Endgame with Gita Wirjawan - Pei Yuen Wong: Cybersecurity, Down But Not Beaten

Episode Date: August 3, 2022

Keamanan siber adalah perlindungan yang sangat dibutuhkan untuk menjaga dan mempertahankan kerahasiaan (confidentiality), integritas (integrity), dan ketersediaan (availability) informasi elektronik a...tau Sistem Elektronik. Lalu, apa endgame dari kemanan siber? Pei Yuen Wong CTO dari IBM Security untuk Asia Tenggara, Australia, Selandia Baru, and Korea, bicara tentang pentingnya prinsip “zero-trust” dan resiliensi dalam menghadapi ancaman siber.   Pei Yuen Wong adalah pimpinan senior di bidang bisnis dan teknologi dengan pengalaman lebih dari 20 tahun dalam R&D Pertahanan, Pemerintah dan Sektor Keuangan, serta keahlian di bidang Security Architecture, Security Programme dan Portfolio Management, Offensive Security, SOC Operations, Governance, Risk Management & Compliance. Saat ini, Pei Yuen berperan aktif dalam transformasi keamanan siber untuk melindungi organisasi dari ancaman siber dengan memanfaatkan inovasi dalam teknologi keamanan siber.  #Endgame #GitaWirjawan #cybersecurity --------------------------  Pre-Order merchandise resmi Endgame: https://wa.me//628119182045 Berminat menjadi "policy leaders" berikutnya? Hubungi: admissions.sgpp.ac.id admissions@sgpp.ac.id https://wa.me/628111522504 Playlist episode "Endgame" lainnya: https://endgame.id/season2 https://endgame.id/season1 https://endgame.id/thetake

Transcript
Discussion (0)
Starting point is 00:00:00 What exactly is the end game for cybersecurity? Where exactly are we heading cybersecurity? Are we heading for zero bridge? Is that the end game? That means we make sure we are, we will never be breached. But being bridge doesn't mean we have to be beaten or we have to be down. So it's really about cyber resilience that we are talking about in today's climate. So what if you are breached? We can still survive.
Starting point is 00:00:26 This is end game. Hello, friends, today we're coming Pei Yuan Wong. He was CTO for IBM, for ASEAN, New Zealand, Australia, and Korea. Tentuneiorea, is one of one of the company that's cool for the technology and line-line. Pei-youan, thank you so much for coming to our show. Thank you for having me. I want to hear a lot of things from you.
Starting point is 00:01:08 today but to start off uh i want to ask you you know about where you grew up and how you grew up and how you got interested in in the field of cyber uh eventually which is what you're doing now tell us thanks thanks thanks thanks for that yeah so i'm kyan i'm um i'm a singaporean i grew up in under the singapore education system which is a very i'll say it's a good system which brought me to wear today. I had a degree in computer science. But since then, I also, because of circumstances and then my results, I actually also managed to secure a Ministry of Defense scholarship. So after graduation from the National University of Singapore, I actually went on to DSO National Laboratories. And that's where I started my career in computer security. I was working in
Starting point is 00:02:03 the computer security lab doing cybersecurity research. And that is where all my real and cyber security, how it started. So during my DSO days, I actually managed to do a lot of things from a data security standpoint, how to secure systems, and then how systems can break as well easily. So I carry on from there, and then one thing leads to another and now with IBM, the CTO, really looking at how cyber security and the technologies involved in the different dimensions and services involved can actually help corporations, enterprises and the world at large, including consumers, to really secure their systems in the corporations as well as at home as well.
Starting point is 00:02:50 Of all the sectors that have been prone or vulnerable in terms of cyber, you know, if I read, it's mainly the financial services, right? and after that, you know, it's the manufacturing. How do you see the treatment from a cyber standpoint with respect to each different sector? Is there a common denominator or each sector is very different from the other for cyber security protection purposes? I think at the core of it, cyber security,
Starting point is 00:03:34 the core dimensions are the same, is always about protecting the CIA, the confidentiality, integrity as well as the availability of IT system. The financial industry has always been among the top sectors for tax by criminal, because it is where the money is. Be it the transaction system, the payment system, credit card systems, as well as consumer data, a lot of data actually sits within the financial sector. I think said that in recent years, because criminals have started to see how by disrupting the supply chain, it can actually cause even more widespread havoc with the entire ecosystem. So they have started to also target the manufacturing sector. So in fact, in 2021, the manufacturing sector has become one of the most,
Starting point is 00:04:24 the top target of attack outpacing the financial sector, because criminals have started to see that by disrupting the manufacturing sector, it actually caused supply chain worldwide to be disrupted. So I think, however, at the core, at the core of cybersecurity, is always about protecting the confidentiality, integrity, and availability of data. So as an example of a supply chain attack that has got disrupted the world over, so sometime last year there was an attack on the US pipeline, for example. It actually caused real world impact to constantly. consumers on the ground, it has actually caused gasoline prices in US to actually increase by 10%.
Starting point is 00:05:08 So by attacking the supply chain, by attacking the actual pipeline, through the use of ransomware, it actually caused real world impact to consumers on the ground. So cyber security is really a real world problem that really has a widespread impact on people like UN. It's not just on enterprises. You may hear about it in the news, but actually it has real impact on the individual as well. You know what's amazing is that as much as you aptly pointed out, it's in the top of the minds of the criminals or the bad guys. Conversationally, it's not in the mindset of lots of leaderships of organizations. There are exceptions, but I could generalize, I think, for the most part or for many parts,
Starting point is 00:06:08 not a lot of guys out there are talking about this as a risk. You know, when you meet with them, they only talk about what numbers you're trying to achieve at the end of the year, at the end of the quarter, at the end of the semester and stuff like that. It doesn't come out, you know, in that cyber is actually a very essential. part of the day-to-day business that they need to look after and try to mitigate the risk of. Why is that or how do we deal with that? I'm just curious. I think it really depends on the industry and that we are in. I think in a lot of the regulated industries, for example, the financial industry,
Starting point is 00:06:49 I think these conversations about cybersecurity are taking place at the board level in terms of cyber risk is usually now also regarded as an operational risk. that really cause and amongst the regulated industries, these are actually thought of mind amongst some of these C-Suit shareholders. I believe what you are referring to is across many other industries where cyber security is really just sort of like a cost of business. If they think about it, otherwise it would be really something that is at the back of their mind. They don't really think about it. But having said that, increasingly there are more people who are because of breaches that has been happening.
Starting point is 00:07:29 So just to cite an example, even an ice cream company, a company that is selling ice cream, because of a data breach, they actually cause millions of customers' data to be lost. And therefore, now they are very into cybersecurity because they need to regain their reputation and also make sure, which is why they are actually asking for the right kind of cybersecurity certification from national authorities to make sure that people regain confidence in their ability to protect consumer data. This is true, for example, loyalty points and so on, where you really have your private data submitted to the company. So I think increasingly there are people are giving awareness.
Starting point is 00:08:10 I think it also requires a lot of concerted effort across the board through the government, through consumers themselves who need to be mindful why are they submitting certain info and data to, you know, for example, for a lucky draw. How likely is it to win that particular car versus how likely is it for you for the data to be lost through a data bridge? I think the odds are almost equal now. If not worse off, because it's a lot easier for you to lose the data than to win that lucky draw price. So I think the good thing is that really people are more attuned to the fact that cyber bridge is real.
Starting point is 00:08:54 But there's more work that needs to be done across the board by many different stakeholders. I'm of the view that it's way underrated. Yeah. Right? I think it needs to be brought up. At the very least, conversationally. Yeah. You know, at any level of the organization.
Starting point is 00:09:10 Right. And I want to ask you this because when I looked at the report, I was shocked when I saw that there would have been about 1.6 billion attacks on Indonesia alone in the year, I don't know, 2020 or 2020. That's a staggering number. I mean, if there would have been 1.6 billion attacks on individuals or companies in this country, why is it that people don't talk about it as much as I think they should, right? Okay, so as you rarely point out, especially because of the pandemic.
Starting point is 00:09:54 In Indonesia, for example, the number of attacks posed. pandemic is actually about four to five times more than pre-pandemic. So I think because of the effect of the pandemic where there's a huge push towards digitalization by corporations, as well as the consumers themselves now needing to work from home, having access to routers and VPN and so on and to really access to corporate data through, but when they are still at home. I think this really sort of excavated the problem. But why are they people not talking about it? Because I think a big factor is really because they are, they themselves are not affected. They hear about all these breaches. They appear in the news, but it's always to other
Starting point is 00:10:42 people. They themselves are not affected yet. But having said that, actually, the truth of the matter is really that most people would have been affected by some breaches. Why is that so? Because if, for example, a particular corporation has been breached and data has been leaked to cyber criminals. That data, even though is breached because of lapses in a particular corporation, but the data actually belongs to you and me. Because if you have submitted the data, for example, in 2018 in Singapore, there's actually a breach in the healthcare system. those data actually belong to the Singaporeans
Starting point is 00:11:25 and these kind of breaches actually happen to other parts of the world and other jurisdictions as well so I think but the effect and the impact of those breaches are still not felt as much yet because we do know that our data is out there anyway but it doesn't impact them so much yet because their money is not lost they are still even though the data healthcare data is lost but they are
Starting point is 00:11:47 not really impacted by any much I think that's the key issue that we need to deal with. You know, I want to follow up on, I think it's important to underline the point that the reason that it's not surfacing to the conversations of as many people as we think it should be. It's not just because the top guys don't pay premium on this as much as they should.
Starting point is 00:12:17 But I think the middle and the level, lower people, they may not know that they would have been inflicted. I wouldn't know if I might have been inflicted. Maybe my data would have been used to the advantage of somebody out there without my knowing that it's to my disadvantage. And, you know, metaphorically, it's until when you open your wallet and you realize you got nothing. in there. That's when you feel the pain. Is that the right way of thinking about it? Very much so. You know, interestingly, one of my friends recently tell me that his mother
Starting point is 00:13:02 was like 70 plus years old, told him that robbers today shouldn't be robbing bags or, you know, taking wallets and so on. Because all the money is actually in your mobile phones, on your mobile apps, in your banking systems and so on. And the truth of the matter is that there actually many breaches out there as you rarely pointed out that we might not even know about you know there's actually this you know a lot of websites that actually compile the different big data breaches that has been happening so for example there's this website called have i been pawn.com once you go to the website you can actually key in for example your email address or your you know credit card number and things like that and lo and behold you might find it already out there
Starting point is 00:13:47 on the dark web oh man being being so for, you know, very cheap amounts. You know, each credit card number is like one cent or something like that that are being sold out there. So, unfortunately, even after we have found out that some of these data is out there. The true of the matter is that they are already out there. You can't really do much about it. People already, of course you can report to your credit card company and whatnot, but other than that, you can't really do much about it.
Starting point is 00:14:15 So this awareness in terms of the real work, impact that it can cause really needs to be promulgated across more widely so that people are aware that data breaches can cause real world issues because people can abuse your credentials or PII, personal identifiable data to apply for credit cards, to apply for loans, for example, and then eventually you will be the one who needs to pay and you need to sort of show that you are not the one applying for it but it's sometimes not so easy so I guess the issue is really to be able to make this a wider known problem and some of this can be done through cooperation with government entities for example for campaigns video campaigns
Starting point is 00:15:11 so in some jurisdiction I know for example there are actually advertisements or not advertisement, sorry, there are actually campaigns to really show how there's this security cannot be done without you. You know, security is spelled as ECU RTI, but taking the you away, security cannot be done without the you. So I think to have campaigns like that to really make people aware that it's important ownership taking ownership, yes, to take ownership about what, so it's not just about how the corporations or how other corporations can protect.
Starting point is 00:15:46 the IT systems, but also about how yourself should be protecting your own data, because the data actually belongs to you. The most common breach is ransomware. Tell us, what's the biggest ransom ransom that would have been asked and paid to settle? So there are different, you know, people typically don't broadcast how much they have been paying. If they are paying at all, they may not even tell. But I have heard of double-digit million payments. And that's really because they are at the week's end, because without paying, they really can't restore their operations
Starting point is 00:16:30 and the operations are just at a stand still. But having said that, it's actually even after paying, in many instances, you may not be getting, but it may not be actually getting what you want. So, for example, usually when you pay, you're actually paying for the keys so that you can decrypt the data that has been encrypted by the ransomware.
Starting point is 00:16:53 But the true of the matter is that they can give you the keys, but the process of decrypting the data may sometimes be so slow that you're actually better off just restoring from your backups if you do have the backups. Or there are actually what we call
Starting point is 00:17:07 double extortion schemes. So about 59% of ransomware in 2021 are actually double extortion. What does that mean is they can give you the keys, you can restore operations, but they will ask you to pay again, otherwise they will leak the data out there because they have your data. So, and there's actually such a thing called triple extortion. Triple extortion means that because they have the data, so they sort of ask you to pay for ransom to get the keys and then if not, they ask you to pay for them not to leak the data as well. but the data actually belongs to a third party.
Starting point is 00:17:46 They then asked the third party to pay the ransom as well, which is why it's called triple extortion. If I have your data, your data is with me. If you don't pay me, I'll also leak your data. So schemes like that are actually happening. So it's actually why ransomware is of concern to many organizations as well as individuals in recent years. I want to bring up day-to-day stuff
Starting point is 00:18:09 that I think we human beings tend to take for granted. A couple of things. I mean, when you go home, most people never check whether or not their router would have been breached. Right. I mean, you have no idea if some stranger within the same zip code or from a different zip code would have breached it.
Starting point is 00:18:35 I mean, I never check my router. I'm sure most people out there don't. And the other stuff is that I take for granted that I know most people take for granted is when you go to a place with unsecured network capabilities, like a cafe or like a mall or like whatever, the hotel, what sort of stuff that we need to know about stuff like this? You know, I mean, I think it's going to be education.
Starting point is 00:19:10 what you're about to say. Right. To be honest, I think these are areas that warrants a lot more awareness, which are unfortunately not at the level that they should be. Many people, when they buy the router back home, you know, the routers are usually when you switch on the router, you can actually start using it, you can connect to it, and then you can have Wi-Fi, you can have internet access and so on.
Starting point is 00:19:34 But all these routers are actually also systems with credentials, you user ID and pass-a-endix. user ID and passwords and configurations that you need to be very mindful of to tighten before using it properly. So as an example, many routers have the default password or user ID and password or admin admin or admin password and people typically just don't change it. So I've had countless, I'll say, occasions where I was visiting friends home and all that. Can I use your router? They say, sure, go ahead.
Starting point is 00:20:08 So I really just go ahead. And after that, they asked me, don't you need the password, but I say, I know the password. Because I mean, oftentimes they actually don't change the password. That's one. That's one. And second is really these flouters and switches, for example, at home, actually needs to be updated regularly as well.
Starting point is 00:20:24 And many don't. So they have, basically runs on firmware and software as well, which needs to be constantly updated and patched. And within each of this, internet connection devices, they're actually different configurations. There you need to tighten to make sure that people are not using it.
Starting point is 00:20:45 For example, you can just limit it for use for your home PC, for your mobile phone, and maybe for your children's machines. And that's it, without allowing other people to hot one. I have had instances, I've seen instances where some of these routers has been hacked,
Starting point is 00:21:01 and you can actually, coming back to your earlier point about cafes, for example, you can actually mimic the same, let's say it's called Cafe A. You can actually mimic the same Wi-Fi, what we call S-SID as Cafe A, and people hot on to it, not knowing that it's actually a rogue ID, and therefore you can start sniffing, passwords, whatever websites they are surfing, legit or otherwise. And that's where people start to know and have got hold of your data. and all will still implant malware onto your machines
Starting point is 00:21:43 and then from there start wreaking havoc and then start to do all sorts of funny things. So I think even very simple things like that has to be done well. Of course for me as a cyber security profession, I know how to do this well. When I get a mobile phone, when I go to a cafe,
Starting point is 00:21:59 even if I do use their Wi-Fi, actually have VPN software installed so that I make sure that it's actually well secured. But as much as possible, especially when I'm in the home country, I'll use the data plan rather than which are, well, at least arguably more secure than using Wi-Fi. So I think these are things that, again, many people, well, I would say either I'm not aware or even if they are aware, they don't quite bother, so long as they get the... Because it's so convenient to be able to get it for free. Exactly. Ah, it's okay.
Starting point is 00:22:34 Nobody's going to bother them. using something for anything sensitive, but not knowing that, not forgetting that they're actually using it for something that is sensitive as well, such as banking application, for example. And that's at the individual level, right? How about at the corporate level? What sort of things that people take for granted that they need to be a little bit more cautious, if not careful off or with? So, you know, with the, especially with, during the pandemic where a lot of are working from home and so on yeah so some of these considerations how I mean how do we know as we were discussing just now for consumers but even when you connect
Starting point is 00:23:14 back to your corporate office through the home router how do we know that the router is really secure how do you know that your the connection is actually not breached I think these are things that people have to be mindful as well but the good thing about corporations especially those with a good and mature security team is really that we have this concept called zero trust, which means we trust nothing, and we assume, yes, some of these things can be breached. And therefore, in every transaction and every connection that we make, we actually make sure that they are properly authenticated and verified. So even if some of these intermediaries, I would say, whether it the router and switches or the ISPs are bridge,
Starting point is 00:23:59 the corporate resources themselves are still well protected. So with a concept such as zero trust, this is something that we will really try to incalcate in the clients that we have. So we are really trying to make sure that the ecosystem, whether is it our clients or even our family members and so on, are imbued with this concept. Let's say if we are talking to your friends and family, it may not be called zero trust. But the concept is really ultimately about zero trust, not trusting anything, making sure that everything is authenticated and properly verified before granting access. Zero trust and verify. Yes.
Starting point is 00:24:44 Not trust and verify. Yeah, it may sound like a paradox. Never trust, always verify. Well, depends on, yeah. So, yeah, but indeed, especially with the increasing sophistication of cyber threats, I think this is something that we need to pivot to us. And the other thing is, the other observation is that most of the breaches, or most breaches, have been done by insiders, as opposed to outsiders. Is that, that's, at first it sounds hard to believe, but it kind of makes sense, right?
Starting point is 00:25:28 Because you, sometimes you're going to overtrust your insiders. Yeah. So there are various reports to say that, say, about 80% of sub-breeches are actually caused by insiders. Well, it really depends also on the interpretation as well. So ultimately, you need to become insider in order to breach a system. In the sense that even if I'm an external attacker, I will need to breach an insiders credentials, be it, you know, the database administrator, some super-administrator. admin user, the CFO or whoever, in order to bridge the system and you have to become insider. But having said that is also the truth of the matter is also that insiders will, by virtue of the fact that they are insiders and have the right access to systems and so on, that they can already do some of these malicious activities to cause a breach. which is why I think
Starting point is 00:26:33 this again this concept of zero trust is needful because for insiders to be able to carry out the attacks usually because
Starting point is 00:26:48 you know for example for insider to transfer large sums of money to their own accounts for example many of these are actually anomalies so with a proper data analytics systems put in place and data security measures put in place.
Starting point is 00:27:04 These are actually good tell-tale signs that something anomalous is happening and you can actually have applied data analytics or AI techniques onto the whole flow of, how should I say, the behavior of the system as well as the individual to really identify all these anomalies and flag out as exceptions for people to validate.
Starting point is 00:27:31 These are some of the techniques that we have been applying in many organizations. But the truth is also that it's a challenging problem because, as I mentioned earlier, to be an insider already means that you have all the right access. So to really identify the right, how should I say, to really identify anomalies across all these different kind of transactions, which can be very complicated transactions and so on. I think you were about to say whether or not there's a universal model. I smelled that. That was what you're thinking about saying.
Starting point is 00:28:11 So GDPR is certainly something that many countries refer to as a good reference model, but I don't think there's a one-size-fit-all. Every country will have its own unique circumstances, and not every aspect of GDPR is applicable to the particular jurisdiction. But at the core of it, I think data privacy is really about protecting, you know, personal data that are very close to you and me, whether is it how much money we have in the bank, our healthcare data, you know, what kind of drugs are we taking and so on. So it's really something that each and every individual ought to be mindful of and ought to be concerned with. Unfortunately, the truth of the matter is also that, well, again, it depends on the individual, it depends on the individual and also generally speaking, it depends on the climate and the awareness level in the different countries.
Starting point is 00:29:19 There will be countries that are very mindful and very fearful about, you know, leaking some of this data. But there will be also those that really, well, so what if it is all there? I don't have money in the bank anyway. So people know I have $500 in the bank. So I think different strokes for different folks. I don't think there's one universal model that when it comes to data privacy that applies to everyone. So back to our earlier discussion about having that awareness, I think the ramifications of.
Starting point is 00:29:58 having your privacy sort of abuse is something that needs a lot more attention to make people aware that from the heart, from themselves, that they should be really mindful of. I guess, you know, to some extent it depends on the type of government that exists in the respective countries, right? And the degree to which the infrastructure is ready, right? And a few other things. And that, I think, is reason for why there shouldn't be any universality with respect to what sort of a framework you have. You've been quoted in the past for saying, pretty much, I'm paraphrasing here. You can get beaten down, but you can't be taken out. You just got to make sure you're not taken out, right?
Starting point is 00:30:56 Explain that. Yeah. Okay, that's really at the core, and that's very close to my heart, because I think in the, well, I think we discussed earlier, I started on my career day one in cybersecurity, and that's where we are mostly talking about protection and also detecting tracks and so on. But in recent years, especially, it is,
Starting point is 00:31:22 really important that we are mindful that it is really and I like this you know this this is called endgame right what exactly is the end game for cybersecurity what where exactly are we heading cybersecurity are we heading for zero bridge is that the end game that means we make sure we are we will never be breached I think the increasingly as as cybersecurity professionals we realize and we recognize that it is a matter of time that any organization or any individual may be breached eventually, one fine day. Of course, we want that fine day to be really, really, really far down the road, right?
Starting point is 00:32:01 But that's an eventuality that we sort of recognize. But being breached doesn't mean we have to be bitten or that we have to be down. So it's really about cyber resilience that we are talking about in today's climate. So what if we are breached? We can still survive. We can still, if we are a bank, we can still dish out money, we can steal your cash, we can recover in time. We can claw back the money in time, for example.
Starting point is 00:32:27 Or if we are a manufacturing firm, the production floor can still operate. The damage can be contained quickly, fast. So it's really about being resilient. It's almost like the pandemic. So, of course, in the past two years, different countries are resilient to the pandemic in different ways. And there's different degrees of how people have bounced back. Some countries have bounced back better or faster. Some countries are still in their, you know, they're still,
Starting point is 00:32:59 I think all countries are still struggling, but I think different countries are sort of bouncing back in different degrees. So it's a little bit like that for cyber resilience as well. The endgame is really not to, for us to be fully protected and never get breached, but to be able to bounce back, even when we are breached to continue to operate, to be a going concern, to be a continuously
Starting point is 00:33:26 functioning corporation or as a consumer at home, for us to be able to continue our daily lives without being really being brought down. I think that's the crux of cyber resilience today.
Starting point is 00:33:44 And really at the core of cyber security, which honestly, not everybody recognizes or not every corporation recognizes a lot of well at least quite a few people that we've been speaking to are still focusing too much on I mean given limited budget for example they're still focusing too much on protection and making sure they are not reached but I think increasingly especially when we mature ourselves in the the different cyber security domains we really need to pivot towards being resilient focusing a lot of our attention on being able to detect
Starting point is 00:34:20 reaches and recover from it. And it's in the recovery part that I think many organizations still need to put a lot more effort and attention on. For example, in conducting exercises, making sure that, you know, let's see in the red teaming exercise, when certain systems are down that we can recover, how do we know that the backup systems is still working? Let's say in a ransomware attack, how do we know we can really recover from our backup? And even though almost all organizations and backup systems, I think, again, hand to heart, many organizations have not tested the recovery part yet.
Starting point is 00:35:00 I think so that's where a lot of attention needs to be spent on. It's not just about being resilient. I think it sounds more like about being anti-fragile. Yeah. Right? You can actually bounce back stronger. Yes. Compared to how you would have been before yesterday or whatever.
Starting point is 00:35:18 Right. Yeah. Talk about what IBM has a mind for ASEAN, you know, broadly or specifically? I think one big challenge in cybersecurity is really the dearth of talent, or in tech at large at least, but certainly in cybersecurity as well. So globally, we are at least in security, depending on the different research reports you have read, there's a shortage to the tune of a few million cyber security professional globally. So in some countries, you'll be a few thousand, some tens of thousands.
Starting point is 00:36:05 So globally there's a widespread shortage of cybersecurity talent, and that's in different roles. That's single digit. millions, all across the world. All across the world. Less than 10 million. Yeah, thereabouts. Okay.
Starting point is 00:36:21 Yeah, thereabouts. Yeah, so each country will be to the tune of tens of thousands. Yeah. Thereabouts. So how do we really have that pipeline so of talent so that we can really close this gap as fast as possible? IBM is doing our part. So we are really committed to train up to 30 million. not subject, 30 million tech professionals across the board by 2030.
Starting point is 00:36:50 That's something that we were really committed to do. And that's through different means, through collaboration with IHL's, institute higher learnings, with corporations through corporate programs, training academies and so on. That's something that we are trying to do across the boat globally and certainly in ASEAN as well. To really have the pipeline through, and that can be mid-career professionals, converting them to tech professionals and so on. To really then build up this band strength and the tech space to really address these gaps.
Starting point is 00:37:26 Especially in the digital economy with a rapid pace of digitalization, there's a lot of need for different professions within the tech industry. I think this is where we are doing our part to really help to uplift. the skill gap and to really make sure that in time to come we have across the globe in different industries we have the pipeline of talent that we need these are vocational levels or tertiary it cuts across it cuts across different vocational levels as well and tertiary as well so it really cuts across different domains
Starting point is 00:38:08 where do you see those 30 million professionals or skilled you know, experts geographically spread. Most of that is going to be in Asia or Europe? It really cuts across. Okay, I don't think I've
Starting point is 00:38:28 answered to that question. I think I have it somewhere but I cannot remember off and, but it really cuts across. Yeah. Okay. Okay. But I would think it would mirror where growth is like. Yes, yeah. Yeah. That is correct. I mean, if it happens in place A,
Starting point is 00:38:44 or place B or place C. That's correct. That's where... Look, I mean, a bit on where the world is heading right now. I mean, we're seeing a number of geopolitical winds in a number of places, one of which is in Europe and a few other places and somewhere else. And we're seeing some macroeconomic headwinds also, right? Recessionary tendencies and...
Starting point is 00:39:14 a number of countries. Right. Then we're seeing these rising tension between the US and China, right? It's just like a perfect recipe for cyber to rise up, you know, in terms of the order of importance. Right? Yeah. Right? Because there is a requirement to reprice everything by way of how everything is changing, not necessarily for the better. It just sounds like it's going to entail more vulnerabilities from a cyber standpoint.
Starting point is 00:40:02 My question is not about the geopolitics, but my question is more about, is 30 million going to be enough by 2030? Well, that is something that IBM aspires to do from our standpoint, and we feel that that is something that we can achieve. Is that enough, everybody's guess? What is for sure going to happen is that all this complexity, all the geopolitical tension that you mentioned about, is going to drastically heighten the need for, we talked about several resilience just now.
Starting point is 00:40:42 for every organization and for every industry out there to be resilient to all this increased complexity of cyber threats. And the reality is also that many of these threats are carried out by very sophisticated threat actors. They can be cyber criminals, they can be nation states and so on. So to be able to withstand the cyber threats that are carried out and the kind of sophistication and the kind of resources that have been pumped into that by the threat actors. It really takes the whole ecosystem of service security professionals,
Starting point is 00:41:22 government, the corporate sector, and everybody to work together in collaboration. And that's something that IBM advocates as well, for the whole entire ecosystem to work, even among competitors. So IBM can be a competitor to another cyber security firm. but what we are trying to really encourage is an open ecosystem where there's a lot of collaboration
Starting point is 00:41:47 for example through common standards and open standards for there to be interoperability between different suburb security solutions and IT solutions so that because in the cyber security industry is actually quite fragmented there are really different players but when there's an open ecosystem
Starting point is 00:42:04 with a lot of open standards and all that that can interoperate with one another it actually helps the organisation to pre-am cyber attacks a lot better because technology A can talk to technology B and then make sure that threats that are identified in this particular technology flows over to a response system by another technology or by another firm. So this is really something and IBM strongly believes that this is the way to go. We have an open ecosystem with open standards and for the
Starting point is 00:42:40 blue team to work, or I would say the blue team to work very closely amongst ourselves because the red team, or rather the bad guys, are collaborating amongst themselves. They're sharing, you know, all their spoys, they're sharing how to crack into the systems and all that, very well amongst themselves. Yeah, and they have no inhibitions. They have no sort of laws in their mind. They are lawless and in the first place we can share freely. So why can't we share freely? Yeah. So, they have no. So, they have no sort of laws in their mind. They are lawless. They are lawless. They are lawless. And in the first place, we can share freely. We can't. We can there's something that we are strongly encouraging. You know, if I take a look at how technology is changing exponentially,
Starting point is 00:43:23 it's more in a private sector, right? It's happening in the private sector. The more you need to basically regulate this or to make sure that it's not being used for the wrong reasons or for the wrong purposes. whereas the way policy making all around the world has been moving at a much more linear manner. How do you reconcile the two so that the coexistence of the two will result in a stable environment where the risk of cyber threats can be further mitigated?
Starting point is 00:44:06 it takes really a very consultative approach on both sides yeah so so from the regular I think gone are the days where the regulators think that they know everything yeah and therefore just prescribe you know standards or or policies and all that just because they are the regulators and they do so increasingly we see in many countries that the regulators are really also very open-minded yeah they really yeah they really yeah they really yeah they really, for example, before they really push out any regulation, there's a lot of consultations that are going on. They consult the industry, the impacted parties, as well as the service providers, for example, IBM as a service provider for critical infrastructure and then
Starting point is 00:44:54 our sort of cybersecurity monitoring services, for example. So there's really a lot of consultation going on by the regulations. And from the private sector standpoint, I think it's also useful. And because, as I mentioned earlier, to have this very good open collaborative ecosystem. So even from a private sector standpoint, I think there's a lot of opportunities for us to collaborate very well with one another through industry consortiums, industry bodies, as well as with the regulators. There are a lot of, I'll say,
Starting point is 00:45:33 I'll say, opportunities in different forums or both sides to work together and collaborate on issues. I've also seen, for example, labs laboratories that are set up, that it can be set up by the private sector by inviting the regulators to join, or it can be set up the other way around. And they actually work hand in hand in the labs to experiment, to try out different things to explore,
Starting point is 00:46:02 whether is it new solutions and technologies or the implications of new regulations and how it impacts. And there's a lot of, I'll say, close collaboration. And that's a good thing to see, and that's really hardening to see that we are sort of converging. And I think in times to come,
Starting point is 00:46:26 will be a more close-needed group of community, a more close-needed community to really work together to address all this increasingly sophisticated cyber trends. Interesting. You've talked about 2030. Tell us what you have in mind about 2045. A lot of the kids in Indonesia, Yeah. Well, at least we're trying to encourage them to think long term, right?
Starting point is 00:46:59 But how Indonesia is going to be, how ASEAN is going to be by 2045. That's only like, what, 23 years from today. You see a much more benign picture from a cyber standpoint for ASEAN? If any, you'll be as complex, if not more complex. and as treacherous, it's not more treacherous. I wouldn't say, I certainly don't think it would be more benign. But what, especially from the threat landscape standpoint, by then you will be, there will be a lot more,
Starting point is 00:47:39 the whole tech landscape, there will be a lot more sophisticated. So, you know, today, in any typical organization, there will be tens of thousands of different types of solutions and technologies that each and every one of them will come with different vulnerabilities that can be exploited. By then, with the rapid migration digitalization effort, there will be, and now, of course, a big push to migrate to the cloud and so on. There will be, I think there will be more convergence in terms of the different types of
Starting point is 00:48:12 technology use, and it will be less fragmented, I think. however having said that because of the different use cases that are brought about by different technologies like 5G and in some countries we are talking about 6G already there's the application of all these different technology will mean an explosion in the types of use cases that can be exploited well there can be I shouldn't use the word exploited in the context of cybersecurity but they can be utilized by different you know consumers on the street or by corporations they all be, so from a cyber security standpoint, again, in tandem, there will be a huge explosion
Starting point is 00:48:53 in terms of the attack surface, where there will be a lot more threats that can be coming and there are a lot more vulnerabilities. So, certainly not more benign. But having said that, because of the collaboration and the convergence that we are seeing in the community and so on, I think things are, from a defender stand more, it will be a lot more harmonized. there will be more so close. So for example, from a threat intelligence sharing standpoint, I think there will be much less inhibition in terms of sharing threats with one another, even amongst competitors.
Starting point is 00:49:30 I think this is what we are seeing. Yeah, correct. In some countries, for example, when it comes to threat intelligence sharing, so in some cases, we still see that people are looking at it, as something that is quite private. I don't want to share with my competitor in terms of what I've been seeing. But in some jurisdictions,
Starting point is 00:49:56 we have in emphasizing that track intelligence is not a competitive advantage. Of course, you can always anonymize certain things that are sensitive, but to share, for example, the tactics that the attackers are using, how they manage to breach the system so that there's wider benefit
Starting point is 00:50:12 for the other organizations to have early warning, to be able to detect some of these threats that are coming towards them. I think that's something that is very useful amongst the community and increasingly we see a lot more of that. I think that is also encouraged by the formation of a lot of industry bodies.
Starting point is 00:50:32 There are of light-minded professionals that come together to really share experiences and insights with one another. I think this is a good development and we should continue to encourage that. Any final? messages pay you on? I think from I think the world
Starting point is 00:50:53 we are living in is especially we are still sort of we are finally seeing a little bit of light at the end of a tunnel from a pandemic standpoint the borders are opening up a lot of travel is happening and so on
Starting point is 00:51:07 so that's good to see but what is what happened during the pandemic because of compressed timeline over the past two years that we see and people starting to work from home and so on. We are at the juncture of and this is something that I am just paraphrasing something that I've heard, which I think is very useful to share as well. There are decisions that we have made in the past two years during the pandemic that are the right decisions back then because of the circumcances.
Starting point is 00:51:44 suddenly if you lock down while you still need to carry on of course you have to work from home and so on and you open up remote access to some of your critical system for example because things still need to run but now that we are sort of almost seeing the light at the end of tunnel
Starting point is 00:52:00 I think it's the right time now to revisit some of these decisions that's been made during the last two years and make sure that they are still the right call and if not to make tweaks to some of some of these and to really calibrate accordingly
Starting point is 00:52:17 and perhaps to even sort of roll back some of these measures. Of course, I don't think, okay, it depends on the organisation and so I don't think everything can be rolled back all the way to pre-pandemic levels, but I think it's time now and it's the right junction now to really
Starting point is 00:52:36 review some of these decisions and then make sure that we are still on the right track. and maybe sort of as a broad summary and again this is something that I think it's quite useful to share is that service security is almost like the seat belt that we have in our cars or on the airplane and it's something that sort of
Starting point is 00:52:57 inhibits our movement a little bit you can't really move incident you better wear it yeah but you better wear it and you have to wear it it sure it works exactly so if you are on a moving car and you are speeding
Starting point is 00:53:11 would you not want to wear a seatbelt? I think, so I think, yeah, a civil security is almost like a seatbelt. You have to wear it for you to speed, for you to move fast, especially in the post-pandemic world where everything is moving so fast. Great. Thank you so much.
Starting point is 00:53:28 Thank you. Come on. Thank you. T-on Wong, CETO from IBM for Asian, Korea, Southan, Slandia,
Starting point is 00:53:39 Badu, and Australia. Thank you. Thank you. Thank you. This is Endgame.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.