Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Yaroth Chhay

Head of Information Security Division at ACLEDA Bank Plc.

Phnom Penh, Cambodia

Leaders produce effective leaders

Yaroth Chhay Points
Academic 460
Author 3
Influencer 5
Speaker 4
Entrepreneur 5
Total 477

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Company
Minimum Project Size: N/A
Average Hourly Rate: N/A
Number of Employees: N/A
Company Founded Date: Undisclosed

Areas of Expertise

Business Continuity 31.86
Cloud 31.27
Cybersecurity 47.13
GovTech
IoT
Leadership 33.31
Management 31.02
National Security
Privacy 44.08
Risk Management 38.30
Security 45.47
AI
Emerging Technology
Personal Branding 32.18

Industry Experience

Financial Services & Banking

Publications

46 Academic Certifications
Personal Branding Course
LinkedIn
February 23, 2023
You are the most powerful marketing tool at your disposal. If you are starting a business, establishing your thought leadership, or trying to get ahead in your career, it's a great time to start investing in the brand of you.

See publication

Tags: Personal Branding

Habits of Executive Leadership
LinkedIn
February 22, 2023
There are thousands of books and entire workshops on the high-level strategies of executive leadership. But what about the daily minutiae of leadership? How do you, as an executive leader, balance everything on your shoulders and still stay sane? How do you achieve a balance between quality of life and leading your organization to success? In this course, Aaron Marshall offers 20 manageable and beneficial habits you can build into your life to help you flourish as an executive leader. As the chief operating officer of the Santa Barbara Zoo, Aaron has a long history of managing executive leadership with thoughtfulness and intention. He teaches you habits to keep you grounded and habits to help you stay disciplined, habits for handling your relationships, and habits to become a more discerning thinker. And best of all, these habits can easily be integrated into your life, starting today.

See publication

Tags: Management, Leadership, Personal Branding

Cybersecurity with Cloud Computing
LinkedIn
February 20, 2023

See publication

Tags: Cloud, Cybersecurity

Threat Hunting Essential
LinkedIn
February 19, 2023
Explore the key differences between proactive and reactive cybersecurity strategies as you learn to articulate the value of creating your own threat hunting program. Upon completing this course, you’ll be prepared to leverage some of the most important threat hunting methodologies and frameworks, including anomaly-based hunting, statistical modeling, hypothesis-driven hunting, the threat hunting lifecycle, MITRE ATT&CK, and Cyber Kill Chain.

See publication

Tags: Cybersecurity, Security

Misconception of Cybersecurity Program
LinkedIn
February 19, 2023
Cybersecurity is one of the most important—and least talked-about—business issues today. But how can you prepare your organization against the threat of a devastating attack? Join instructor and cybersecurity expert Matthew Rosenquist as he identifies the five biggest mistakes made by cybersecurity organizations, regardless of their size or stature.

Explore the power of learning from others’ mistakes to improve your ability to manage digital risk. Find out what happens with inexperienced leadership, deprioritized strategic thinking, failing to optimize for threats, insufficient organizational teamwork, and failing to maximize value. Matt brings a wealth of cybersecurity knowledge gleaned from over three decades of industry experience, showing you how to manage risk more effectively so you can avoid costly blunders.

See publication

Tags: Cybersecurity, Leadership

Cybersecurity for Startups
LinkedIn
February 19, 2023
The startup world is fun and exciting, but startups are often more vulnerable to cybersecurity attacks than other enterprises. Startups move quickly as they juggle multiple competing priorities, and while cybersecurity should be one of those priorities, many startup founders have no idea where to even start. In this course, Jerod Brennen shares lessons he’s learned from experience in both the enterprise world and the startup world, helping founders and their executive leadership teams better understand how to build an effective cybersecurity program for their startup. Jerod also details the expectations that investors and board members are likely to have, and provides practical advice for anyone in a startup who’s concerned with cybersecurity to get from where they are today to where they want to be, even if they have little to no knowledge of cybersecurity.

See publication

Tags: Cybersecurity, Leadership

Building the Next Generation of Cybersecurity Professionals
LinkedIn
February 18, 2023
Topics include: Discovering hidden potential, dispelling common myths in cybersecurity job applicants, writing foolproof cybersecurity job descriptions, rethinking technical interviews, dealing with unconscious bias, and onboarding new hires for future success. She advises on how to find, hire, and retain first-class cybersecurity talent in a highly competitive market.

See publication

Tags: Cybersecurity, Leadership

Cloud Security Considerations for General Industry
LinkedIn
February 18, 2023
provides regional breakdowns, exploring security requirements for each area. The course concludes with a review of key threats and some real-world case studies that show how different security controls can be used to defend enterprises from similar attacks.

See publication

Tags: Cloud, Cybersecurity, Privacy

Inside the Breach
LinkedIn
February 18, 2023
Major security incident making headlines. Each incident provides an opportunity to learn from another company's misfortune. In this series, you can explore high-profile cybersecurity breaches, discovering the inside story of what happened and lessons that you can draw from each breach. Instructor Mike Chapple breaks down incidents at major companies like Equifax and Target, and explains what you can do to protect your organization against similar attacks. He connects concepts you may have only studied to real-world incidents and shows how cybersecurity has evolved in response to these new kinds of threats.

See publication

Tags: Cybersecurity, Risk Management

Implementing a Privacy, Risk and Assurance Program
LinkedIn
February 17, 2023
This introductory privacy course enables you to implement and operationalize a modern, flexible, practical privacy program. This program will account for the challenges in data privacy, how your business is impacted by it, and the expectations of regulators, industry stakeholders, and your consumers.

See publication

Tags: Cybersecurity, Privacy, Risk Management

Soft Skills for Information Security Professionals
LinkedIn
February 17, 2023
Information security isn’t all ones and zeros. While the people, processes, and technology we rely on to protect our data is critically important, so are the communication skills to help the rest of the organization understand the value and the necessity of those controls. This course was designed to help information security professionals better understand the perspective of the business, as well as learn how to communicate security concepts and proposals in terms that will resonate with all audiences.

See publication

Tags: Cybersecurity, Privacy

Cloud Cybersecurity
CXO Junction
February 17, 2023

See publication

Tags: Cloud, Cybersecurity, Risk Management

Executive Decision Making
LinkedIn
February 16, 2023
Making executive decisions requires making tough choices. The decision to lay people off, halt major projects, or to take your company global all come with a significant amount of risk—both business risk and professional risk. In this course, executive coach Mike Figliuolo explains the difference between executive decision making and day-to-day decision making and shows how to equip yourself so you can make high-quality decisions with far-reaching positive impact.

See publication

Tags: Leadership, Management

Building a Cybersecurity Awareness Program
LinkedIn
February 15, 2023
By implementing a security awareness program, you can turn people into assets—not fragile targets. A truly robust and mature security program makes educating employees a top priority in a company's overall multilayered approach. In this course, Lauren Zink shows how to develop and implement a successful, ongoing security awareness program that's so much more than just one phishing simulation or an annual required training. True security awareness necessitates year-round, relevant, and tailored training and communications that create an overall cultural shift you can measure. Through this course, discover how to sketch out your program plan, create a budget, leverage creative approaches for keeping your employees engaged, and assess the effectiveness of your program.

Credential ID AVvXgLU-T95Xti7mAbQx_hYsIx2H

See publication

Tags: Cybersecurity, Privacy

Master Cybersecurity Management
LinkedIn
February 15, 2023
A successful cybersecurity program requires thinking big, building a team, and implementing a program that creates business value and protects your organization’s digital assets. This learning path shows you critical success factors and how to allocate your limited budget to the greatest effect.

Credential ID ATJwinWPUd-FhA07nL3clw0O05gl

See publication

Tags: Cybersecurity, Privacy

Crisis Communication Planning
LinkedIn
February 15, 2023
Cyberattacks are a huge problem, but you can prepare your organization with a multi-faceted communications program to inform and reassure your stakeholders. In this short course, David Oates covers what to do and how to do it. David points out that planning for a ransomware or other cybersecurity attack is just as important as preparing your financial budgets. He explains the impact of cyberattacks and goes over how to communicate effectively to employees, customers, partners, investors, donors, and the general public if you are the subject of a ransomware or other cyberattack. He goes over what to say, to whom, and at what stage of the cyberattack crisis to say it. Plus, David dives into the best ways to evaluate a crisis and continue to train in better communication. Preparing for a crisis communications event like a cyberattack is not only possible, but also crucial to any organization.

Credential ID AT4DpMetQWzL-ZVYyDtZcOTQMIV4

See publication

Tags: Cybersecurity, Security

The Cybersecurity Threat Landscape
LinkedIn
February 14, 2023
As tech systems continue to grow in complexity, cybersecurity threats are becoming increasingly more effective and damaging. News headlines regularly announce enormous data breaches and sophisticated hacks. How are these attackers getting in, and what actions can you take to protect against them? In this course, Marc Menninger describes some of the most common cybersecurity threats, including phishing and ransomware, deepfakes, unmanaged Internet of Things (IoT) devices, business email compromise, and more. He then teaches the best countermeasures for reducing or eliminating the impact of these threats.

See publication

Tags: Cybersecurity, Privacy, Security

Implementing an Information Security Program
LinkedIn
February 14, 2023
Building and operating an information security program at your organization can be challenging. The scope can be vast and complex. Thinking of all the ways an organization can fail and coming up with actionable measures you can take to prevent issues, mitigate risk, or recover from events is a large undertaking. In this course, Kip Boyle, president of Cyber Risk Opportunities, guides you through the entire process of creating an information security program, rolling it out to your organization, and maintaining it for continuous risk management.

Credential ID AZ1JPrGi3Kjmc-muH8xh9xJYAxHC

See publication

Tags: Cybersecurity, Privacy, Security

Security Metric
LinkedIn
February 14, 2023
In most areas of business, specifics matter. This is especially true in the area of cybersecurity. If you’re a cybersecurity professional, you’ll have a very short career if the best answer you can come up with to security questions is “I think everything is pretty secure.” You need metrics and hard data to effectively communicate the value of your security programs and activities. In this course, Caroline Wong gives you a tried-and-true approach for customizing metrics that you can use to communicate the objectives and progress of your team’s cybersecurity initiatives. Caroline starts with an overview of the value of metrics, then covers the different ways you communicate cybersecurity topics to different groups like executives, business leaders, and engineers. She also covers risk management objectives, and finishes the course by going over examples of a number of important cybersecurity metrics.

Credential ID AWhhPmr-8TTFx2rO7yKbtxXqepSn

See publication

Tags: Cybersecurity, Privacy

Cybersecurity Outsourcing Management
LinkedIn
February 14, 2023
Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.

Credential ID AUwfcno3rhTSqaMxcpsE_81Yoomd

See publication

Tags: Cybersecurity, Privacy

Building Cybersecurity Talent Pipeline
LinkedIn
February 14, 2023
Cyberattacks are becoming more frequent, infrastructures are becoming more complex, and hiring and retaining cybersecurity resources is becoming increasingly difficult. But what can you do about it? Cybersecurity executive and educator Tia Hopkins explains the challenges and evaluates the data behind the perceived cybersecurity skills gap. She shows you how to structure your security program to widen and diversify your talent pool. Tia covers why retention is critical, then dives into how you can set yourself up for success by defining roles and responsibilities, putting in the work, and enacting the best recruiting approach for your organization. Tia describes ways to maintain your pipeline, use career progression as a program strategy, and define clear career progression requirements and growth plans. Plus, she goes into useful tips on boosting your corporate brand and incorporating the ROI of building a successful internal pipeline into overall program effectiveness.

See publication

Tags: Cybersecurity, Privacy, Recruiting

Cybersecurity Careers: Become a Security Auditor
LinkedIn
February 13, 2023

See publication

Tags: Cybersecurity, Leadership, Security

Implementing the NIST Privacy Framework
LinkedIn
February 13, 2023
Explore the fundamentals of the NIST Privacy Framework and how your organization can use it to categorize and effectively oversee its in-house privacy protocols. Discover the benefits of implementing the NIST Framework as a safeguard in your security management lifecycle. Learn strategies of identifying, managing, and mitigating privacy risks, as Ronald teaches you how to assess your own specific needs and outcomes, highlighting real-world examples and best practices along the way.

See publication

Tags: Cybersecurity, Privacy, Security

Cybersecurity Careers: Getting Started as a BISO
LinkedIn
February 13, 2023
Explore common business challenges and how BISOs can help resolve, or even prevent, them. Nicole shares lessons from her own experience about what it takes to align the priorities and operations of information security and business leadership across different domains and functions. By the end of this course, you’ll know more about how the BISO helps protect sensitive information about consumers and company secrets, improves the maturity of technology ecosystems, and creates new space for innovation.

See publication

Tags: Cybersecurity, Leadership, Security

GDPR Compliance: Essential Training
LinkedIn
February 13, 2023
The General Data Protection Regulation (GDPR) is a privacy-related regulation in the EU that became active and enforceable in May of 2018. GDPR requires US companies doing business in the EU to protect citizen privacy, and companies who do not comply face heavy fines. In this course, instructor Mandy Huth outlines who needs to comply with GDPR, what they need to do, and how they need to do it. She details the scope of GDPR, the definition of a personal data breach, the rights of data subjects, incident response requirements under GDPR, and more. The previous version of this course was released prior to the GDPR going into effect, so Mandy wraps up the course with some real-word examples that highlight some key points about GDPR, including the UK’s post-Brexit version of GDPR.

See publication

Tags: Cybersecurity, Privacy, Security

1 Industry Badge
CorpSecurity
badgr
October 31, 2022
CorpSecurity International Membership connects corporate security professionals with the best-in-class security resources, certifications, and networking with global security professionals to succeed in their careers.

See publication

Tags: Cybersecurity

1 Influencer Award
CSO30 ASEAN Top30 Cybersecurity
CSOonline
December 08, 2022
Honestly appreciated getting this award winner of CSO30 ASEAN which recognizes the Top 30 Senior Cybersecurity Executives. That's my great honour to be recognized as one among cybersecurity leaders across the industry in Southeast Asia and Hong Kong. It is a great transition to be privileged toward.

See publication

Tags: Cybersecurity

1 Panel
Cybercrime
LinkedIn
January 21, 2020
Was a great experience to be a panelist among experts from the US Department of Justice, Facebook, and Deloitte discussed "Cybercrime 2020: Threats, Risks, and Protecting Your Business".

See publication

Tags: Cybersecurity, Privacy

1 Profile
Who should the CISO report to?
LinkedIn
February 05, 2023
CIO: Because CIOs and CISOs often have competing goals, prioritizes expedient IT service delivery over cybersecurity.

CFO: Incorrectly positions cybersecurity as a cost center with little strategic value.

CRO: Accurately frames cyber-risk as a subset of enterprise risk that has companywide implications.

COO: Correctly treats security as a baseline operational requirement that affects the entire enterprise.

CEO & BoD: Demonstrates a commitment to cybersecurity as tactically, operationally and strategically critical.


The report line management may apply at the appropriate level of corporate governance and especially the culture and context of the organization. It's not one size fits all, but it may fit the most.

See publication

Tags: Cybersecurity, Leadership, Security

2 Quotes
The worth of critical data
LinkedIn
February 06, 2023

See publication

Tags: Cybersecurity

Effective Leaders
LinkedIn
February 05, 2023

See publication

Tags: Cybersecurity

1 Workshop
Security Leaders Workshop
LinkedIn
January 31, 2020
The Refresher Course and 1st meeting of Vice President and Branch Managers of ACLEDA Bank Plc.
Mondulkiri, 30th-31st January 2020

See publication

Tags: Cybersecurity

Thinkers360 Credentials

9 Badges

Blog

3 Article/Blogs
Proactive vs Reactive cybersecurity strategy, which strategy is the most important? Why not both?
Thinkers360
February 21, 2023

Proactive vs Reactive cybersecurity strategy, which strategy is the most important? Why not both?


What does a Proactive approach look like?

Proactive cybersecurity activities focus on closing gaps and weaknesses in an environment before attackers exploit them.

Such as:
• Threat hunting and Threat Intelligence
• Cyber Risk Assessments
• Data Classification
• Managed Security Service Providers (MSSP)
• Penetration testing or red teaming
• Vulnerability scanning
• BCP
• Security awareness training


What does the Reactive approach look like?

Reactive cybersecurity activities focus on responding to security incidents after they happen.

Such as:
• Disaster recovery process
• Antivirus or endpoint detection and response (EDR)
• Intrusion detection systems (IDS)
• Email security gateways
• Firewalls
• Forensice and investigate process
• Incident response team


Absolutely that's not one-size-fits-all; diversified approaches of both Proactive and reactive have come into play with different meanings, purposes, and processes and are applicable based upon the business context requirements and where risk is associated and understand security controls deliver possible outcomes of the business and effectively managed and mitigated the risk.

See blog

Tags: Cybersecurity, Leadership, Risk Management

Who should the CISO report to?
Thinkers360
February 13, 2023

CIO: Because CIOs and CISOs often have competing goals, prioritizes expedient IT service delivery over cybersecurity.

CFO: Incorrectly positions cybersecurity as a cost center with little strategic value.

CRO: Accurately frames cyber-risk as a subset of enterprise risk that has companywide implications.

COO: Correctly treats security as a baseline operational requirement that affects the entire enterprise.

CEO & BoD: Demonstrates a commitment to cybersecurity as tactically, operationally and strategically critical.



See blog

Tags: Cybersecurity, Leadership, Security

As a CISO, what is the keys requirements of security strategic initiative/project originated?
Thinkers360
February 12, 2023

5 keys principal consideration for a strategic security initiative/project that security leaders or security professionals should define into security strategic planning from these requirements:

1) Business risk context and business requirements that are constantly changing to adapt and growth in the market space of competitive advantage
2) Threat landscape environment and geopolitics and international security changing associated with business context
3) Risk assessment of business process area to identify control gaps and manage and mitigate the business risk.
4) Regulatory, legal and compliance requirements to mandate the security project plan
5) Business partners, customers, and stakeholder requirement is being considered to initial the security requirement and plan.

See blog

Tags: Cybersecurity, Leadership, Security

Opportunities

Contact Yaroth Chhay

Book a Meeting

Media Kit

Share Profile

Contact Info

  Profile

Yaroth Chhay