Why Singapore CISOs must shift to identity security

For boards and business leaders, cybersecurity has become a determinant of operational continuity and enterprise trust. In Singapore, where digital adoption is deep and infrastructure is world-class, that trust has long rested on a belief in strong systems and well-defended networks.

That belief, while once well-founded, is being tested by a very different threat landscape.

As AI reshapes cyberthreats and regulatory pressure intensifies, organisations now face a race to harness AI and new controls faster than attackers and regulations outpace them, forcing identity, data governance and resilience to become immediate operating priorities rather than future considerations.

Singapore enterprises today face AI-augmented cyberthreats, which are becoming faster, smarter, and more deceptive, amplifying attacks. As a result, organisations are being pushed to rethink identity verification and trust protocols at the enterprise level.

At the same time, hybrid work, distributed cloud, IoT, and 5G mean employees, systems, and data no longer sit behind a single corporate network.

Security can no longer be built around networks alone. Most attacks no longer begin with breached firewalls, but with compromised credentials and impersonation. It must be rebuilt around identity as the new perimeter, supported by responsible AI governance and lifecycle-oriented data protection. Against this backdrop, compliance is no longer a constraint but a source of competitive advantage as threats continue to accelerate.

As cyber risk becomes identity-led rather than network-based, what should Singapore CISOs treat as the real foundation of cyber resilience?

AI-driven security operations: Responsible AI

As generative AI becomes embedded in security operations, explainability and human oversight become non-negotiable so that AI-driven defence can keep pace with AI-driven attacks without creating new blind spots.

With its ability to triage alerts, correlate signals across cloud and network, and recommend response actions, AI can reduce analyst fatigue and shrink the mean time to recover by up to 60%. Furthermore, according to IDC’s 2026 Security FutureScape study, AI systems will process as much as 80% of first-level security warnings by 2028, enabling security teams to focus on high-value decision-making.

Yet, without explainability and human oversight, this acceleration can create blind spots worse than analyst fatigue if AI goes unchecked.

To tackle this, frameworks must be implemented. For example, Singapore’s Model AI Governance Framework reflects heightened risks of AI systems accessing sensitive data and mandates human oversight for high-risk decisions, ensuring that the speed and scale of AI do not outrun accountability and control.

Additionally, enterprises must prioritise agility, visibility, and continuous learning. CISOs must deploy auditable AI with human checkpoints, model audit trails, and bias testing, as transparency, accountability, and human control are becoming just as critical as performance gains.

That means enterprises must use AI not in silos, but across the entire digital fabric, from cloud to network to endpoint.

Identity security: Singapore’s new perimeter

Singapore’s digital economy, driven by hybrid work, distributed cloud, IoT, and 5G, has dissolved the traditional network perimeter. In its place stands identity, now the frontline of cybersecurity for organisations and regulators alike, and the point where the contest between sophisticated identity abuse and continuous verification will be won or lost.

This is not theoretical: CSA reports that over 80% of Singapore organisations encountered cybersecurity incidents in 2024, dominated by phishing (over 6,100 cases, up 49%) and ransomware (159 cases, up 21% year-on-year), both of which are key vectors for credential theft and identity compromise.

In practice, identity and access remain moving targets, particularly in API-first and multi-cloud environments. Static role-based access models are ill-equipped to counter identity abuse driven by deepfakes and AI-embedded impersonation.

Continuous verification must be the operational standard for CISOs, introducing dynamic privilege controls for API-first architectures, OT connected factories, and distributed multi-cloud environments where conventional network boundaries no longer apply.

Responsible data practices: Governing for trust

As data volumes grow and regulations tighten, enterprises must adopt unified, lifecycle-oriented data-protection strategies that allow them to unlock AI-driven value from data without eroding trust or breaching regulatory expectations.

These include encryption, key management, asset classification, anonymisation, audit logs, and consent governance aligned with the Data Protection Trust Mark, an accountability tool to demonstrate responsible data protection practices.

Trust is increasingly shaped by how consistently data is governed across its entire lifecycle, not just how it is protected at rest. Inconsistent governance erodes trust.

The Personal Data Protection Act also ensures enterprises form unified strategies to use data responsibly.

From reaction to resilience: Building cybersecurity for constant pressure

The cybersecurity paradigm has shifted from reacting to incidents toward sustaining resilience under constant pressure, reframing cybersecurity as a present-day leadership mandate.

In this environment, the central challenge for leaders is to get ahead of compounding AI-driven threats and regulatory demands by turning responsible AI, identity-centric security, and data governance into a coherent resilience strategy, not a patchwork of point fixes.

For enterprise leaders and CISOs alike, it is paramount to deploy AI checkpoints that comply with government regulations while retaining human oversight; implement continuous identity verification to tackle expanding attack surfaces; and prioritise unified, lifecycle-oriented data governance.

Organisations that are more resilient maintain clear visibility, respond intelligently, and embed trust at the centre of their business models. This goes beyond standard checkboxes, making robust security mandates a strategic requirement for business continuity, compliance, and confidence, even as threats increase.

- Advertisement -