All Episodes
Ask A CISO — 76 episodes
Cyber Threats & Evolution
How AI is Disrupting and Transforming Cybersecurity Landscape
Cybersecurity : Tantangan dan Peluang Karir Masa Depan
Career in Cybersecurity
Strategi Keamanan Siber Nasional untuk Melindungi Ekosistem Digital
Cybersecurity in Enterprise
Horangi Anniversary Special
Understanding Password Vulnerabilities to Stay Safer Online
Decoupling Authorization From Your Applications
Cloud Control Matrix
Threat Modeling
Quantifying Defence
Cybersecurity Outlook 2023 dan Peran Komunitas dalam Membangun Ketahanan Siber Nasional
Exploring the Challenges of Application Security
The Benefits of Threat Modeling
AI and ML in Cybersecurity
AI and the Future of Mobile Security
Mengenal Sanksi Bagi Penyalahgunaan Data Pribadi
Understanding DSPM & CSPM for Optimal Data Security
Cybersecurity Risks and Business Context
Looking back with the Hosts (The Last Episode)
API Security
Linux and the Enterprise
The Cyber Defense Matrix
Hypponen’s Law: If it’s Smart, It’s Vulnerable
The Importance of Good Cyber Hygiene
Project Zero Trust
Mengenal Insider Threat - Deteksi, Monitor dan Pencegahannya
Modern Security Awareness Programs and People-Centric Cybersecurity
Threat Hunting and Incident Response
CrowdSec, Meshed Security that Leverages Numbers for Strength
ISACs, Information Sharing, and Building Cyber Resilience
Ready, Game, Train, GO!
Open Source and the Enterprise
The Local Startup Ecosystem, Going Digital, and Microsoft for Startups
Mempersiapkan Talenta Keamanan Siber Masa Depan Indonesia
Cyber Mayday and the Day After
CII, Supply Chain Risks, and Zero Trust
Zero Trust and Cyber Warfare
Cryptocurrencies, DeFi Hacks & the Future of the Crypto Market
Insights from InfoSecurity Europe 2022
Web3, The Metaverse, and Cyber Risk Management
People, Process, and Technology
Learning about Huawei Cloud
Operational Technology - Origins, Challenges and the Future
Future Tech and Cybersecurity: A Conversation with Chuck Brooks
The Cybersecurity Landscape in Hong Kong
The Human Defense Layer
A CISO's Take On the Gartner Magic Quadrant
Cybersecurity Sales and Diversity in the Industry
Cloud Transformation and the Cybersecurity Landscape in the Middle East
Top 5 Qualities For Succeeding In Tomorrow's Cybersecurity Industry
DevSecOps, AppSecOps, and What is Application Security Posture Management with Lawrence Crowther (Snyk)
Backups, Ransomware, and the Killer App for the Cloud
How Startups Can Overcome Limitations To Secure Their Business
Advantages of Moving to the Cloud and Predictions on the Future of Banking
Using Warden IAM, Jumpcloud, BambooHR for Smooth Onboarding
S3 Buckets and IAM Audits
Women in Cybersecurity, and Support for Cybersecurity Entrepreneurship in Asia
Seberapa Aman Industri Blockchain di Indonesia?
Shocking Cybersecurity War Stories And The Lessons We Can Learn From Them
The CISO Evolution: Why Today's Security Leaders Need To Combine Technical Expertise With Business Savvy
The Evolution of Ransomware, How Ransomware Gangs Work, And How You Can Prevent An Attack
Practical Advice For A Career In Cybersecurity
A Good Cloud Security Posture Is Not Unattainable, But Within REA&H (Ask A CISO Ep. 12)
Ask A CISO Ep. 11: The Evolution Of Cloud Security, Its Future, And 3 Tips For Your Cloud Security Journey
Ask A CISO Ep. 10: Starting On Your ISO 27001 Certification Journey, And A Protip On Getting Certified!
Ask A CISO Ep. 09: Is MAS TRM Mandatory For Your Organization?
Ask A CISO Ep. 08: Sheran Gunasekera On His New Book: Android Apps Security
Ask A CISO Ep. 07: Ransomware — To Pay Or Not To Pay
Ask A CISO Ep. 06: What’s New In Insider Threats?
Ask A CISO Ep. 05: Compliance In The Big Durian: Indonesia's 2020 Regulatory Landscape
Ask A CISO Ep. 04: Hard Truths In Cloud Security
Ask A CISO Ep. 03: An Interview With George Do, Gojek CISO
Ask A CISO Ep. 02: Bend Your Security Tools To Your Business Goals
Ask A CISO Ep. 01: Security & Privacy Compliance: Better Together!