Course Overview

The course will provide students with a good overview and understanding of the Cybersecurity Act and how it applies to organisations for their compliance. Areas covered in the training include main objectives of the Cybersecurity Act, its key legislative provisions and how it affects organisations. The course also explains how learners can help ensure compliance with the Cybersecurity Act, as well as how to prepare a management report for follow-up.


Course Duration

1 Day / 8 Hours (including 1 hr of assessment)


Course Outline

  • Background and Circumstances on why the Act was enacted
  •  Objectives of the Act
  •  Reasons why the Act came about
  •  Global development and standards
  • Key legislative requirements of the Act
  •  Definition of what constitutes Essential Services and what makes up the Critical  Information Infrastructure
  •  Definition of what is a cybersecurity threat and cybersecurity incident
  •  Computers and systems are considered Critical Information Structure
  •  Services that are considered essential services
  •  Regulation and obligations of owners of Critical Information Infrastructure (CII)
  •  Duties of owners of CII, including
  •  Compliance with any codes of practice implemented the Commissioner
  •  Giving information relating to CII
  •  Notification obligations
  •  Carrying out risk assessments, regular audits and exercises
  •  Effect of rules of professional conduct, privilege or immunity on disclosure obligations
  •  Appeals to the Minister
  •  Responses to cybersecurity threats and incidents
  •  Power to investigate
  •  Duties of incident response officer
  •  Statements made by persons during investigations
  •  Severe cybersecurity threats or incidents
  •  Emergency cybersecurity measures
  •  The Licensing regime for Cybersecurity Providers
  •  Cybersecurity services that need to be licensed
  •  Requirements for individuals or businesses to qualify for the license
  •  Conditions for license
  •  Record-keeping requirements
  •  Revocation and suspension of license
  •  The duties and powers of Commissioner of Cybersecurity, including the power to exercise the duty to take possession of computers and equipment
  •  Offences and penalties under the Act
  •  Unlicensed cybersecurity service providers
  •  Financial penalties
  •  Liability for offences by corporations
  •  Liability of unincorporated associations or partnerships
  •  Power of officers to enter into premises for searches, etc.
  •  Preservation of secrecy
  •  Protection for informers
  •  Effect of provisions under the Computer Misuse & Cybersecurity Act
  • Potential issues in implementation and application of the Act
  •  Issues on the effect of Act on existing laws, especially personal data protection and privacy  laws
  •  Whether organisations will be additionally burdened by obligations under the Act
  •  Implications on innovation, e.g. for startups
  • Structure of Security Function in an Organisation
  •  Role of the Chief Information Security Officer or equivalent
  •  Set security strategy
  •  Set standards and governance
  •  Establish security architecture
  •  Advise incidence resolution
  •  Manage cyber risk
  •  Manage department
  •  Other Roles
  •  Principal security engineer
  •  Incident Investigation manager
  •  Security operations manager
  •  Cyber risk manager
  •  Security operations analyst
  •  others
  • Develop a Process to detect and report cybersecurity threats and incidents
  •  Factors to consider
  •   Example of a workflow to detect and report threats and incidents
  • Develop a process to detect and report threats and incidents
  •  Risk assessment techniques
  •  What if questioning analysis
  •   Checklists
  •  HAZOP
  •  FMEA
  •  FTA
  •  Risk assessment steps
  •  Risk assessment -technologies used
  •  Detection adapting internal organisational structures and procedures
  •  Reporting key actions
  •  Case studies - types of attacks, and current position on defences
  • Risk Management
  •  Critical evaluation, review and drive of organisation-wide risk mitigation and  management
  •  Anticipate emerging threats and potential risks
  •  Risk managing the broader perimeter of exposure third parties including vendors,  service providers, IoT, etc
  • Practical techniques for protection
  •  Potential end-user threats and vulnerabilities
  •  Information and cyber security education needs and objectives
  •  Methods for on-going compliance with cybersecurity measures
  •   Practical techniques for employee protection and education
  •  Review of cybersecurity measures for keeping processes up to date and ensure on-going  com
  • Training and Communications to Staff
  •  Establish a communications plan
  •  Content of communications plan and document
  •  Review of communication plan
  •   Access to communications plans
  •  Keeping updated on legal developments and news regarding cybersecurity


Mode of Assessment

Not Applicable


Certification Obtained and Conferred by

Awarded NTUC LearningHub Certificate of Completion


More Information
  • (Local Institution) NTUC LearningHub
  • No comments yet.
  • Add a review
    error: Content is protected !!