APAC CIO Outlook
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Agile

    Artificial Intelligence

    Aviation

    Bi and Analytics

    Big Data

    Blockchain

    Cloud

    Cyber Security

    Digital Infrastructure

    Digital Marketing

    Digital Transformation

    Digital Twin

    Drone

    Internet of Things

    Low Code No Code

    Networking

    Remote Work

    Singapore Startups

    Smart City

    Software Testing

    Startup

  • E-Commerce

    Education

    FinTech

    Healthcare

    Manufacturing

    Retail

    Travel and Hospitality

  • Dell

    Microsoft

    Salesforce

    SAP

  • Cognitive

    Compliance

    Contact Center

    Corporate Finance

    Data Center

    Data Integration

    Digital Asset Management

    Gamification

    HR Technology

    IT Service Management

    Managed Services

    Procurement

    RegTech

    Travel Retail

Menu
    • Cyber Security
    • Software Testing
    • Procurement
    • Managed Services
    • Gamification
    • Blockchain
    • CRM
    • E-Commerce
    • MORE
    #

    Apac CIO Outlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIO Outlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Cyber Security
    Editor's Pick (1 - 4 of 8)
    left
    IAM May Help Secure Data, But It Needs to be Protected as Well

    Marc Ashworth, Chief Information Security Officer, First Bank

    The Changing Landscape of Cyber Security

    Scott Brandt, CIO & Director of IT, Texas Office of the Secretary of State

    Cyber Security - Integrated enterprise approach required to address the multifaceted challenges

    Sumit Puri, CIO, Max Healthcare

    Leadership Framework for Building Elite Teams

    Douglas Duncan, CIO, Columbia Insurance Group

    Four Cybersecurity Weak Spots You Should Care About When Others Don't

    Marc Probst, CIO & VP, Intermountain Healthcare

    Enterprise Security And The Elusive

    Andre' Allen, CISO, City of Houston

    Secure Text Messaging in an Academic Medical Center - Experience and Lessons

    Kari Cassel, SVP & CIO, UF Health

    It's Time to Turn Security Inside Out

    Gilad Raz, CIO, Varonis

    right

    Decryption of the Cyber Security for the business and IT leaders

    Frankie Shuai, Former Director of Cyber & Technology Risk at UBS.

    Tweet
    content-image

    Frankie Shuai, Former Director of Cyber & Technology Risk at UBS.

    1. Are they any major challenges and trends in the Cyber Security area you would like to share?

    Frankie: The cyber security landscape has been evolved significantly in the past few years. When digital transformation becomes the main stream across industries, cyber security has also become the critical agenda topic even in the board room discussion. Let me name a few challenges we have seen so far across the industries:

    Firstly, attack surface exposure has been increased when we are moving the system and data to the cloud, when our employees are connecting to the corporate network at any place by using any device, and when there are more connections & dependency on the third party partners & suppliers in the whole product or service ecosystem.

    Secondly, cyber-attacks have also been more sophisticated in the form of phishing, malware, ransomware, etc. Don’t forget when we are on the digital transformation journey, those cyber attackers are also on their digital transformation journey. Many years ago, they might have people manually draft and send you the phishing email to conduct the social engineering attack. Nowadays, they might even use Artificial Intelligence to generate the sophisticated and tailed phishing email to you, that’s the spear phishing.

    Last but not least, for the industries heavily regulated, like financial industry, regulators are also paying more attention to the cyber security, data privacy, operational resilience, etc. A good cyber security leader, should also be an expert to understand clearly what are the expectations from regulators, what’s the cyber security risk appetite in the organization and what’s the cyber security advice could bring to the business to enable business growth in the compliant manner.

    2. What keeps you up at night when it comes to some of the major predicaments in Cyber Security?

    Frankie: Cyber-attack is no longer the matter of WHETHER, but the matter of WHEN. So when real cyber-attack happens - What’s the next? Do we have plan B? What are the critical processes and critical assets impacted we have to prioritize and recover them from the attack first? What are the key stakeholders we have to engage and notify? The list of the these questions are growing and keeping us up at night. But as the cyber security leaders, we have to prepare them, not randomly but based on the protocol we have well defined, trained and exercised.

    3. What are the important factors could help make the cyber security initiative successful?

    Frankie: There might be many success factors, but in many organizations across industries, there might be 2 common baseline factors to make project success, they are PEOPLE and CULTURE. People is the most valuable asset and culture is the best oil of the organization. When two of them come together, the united power will be amplified to enable the business growth in the safe & sound manner. I’m fortunate to be able to work with a lot of smart and great leaders and experts in the cybersecurity domain so far. One great character about them is promoting the strong & positive people connection and inclusive culture. They are able to understand the organization’s business thoroughly from strategy to execution. Understand where and how critical business assets and processes are running. Thinking and talking like a business partner is key to get support from the business side for cyber security professionals. It’s about connecting the people in the inclusive way, so that the cyber security risk could be well articulated in the business world. We could use the cyber thread landscape, data analytics, and risk appetite as the elements to the tell the story that could be understood and adopted. Remember, talking in the jargon could only be understood within our limited cyber security teams, but not the wider business partner teams. People need to be connected and included and after that, the project run by people could be successful.

    4. Anything would make you excited for the future of the Cyber Security space?

    Frankie: There’re enough talks in the industry about technological trends like cloud computing, Artificial Intelligence, Machine Learning, etc. I will not repeat these buzzwords here, but would like to share that Quantum computing is one of emerging technologies I would encourage to take a look. Quantum computing might disrupt the foundation of today’s data encryption / protection algorithm we have rely on heavily for many years in the cyber security world.

    In 2019, Google announced that its Sycamore quantum computer had completed a task in 200 seconds that would take a conventional computer 10,000 years. If the commercialization and mass production of quantum computing arrives in the long run, today’s encrypt key might be not able to claim secure any more. As the cybersecurity practitioners, we should keep the eye closely on these disruptive technologies, see how they will impact us and if any emerging solution coming up, how we could leverage.

    5. Cyber Security leaders in the enterprise not only need hard skills on the technical expertise and knowledge, but also soft skills like aligning with business priority, communicating well with non-tech stakeholder, etc. Any other soft skills cyber security leaders could consider to improve?

    Frankie: Totally agree here. I just shred one thing as the example, it’s too common that people might overlook, but it’s very important for all the stakeholders -- this is same language. Sometimes, people might assume something for granted and it will cause confusion if not everyone is on the same page even on the same topic. Let me share one real life example of same language, it’s stock exchange’s stock price color code. In US, Europe and Singapore, we know the green color means the stock price is up and red color means the stock price is down. But if you go to exchanges in China, Taiwan and Japan you will find they are following the other way that red color means the stock price is up and green color means going down. And if you go to Korea’s exchange, you will find, for them red color means going up but blue color means going down. So same color might have the complete opposite meanings in different countries. So let’s use the same language with the same meaning to avoid the confusion.

    tag

    Quantum Computing

    Financial

    Machine Learning

    Cloud Computing

    Weekly Brief

    loading
    Top 10 Cyber Security Companies - 2022

    Featured Vendors

    I-Sprint Innovations

    Dutch Ng, CEO

    HP

    Richard Bailey, President - Asia Pacific & Japan (APJ)

    ON THE DECK

    Cyber Security 2022

    Top Vendors

    Cyber Security 2021

    Top Vendors

    Cyber Security 2020

    Top Vendors

    Cyber Security 2019

    Top Vendors

    Cyber Security 2018

    Top Vendors

    Cyber Security 2017

    Top Vendors

    Previous Next

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Deliver Resiliency with Managed Services

    Deliver Resiliency with Managed Services

    Edy Salim, Head of Technology Services & Enterprise Architecture, PT Adira Dinamika Multifinance Tbk
    Sustainable Future through Innovative Technology Solutions

    Sustainable Future through Innovative Technology Solutions

    Faisal Parvez, CIO and Director, BT
    How to align Supply Chain with Corporate Strategy

    How to align Supply Chain with Corporate Strategy

    Chanaka Rathnayake, Senior Production Manager (Packaging) at The HEINEKEN Company
    A dose of our own medicine

    A dose of our own medicine

    SABINA JANSTROM, IT DIRECTOR, DYNO NOBEL
    Insider Threat

    Insider Threat

    AI is America's best weapon for disrupting health inequities

    AI is America's best weapon for disrupting health inequities

    Michael Dowling, President & Ceo, Northwell Health and Tom Manning, Chairman, Ascertain
    Combating IoT Challenges with Smart Choices

    Combating IoT Challenges with Smart Choices

    Sandeep Babbar, Head Of Technology Innovation, Gwa Group Limited
    Artificial Intelligence regulations and its impact on medical devices

    Artificial Intelligence regulations and its impact on medical devices

    Leo Hovestadt, Director Quality Assurance Elekta
    Loading...

    Copyright © 2023 APAC CIOoutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    |  Sitemap |  Subscribe |   About us

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://cyber-security.apacciooutlook.com/cxoinsights/decryption-of-the-cyber-security-for-the-business-and-it-leaders-nwid-9264.html