APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Cyber Security
    Editor's Pick (1 - 4 of 8)
    left
    IAM May Help Secure Data, But It Needs to be Protected as Well

    Marc Ashworth, Chief Information Security Officer, First Bank

    The Changing Landscape of Cyber Security

    Scott Brandt, CIO & Director of IT, Texas Office of the Secretary of State

    Cyber Security - Integrated enterprise approach required to address the multifaceted challenges

    Sumit Puri, CIO, Max Healthcare

    Leadership Framework for Building Elite Teams

    Douglas Duncan, CIO, Columbia Insurance Group

    Four Cybersecurity Weak Spots You Should Care About When Others Don't

    Marc Probst, CIO & VP, Intermountain Healthcare

    Enterprise Security And The Elusive

    Andre' Allen, CISO, City of Houston

    Secure Text Messaging in an Academic Medical Center - Experience and Lessons

    Kari Cassel, SVP & CIO, UF Health

    It's Time to Turn Security Inside Out

    Gilad Raz, CIO, Varonis

    right

    The Impact of Digitalization on Cybersecurity

    Oliver Valentino, Head of Cybersecurity, Amar Bank

    Tweet
    content-image

    Oliver Valentino, Head of Cybersecurity, Amar Bank

    Digitalization has become the main theme for change these past few years. Currently, everything is either “as a code” or “as a service”. These changes happened because of the global pandemic that significantlyaffected every aspect of our lives. By moving to digital space, a whole new risk is introduced to businesses around the globe.

    Before the pandemic happened, some companies had already started their digitization effort to gain an advantage over competitors. So, now that digitalization is a must, a lot of people are already prepared to transform the business into a digital space. But are we ready to deal with cyber security?

    Let us look at what cyber security is all about. A penetration test is where they do a manual security test at the end of the development or once a year, where they have to sign off every deployment. During tools administration, they place a security engineer for each tool and do administration to the tools, where the tools are expected to protect and monitor everything. We try to comply with or certified our process to meet certain security standards and check if it is good, bad, or enough and analyze ifthere are anyproblems with this setup.

    The main problem with this arrangement is, security is not integrated into the business process. We, as security leaders, act as a gatekeeper and that’s it. So, are we helping them to achieve the security standard? Or are we just becoming an obstacle?

    Cyber security has to evolve. We need more cyber security professionals that understand we are in the same boat as the other team. We need to start bringing value to what companiesthink is important.

    Here are a few things that cybersecurity professionalsneed to startdoing.

    Integrate Presence

    We have to start integrating our presence into the business process, as a gatekeeper, and a navigator. Talk with your business and product team as early as possible. Initiate conversation, or ask to be involved as early as the ideation stage. State your concern regarding potential risk early on, and state that you need to be involved in the whole cycle, including penetration testing in the last phase, so they can plan accordingly. By involving in requirement preparation for the new product, give security recommendations that help developers as guiding posts when they develop their product, not the exact word-by-word limitation.

    By doing this, they can feel cyber security presence as a friend instead of a blocker. We can help them navigate their development process toward a secure product.

    Maintain the Same Speed and Agility

    Security testing might take a long time to complete. Start adopting automation where low-hanging fruit can be easily found as early as possible. While manual testing needs extra time to complete, the cyber security team can do the planning, so the process can be completed without taking much time. The team can start understanding the product by learning their documentationon how you will conduct the test, and what the product and development team will have to provide. Keep in mind that the test is to be completed faster and smoothly.

    Maintain the Same Technology Standard

    Developers and technology have a high speed in their development research and technology adoption. We also need to learn and adopt this new emerging technology. While it benefits us to understand the new technology, it is also a huge benefit to the company. By keeping up with this new technology, we can also help our development process and guide them to adopt this new technology securely. This can give the business an advantage in technology adoption and will affect the service to the customer. So, we need to prepare. Keep doing research in new and emerging technologies, and joint research with a technology team where we can have the same direction in technology research.

    A Complete Vision of What You Want to Achieve

    A security checklist or security standard is a tool to help you achieve what you need. But sometimes this checklist is not suitable for your organization. As a cyber security professional, you need to have a vision of what you want to achieve by implementing certain security standards. It is okay to challenge the list and ask if this standard will bring me closer to our goals. You need to check all the lists to gain the certification or conform to the standard, but by understanding what this list wants you to achieve, you don’t have to follow exactly word by word but show that by implementing certain control, you can achieve the same result.

    As a Cyber Security Professional, You Need to Have the Vision of What you Want to Achieve by Implementing Certain Security Standards. It is Okay to Challenge the List and ask if this Standard will bring me Closer to our Goals

    Going Beyond the Limitation of Physical Space

    Companies started adopting remote working, and data centers are no longer in the same building as the office. Critical systems have been moved to cloud platforms and we are no longer building systems but subscribing to digital services. A lot of these operations are no longer confined by physical space. Cyber security teams have to understand this and start to change their point of view to the important thing, which is to protect data and digital access instead of physical access.

    In Amar Bank, as the pioneer of the digital bank in Indonesia, we prove our commitment to continuously maintaining its data and operational security. We continue to develop technology on its digital platforms. To be able to ensure that all of our digital platforms or systems are safe, we will continue to acknowledge and be actively involved in the development phases so that we have good knowledge regarding these technologies. Then, we will provide relevant prevention or protection and ensure Amar Bank’s and the users’ data security.

    tag

    Data Security

    Weekly Brief

    loading
    Top 10 Cyber Security Companies in APAC - 2024
    ON THE DECK

    Cyber Security 2024

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Streamlining Operations and Empowering Teams in Facilities Management

    Streamlining Operations and Empowering Teams in Facilities Management

    Shaye Rogers, Workflow Support Manager, Cushman & Wakefield
    Technocreativity: The Synergy Of Technology And Creativity

    Technocreativity: The Synergy Of Technology And Creativity

    Tran Nguyen Phi Long, Group Head Of Retail Marketing, Pnj Group
    Leading It And Digital Transformation At Ikea: Insights From An Industry Veteran

    Leading It And Digital Transformation At Ikea: Insights From An Industry Veteran

    Sigit Triwibowo, Head Of It And Digital, Chief Technology And Digital, Ikea
    Executive Leadership And Digital Transformation In The Global Fashion Industry

    Executive Leadership And Digital Transformation In The Global Fashion Industry

    Eiko Ando, E-Commerce And Digital Director, Pvh Corporation
    Digital Transformation in Fashion Retail - From Efficiency to Experience

    Digital Transformation in Fashion Retail - From Efficiency to Experience

    Le Van, CTO, YODY Fashion
    Driving IT Transformation at Lactalis Australia

    Driving IT Transformation at Lactalis Australia

    Sabina Janstrom, Chief Information Officer, Lactalis Australia
    AI Adoption in Hospitality: Striking the Balance Between Innovation, Excellence and Trust

    AI Adoption in Hospitality: Striking the Balance Between Innovation, Excellence and Trust

    Phiphat Khanonwet, Head of IT, Onyx Hospitality Group
    The AI Rat Race - Keeping Up with New Technologies or Waiting for Maturity?

    The AI Rat Race - Keeping Up with New Technologies or Waiting for Maturity?

    Andreas Kurz, Global Head of Digital Transformation, ALFAGOMMA Group
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://cyber-security.apacciooutlook.com/cxoinsights/the-impact-of-digitalization-on-cybersecurity-nwid-9520.html