Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers (Singapore Edition) Provides Expert Advice, Insights and Best Practices

SINGAPORE – January 11, 2017 – Palo Alto Networks® (NYSE: PANW), the next-generation security company, has announced the publication of ‘Navigating the Digital Age: The Definitive Cybersecurity Guide for directors and officers (Singapore Edition)’. The guide, which has been published in collaboration with Forbes, provides business leaders and executives at enterprises, government agencies and other organisations with practical, actionable advice on how best to protect their organisations from cyberattacks.

The Singapore Edition is supported by the Cyber Security Agency (CSA) of Singapore, and written both for executives who seek better understanding on the topic of cybersecurity as well as seasoned professionals in the field. It contains advice on a range of cybersecurity issues from both private and public sector thought leaders, and is intended to enable business leaders to start having conversations on topics such as security for the Internet of Things (IOT), legal and regulatory cybersecurity considerations as well as breach prevention.

Contributing authors include:

  • David Koh, Chief Executive, Cyber Security Agency of Singapore
  • Richard A. Clarke, Chairman, former White House Advisor on Cybersecurity & Counterterrorism
  • Bill Chang, Chief Executive Officer, Group Enterprise, Singtel
  • Khoo Boon Hui, former INTERPOL President; retired Singapore Police Commissioner
  • Professor Yu Chien Siang, Chief Innovation Officer, Quann
  • Huang Shao Fei, Director, IT Security, Governance & Risk Management, Land Transport Authority
  • Baey Chin Cheng, Chief Information Security Officer, Singtel
  • Seah Kian Peng, Chief Executive Officer, NTUC FairPrice
  • Professor Lam Kwok Yan, Professor of Computer Science, School of Computer Science and Engineering, College of Engineering, Nanyang Technological University
  • Sean Duca, Vice President, Regional Chief Security Officer, Palo Alto Networks
  • Foreword by Dr Yaacob Ibrahim, Minister for Communications & Information and the Minister-in-charge of Cyber Security


“We need more people to come forward to share their expertise and experience. This practical guide to cybersecurity – the first of its kind in Singapore – is a good step in this direction, with invaluable lessons and insights from real-world experience. I trust this initiative by Palo Alto Networks will inspire others to follow in their footsteps.”

- Dr Yaacob Ibrahim, Minister for Communications & Information and the Minister-in-charge of Cyber Security

“To deal with the rapidly evolving cyber threat landscape, there is a need for close collaboration and cross-pollination of ideas among academia and industry, both local and foreign. Cybersecurity R&D does not involve just developing engineering solutions to difficult technical problems; emphasis must also be placed on research into policy, governance and legislation, which are equally essential… Collective defence is the key to creating a safer cyberspace.”

- David Koh, Chief Executive, Cyber Security Agency of Singapore

“Board of directors need to be more educated in the fast-rising risks of cyber threats so as to provide oversight and governance with management in cyber risk assessment. In the financial industry, regulators now require board members to undertake cyber security awareness training...”

- Bill Chang, Chief Executive Officer, Group Enterprise, Singtel

“The most sophisticated and advanced security technology in the world cannot guard you securely unless employees understand their roles and responsibilities in safeguarding sensitive data and protecting company resources. This involves establishing, and implementing practices and policies that promote security and training employees to identify and avoid risks.”

- Khoo Boon Hui, former INTERPOL President; retired Singapore Police Commissioner

“Every organisation needs to evaluate the way cybersecurity is strategically managed and embedded into the business to enable the continued pursuit of its digitisation agenda.”

- Seah Kian Peng, Chief Executive Officer, NTUC FairPrice

“Cybersecurity can support the goals of senior executives to keep the company running and profitable. Executive leadership must set organisational strategy that builds cybersecurity considerations into the business planning process. Toward that goal, technical and non-technical personnel should enter into a common lexicon to discuss how cyber is the vector where good and bad things happen and that there is no such thing as cyber risk, it is just risk to the business.”

- Sean Duca, Vice President, Regional Chief Security Officer, Palo Alto Networks

To learn more about cybersecurity from leading experts and contributors, download your own copy of the Guide here:

To learn more about how Palo Alto Networks helps organisations prevent successful cyberattacks with its next-generation security platform, visit:

To download the original U.S. edition of the guide published in partnership with the New York Stock Exchange (NYSE), visit

About Palo Alto Networks

Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization’s most valuable assets. Find out more at

Palo Alto Networks and the Palo Alto Networks logo are trademarks of Palo Alto Networks, Inc. in the United States and in jurisdictions throughout the world. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.

Media Contacts:

Martina Schulze-Warnecke

Senior Manager, Corporate Communications, Asia Pacific & Japan

Palo Alto Networks

+65 9295 9707

Sheena Chauhan

Rice Communications on behalf of Palo Alto Networks

+65 8646 2010


NSS Labs 2016 NGFW Test Report

The 2016 NSS NGFW Product Analysis Report shows the Palo Alto Networks PA-7050 achieving a 95.8% security effectiveness rating and successfully passing all security tests.

  • 3
  • 11644

Exploit Kits

Exploit kits, which first became popular in 2006, are used to automate the exploitation of vulnerabilities on victims’ machines, most commonly while users are browsing the web. Over the past decade they have become an extremely popular means for criminal groups to distribute mass malware or remote access tools (RAT), because they lower the barrier to entry for attackers and can enable opportunistic attacks at scale. To understand this phenomenon, we must understand the ecosystem that surrounds exploit kits, including the actors, campaigns and terminology involved.

  • 1
  • 5136

Someone is putting lots of work into hacking Github developers

Open source developers who use Github are in the cross-hairs of advanced malware that can steal passwords, download sensitive files, take screenshots, and self-destruct when necessary.

  • 0
  • 760

Unit 42 Report - Ransomware: Unlocking the Lucrative Criminal Business Model

Ransomware, specifically cryptographic ransomware, has quickly become one of the greatest cyberthreats facing organizations around the world. This criminal business model has proven to be highly effective in generating revenue for cyber adversaries in addition to causing significant operational impact to affected organizations. It is largely victim agnostic, spanning the globe and affecting all major industry verticals. Small organizations, large enterprises, individual home users – all are potential targets.

Santa Clara, CA, USA
  • 0
  • 7250

Why Healthcare Network Security is a Critical Provider Tool

Covered entities are quickly implementing more technology into daily operations, which could potentially open the door for cyber criminals or even unauthorized insider access. Healthcare network security measures must be current and comprehensive, ensuring that patient data does not fall into the wrong hands.

  • 0
  • 736

As Malware Gets Smarter, Bare Metal Analysis Can Keep You Secure

Android adware has embraced an innovative way to promote potentially malicious apps: abuse Android plugin frameworks. They say a rising tide lifts all boats; unfortunately, the proverb applies to cybercriminals, too. While the inexpensive availability of compute processing power and broadband connectivity has made technologies like virtualization and cloud computing possible, that same ready access makes it possible for even a novice cybercriminal to leverage some of the most advanced malware available today.

  • 0
  • 663