Book Review — ‘Cyber Risk Leaders: Global C-Suite Insights’

One thing that I really like about LinkedIn is the opportunity it provides to meet people from all over the world who are experts at what they do. I have been blessed with the chance to interact with outstanding cybersecurity leaders from Europe, Asia, South America, Africa and all over the USA in surprising ways that I never thought possible a decade ago.  

One great example of this has been my interactions with Shamane Tan from Australia. Tan is an inspiring, passionate leader who offers global insights and perspectives that are very helpful and different than many others. She goes out of her way to interact with diverse groups from around the globe on a wide range of topics that impact the worldwide cybersecurity industry and technology leaders from varied backgrounds, experiences and cultures.   

Shamane Tan’s LinkedIn profile describes her as an “Executive Advisor, APAC | Author, International Industry Speaker, Panel Moderator and Influencer.” After completing her education in Singapore, Tan worked for Eames Consulting Group as a senior infrastructure consultant. She moved to become a principal consultant and cybersecurity specialist for Naviro in Sydney, Australia, from 2015 to 2018.

Tan is best known for becoming the founder of “Cyber Risk Meetup” in 2017. Cyber Risk Meetup is now in Sydney, Melbourne, Brisbane, Perth and Singapore. 

Tan is now an executive advisor for Privasec. She works with the C-Suite and other executives to examine various approaches in uplifting the corporate and individuals’ security posture in this cyber age. While managing APAC relations, she has successfully enabled businesses in Australia and Singapore, as well as enterprises and agencies to be well-equipped in key cyber-risk aspects.

She is quoted in media around the world, and is especially well-known in Asia. For example, this recent article from the (Read more...)

*** This is a Security Bloggers Network syndicated blog from Lohrmann on Cybersecurity authored by Lohrmann on Cybersecurity. Read the original post at: