Skip To Content
Fundamentals of Cybersecurity Act is a Program

Fundamentals of Cybersecurity Act

Self-paced

Sorry! The enrollment period is currently closed. Please check back soon.

Full program description

Fundamentals of Cybersecurity Act

Course Overview

The course will provide students a good overview and understanding of the Cybersecurity Act and how it applies to organisations for their compliance. Areas covered in the training include main objectives of the Cybersecurity Act, its key legislative provisions and how it affects organisations. The course also explains how learners can help ensure compliance with the Cybersecurity Act, as well as how to prepare a management report for follow-up.

Who Should Attend

  • Compliance Officer, IT Heads of Departments and IT Managers
  • Cybersecurity Managers and Privacy Officers (including Data Protection Officers)
  • IT personnel

Course Duration

1 Day / 7 Hours

Course Outline

Background and Circumstances on why the Act was enacted

  • Objectives of the Act
  • Reasons why the Act came about
  • Global development and standards

Key legislative requirements of the Act

  • Definition of what constitutes Essential Services and what makes up the Critical Information Infrastructure
    • Definition of what is a cybersecurity threat and cybersecurity incident
    • Computers and systems are considered Critical Information Structure
    • Services that are considered essential services
  • Regulation and obligations of owners of Critical Information Infrastructure (CII)
    • Duties of owners of CII, including
      •   Compliance with any codes of practice implemented the Commissioner
      •   Giving information relating to CII
      •   Notification obligations
      •   Carrying out risk assessments, regular audits and exercises
    • Effect of rules of professional conduct, privilege or immunity on disclosure obligations 
    • Appeals to the Minister
  • Responses to cybersecurity threats and incidents
    • Power to investigate
    • Duties of incident response officer
    • Statements made by persons during investigations
    • Severe cybersecurity threats or incidents
    • Emergency cybersecurity measures
  • The Licensing regime for Cybersecurity Providers
    • Cybersecurity services that need to be licensed
    • Requirements for individuals or businesses to qualify for license
    • Conditions for license
    • Record-keeping requirements
    • Revocation and suspension of license
  • The duties and powers of Commissioner of Cybersecurity, including the power to exercise duty to take possession of computers and equipment
  • Offences and penalties under the Act
    • Unlicensed cybersecurity service providers
    • Financial penalties
    • Liability for offences by corporations
    • Liability of unincorporated associations or partnerships
    • Power of officers to enter into premises for searches, etc.
  • Preservation of secrecy
  • Protection for informers
  • Effect of provisions under the Computer Misuse & Cybersecurity Act

Potential issues in implementation and application of the Act

  • Issues on effect of Act on existing laws, especially personal data protection and privacy laws
  • Whether organisations will be additionally burdened by obligations under the Act
  • Implications on innovation, e.g. for start ups

Develop a Process to detect and report cybersecurity threats and incidents

  • Factors to consider
  • Example of a workflow to detect and report threats and incidents

Training and Communications to Staff

  • Considerations when developing a Training and Communications Plan
  • Example of a Training and Communications Plan

Course Objectives

  • Identify legislative and regulatory requirements under the Cybersecurity Act that the organisation with, including identifying which are the computer systems affected by the Act;
  • Communicate key legislative and regulatory requirements (including offences and penalties) under the Cybersecurity Act to relevant stakeholders to facilitate compliance,
  • Assess the organisations internal policies and procedures to ensure compliance (including the obligations for notification, audits, information provision and participation in cybersecurity exercises);
  • Identify areas of possible non-compliance in the organisations processes;
  • Assist in review of the organisations guidelines / policies for adherence to requirements under the Cybersecurity Act,
  • Assist in the implementation of procedures to ensure compliance with the Cybersecurity Act in the organisations operations and processes, and
  • Prepare management report for follow-up action.

Pre-requisites

Learners are assumed to be able to:

  • Understand relevant organisational policies, processes, IT systems and the types of data that is captured and stored in those systems;
  • Have information gathering skills to gather and collate necessary information;
  • Have analytical skills to assess policies and procedures;
  • Have business writing skills to prepare management report; and
  • Be aware of compliance requirements of organisation.

Price

 Original course fee $350 (before GST)
 After funding for NTUC Union Member $20 (with GST)


Terms and conditions apply. NTUC LearningHub reserve the right to make changes or improvements to any of the products described in this document without prior notice.

Prices are subject to other LHUB miscellaneous fees

UDSIT05