Episodes
Mikko Hypponen, bestselling author of If It’s Smart, It’s Vulnerable, joins us this week to talk about the Hypponen Law, the future of the internet, the worrying trend that he foresees in the future with respect to cybercriminal gangs, and how he thinks we can best combat the new developments when they come to fruition. He also laments the loss of privacy in the internet age and gives us a few tips to secure our environments and regain some of our privacy. Learn about: 👉 The Hypponen Law:...
Published 11/02/22
So you’ve made the transition to the cloud, but you’re wondering how it is that your cloud costs are so high. Is it supposed to be that way when the cloud promises competitive advantages and cost savings? It’s all down to cloud sprawl and practicing good cyber hygiene, according to Nick Lumsden, our guest this week. Join host Jeremy Snyder as he speaks with Nick Lumsden, co-founder, and CTO at Tenacity Cloud to understand how cyber hygiene is key to reducing cloud sprawl, cloud costs, and...
Published 10/26/22
The old mantra that humans are the weakest link in cybersecurity should be discarded, according to George Finney. Listen in as we talk to him about why he thinks so, and why he chose to draw from sciences like psychology, neuroscience, history, and economics for his first book Well Aware. We also had George define Zero Trust and talk about his new book Project Zero Trust, which he co-authored with John Kindervag, the “father” of Zero Trust. Learn about: 👉 Drawing from the sciences for...
Published 10/19/22
Maraknya berbagai bentuk serangan siber mulai dari kebocoran data, serangan malware, pencurian identitas, social engineering dan kasus serangan siber lainnya menjadi perhatian seluruh pihak khususnya penggiat bisnis dan Organisasi. Namun bagaimana apabila serangan tersebut nyatanya berasal dari orang-orang di dalam organisasi yang memiliki akses terhadap sejumlah informasi, data dan sistem keamanan perusahaan, yang berasal dari karyawan, mantan karyawan, atau rekan bisnis. Di episode Ask a...
Published 10/11/22
Cybersecurity awareness training can be long and boring. With shorter attention spans and work at the back of your mind, sitting through a training session may seem like a waste of time. How should cybersecurity awareness training be conducted in this landscape? We speak to Theo Nasser, Founder, and CEO of RIght-Hand Cybersecurity, to learn about modern cybersecurity awareness training and people-centric cybersecurity. Learn about: 👉 What is the Modern Security Awareness Program? 👉  How...
Published 10/05/22
We speak to Harlan Carvey, Senior Incident Responder in R&D at Huntress, to understand what threat hunting is, and even learn how surprisingly easy it is to tell if an account has been compromised! Harlan and host Jeremy also explore the claim that there's a lack of cybersecurity talents and whether organizations should have an organic incident response, outsource the function to managed service providers, or adopt an approach that combines both choices. Learn about: 👉 What is threat...
Published 09/28/22
It seems like the adversaries have all the advantages stacked in their favor. They can attack any time, and only need to get lucky once to breach our cloud investments. On the other hand, we have to ensure that our cloud infrastructure is always secure. So what can we do about this complicated problem?  We speak with Philippe Humeau of CrowdSec to understand how we can leverage our numbers as a countermeasure. Along the way, we also discuss social engineering, and how we can safeguard...
Published 09/21/22
Our ancestors shared information on threats with their communities to ensure survival. The same is necessary for today's digital landscape. Businesses need to share information pertinent to their verticals to remain resilient against threats, but how can we do that in a diverse business environment while encouraging sharing? We speak to John Lee, Managing Director at Global Resilience Federation Asia Pacific to learn the important roles ISACs play and how they help organizations like yours...
Published 09/14/22
Think back to when you first studied cybersecurity. Was it not only dry but also hard to learn? Now, if only you had a game like World of Haiku to help make learning fun and help you make sense of what you’ve learned and choose the right path to take for your cybersecurity career, things might have been so much easier! We sit down with Eric Basu, CEO at Haiku, Inc., the brains behind the game World of Haiku to help us learn about the genesis and inspiration behind the game, how it has been...
Published 09/06/22
How familiar are you with Open Source software and projects? Are they viable? Are they even safe to use? Host Mark Fuentes helps us get the answers to these questions in this episode of the Ask A CISO podcast, and also learn why some proprietary software companies choose to go the Open Source route from Harish Pillay, Head of Community Architecture and Leadership at Red Hat Asia Pacific. Tune in to this episode of the Ask A CISO podcast to hear: 👉 Is Red Hat Enterprise Linux (RHEL) Open...
Published 08/30/22
Are startups still viable today? Where are they in the digital ecosystem and what does Microsoft have to do with startups? We speak to Michael Smith Jr., the newly-appointed APAC GM of Microsoft Startups, to get his insights and opinions on the startup ecosystem in Singapore, and how Microsoft is positioned to facilitate the growth of startups. Tune in to this episode of Ask A CISO to hear: 👉 The startup ecosystem, then and now 👉 Why startups are still necessary and will be here to stay 👉...
Published 08/24/22
Permintaan akan tenaga ahli di bidang keamanan siber terus mengalami peningkatan, bahkan diprediksi menjadi salah satu profesi yang akan banyak dicari. Karir di bidang keamanan siber sendiri cukup beragam dan dapat ditemukan pada berbagai sektor industri. Akan tetapi untuk bisa terjun ke bidang profesional yang satu ini, diperlukan beberapa kemampuan atau skills yang wajib dimiliki oleh setiap ahli keamanan siber.  Di episode Ask a CISO kali ini kami menghadirkan Bapak Yudistira Asnar, ST.,...
Published 08/16/22
Dan Lohrmann, award-winning CISO, keynote speaker, mentor, columnist, and bestselling co-author of the book Cyber Mayday and the Day After joins us this week to talk about cybersecurity roles in the public and private sectors, checklists for dealing with disruptions to your business, what organizations can learn from breaches, and much more including a lesson from a blackout on how tabletop exercises should be conducted. Tune in to this episode of Ask A CISO to hear: 👉 Cybersecurity jobs in...
Published 08/10/22
This is an episode you should not miss. It's not often that you get to sit down with a renowned CISO one-to-one for 45 minutes and just take in all the knowledge and wisdom he has to impart. This week, we had a chance to sit down with Steven Sim, one of Singapore's most renowned and decorated CISOs to get his advice and insights on a variety of contemporary cybersecurity topics like Critical Information Infrastructure, Zero Trust, etc. Tune in to this episode of Ask A CISO to hear: 👉 How...
Published 08/03/22
Dr. Chase Cunningham, a well-renowned expert on Zero Trust, sits down with us this week to talk about zero trust, VPNs, SASE, WAFs, and how the IS and security team can still be the department of "no" and still accommodate the demands of DevOps and contribute to an organization's growth. Tune in to this episode of Ask A CISO to hear: 👉 What is Zero Trust 👉 Are VPNs still viable today and are they part of a Zero Trust strategy 👉 Can Zero Trust be realistically realized? 👉 Cyber warfare, and...
Published 07/27/22
We may be experiencing a "crypto winter" now, but the technology is definitely here to stay. Pasi Koistinen, CISO of Coinhako, a Singapore-based crypto exchange, joins us this week to talk about crypto, DeFi hacks and how you as an investor can protect your crypto investments. Tune in to this episode of Ask A CISO to hear: 👉 If there are similarities and differences between cybersecurity in general and in the crypto industry 👉 What is Coinhako and what makes it unique as an exchange 👉...
Published 07/20/22
Physical tradeshows are back, and our guest and host were both at the recently-concluded InfoSecurity Europe 2022. Hear their insights on tradeshows and learn their main takeaways from conversations with industry peers in panels on a variety of cybersecurity topics like public-private partnerships, and incident reporting and response. Tune in to this episode of Ask A CISO to hear: 👉 If tradeshows are still worth attending 👉 What InfoSec Europe 2022 was all about 👉 How tradeshows are a great...
Published 07/13/22
What are the unique challenges that Web3, the Metaverse, and in particular, crypto and NFTs present with regards to trust? Michael Lew, CEO of Rajah and Tann Technologies and Chairman of the Cyber Risk sub-committee of the Singapore Fintech Association, sits down with host Paul Hadjy to discuss this and how companies should approach cyber risk management. Tune in to this episode of Ask A CISO to hear: 👉 What is e-Discovery? 👉 Cyber Risk Management and building trust in Web3, the Metaverse,...
Published 07/06/22
How do you balance people, process, and technology, the three pillars of information security, to achieve a balanced security program? What can you do to bolster each pillar? Johannes Wiklund, the Head of Information Security at Jotforms, shares his experience on this, why he thinks a systematic approach to troubleshooting is important, and his key takeaways from the recent RSA conference. Tune in to this episode of Ask A CISO to hear: 👉 What his first steps were after joining Jofform as...
Published 06/28/22
Despite being a latecomer to the space, Huawei Cloud is today the 5th largest Infrastructure-as-a-Service (IaaS) provider in the world, according to a report released by Gartner in June 2021. Hear from representatives from Huawei Singapore on their journey to compliance with the Singapore authorities, and how their unique offerings are helping their customers. Tune in to this episode of Ask A CISO to hear: 👉 How Huawei leverages strategic partnerships to ensure compliance with international...
Published 06/22/22
Mel Migriño, Vice-President and Group CISO at Meralco, the largest power distribution conglomerate in the Philippines, joins us this week to talk about Operational Technology (OT). Tune in to this episode of Ask A CISO to hear: 👉 The origins of the OT/IT convergence 👉 Zero Trust and the OT/IT convergence 👉 People, Process, and Technology challenges for an OT/IT environment 👉 Advantages and Disadvantages of OT/IT convergence 👉 Zero Trust and the OT/IT convergence 👉 The future of OT/IT...
Published 06/15/22
Chuck Brooks is a world-renowned cybersecurity expert and an Adjunct Professor at Georgetown University where he teaches courses on risk management, homeland security, and cybersecurity. Chuck is also a two-time Presidential appointee and Forbes contributor. LinkedIn named him one of “The Top 5 Tech People to Follow on LinkedIn”. He was named by Thompson Reuters as a “Top 50 Global Influencer in Risk, Compliance,” and by IFSEC as the “#2 Global Cybersecurity Influencer” in 2018. He has...
Published 06/08/22
Singapore and Hong Kong were acknowledged as having rather similar economies at one time, with the two countries going head-to-head in many industries, especially financial services and shipping. How different or similar is the cybersecurity landscape in Hong Kong then? Are there similarities or significant differences from Singapore's? Tune in to this episode of Ask A CISO to hear: 👉 What the Russian invasion of Ukraine tells us of the global cybersecurity landscape 👉 Why Samuel sees...
Published 05/31/22
Most cybersecurity programs work against human nature instead of with our innate behaviors, resulting in breaches even though your organizations may already have spent large amounts of money on security technologies. Perry Carpenter, our guest this week, helps you understand your end-users and build an effective Human Defense Layer to bolster your cybersecurity posture. Tune in to this episode of Ask A CISO to hear: 👉 How Perry defines the Human Defense Layer 👉 What inspired Perry to focus...
Published 05/25/22
Many security leaders refer to Gartner's Magic Quadrant to decide on which security tool to purchase and deploy to secure their environments. The question then is whether it's good enough to just look at the quadrant the tool is in to guide your decision. What other factors should you consider? Tune in to this episode of Ask A CISO to hear: 👉 What the Gartner Magic Quadrant is and what the quadrants represent. 👉 How the Magic Quadrant helps CISOs decide on a security tool to purchase and...
Published 05/18/22