Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Episode | Date |
---|---|
Cyber Threats & Evolution
|
Aug 10, 2023 |
How AI is Disrupting and Transforming Cybersecurity Landscape
|
Aug 03, 2023 |
Cybersecurity : Tantangan dan Peluang Karir Masa Depan
|
Jun 21, 2023 |
Career in Cybersecurity
|
Jun 14, 2023 |
Strategi Keamanan Siber Nasional untuk Melindungi Ekosistem Digital
|
Jun 07, 2023 |
Cybersecurity in Enterprise
|
Jun 02, 2023 |
Horangi Anniversary Special
|
May 25, 2023 |
Understanding Password Vulnerabilities to Stay Safer Online
|
May 19, 2023 |
Decoupling Authorization From Your Applications
|
Apr 27, 2023 |
Cloud Control Matrix
|
Apr 18, 2023 |
Threat Modeling
|
Apr 13, 2023 |
Quantifying Defence
|
Apr 06, 2023 |
Cybersecurity Outlook 2023 dan Peran Komunitas dalam Membangun Ketahanan Siber Nasional
|
Mar 23, 2023 |
Exploring the Challenges of Application Security
|
Mar 15, 2023 |
The Benefits of Threat Modeling
|
Mar 08, 2023 |
AI and ML in Cybersecurity
|
Mar 01, 2023 |
AI and the Future of Mobile Security
|
Feb 22, 2023 |
Mengenal Sanksi Bagi Penyalahgunaan Data Pribadi
|
Feb 15, 2023 |
Understanding DSPM & CSPM for Optimal Data Security
|
Feb 08, 2023 |
Cybersecurity Risks and Business Context
|
Feb 01, 2023 |
Looking back with the Hosts (The Last Episode)
|
Dec 06, 2022 |
API Security
|
Nov 23, 2022 |
Linux and the Enterprise
|
Nov 16, 2022 |
The Cyber Defense Matrix
|
Nov 09, 2022 |
Hypponen’s Law: If it’s Smart, It’s Vulnerable
|
Nov 02, 2022 |
The Importance of Good Cyber Hygiene
|
Oct 26, 2022 |
Project Zero Trust
|
Oct 19, 2022 |
Mengenal Insider Threat - Deteksi, Monitor dan Pencegahannya
|
Oct 11, 2022 |
Modern Security Awareness Programs and People-Centric Cybersecurity
|
Oct 05, 2022 |
Threat Hunting and Incident Response
|
Sep 28, 2022 |
CrowdSec, Meshed Security that Leverages Numbers for Strength
|
Sep 21, 2022 |
ISACs, Information Sharing, and Building Cyber Resilience
|
Sep 14, 2022 |
Ready, Game, Train, GO!
|
Sep 06, 2022 |
Open Source and the Enterprise
|
Aug 30, 2022 |
The Local Startup Ecosystem, Going Digital, and Microsoft for Startups
|
Aug 24, 2022 |
Mempersiapkan Talenta Keamanan Siber Masa Depan Indonesia
|
Aug 16, 2022 |
Cyber Mayday and the Day After
|
Aug 10, 2022 |
CII, Supply Chain Risks, and Zero Trust
|
Aug 03, 2022 |
Zero Trust and Cyber Warfare
|
Jul 27, 2022 |
Cryptocurrencies, DeFi Hacks & the Future of the Crypto Market
|
Jul 20, 2022 |
Insights from InfoSecurity Europe 2022
|
Jul 13, 2022 |
Web3, The Metaverse, and Cyber Risk Management
|
Jul 06, 2022 |
People, Process, and Technology
|
Jun 28, 2022 |
Learning about Huawei Cloud
|
Jun 22, 2022 |
Operational Technology - Origins, Challenges and the Future
|
Jun 15, 2022 |
Future Tech and Cybersecurity: A Conversation with Chuck Brooks
|
Jun 08, 2022 |
The Cybersecurity Landscape in Hong Kong
|
May 31, 2022 |
The Human Defense Layer
|
May 25, 2022 |
A CISO's Take On the Gartner Magic Quadrant
|
May 18, 2022 |
Cybersecurity Sales and Diversity in the Industry
|
May 11, 2022 |
Cloud Transformation and the Cybersecurity Landscape in the Middle East
|
May 04, 2022 |
Top 5 Qualities For Succeeding In Tomorrow's Cybersecurity Industry
|
Apr 27, 2022 |
DevSecOps, AppSecOps, and What is Application Security Posture Management with Lawrence Crowther (Snyk)
|
Apr 20, 2022 |
Backups, Ransomware, and the Killer App for the Cloud
|
Apr 13, 2022 |
How Startups Can Overcome Limitations To Secure Their Business
|
Apr 06, 2022 |
Advantages of Moving to the Cloud and Predictions on the Future of Banking
|
Mar 30, 2022 |
Using Warden IAM, Jumpcloud, BambooHR for Smooth Onboarding
|
Mar 22, 2022 |
S3 Buckets and IAM Audits
|
Mar 16, 2022 |
Women in Cybersecurity, and Support for Cybersecurity Entrepreneurship in Asia
|
Mar 08, 2022 |
Seberapa Aman Industri Blockchain di Indonesia?
|
Mar 02, 2022 |
Shocking Cybersecurity War Stories And The Lessons We Can Learn From Them
|
Feb 23, 2022 |
The CISO Evolution: Why Today's Security Leaders Need To Combine Technical Expertise With Business Savvy
|
Feb 16, 2022 |
The Evolution of Ransomware, How Ransomware Gangs Work, And How You Can Prevent An Attack
|
Feb 09, 2022 |
Practical Advice For A Career In Cybersecurity
|
Feb 03, 2022 |
A Good Cloud Security Posture Is Not Unattainable, But Within REA&H (Ask A CISO Ep. 12)
|
Dec 09, 2021 |
Ask A CISO Ep. 11: The Evolution Of Cloud Security, Its Future, And 3 Tips For Your Cloud Security Journey
|
Nov 24, 2021 |
Ask A CISO Ep. 10: Starting On Your ISO 27001 Certification Journey, And A Protip On Getting Certified!
|
Oct 27, 2021 |
Ask A CISO Ep. 09: Is MAS TRM Mandatory For Your Organization?
|
Mar 15, 2021 |
Ask A CISO Ep. 08: Sheran Gunasekera On His New Book: Android Apps Security
|
Nov 30, 2020 |
Ask A CISO Ep. 07: Ransomware — To Pay Or Not To Pay
|
Sep 28, 2020 |
Ask A CISO Ep. 06: What’s New In Insider Threats?
|
Jul 21, 2020 |
Ask A CISO Ep. 05: Compliance In The Big Durian: Indonesia's 2020 Regulatory Landscape
|
Jun 05, 2020 |
Ask A CISO Ep. 04: Hard Truths In Cloud Security
|
Dec 20, 2019 |
Ask A CISO Ep. 03: An Interview With George Do, Gojek CISO
|
Nov 21, 2019 |
Ask A CISO Ep. 02: Bend Your Security Tools To Your Business Goals
|
Oct 15, 2019 |
Ask A CISO Ep. 01: Security & Privacy Compliance: Better Together!
|
Sep 12, 2019 |