By Horangi Cyber Security

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Category: Technology

Open in Apple Podcasts

Open RSS feed

Open Website

Rate for this podcast

Subscribers: 7
Reviews: 0
Episodes: 76


The Ask A CISO podcast is brought to you by Horangi Cyber Security, Asia's leader in cloud security. Every week, we chat with prominent CISOs and industry veterans from all over the world to get their insights into the most pressing cybersecurity issues today and tomorrow's challenges. For more information, visit Horangi at

Episode Date
Cyber Threats & Evolution
Aug 10, 2023
How AI is Disrupting and Transforming Cybersecurity Landscape
Aug 03, 2023
Cybersecurity : Tantangan dan Peluang Karir Masa Depan
Jun 21, 2023
Career in Cybersecurity
Jun 14, 2023
Strategi Keamanan Siber Nasional untuk Melindungi Ekosistem Digital
Jun 07, 2023
Cybersecurity in Enterprise
Jun 02, 2023
Horangi Anniversary Special
May 25, 2023
Understanding Password Vulnerabilities to Stay Safer Online
May 19, 2023
Decoupling Authorization From Your Applications
Apr 27, 2023
Cloud Control Matrix
Apr 18, 2023
Threat Modeling
Apr 13, 2023
Quantifying Defence
Apr 06, 2023
Cybersecurity Outlook 2023 dan Peran Komunitas dalam Membangun Ketahanan Siber Nasional
Mar 23, 2023
Exploring the Challenges of Application Security
Mar 15, 2023
The Benefits of Threat Modeling
Mar 08, 2023
AI and ML in Cybersecurity
Mar 01, 2023
AI and the Future of Mobile Security
Feb 22, 2023
Mengenal Sanksi Bagi Penyalahgunaan Data Pribadi
Feb 15, 2023
Understanding DSPM & CSPM for Optimal Data Security
Feb 08, 2023
Cybersecurity Risks and Business Context
Feb 01, 2023
Looking back with the Hosts (The Last Episode)
Dec 06, 2022
API Security
Nov 23, 2022
Linux and the Enterprise
Nov 16, 2022
The Cyber Defense Matrix
Nov 09, 2022
Hypponen’s Law: If it’s Smart, It’s Vulnerable
Nov 02, 2022
The Importance of Good Cyber Hygiene
Oct 26, 2022
Project Zero Trust
Oct 19, 2022
Mengenal Insider Threat - Deteksi, Monitor dan Pencegahannya
Oct 11, 2022
Modern Security Awareness Programs and People-Centric Cybersecurity
Oct 05, 2022
Threat Hunting and Incident Response
Sep 28, 2022
CrowdSec, Meshed Security that Leverages Numbers for Strength
Sep 21, 2022
ISACs, Information Sharing, and Building Cyber Resilience
Sep 14, 2022
Ready, Game, Train, GO!
Sep 06, 2022
Open Source and the Enterprise
Aug 30, 2022
The Local Startup Ecosystem, Going Digital, and Microsoft for Startups
Aug 24, 2022
Mempersiapkan Talenta Keamanan Siber Masa Depan Indonesia
Aug 16, 2022
Cyber Mayday and the Day After
Aug 10, 2022
CII, Supply Chain Risks, and Zero Trust
Aug 03, 2022
Zero Trust and Cyber Warfare
Jul 27, 2022
Cryptocurrencies, DeFi Hacks & the Future of the Crypto Market
Jul 20, 2022
Insights from InfoSecurity Europe 2022
Jul 13, 2022
Web3, The Metaverse, and Cyber Risk Management
Jul 06, 2022
People, Process, and Technology
Jun 28, 2022
Learning about Huawei Cloud
Jun 22, 2022
Operational Technology - Origins, Challenges and the Future
Jun 15, 2022
Future Tech and Cybersecurity: A Conversation with Chuck Brooks
Jun 08, 2022
The Cybersecurity Landscape in Hong Kong
May 31, 2022
The Human Defense Layer
May 25, 2022
A CISO's Take On the Gartner Magic Quadrant
May 18, 2022
Cybersecurity Sales and Diversity in the Industry
May 11, 2022
Cloud Transformation and the Cybersecurity Landscape in the Middle East
May 04, 2022
Top 5 Qualities For Succeeding In Tomorrow's Cybersecurity Industry
Apr 27, 2022
DevSecOps, AppSecOps, and What is Application Security Posture Management with Lawrence Crowther (Snyk)
Apr 20, 2022
Backups, Ransomware, and the Killer App for the Cloud
Apr 13, 2022
How Startups Can Overcome Limitations To Secure Their Business
Apr 06, 2022
Advantages of Moving to the Cloud and Predictions on the Future of Banking
Mar 30, 2022
Using Warden IAM, Jumpcloud, BambooHR for Smooth Onboarding
Mar 22, 2022
S3 Buckets and IAM Audits
Mar 16, 2022
Women in Cybersecurity, and Support for Cybersecurity Entrepreneurship in Asia
Mar 08, 2022
Seberapa Aman Industri Blockchain di Indonesia?
Mar 02, 2022
Shocking Cybersecurity War Stories And The Lessons We Can Learn From Them
Feb 23, 2022
The CISO Evolution: Why Today's Security Leaders Need To Combine Technical Expertise With Business Savvy
Feb 16, 2022
The Evolution of Ransomware, How Ransomware Gangs Work, And How You Can Prevent An Attack
Feb 09, 2022
Practical Advice For A Career In Cybersecurity
Feb 03, 2022
A Good Cloud Security Posture Is Not Unattainable, But Within REA&H (Ask A CISO Ep. 12)
Dec 09, 2021
Ask A CISO Ep. 11: The Evolution Of Cloud Security, Its Future, And 3 Tips For Your Cloud Security Journey
Nov 24, 2021
Ask A CISO Ep. 10: Starting On Your ISO 27001 Certification Journey, And A Protip On Getting Certified!
Oct 27, 2021
Ask A CISO Ep. 09: Is MAS TRM Mandatory For Your Organization?
Mar 15, 2021
Ask A CISO Ep. 08: Sheran Gunasekera On His New Book: Android Apps Security
Nov 30, 2020
Ask A CISO Ep. 07: Ransomware — To Pay Or Not To Pay
Sep 28, 2020
Ask A CISO Ep. 06: What’s New In Insider Threats?
Jul 21, 2020
Ask A CISO Ep. 05: Compliance In The Big Durian: Indonesia's 2020 Regulatory Landscape
Jun 05, 2020
Ask A CISO Ep. 04: Hard Truths In Cloud Security
Dec 20, 2019
Ask A CISO Ep. 03: An Interview With George Do, Gojek CISO
Nov 21, 2019
Ask A CISO Ep. 02: Bend Your Security Tools To Your Business Goals
Oct 15, 2019
Ask A CISO Ep. 01: Security & Privacy Compliance: Better Together!
Sep 12, 2019