{"id":331,"date":"2018-12-12T06:56:27","date_gmt":"2018-12-11T23:56:27","guid":{"rendered":"http:\/\/www.seven-stones.biz\/blog\/?p=331"},"modified":"2018-12-12T07:19:10","modified_gmt":"2018-12-12T00:19:10","slug":"infosec-in-apac-a-first-hand-summary","status":"publish","type":"post","link":"https:\/\/www.seven-stones.biz\/blog\/infosec-in-apac-a-first-hand-summary\/","title":{"rendered":"Infosec in APAC &#8211; A Very Summarised View"},"content":{"rendered":"\n<p>I spent a total of 16 years working in infosec in APAC &#8211; across the region as a whole except for India and mainland China. I was based initially in a pen test\/research lab in Thailand with regional customers, and then later spent some time with big-4 in Thailand, before moving base to Jakarta for what will probably be my final stint in the region. As well as the aforementioned places i spent lots of time in Singapore, Taiwan, and HK. Less so in Malaysia, and i never worked in either of Vietnam, Cambodia, Laos, Myanmar, or the Philippines.<\/p>\n\n\n\n<p>I was in APAC for most of the period between 1999 and 2013. My time with the consultancy which was based in Bangkok (although there was only one client account in Thailand) made up the formative, simulated-attack experience of my career &#8211; not a bad place to start. There were some brief spells away in the UK and Czech Republic (the best blue team experience one can hope to find). Overall i was lucky with the places I worked in, and especially the people I worked with &#8211; some of whom quit infosec not long after the Great Early Noughties Infosec Brain Drain.&nbsp;<\/p>\n\n\n\n<p>Appetite for risk is high in APAC &#8211; just look at the stats for insurance sales in the region. What results in infosec, even in banking and finance though, is exactly the same as the west &#8211; base compliance only. The difference is something like this: western CEOs showed interest and worried about cyber at some point in time, but when they went looking for answers they didn&#8217;t find any, other than buzzwords from CISSPs &#8211; result: base compliance &#8211; aka lets just get thru the audit. In Asia the CEOs didn&#8217;t go looking for answers &#8211; its just base compliance, do not pass go. But before you pass judgment on this statement &#8211; read on.<\/p>\n\n\n\n<p>Where APAC countries were better was the lack of any pretence around GRC. You will never hear anything along the lines &#8220;security is not about IT&#8221; &#8211; i.e. there is no community of self-serving non-technical GRC folk spouting acronyms. Western countries blow billions down the dunny on this nonsense.<\/p>\n\n\n\n<p>So both regions have poor security. Both face a significant threat. But if you measure security performance in terms of how much is spent, versus the results &#8211; there&#8217;s a clear winner, and that is APAC. Both have poor security, but one spends more for poor security than the other.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I spent a total of 16 years working in infosec in APAC &#8211; across the region as a whole except for India and mainland China. I was based initially in a pen test\/research lab in Thailand with regional customers, and &hellip; <a href=\"https:\/\/www.seven-stones.biz\/blog\/infosec-in-apac-a-first-hand-summary\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":272,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[145,146,113,42,147],"class_list":["post-331","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-asia","tag-asia-pacific","tag-information-security","tag-information-security-management","tag-south-east-asia"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Infosec in APAC - A Very Summarised View - Security Macromorphosis<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.seven-stones.biz\/blog\/infosec-in-apac-a-first-hand-summary\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infosec in APAC - A Very Summarised View - Security Macromorphosis\" \/>\n<meta property=\"og:description\" content=\"I spent a total of 16 years working in infosec in APAC &#8211; across the region as a whole except for India and mainland China. I was based initially in a pen test\/research lab in Thailand with regional customers, and &hellip; Continue reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.seven-stones.biz\/blog\/infosec-in-apac-a-first-hand-summary\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Macromorphosis\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-11T23:56:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-12-12T00:19:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/blog-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"454\" \/>\n\t<meta property=\"og:image:height\" content=\"340\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"itibble@gmail.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@seven_stones\" \/>\n<meta name=\"twitter:site\" content=\"@seven_stones\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"itibble@gmail.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/infosec-in-apac-a-first-hand-summary\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/infosec-in-apac-a-first-hand-summary\\\/\"},\"author\":{\"name\":\"itibble@gmail.com\",\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/#\\\/schema\\\/person\\\/dd7adbe0152f2279b133661b823e0c28\"},\"headline\":\"Infosec in APAC &#8211; A Very Summarised View\",\"datePublished\":\"2018-12-11T23:56:27+00:00\",\"dateModified\":\"2018-12-12T00:19:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/infosec-in-apac-a-first-hand-summary\\\/\"},\"wordCount\":428,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/infosec-in-apac-a-first-hand-summary\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/wp-content\\\/uploads\\\/blog-image.jpg\",\"keywords\":[\"Asia\",\"Asia Pacific\",\"information security\",\"Information Security Management\",\"South East Asia\"],\"articleSection\":[\"General\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/infosec-in-apac-a-first-hand-summary\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/infosec-in-apac-a-first-hand-summary\\\/\",\"url\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/infosec-in-apac-a-first-hand-summary\\\/\",\"name\":\"Infosec in APAC - A Very Summarised View - Security Macromorphosis\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/infosec-in-apac-a-first-hand-summary\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/infosec-in-apac-a-first-hand-summary\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/wp-content\\\/uploads\\\/blog-image.jpg\",\"datePublished\":\"2018-12-11T23:56:27+00:00\",\"dateModified\":\"2018-12-12T00:19:10+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/#\\\/schema\\\/person\\\/dd7adbe0152f2279b133661b823e0c28\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/infosec-in-apac-a-first-hand-summary\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/infosec-in-apac-a-first-hand-summary\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/infosec-in-apac-a-first-hand-summary\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/wp-content\\\/uploads\\\/blog-image.jpg\",\"contentUrl\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/wp-content\\\/uploads\\\/blog-image.jpg\",\"width\":454,\"height\":340},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/infosec-in-apac-a-first-hand-summary\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infosec in APAC &#8211; A Very Summarised View\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/\",\"name\":\"Security Macromorphosis\",\"description\":\"Ian Tibble&#039;s Security Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/#\\\/schema\\\/person\\\/dd7adbe0152f2279b133661b823e0c28\",\"name\":\"itibble@gmail.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4efc9caa4c914912bcf9dd199b33f34a0d42e56752f4f713cd8d0c5416733603?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4efc9caa4c914912bcf9dd199b33f34a0d42e56752f4f713cd8d0c5416733603?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4efc9caa4c914912bcf9dd199b33f34a0d42e56752f4f713cd8d0c5416733603?s=96&d=mm&r=g\",\"caption\":\"itibble@gmail.com\"},\"description\":\"Author of Security De-engineering, CTO at Seven Stones (Indonesia)\",\"sameAs\":[\"http:\\\/\\\/www.seven-stones.biz\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Infosec in APAC - A Very Summarised View - Security Macromorphosis","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.seven-stones.biz\/blog\/infosec-in-apac-a-first-hand-summary\/","og_locale":"en_US","og_type":"article","og_title":"Infosec in APAC - A Very Summarised View - Security Macromorphosis","og_description":"I spent a total of 16 years working in infosec in APAC &#8211; across the region as a whole except for India and mainland China. I was based initially in a pen test\/research lab in Thailand with regional customers, and &hellip; Continue reading &rarr;","og_url":"https:\/\/www.seven-stones.biz\/blog\/infosec-in-apac-a-first-hand-summary\/","og_site_name":"Security Macromorphosis","article_published_time":"2018-12-11T23:56:27+00:00","article_modified_time":"2018-12-12T00:19:10+00:00","og_image":[{"width":454,"height":340,"url":"https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/blog-image.jpg","type":"image\/jpeg"}],"author":"itibble@gmail.com","twitter_card":"summary_large_image","twitter_creator":"@seven_stones","twitter_site":"@seven_stones","twitter_misc":{"Written by":"itibble@gmail.com","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.seven-stones.biz\/blog\/infosec-in-apac-a-first-hand-summary\/#article","isPartOf":{"@id":"https:\/\/www.seven-stones.biz\/blog\/infosec-in-apac-a-first-hand-summary\/"},"author":{"name":"itibble@gmail.com","@id":"https:\/\/www.seven-stones.biz\/blog\/#\/schema\/person\/dd7adbe0152f2279b133661b823e0c28"},"headline":"Infosec in APAC &#8211; A Very Summarised View","datePublished":"2018-12-11T23:56:27+00:00","dateModified":"2018-12-12T00:19:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.seven-stones.biz\/blog\/infosec-in-apac-a-first-hand-summary\/"},"wordCount":428,"commentCount":0,"image":{"@id":"https:\/\/www.seven-stones.biz\/blog\/infosec-in-apac-a-first-hand-summary\/#primaryimage"},"thumbnailUrl":"https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/blog-image.jpg","keywords":["Asia","Asia Pacific","information security","Information Security Management","South East Asia"],"articleSection":["General"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.seven-stones.biz\/blog\/infosec-in-apac-a-first-hand-summary\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.seven-stones.biz\/blog\/infosec-in-apac-a-first-hand-summary\/","url":"https:\/\/www.seven-stones.biz\/blog\/infosec-in-apac-a-first-hand-summary\/","name":"Infosec in APAC - A Very Summarised View - Security Macromorphosis","isPartOf":{"@id":"https:\/\/www.seven-stones.biz\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.seven-stones.biz\/blog\/infosec-in-apac-a-first-hand-summary\/#primaryimage"},"image":{"@id":"https:\/\/www.seven-stones.biz\/blog\/infosec-in-apac-a-first-hand-summary\/#primaryimage"},"thumbnailUrl":"https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/blog-image.jpg","datePublished":"2018-12-11T23:56:27+00:00","dateModified":"2018-12-12T00:19:10+00:00","author":{"@id":"https:\/\/www.seven-stones.biz\/blog\/#\/schema\/person\/dd7adbe0152f2279b133661b823e0c28"},"breadcrumb":{"@id":"https:\/\/www.seven-stones.biz\/blog\/infosec-in-apac-a-first-hand-summary\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.seven-stones.biz\/blog\/infosec-in-apac-a-first-hand-summary\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.seven-stones.biz\/blog\/infosec-in-apac-a-first-hand-summary\/#primaryimage","url":"https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/blog-image.jpg","contentUrl":"https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/blog-image.jpg","width":454,"height":340},{"@type":"BreadcrumbList","@id":"https:\/\/www.seven-stones.biz\/blog\/infosec-in-apac-a-first-hand-summary\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.seven-stones.biz\/blog\/"},{"@type":"ListItem","position":2,"name":"Infosec in APAC &#8211; A Very Summarised View"}]},{"@type":"WebSite","@id":"https:\/\/www.seven-stones.biz\/blog\/#website","url":"https:\/\/www.seven-stones.biz\/blog\/","name":"Security Macromorphosis","description":"Ian Tibble&#039;s Security Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.seven-stones.biz\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.seven-stones.biz\/blog\/#\/schema\/person\/dd7adbe0152f2279b133661b823e0c28","name":"itibble@gmail.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4efc9caa4c914912bcf9dd199b33f34a0d42e56752f4f713cd8d0c5416733603?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4efc9caa4c914912bcf9dd199b33f34a0d42e56752f4f713cd8d0c5416733603?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4efc9caa4c914912bcf9dd199b33f34a0d42e56752f4f713cd8d0c5416733603?s=96&d=mm&r=g","caption":"itibble@gmail.com"},"description":"Author of Security De-engineering, CTO at Seven Stones (Indonesia)","sameAs":["http:\/\/www.seven-stones.biz"]}]}},"_links":{"self":[{"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/posts\/331","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/comments?post=331"}],"version-history":[{"count":2,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/posts\/331\/revisions"}],"predecessor-version":[{"id":335,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/posts\/331\/revisions\/335"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/media\/272"}],"wp:attachment":[{"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/media?parent=331"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/categories?post=331"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/tags?post=331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}