties under the Act
  •  Unlicensed cybersecurity service providers
  •  Financial penalties
  •  Liability for offences by corporations
  •  Liability of unincorporated associations or partnerships
  •  Power of officers to enter into premises for searches, etc.
  •  Preservation of secrecy
  •  Protection for informers
  •  Effect of provisions under the Computer Misuse & Cybersecurity Act
 
  • Potential issues in implementation and application of the Act
  •  Issues on the effect of Act on existing laws, especially personal data protection and privacy  laws
  •  Whether organisations will be additionally burdened by obligations under the Act
  •  Implications on innovation, e.g. for startups
 
  • Structure of Security Function in an Organisation
  •  Role of the Chief Information Security Officer or equivalent
  •  Set security strategy
  •  Set standards and governance
  •  Establish security architecture
  •  Advise incidence resolution
  •  Manage cyber risk
  •  Manage department
  •  Other Roles
  •  Principal security engineer
  •  Incident Investigation manager
  •  Security operations manager
  •  Cyber risk manager
  •  Security operations analyst
  •  others
 
  • Develop a Process to detect and report cybersecurity threats and incidents
  •  Factors to consider
  •   Example of a workflow to detect and report threats and incidents
 
  • Develop a process to detect and report threats and incidents
  •  Risk assessment techniques
  •  What if questioning analysis
  •   Checklists
  •  HAZOP
  •  FMEA
  •  FTA
  •  Risk assessment steps
  •  Risk assessment -technologies used
  •  Detection adapting internal organisational structures and procedures
  •  Reporting key actions
  •  Case studies - types of attacks, and current position on defences
  • Risk Management
  •  Critical evaluation, review and drive of organisation-wide risk mitigation and  management
  •  Anticipate emerging threats and potential risks
  •  Risk managing the broader perimeter of exposure third parties including vendors,  service providers, IoT, etc
  • Practical techniques for protection
  •  Potential end-user threats and vulnerabilities
  •  Information and cyber security education needs and objectives
  •  Methods for on-going compliance with cybersecurity measures
  •   Practical techniques for employee protection and education
  •  Review of cybersecurity measures for keeping processes up to date and ensure on-going  com 
  • Training and Communications to Staff
  •  Establish a communications plan
  •  Content of communications plan and document
  •  Review of communication plan
  •   Access to communications plans
  •  Keeping updated on legal developments and news regarding cybersecurity

Mode of Assessment

Not Applicable

Certification Obtained and Conferred by

Awarded NTUC LearningHub Certificate of Completion

Course Objectives

After completing this course, students will be able to:

  • Identify legislative and regulatory requirements under the Cybersecurity Act that the organisation with, including identifying which are the computer systems affected by the Act;
  • Communicate key legislative and regulatory requirements (including offences and penalties) under the Cybersecurity Act to relevant stakeholders to facilitate compliance,
  • Assess the organisation's internal policies and procedures to ensure compliance (including the obligations for notification, audits, information provision and participation in cybersecurity exercises);
  • Identify areas of possible non-compliance in the organisation's processes;
  • Assist in the review of the organisation's guidelines/policies for adherence to requirements under the Cybersecurity Act,
  • Assist in the implementation of procedures to ensure compliance with the Cybersecurity Act in the organisation's operations and processes, and
  • Prepare management report for follow-up action.
  • Recommend security measures for the organization

Pre-requisites

Learners are assumed to be able to:

  • Understand relevant organisational policies, processes, IT systems and the types of data that is captured and stored in those systems;
  • Have information gathering skills to gather and collate necessary information;
  • Have analytical skills to assess policies and procedures;
  • Have business writing skills to prepare management report; and
  • Be aware of the compliance requirements of the organisation.

Medium of Instruction & Trainer

Medium of Instruction: English

Trainer: Trainee ratio is 1:25

Funding Information

Union Training Assistance Programme (UTAP)

NTUC members enjoy UTAP* benefit of up to $250 each year when you sign up for courses with NTUC LearningHub.

* UTAP supports 50% of the course fees paid cap at $250 per year. You must be a union member throughout the course duration and at the time of claim. You must achieve a minimum of 75% attendance for each application and have sat for all prescribed examinations. Other terms and conditions apply.

Price

 

w/o GST

w GST

Full Course Fee

$350.00

374.50

Singaporeans/PR (Permanent Resident) aged below 40 years old

$105.00

$129.50

Singaporeans aged 40 years old and above

$35.00

$59.50

 

To qualify for funding, you need to meet the following criteria:

Individual:

  1. Singapore Citizens or Singapore Permanent Residents physically based in Singapore.
  2. Complete 100% attendance and pass all relevant assessments and examinations.
  3. NTUC Members can enjoy up to 50% funding (capped at $250 per year) under Union Training Assistance Programme (UTAP).

Company Sponsored

  1. Singapore Citizens or Singapore Permanent Residents physically based in Singapore.
  2. Company must be Financial Institutions regulated by MAS (licensed or exempted from licensing), or involved in supporting financial sector activities.
  3. Complete 100% attendance and pass all relevant assessments and examinations.

For more information on funding reimbursement, please refer to this link.

IBFIT01