STAT Trade Times: “Will Air Cargo’s lax cybersecurity measures be its undoing?”

Recently, our Directors Sean Lee and Chua Eng Hock spoke to STAT Times on how the heightened risk of cyberattacks has increased vulnerability for air cargo logistics.

Sean Lee, Director, Cyber Risk Advisory at Heron Technology, said, “What we could see happening in the future is a potential decoupling of the global economy into a West and East economic bloc and more countries strengthening resilience within their supply chain. There would be fragmentation of the global supply chain into smaller ‘supply chain blocs’. This means that disrupting the smaller supply chain blocs, or either the West or East economic supply chains, to achieve political or criminal aims by attackers can become more attractive and prevalent.”

Chua Eng Hock, Director, Cybersecurity Ops & Engineering at Heron Technology, told the publication that the company offers a suite of offerings, including consultancy services, data protection, and Managed SOC(Security Operations Center) services for its customers. “With our consultancy services, we support companies to comply with the latest standards specified within their industries and regulations by relevant authorities. We also provide red teaming and vulnerability assessment services to test and audit companies’ cybersecurity readiness and maturity. With our ‘Data Protection’ services, we offer a unique data leak protection (DLP) solution that incorporates digital rights management (DRM) and user entity behavioural analytics (UEBA) functionalities that enable companies to classify and manage access to their data across their companies and supply chain. We also offer a data diode solution that optimizes data management in segregated networks, which are relevant to the air cargo industry that operates diverse information and operational technologies across public and private networks. With our managed SOC services, we provide for early detection and response to cyber-attacks by proactively monitoring our clients’ IT network and user endpoints.”

Read the full article here or download the article.