Wegrow - Asian Startup Spotlight #4 ποΈ Cybersecurity with Christophe Poisson π
In the fourth episode of the Asian Startup Spotlight podcast, hosts discuss the crucial topic of cybersecurity in the context of our connected world. They emphasize that the data generated by our use of smartphones, computers, and the internet is valuable and needs to be safeguarded to prevent harm.
Compliance
TechID assists companies in adhering to local regulations, especially critical in countries like Vietnam, which recognizes that IT issues can have broader impacts beyond just technology. They also help companies achieve ISO 27 certification, a cybersecurity standard.
Security Audit
This involves vulnerability assessment and penetration testing of a company's infrastructure and websites to gauge their resilience against potential cyber attacks. The security audit also evaluates a company's cybersecurity governance, crisis management, and organizational preparedness.
E-discovery
This involves two key aspects. One is computer forensic investigation, which examines hard drives, emails, and decrypted data from social networks like WhatsApp, WeChat (for China), and Zalo (for Vietnam) to analyze potential wrongdoings. The other aspect is the disaster recovery plan (DRP) and business continuity plan (BCP), which help companies prepare for cyber attacks and manage work-around solutions to continue operations.
The podcast sheds light on the importance of cybersecurity, especially in the business context, and the potential impacts of cyber attacks on operations and reputation. It also introduces TechID's multifaceted approach to addressing these concerns and ensuring that companies can navigate cybersecurity challenges effectively.
Certainly, in this portion of the podcast, Christophe Poisson discusses various aspects of cybersecurity challenges and his journey transitioning from an executive in a multinational company to developing a cybersecurity business. He explains how opportunities and personal choices led him to his current role as the TechID country manager. Here's a summary of the discussed content:
Human Behavior and Employee Training
Christophe emphasizes the significance of human behavior in cybersecurity. Even with advanced tools, the effectiveness of cybersecurity measures relies on employees being well-trained and aware of best practices. Many employees may not be fully aware of cybersecurity roles and practices, which underscores the importance of education.
TechID's Services
Christophe provides an overview of the services offered by TechID. They offer expertise in compliance, helping companies adhere to local regulations like ISO 27 certification. Their security audit service includes vulnerability assessment and penetration testing to evaluate a company's cybersecurity preparedness. E-discovery involves computer forensic investigation and disaster recovery planning. TechID's team includes cybersecurity experts, IT compliance experts, and lawyers due to the legal connections with cybersecurity.
Transitioning to Cybersecurity Business
Christophe explains how he moved from being an executive in a multinational company to developing a cybersecurity business. He describes his role as APEC CIO in a chemical company and his decision to seize opportunities. The opportunity to develop a cybersecurity business in Asia arose, and Christophe took the chance, appreciating the challenge and motivation that comes with it. He decided to move beyond his comfort zone and tackle the challenges associated with a startup environment.
Cybersecurity Challenges in Vietnam
When asked about current cybersecurity challenges for companies in Vietnam, Christophe identifies two key challenges. The first challenge pertains to the local regulations being implemented in Vietnam. He mentions the significance of the Vietnamese government's recognition of IT assets and the country's focus on implementing cybersecurity regulations.
Digital Transformation and Cybersecurity Loop
Thibault emphasizes that digital transformation and cybersecurity are intertwined in an ongoing loop. As businesses adopt new digital tools and services for transformation, they also introduce new cyber risks. Addressing these risks requires deploying new tools and practices to ensure the security of the evolving digital landscape.
Normative Constraints and ISO 27 .1 Certification
Thibault discusses Wegrow's commitment to ISO 27 .1 certification as a way to strengthen security by implementing new security processes and procedures. This pursuit of certification is leading to digital transformation at WeGrow, involving the adoption of new tools, revisiting digital resilience, and implementing new practices.
β
Are you ready to unlock your team's full potential thanks to collective intelligence? Join Wegrow the best practice revolution! π https://calendly.com/tristan-jjk/discover-the-wegrow-solution
β