5 Tips Memilih Password

Data breach dan segudang kasus cyberattack lainnya semakin mewarnai pemberitaan di berbagai belahan dunia terlebih sejak tahun 2014. Tidak sedikit upaya pengamanan yang di ikuti dengan peningkatan awareness kerap di lakukan organisasi dan pemerintah di berbagai negara. Upaya ini masih di rasakan belum menunjukkan hasil yang cukup dalam menekan dampak negatif financial. Peran serta pemilik akun ternyata juga memiliki peran yang tidak kecil disini. Salah satu peran yang paling sangat membantu dan di rasakan tidak terlalu sulit untuk di lakukan adalah dengan memperhatikan “kualitas” password yang dipergunakan pada setiap online account. Mengapa demikian? Karena pada prakteknya, password merupakan pintu pertama..

baca lebih lanjut …

Pertanyaan yang sering muncul saat Interview posisi CISO

Dampak positif dari peningkatan penyerangan cyber yang terjadi dalam beberapa tahun terakhir ini adalah peningkatan permintaan akan tenaga kerja yang memiliki keterampilan cybersecurity. Hal ini terbukti dengan masih banyaknya posisi pekerjaan CyberSecurity yang belum terisi. Namun bukan berarti bahwa tidak ada kompetisi untuk mendapatkan pekerjaan di domain ini. Untuk unggul […]

baca lebih lanjut …

50 role dan 10 sertifikasi CyberSecurity yang Populer di 2019

“If you know cybersecurity, then you’ve got a job for life,” ungkap Robert Herjavec (CEO perusahaan CyberSecurity yang bernilai sekitar USD 300 juta) pada suatu kesempatan interview di ABC’s Shark Tank. Dampak kerusakan sebagai akibat dari CyberCrime di prediksi meningkat sehingga menyentuh angka USD 6 triliun di tahun 2021 yang […]

baca lebih lanjut …
Semua artikel

Instagram

Information Security is a position inside an enterprise that eventually butts heads with other functional roles, as the instincts of a security pro are to lock down systems and make them more challenging to access, something that may clash with the job of IT to make information and apps accessible in a frictionless manner. As a CISO vs. CIO war, the way the drama plays out at the top of the org chart may be, and the contours of that combat are always defined within an organization by the lines of reporting. Although both titles have "C" in the name, it is relatively common for CISOs to report to CIOs, frankly said this can restrict the ability of CISO to execute strategically, as their vision ends up being subordinated to the overall IT strategy of the CIO. #CIO #CISO #cybersecurity #governance #cyberrisk #threatlandscape #compliance #risk ...

100 8

Thank you, all delegates, Bu Tin Tin Hadijanto , and Synex Metrodata for the opportunity to share my knowledge and experience for this CISO class.

Today's session is to conclude our online weekend class for EC-Council C|CISO official training. Thank you to all the excellent professionals for joining this class. I appreciate the discussion and engagement we had on the last 5 (Saturday) weekends.

Best wishes to all participants. I hope the knowledge we share can benefit your continued success.

#cciso
#ciso
#cisolife
#eccouncil
...

57 1

As cloud computing becoming an extremely important platform for any organizations, so thus cloud security. Last year, I was passed the CCSK v4 exam. In the beginning of this year, I take a Train-the-Trainer course. Proudly said that I passed. Thank you tk CSA APAC for their support. It is now the time to giving the back to the education community, leveraging Cloud Security best practice. #cloudsecurity #cybersecurity #cloudsecurityalliance ...

76 4

Life Is Good, Mommy! This is what my kids were once telling his mommy during our family trip. He just simply read the text on our t-shirt. However, the way he said that to us has brought us another level of gratitude. It reminds us that: “Those people cannot enjoy comfortably what God has given them because they see and covet what He has not given them. All of our discontents for what we want appear to me to spring from want of thankfulness for what we have.” (Robinson Crusoe) #weekendvibes #weekendmood #weekendgetaway #familytrip #happinessquotes #lifeisbeautiful #gratitude ...

64 0

In facilities like Know Your Customer KYC and Anti-Money Laundering (AML), Artificial Intelligence has implemented new requirements to monitor suspicious transactions and related potential risks. Machine Learning clubbed with AI efficiently enhances the operations , especially in work-intensive areas. In just seconds, AI-powered KYC solutions are used to authenticate the address and the true identities of documents. #cybersecurity #kyc #ml #ai #cyberrisk #rpa #automation ...

99 1

The Comeback is always stronger than the Setback. Stay positive. Eventually your time will come. #positivevibes #weekendvibes #positiveenergy #weekendgetaway #daughters #familyphotography ...

51 0

As professionals in the CyberSecurity domain, we still need to continue to study science with academic experts. Professional experience needs to be combined with an empirical approach. This will sustainably produce not only implementation effectiveness but also long-term cost efficiency. #cybersecurity #cyberrisk #academiclife #universitylecturer ...

62 2