5 Tips Memilih Password

Data breach dan segudang kasus cyberattack lainnya semakin mewarnai pemberitaan di berbagai belahan dunia terlebih sejak tahun 2014. Tidak sedikit upaya pengamanan yang di ikuti dengan peningkatan awareness kerap di lakukan organisasi dan pemerintah di berbagai negara. Upaya ini masih di rasakan belum menunjukkan hasil yang cukup dalam menekan dampak negatif financial. Peran serta pemilik akun ternyata juga memiliki peran yang tidak kecil disini. Salah satu peran yang paling sangat membantu dan di rasakan tidak terlalu sulit untuk di lakukan adalah dengan memperhatikan “kualitas” password yang dipergunakan pada setiap online account. Mengapa demikian? Karena pada prakteknya, password merupakan pintu pertama..

baca lebih lanjut …

Pertanyaan yang sering muncul saat Interview posisi CISO

Dampak positif dari peningkatan penyerangan cyber yang terjadi dalam beberapa tahun terakhir ini adalah peningkatan permintaan akan tenaga kerja yang memiliki keterampilan cybersecurity. Hal ini terbukti dengan masih banyaknya posisi pekerjaan CyberSecurity yang belum terisi. Namun bukan berarti bahwa tidak ada kompetisi untuk mendapatkan pekerjaan di domain ini. Untuk unggul […]

baca lebih lanjut …

50 role dan 10 sertifikasi CyberSecurity yang Populer di 2019

“If you know cybersecurity, then you’ve got a job for life,” ungkap Robert Herjavec (CEO perusahaan CyberSecurity yang bernilai sekitar USD 300 juta) pada suatu kesempatan interview di ABC’s Shark Tank. Dampak kerusakan sebagai akibat dari CyberCrime di prediksi meningkat sehingga menyentuh angka USD 6 triliun di tahun 2021 yang […]

baca lebih lanjut …
Semua artikel

Instagram

My life goal is not about money, but to live life our way. Eating delicious food for dinner in unique location is one of our usual way. #saturdayvibes #weekendfood #husbandandwife ...

80 0

Threat Intelligence Analyst is becoming a prominent role in many countries, especially for the government institution. The dynamic threat landscape may sometimes confusing, and reactive approaches are no longer providing practical strategies. We need a new model for uniquely defining how each institution describes its threat model. And Intelligence is undoubtedly something that will help a lot for this matter. Yesterday was the last session for Official training for Certified Threat Intelligence Analyst from EC-Council. We have participants from the Indonesian Army. They work in cybersecurity areas, including Threat Intelligence and Forensic. We are thrilled to teach the class with so many practitioners. It is where we share and combine practice with theory. #threatintelligence #cybersecuritytraining #cybersecurity #threatmodeling #armyindonesia #indonesianarmy #cyber ...

76 2

It is not where you go that matters. It is who you travel with that makes a difference. Life itself alone is a journey, and love is what making that journey worthwhile. ...

85 0

Thrilled to be part of AWS Community Builders for CyberSecurity/Compliance domain. Amazing opportunity to learn directly from the Subject Matter Experts from AWS. Another learning milestone for Cloud Security. And perhaps many things to share for my next Cloud Security Alliance CCSK Plus class. #aws #csa #cloudsecurityalliance #cloudsecurity #cybersecurity #awscommunitybuilders #awscommunity ...

45 0

Information Security is a position inside an enterprise that eventually butts heads with other functional roles, as the instincts of a security pro are to lock down systems and make them more challenging to access, something that may clash with the job of IT to make information and apps accessible in a frictionless manner. As a CISO vs. CIO war, the way the drama plays out at the top of the org chart may be, and the contours of that combat are always defined within an organization by the lines of reporting. Although both titles have "C" in the name, it is relatively common for CISOs to report to CIOs, frankly said this can restrict the ability of CISO to execute strategically, as their vision ends up being subordinated to the overall IT strategy of the CIO. #CIO #CISO #cybersecurity #governance #cyberrisk #threatlandscape #compliance #risk ...

100 8

Thank you, all delegates, Bu Tin Tin Hadijanto , and Synex Metrodata for the opportunity to share my knowledge and experience for this CISO class.

Today's session is to conclude our online weekend class for EC-Council C|CISO official training. Thank you to all the excellent professionals for joining this class. I appreciate the discussion and engagement we had on the last 5 (Saturday) weekends.

Best wishes to all participants. I hope the knowledge we share can benefit your continued success.

#cciso
#ciso
#cisolife
#eccouncil
...

57 1

As cloud computing becoming an extremely important platform for any organizations, so thus cloud security. Last year, I was passed the CCSK v4 exam. In the beginning of this year, I take a Train-the-Trainer course. Proudly said that I passed. Thank you tk CSA APAC for their support. It is now the time to giving the back to the education community, leveraging Cloud Security best practice. #cloudsecurity #cybersecurity #cloudsecurityalliance ...

77 4