View from industry: Singapore’s internet policy
Advice from Tony Jarvis, Chief Strategist, Threat Prevention, APAC, Middle East & Africa

What advice would you provide to manage digital risks?
There are three pillars to any successful security program: people, processes and technology. Training users in proper cyber hygiene is a good first step. Having robust procedures in place to manage risk is another step in the right direction. These should ideally leverage best practices where available.
Technology allows policies to be enforced and protections to be automated. Not all technologies are created equal, so it is important to identify what risks an organisation is exposed to, and what technologies are best suited to providing the required protections.
How can governments secure infrastructure without endangering productivity and innovation?
The best way of achieving this would be with a solution that provides users with the flexibility they have grown accustomed to, while at the same time keeping the organisation secured. Today's advanced threats are constantly changing, and traditional defences based on signatures were never designed to protect against these dangers.
These protections are still necessary, but should be viewed as elements of a multi-layered approach to security. Solutions that are able to identify malicious behaviour in files that have never been seen before are a necessity today.
Most security vendors allow threats into the network and then begin the process of evaluating their behaviour. Once a suspicious activity is identified, it can often be too late.
With Check Point, threats can be kept at bay by providing users with cleaned versions of documents while evaluation takes place in the background. This ensures productivity is not impacted, and the organisation is kept secure at all times.
Image by Xiaobin Liu, used under CC BY-SA 2.0