<img height="1" width="1" style="display:none" alt="" src="https://www.facebook.com/tr?id=367542720414923&amp;ev=PageView&amp;noscript=1">

CISO Singapore

Exclusive content

Jenny Tan

Read the article

AI Ethics can be Difficult to Control: ISACA Singapore’s Jenny Tan

Corinium APAC Content Director Director Vanessa Jalleh sits down with the President of ISACA Singapore, Jenny Tan, to talk about cybersecurity in the era of large language models (LLMs).

One of the biggest recent disrupters in the technology sector has been the emergence of mainstream large language models and the impact they are having globally on day-to day-life.

Some of the discussion points that came up in conversation includes:

  • LLMs have changed the way the information security community views the potential of AI. What are some of the challenges and opportunities for cybersecurity around generative AI?
  • The challenge cyber security leaders face is bringing their information security strategy to life in business. How can we embrace business language and the business’s way of thinking to drive more successful cyber security strategies?
  • Are there new threats that we should be wary of or prepared to face?
  • Changing from a reactive to proactive approach: How can we adopt a more proactive outlook to cybersecurity?
  • How can you enhance an organisation’s capabilities and strengthen cyber posture in times of high risk?

Coinhako CISO shares cybersecurity awareness insights

Corinium’s Vanessa Jalleh speaks to Pasi Koistinen, Chief Information Security Officer at Coinhako, ahead of CISO Singapore.

Cybersecurity awareness within an organisation can be the ultimate defense against bad actors and serve as the cornerstone of security. Coinhako information security leader Pasi Koistinen shared his thoughts on cyber risk awareness, stakeholder collaboration and new trends in cybersecurity.

Topics covered in the conversation include:

  • Approaching cybersecurity management and awareness within an organisation
  • How to ensure that employees are aware of and adhere to cybersecurity policies and best practices.
  • Strategies or tools employed to promote a culture of cybersecurity awareness.
  • How to staying updated on the latest cybersecurity threats, trends, and best practices
  • Assess and measure the effectiveness of cybersecurity awareness initiatives with metrics and indicators.
  • Collaborating with other departments or stakeholders to ensure cybersecurity management and awareness are integrated into the overall business strategy.

Pasi Koistinen-1

Check out the video interview

Security Starts at the Core: Lessons in Building Resilient Cyber Architectures

Ts. Prasad Jayabalan of Axiata sits down with Corinium's Eleen Meleng to share his perspective on building resilient security architecture for the future of telco and critical ...

Read more

April 2025  |   1 minute read
Balancing Security and Innovation: Tackling Cloud Risks with Agility

Corinium’s Conference Director, Vanessa Jalleh, spoke with Enid Zheng from Telstra on how cloud security is taking the forefront in security and business imperatives. As more ...

Read more

March 2025  |   3 minute read
Cultivating a Resilient Security Culture in FSI with Aspire's Tobias Klingel.

Corinium’s Kashmira George spoke with Tobias Klingel, Head of Information Security at Aspire, about creating a resilient security culture in financial services. In an era where AI ...

Read more

February 2025  |   3 minute read
IT Observability Insights, ASEAN, 2024

While the progression to the hyperscale cloud and multi-cloud model has simplified many aspects of running computing environments, it has introduced its own unique set of ...

Read more

May 2024  |   1 minute read
Considerations in Cloud Security, Australia, 2023

Discussing cloud infrastructure risk and resilience with Australian cybersecurity leaders Since the first major IT migrations to the cloud took place, protecting the workloads ...

Read more

May 2023  |   1 minute read
Inside Active Directory Security, Australia, 2023

A major business technology control with massive security implications Active Directory architecture is critical to every Microsoft-based organisation or entity that operates a ...

Read more

April 2023  |   1 minute read