BitDepthFeatured

Regional cybersecurity faces fire

4 Mins read
  • The siloed approach in the Caribbean hinders effective information sharing for coordinated responses to various cyber threats
  • The absence of legislation requiring incident disclosure hinders effective response efforts
  • Moving beyond seeking scapegoats to foser a culture of trust and responsibility

Above: Dale Joseph. Image captured from video footage.

BitDepth 1540 for December 08, 2025

On the first day of the cybersecurity track at AmCham’s Health, Safety, Security, and Environment (HSSE) Conference on November 11, the regional response to cybersecurity threats led the agenda.

The discussion on the topic Outpaced and under fire – Navigating the new era of cyber threats, was summarised by moderator Gerardo Rivera Menjivar, “Traditional threat models are being outpaced and this means, our strategies, governance, culture must evolve just as fast.”

Even casual observers of cybersecurity breaches are aware that attacks on businesses have increased dramatically over the last six years, despite industrious local efforts to keep successful breaches a business secret.

Some cyber attacks were so bold and their impact so disruptive that they couldn’t be hidden. How does TT and the region move forward from an approach that clearly isn’t working?

“We still operate largely in silos in the Caribbean,” said Dale Joseph, Chief Analyst, Cyber, at CARICOM IMPACS, the region’s collective implementation agency for crime and security response.

“That’s a problem, because if we don’t share information, we won’t be able to coordinate and we won’t be able to respond to [threats effectively]. It could be ransomware, it could be AI-enabled threats, but if we don’t share information, we won’t be able to coordinate and have a structured, realistic response.”

“In response to a cyber incident, there’s often confusion, knowing who to call, when to call, and who has responsibilities for what. That’s a challenge for us.”

“Just having asset management, even an Excel sheet [listing] some of your main assets, I’ll take that as opposed to nothing,” said Anish Bachu Head of the National Cyber Security Incident Response Team (TT-CSIRT).

Anish Bachu. Image captured from video footage.

“That’s where things fall apart through failure to prepare. I can’t tell you how many times, during an incident, we’re trying to figure these things out on the fly.”

“You never want, on one of the worst days of your professional career, in the company’s operations, to be trying to figure out who to call. I think the biggest failure [I’ve experienced] is the failure to prepare.”

“From an organizational standpoint a siloed approach is one of the biggest hindrances to resilience,” agreed Travais Sookoo, Security Engineer with Check Point, a cybersecurity response and risk assessment company.

“Every department, is juggling and running to do something, but nobody’s coordinating in-between. [In my] experience across the region, that lack of coordination during an event leads to slower recovery, and after an event, a lack of lessons learned to improve handling of future incidents.”

The lack of legislation requiring disclosure from businesses or government agencies after a breach is another stumbling block to effective response.

“If you don’t tell the doctor your symptoms, you can’t be treated,” Joseph said.
“In Trinidad and Tobago and many other islands in the Caribbean, there’s still no legislation to compel organizations to report incidents. I’ll get a call from other contacts, there’s an incident.”

“But is there a structured approach for them in legislation that would compel them to report? Preparedness and coordination would dovetail from that approach. This structure would come from a national security strategy.”

Should leaders be held personally accountable for inaction that leads to cybersecurity risks?

Terrence Pachoo. Image captured from video footage.

“We’re all accountable for something. If I’m not accountable from a business perspective, then who really drives this change? No one,” said Terrence Panchoo, head of technology at Proman Trinidad.

“If I’m unable to say, yes, this is a result of an issue that we had, then who really is responsible? There’s a move to legal accountability for corporate executives. In the event of gross negligence, they will be held accountable and are potentially liable, whether it be in financial compensation or other mechanisms.”

“Boards that are being formed now accept that these areas of both cybersecurity and ECG (Ethics, Compliance and Governance) are critical components [of their scope of responsibilities].”

“[When it comes to] accountability in failures in cybersecurity, it needs to be a balanced discussion,” said Bachu.

“Looking for a head to put on the block at the onset of a cyber incident will not get us anywhere productive. I only get information [from the C-suite] if they see me as a trusted source.”

“If they see me as somebody that they could talk to without getting in trouble with their board or without getting in trouble with their line minister. If I share this information with you, I’m going to get in trouble.”

“We’re still talking about getting boards to accept that responsibility, getting senior persons in government to accept that responsibility. Once we get to the point where somebody owns it, then we can talk about accountability after the fact.”

“Many organizations treat compliance as resilience, but compliance should be the floor, the base,” said Sookoo.

“We do compliance to comply with regulations, meet the requirements and continue business. But if compliance is the floor, resilience should be the ceiling. All of us here should know our cost for downtime.”

“In 2018, Amazon said their cost for one minute of downtime is a million. Do executives ask themselves what is the cost of their organisation’s downtime?”

“Quantifying that cost also [offers an] opportunity to incentivize not only a board, but your entire company, [making it] a metric to achieve,” said Panchoo.
“It’s an opportunity to move from just compliance to more of a [business] positioning.”

“The CARICOM Cybersecurity and Cybercrime Action Plan (CCSCAP) is a structured approach to cyber resilience at a regional level.” said Joseph.

Travais Sookoo. Image captured from video footage.

“The plan has awareness and advocacy as one of the priority areas, capacity building and development, enhancing technical standards and infrastructure, policy, institutional, regulatory frameworks, cyber incident management, and regional and international cooperation.”

“As the Caricom member in charge of security and energy, TT should be taking the lead in adopting that plan, ensuring its implementation in government and in our governance partnerships with the private sector,” Bachu said.

IMPACS has been doing its part to raise awareness regionally and since 2019 has engaged in awareness building in the region among all 15 member states emphasising the importance of cybersecurity resilience.

In Trinidad and Tobago, IMPACS has done sensitisation sessions with high-level governmental officials, key operational stakeholders and members of the public.

“Strategic documents for business continuity have to be living documents,” said Joseph. “What’s required over the next five years is a commitment to reworking partnerships, agile leadership and decision-making, legislation, strategy and policy with an emphasis on agility.”

Regional cybersecurity faces fire

Regional cybersecurity faces fire

Boards that are being formed now accept that both cybersecurity and Ethics, Compliance and Governance are critical components of their scope of responsibilities.
Read More
Unfinished symphonies

Unfinished symphonies

The market viability of creative projects often can't be realistically assessed until the work is done.
Read More
Do you know who your child is talking to?

Do you know who your child is talking to?

That gorgeous, soft-spoken Swedish girl who admires your boy-child might a retired Nigerian prince looking for a new revenue stream.
Read More
Windows on a Mac, 2025

Windows on a Mac, 2025

Software virtualisation solutions were a great solution for users who just needed to run one or two apps on Windows that weren't processor intensive.
Read More
An Affinity for Canva

An Affinity for Canva

Professionally oriented software that integrates seamlessly with a consumer grade design tool is next level gamesmanship.
Read More
When the cloud bursts

When the cloud bursts

Hyperscalers typically operate networks of hundreds of data centers with millions of servers distributed globally.
Read More
Encryption, privacy and public safety

Encryption, privacy and public safety

Without encryption, that data can be read, copied or changed in transit. Encryption makes that data unreadable to outsiders
Read More
Big budget for tech, unclear spending strategy

Big budget for tech, unclear spending strategy

ICT is now the single largest line item under economic infrastructure spending in the 2026 PSIP with almost a third of that budget at $400 million.
Read More
Caribbean cryptocurrency concerns

Caribbean cryptocurrency concerns

In a pause with a defined timeline, operators may move outside the jurisdiction or take government to court and hope it drags on.
Read More
Suddenly, 30 years later…

Suddenly, 30 years later…

It’s really difficult to get excited over shiny and new when you’ve seen how quickly that gloss gets tarnished and eventually rots.
Read More
A blanket ban on cryptocurrency is a Luddite’s strategy

A blanket ban on cryptocurrency is a Luddite’s strategy

The government has not made it clear to what extent the new bill is intended to deepen compliance requirements with the FATF.
Read More
The parable of the rake

The parable of the rake

The first school reopening that included rake distribution was, predictably, somewhat chaotic.
Read More
AI and the jobs of the future

AI and the jobs of the future

Of the three broad classes of jobs, making, thinking, and caring, the ones that are likely to survive will be those that are driven by thinking and caring.
Read More
What Barbados’ Banyan acquisition teaches us

What Barbados’ Banyan acquisition teaches us

Our continuing national mistake in art, culture and journalism has been to treat the final product as the only product.
Read More
Is the M4MacMini a workstation?

Is the M4MacMini a workstation?

This computer can't be upgraded after purchase. You have to choose your specs on purchase and live with it
Read More
Jamaica’s digital transformation journey

Jamaica’s digital transformation journey

"Failure to share the vision and mission can lead to misalignment of that business or ministry with the IT plan."
Read More
How USB-C failed us

How USB-C failed us

USB-C cables shipped with smartphones were often cheap and delivered power, but limited or no data transfer at all.
Read More
How AI summaries will break knowledge

How AI summaries will break knowledge

Google has been indexing the collective wisdom of the open internet for the last two-and-a-half decades.
Read More
Drifting to data-driven decisions

Drifting to data-driven decisions

"Many organizations are collecting data, but few are converting it into action."
Read More
What .POST means for secure communications

What .POST means for secure communications

Posts are not just offering digital postal services, they are offering digital services across multiple sectors.
Read More
Regional cybersecurity faces fire Regional cybersecurity faces fire
Unfinished symphonies Unfinished symphonies
Do you know who your child is talking to? Do you know who your child...
Windows on a Mac, 2025 Windows on a Mac, 2025
An Affinity for Canva An Affinity for Canva
When the cloud bursts When the cloud bursts
Encryption, privacy and public safety Encryption, privacy and public safety
Big budget for tech, unclear spending strategy Big budget for tech, unclear spending...
Caribbean cryptocurrency concerns Caribbean cryptocurrency concerns
Suddenly, 30 years later… Suddenly, 30 years later…
A blanket ban on cryptocurrency is a Luddite’s strategy A blanket ban on cryptocurrency is...
The parable of the rake The parable of the rake
AI and the jobs of the future AI and the jobs of the...
What Barbados’ Banyan acquisition teaches us What Barbados’ Banyan acquisition teaches us
Is the M4MacMini a workstation? Is the M4MacMini a workstation?
Jamaica’s digital transformation journey Jamaica’s digital transformation journey
How USB-C failed us How USB-C failed us
How AI summaries will break knowledge How AI summaries will break knowledge
Drifting to data-driven decisions Drifting to data-driven decisions
What .POST means for secure communications What .POST means for secure communications

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
BitDepthFeatured

Encryption, privacy and public safety

4 Mins read
Without encryption, that data can be read, copied or changed in transit. Encryption makes that data unreadable to outsiders
FeaturedNews Briefs

Venture Credit Union announces recovery from ransomware attack

2 Mins read
The Qilin ransomware group has become increasingly active in the Caribbean in 2025.
BitDepthFeatured

Drifting to data-driven decisions

3 Mins read
“Many organizations are collecting data, but few are converting it into action.”
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
0
Share your perspective in the comments!x
()
x