AIRLINK 75.41 Decreased By ▼ -0.02 (-0.03%)
BOP 5.13 Increased By ▲ 0.06 (1.18%)
CNERGY 4.62 Decreased By ▼ -0.13 (-2.74%)
DFML 29.80 Decreased By ▼ -0.30 (-1%)
DGKC 88.19 Decreased By ▼ -2.29 (-2.53%)
FCCL 22.59 Decreased By ▼ -0.31 (-1.35%)
FFBL 33.00 Increased By ▲ 0.05 (0.15%)
FFL 10.07 Increased By ▲ 0.02 (0.2%)
GGL 11.12 Decreased By ▼ -0.22 (-1.94%)
HBL 114.42 Increased By ▲ 0.93 (0.82%)
HUBC 137.15 Increased By ▲ 0.64 (0.47%)
HUMNL 9.48 Decreased By ▼ -0.42 (-4.24%)
KEL 4.61 Decreased By ▼ -0.05 (-1.07%)
KOSM 4.65 Decreased By ▼ -0.04 (-0.85%)
MLCF 39.94 Decreased By ▼ -1.16 (-2.82%)
OGDC 135.30 Increased By ▲ 0.50 (0.37%)
PAEL 27.07 Decreased By ▼ -0.54 (-1.96%)
PIAA 24.70 Decreased By ▼ -0.77 (-3.02%)
PIBTL 6.95 Increased By ▲ 0.03 (0.43%)
PPL 124.19 Decreased By ▼ -0.26 (-0.21%)
PRL 27.29 Decreased By ▼ -0.11 (-0.4%)
PTC 14.20 Decreased By ▼ -0.30 (-2.07%)
SEARL 60.75 Increased By ▲ 0.55 (0.91%)
SNGP 71.34 Increased By ▲ 0.79 (1.12%)
SSGC 10.53 Decreased By ▼ -0.03 (-0.28%)
TELE 8.77 Decreased By ▼ -0.12 (-1.35%)
TPLP 11.73 Decreased By ▼ -0.05 (-0.42%)
TRG 66.75 Decreased By ▼ -0.91 (-1.34%)
UNITY 25.20 Increased By ▲ 0.03 (0.12%)
WTL 1.45 Decreased By ▼ -0.03 (-2.03%)
BR100 7,750 Increased By 24.9 (0.32%)
BR30 25,551 Decreased By -50.3 (-0.2%)
KSE100 74,133 Increased By 334.2 (0.45%)
KSE30 23,819 Increased By 195 (0.83%)

ISLAMABAD: Pakistan Telecommunication Authority (PTA) while admitting an increase in cyber attacks complexity unveiled Cyber Security Strategy for the telecom sector - providing a strategic framework and road map for the implementation of National Cyber Security Policy during the next five years (2023-2028).

The strategy envisioned to create a secure, resilient, and trusted digital ecosystem for Pakistan’s telecom sector.

The PTA stated that recent years have witnessed a wave of major security breaches that have revealed vulnerabilities in both sophisticated international and national networks.

The likes of Solar Wind, Microsoft Exchange and Moveit exploits serve as stark reminders, breaching even the most advanced layers of security and propagating on a broad scale.

A recent addition to these is the access of hackers to sophisticated AI tools such as ChatGPT or its malicious variants such as WormGPT or FraudGPT, the use of which can enable even script kiddies to create sophisticated payloads to successfully breach multilayered cyber defence.

Over the past decade, Pakistan has found itself on the receiving end of comparable state-sponsored cyber attacks.

This is of significant concern, especially considering Pakistan’s low standing in global cyber security rankings, which renders the nation susceptible to its adversaries aiming to disrupt national stability.

These cyber security threats are not simply a challenge to our digital networks; they pose a profound risk to our national security, economy, and social fabric.

The Cyber Security Strategy for the telecom sector seeks to ensure the security and resilience of the telecom sector in the face of ever-evolving cyber threats. It outlines various challenges and opportunities associated with the protection of critical telecom infrastructure and provide a framework for collaborative action to address these challenges.

The strategy emphasizes the need for a risk-based, integrated approach to cyber security, and identifies key action areas including risk management and governance, cyber defence and incident response, research and development, and public-private partnerships.

The strategy comprises six pillars, each of which addresses a distinct area of cyber security. The strategy stated that it addresses the challenges posed by the increasing interconnectivity of telecom networks, the cyber threats they face, and the need to protect their data and customer information.

The strategy focuses on areas, such as risk management and governance; cyber defence and incident response; research and development; and public-private partnerships.

It emphasizes the need for a comprehensive and integrated approach to cyber security across the telecom sector and lays out a framework for collaborative efforts to protect critical telecom infrastructure and services.

The strategy also identifies key challenges and opportunities for the sector and provides a roadmap for action to ensure the security of the telecom sector.

The strategy also outlines several initiatives and activities that will be undertaken to help protect the national critical infrastructure. These include enhancing public-private partnerships, investing in research and development, and developing a unified national framework for cyber security.

At a high level, following are the expectations from telecom companies to achieve the objectives of this strategy: a. Telecom companies should ensure that all personnel are trained and educated on cyber security practices and procedures, especially on employees’ responsibilities to ward off insider threats. b. Telecom companies should ensure that their networks and systems are compliant with PTA’s regulations and directives, especially to the CTDISR and Cyber Security Framework. c. Telecom companies are obligated to ensure consistent monitoring and timely updates of their networks and systems to mitigate the risk of cyber attacks.

This can be particularly achieved by establishing CERT/SOCs and facilitating round-the-clock monitoring. Employing skilled Level 1, 2, and 3 resources, alongside clearly defined processes, are paramount to this effort.

Additionally, it is crucial for these companies to ensure the integration of their SOC with nTSOC, which will enable an effective, synergized response to any potential cyber attack.

This proactive, unified approach is crucial for enhancing overall cyber resilience in the telecom sector. d. Telecom companies must implement robust measures to protect customer data from unauthorized access.

Prioritizing data privacy is essential to maintain trust among users. e. Telecom companies should ensure that their systems are designed to detect and respond to cyber security incidents promptly. f. Telecom companies should frequently assess their systems and networks to ensure that security flaws are identified and addressed.

In this regard, they need to devise and practice a well-defined three tier audit process, culminating in validation by the PTA cyber security team.

The operators should approach this effort positively, cooperating with external teams to improve their security posture. g. Telecom companies should collaborate with other organizations within the industry and PTA in sharing relevant information about cyber security threats and incidents. Instead of hiding cyber incidences, we should be working on a mutual-trust model to fight this menace jointly. And, h. Telecom companies should provide customers with information about cyber security threats and how to protect themselves from such threats.

Copyright Business Recorder, 2023

Comments

Comments are closed.