Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Julien Legrand

Security Governance Lead at Neat

Hong Kong, Hong Kong

Julien is an passionated and experienced technology and cyber security specialist with a particular focus on data protection, risk management, identity and access management, penetration testing and cryptography.

He is a regular speaker at external conferences and a writer for international newspapers on a variety of technology and cybersecurity topics.

Julien is also a Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Security Auditor (CISA), Certified in Risk and Information Systems Control (CRISC) and Certified Ethical Hacker (CEH).

He holds a master's degree in computer science, cryptography and network security.

Julien LegrandPoints
Academic0
Author19
Influencer4
Speaker7
Entrepreneur20
Total50

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Company
Business Unit: Cybersecurity

Areas of Expertise

AI 30.22
Big Data 30.14
Cybersecurity 34.60
Entrepreneurship
Fintech 30.42
IoT
Leadership
Risk Management
Privacy 30.62

Industry Experience

High Tech & Electronics
Insurance
Professional Services
Telecommunications

Please signin or signup to view publication section.

Publications

3 Article/Blogs
Artificial Intelligence as Security Solution and Weaponization by Hackers
CISO MAG
December 09, 2019
Artificial intelligence is a double-edged sword that can be used as a security solution or as a weapon by hackers. AI entails developing programs and systems capable of exhibiting traits associated with human behaviors. The characteristics include the ability to adapt to a particular environment or to intelligently respond to a situation. AI technologies have extensively been applied in cybersecurity solutions, but hackers are also leveraging them to develop intelligent malware programs and execute stealth attacks.

See publication

Tags: Cybersecurity

Cybersecurity Awareness And Skilling In The Organization
CISO MAG
October 08, 2019
Under the spotlight - 5 questions and answers related to cybersecurity awareness and education

See publication

Tags: Cybersecurity

Current Application Security Threats
CISO MAG
August 06, 2019
Application usage continues to rise as technologies take a central place in daily processes. In 2018, more than 105 billion applications were downloaded. The figure will increase since the number of downloaded applications is expected to rise by 25% between 2018 and 2022. Such amounts are a testimony to the massive reliance on apps to run essential tasks every day. As such, understanding the current application security threats and available countermeasures provides users and developers with the much-needed app safety knowledge.

See publication

Tags: Cybersecurity

1 Book Chapter
Artificial Intelligence as Security Solution and Weaponization by Hackers
PISA
September 19, 2019
Artificial intelligence is a double-edged sword that can be used as a security solution or as a weapon by hackers. AI entails developing programs and systems capable of exhibiting traits associated with human behaviors. The characteristics include the ability to adapt to a particular environment or to intelligently respond to a situation. AI technologies have extensively been applied in cybersecurity solutions, but hackers are also leveraging them to develop intelligent malware programs and execute stealth attacks.

See publication

Tags: Cybersecurity

1 Founder
Mycybersecurity.tips
CISO MAG
August 07, 2019
mysecurity.tips aims is to strengthen cybersecurity and fight against cybercrime, and utilize expertise and knowledge to help to build a better security world.

/ Training
/ Awareness
/ Conference session

See publication

Tags: Cybersecurity

2 Influencer Awards
Top 50 Global Thought Leaders and Influencers on Privacy, May 2020
Thinkers360
May 01, 2020

See publication

Tags: Cybersecurity, Fintech, Privacy

Most Favourited Speaker By Attendees
Cloud & Cyber Security Expo
May 14, 2019

See publication

Tags: AI, Cybersecurity, Privacy

1 Panel
Organisation-wide Data Hack: A Perspective at How Artificial Intelligence Could Be Essential to the Cyber Security Field
Cloud & Cyber Security Expo
October 09, 2019
An intentional attack was made on a large enterprise with more than 2,000 employees, which resulted in a large scale data breach during the attack. The attack which was purposefully carried out by an organised group of hackers who were still able to successfully hack into the system despite the controls in place. We invite four companies to share how artificial intelligence can play a vital role in cyber security and how it could have helped minimise the recovery time after the attack occured.

See publication

Tags: AI, Big Data, Cybersecurity

1 Podcast
How To Improve Security & Efficiency for Your File Transfers
Infosecurity Magazine
October 17, 2019
How is your organization moving sensitive files? Human error, file transfer inefficiency, and subpar encryption processes are among the common challenges that IT security professionals face when sharing files both inside and outside the organization.

In this webinar, a first specifically for the APAC time zone, we will look at how your business can avoid the common file transfer pitfalls, how MFT is implemented, and what configurations and management are needed, and what the outsourced options look like.

See publication

Tags: Cybersecurity

2 Speaking Engagements
Performing penetration testing is still relevant to protect application security in 2019?
Cloud & Cyber Security Expo
May 22, 2019
Penetration testing aim to prevent and protect information technology systems and applications from attack, enabling fast and effective response if vulnerabilities have found and correct in time, but is it still sufficient.

See publication

Tags: Cybersecurity

Building Cyber Resilience to Protect Your Business
Cloud & Cyber Security Expo
May 22, 2019
Data breaches are increasing both in terms of size and frequency and companies need to rethink their risk strategies.. During this session, it will present the cyber security threat landscape in 2019, illustrate the good way to build a cyber resilience to protect your business and, explain how to be compliant with international regulatory requirements.

See publication

Tags: Cybersecurity

1 Whitepaper
Informatique quantique : pourquoi la cybersécurité doit s’y préparer dès aujourd’hui
TechTarget
August 05, 2020
L’ordinateur quantique ne sera pas une réalité avant dix ans, minimum. Il n’empêche. Ses énormes promesses – et les risques qui vont avec – s’imposent déjà aux experts en sécurité. Ils doivent envisager cette technologie de manière proactive dès maintenant ; sous peine d’être dépassés demain.

See publication

Tags: AI, Cybersecurity, Privacy

Blog

Opportunities

Contact Julien Legrand

Media Kit

Share Profile

Contact Info

  Profile

Julien Legrand