<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">

CISO Singapore

Exclusive Content

Jenny Tan

Read the article

AI Ethics can be Difficult to Control: ISACA Singapore’s Jenny Tan

Corinium APAC Content Director Director Vanessa Jalleh sits down with the President of ISACA Singapore, Jenny Tan, to talk about cybersecurity in the era of large language models (LLMs).

One of the biggest recent disrupters in the technology sector has been the emergence of mainstream large language models and the impact they are having globally on day-to day-life.

Some of the discussion points that came up in conversation includes:

  • LLMs have changed the way the information security community views the potential of AI. What are some of the challenges and opportunities for cybersecurity around generative AI?
  • The challenge cyber security leaders face is bringing their information security strategy to life in business. How can we embrace business language and the business’s way of thinking to drive more successful cyber security strategies?
  • Are there new threats that we should be wary of or prepared to face?
  • Changing from a reactive to proactive approach: How can we adopt a more proactive outlook to cybersecurity?
  • How can you enhance an organisation’s capabilities and strengthen cyber posture in times of high risk?

Coinhako CISO shares cybersecurity awareness insights

Corinium’s Vanessa Jalleh speaks to Pasi Koistinen, Chief Information Security Officer at Coinhako, ahead of CISO Singapore.

Cybersecurity awareness within an organisation can be the ultimate defense against bad actors and serve as the cornerstone of security. Coinhako information security leader Pasi Koistinen shared his thoughts on cyber risk awareness, stakeholder collaboration and new trends in cybersecurity.

Topics covered in the conversation include:

  • Approaching cybersecurity management and awareness within an organisation
  • How to ensure that employees are aware of and adhere to cybersecurity policies and best practices.
  • Strategies or tools employed to promote a culture of cybersecurity awareness.
  • How to staying updated on the latest cybersecurity threats, trends, and best practices
  • Assess and measure the effectiveness of cybersecurity awareness initiatives with metrics and indicators.
  • Collaborating with other departments or stakeholders to ensure cybersecurity management and awareness are integrated into the overall business strategy.

Pasi Koistinen-1

Check out the video interview

Cybersecurity in the Age of AI: Adapting, Innovating, and Outsmarting the Threats

Singapore University of Social Sciences's Anthony Lim navigates emerging threats by balancing innovation, managing risks, and leveraging AI, people, processes, and continuous ...

Read more

November 2024  |   3 minute read
Navigating Cybersecurity's New Frontiers: Building Resilient Defence Strategies Against Advanced Threats

MMC Ports’ Gaurav Sharma discusses the increasing sophistication of cyber threats and resilient defence techniques. In the dynamic realm of cybersecurity, where threats evolve at ...

Read more

January 2024  |   4 minute read
Embracing Digital Transformation Amidst Shifting Threats in Malaysia

Cybersecurity Malaysia CEO discusses the evolving global threat landscape and how companies in Malaysia embraces digital transformation securely. As Malaysia emerges as a dynamic ...

Read more

November 2023  |   1 minute read
IT Observability Insights, ASEAN, 2024

While the progression to the hyperscale cloud and multi-cloud model has simplified many aspects of running computing environments, it has introduced its own unique set of ...

Read more

May 2024  |   1 minute read
Considerations in Cloud Security, Australia, 2023

Discussing cloud infrastructure risk and resilience with Australian cybersecurity leaders Since the first major IT migrations to the cloud took place, protecting the workloads ...

Read more

May 2023  |   1 minute read
Inside Active Directory Security, Australia, 2023

A major business technology control with massive security implications Active Directory architecture is critical to every Microsoft-based organisation or entity that operates a ...

Read more

April 2023  |   1 minute read