Mark Anthony Fuentes
Mark Fuentes has over a decade of experience in the cyber security field highlighted by roles in organizations such as Verizon, The International Monetary Fund, and The United States Department of Homeland Security. Mark is an avid consumer of technology trends and threat intelligence and seeks out new applications of tech and research to combat cyber crime.
ISACs, Information Sharing, and Building Cyber Resilience
Our ancestors shared information on threats with their communities to ensure survival. The same is necessary for today's digital landscape. Businesses need to share information pertinent to their verticals to remain resilient against threats, but how can we do that in a diverse business environment while encouraging sharing? We speak to John Lee, Managing Director at Global Resilience Federation Asia Pacific to learn the important roles ISACs play and how they help organizations like yours build cyber resilience.
Open Source and the Enterprise
How familiar are you with Open Source software and projects? Are they viable? Are they even safe to use? Host Mark Fuentes helps us get the answers to these questions and learns why some proprietary software companies choose to go the Open Source route from Harish Pillay, Head of Community Architecture and Leadership at Red Hat Asia Pacific.
The Local Startup Ecosystem, Going Digital, and Microsoft for Startups
Are startups still viable today? Where are they in the digital ecosystem and what does Microsoft have to do with startups? We speak to Michael Smith Jr., the newly-appointed APAC GM of Microsoft Startups, to get his insights and opinions on the startup ecosystem in Singapore, and how Microsoft is positioned to facilitate the growth of startups.
CII, Supply Chain Risk, and Zero Trust
It's not often that you get to sit down with a renowned CISO one-to-one for 45 minutes and just take in all the knowledge and wisdom he has to impart. This week, we had a chance to sit down with Steven Sim, one of Singapore's most renowned and decorated CISOs to get his advice and insights on a variety of contemporary cybersecurity topics like Critical Information Infrastructure, Zero Trust, etc.
Operational Technology - Origins, Challenges and the Future
Mel Migriño, Vice-President and Group CISO at Meralco, the largest power distribution conglomerate in the Philippines, joins us this week to talk about Operational Technology (OT). Listen in to learn about the origins of the OT/IT convergence, zero trust and the convergence, and the challenges and benefits of this convergence.
Cloud Transformation and the Cybersecurity Landscape in the Middle East
How do you convince senior management to stop seeing cybersecurity as an afterthought, but rather as a business enabler? We also get a look at cybersecurity practices in the Middle East, a region most of us have never been to or worked in.
Top 5 Qualities For Succeeding In Tomorrow's Cybersecurity Industry
Surprise, surprise! A passion for cybersecurity is not even on the list of top 5 qualities for success in tomorrow's cybersecurity industry. Find out what employers are actually looking for today from Emil Tan, COO at Red Alpha and Founder of Infosec In The City.
Backups, Ransomware, And The Killer App For The Cloud
The evolution of backup systems moving from tapes to disks exposed backups to cyber threats, including ransomware, according to Mr. Backup, our guest this week.
The Biggest Questions About Ransomware Answered
We go deep into what ransomware can and cannot do — jumping into misconceptions and myths about ransomware attacks and revealing the truth behind those notions.
The Cybersecurity Ceiling
Making a cybersecurity budget a percentage of the IT budget is systematically implying that cybersecurity will never be more important than information technology. The limitation of cybersecurity capabilities by tying their budget to the IT budget is that ceiling.
From Ashes to Phoenix: Crises and Innovation
Most would agree that the COVID-19 situation has brought on a crisis of global proportions. Nothing short of the entire planet has been brought down by this virus. Many have described this as a once-in-a-generation kind of crisis. These truly are dark times.
Cybersecurity In The Time Of COVID-19: Is It Really Different?
In the COVID-19-stricken world, what exactly has changed? What is still the same? We venture into the New Normal of remote work to understand what it means for cybersecurity.
Building An Effective Cybersecurity Team In A Workforce Deficit
Cybersecurity has been around as long as computers have existed, but has only seen mainstream attention in the past decade or so. Why are there over 1 million cybersecurity jobs in the United States remaining unfilled?
A Brief History of Ransomware
Ransomware is as commonplace in our lives today as email. All signs indicate that ransomware is not going away any time soon. So where did this nefarious family of malware come from?
What Is A Man-in-the-Middle (MITM) Attack?
Learn how MITM attacks work, the various types and forms it presents itself in, and appropriate mitigation measures that organizations can take.
Introducing the Ask A CISO Podcast! Tune In To The Data Privacy Pilot.
Join Horangi in our pilot episode of Ask A CISO! Mark Fuentes looks at the typical data privacy challenges and then shows how a security-first approach helps organizations achieve their compliance goals efficiently.
Cybersecurity Strategy: A Crash Course
You want to address cybersecurity within your organization. But where do you start?
Adopting a Holistic Approach to Cybersecurity
Cybersecurity is making its way to the forefront of every enterprise’s agenda. Even for organizations that are not at the point where it’s an overwhelming priority, it’s a safe bet that cybersecurity is an area of deep concern in their boardrooms.