{"id":1816,"date":"2025-05-06T12:09:48","date_gmt":"2025-05-06T04:09:48","guid":{"rendered":"https:\/\/icats.edu.my\/FCSE\/?p=1816"},"modified":"2025-05-06T12:13:27","modified_gmt":"2025-05-06T04:13:27","slug":"the-expert-insights-cybersecurity-risk-management-from-industry-and-beyond","status":"publish","type":"post","link":"https:\/\/icats.edu.my\/FCSE\/the-expert-insights-cybersecurity-risk-management-from-industry-and-beyond\/","title":{"rendered":"The Expert Insights: Cybersecurity &#038; Risk Management From Industry and Beyond"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1816\" class=\"elementor elementor-1816\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b5e60c1 e-flex e-con-boxed e-con e-parent\" data-id=\"b5e60c1\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0efc78f elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"0efc78f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.16.0 - 09-10-2023 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">The Expert Insights: Cybersecurity &#038; Risk Management From Industry and Beyond<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eabfead e-flex e-con-boxed e-con e-parent\" data-id=\"eabfead\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6deb7fc elementor-widget elementor-widget-image\" data-id=\"6deb7fc\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.16.0 - 09-10-2023 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1448\" src=\"https:\/\/icats.edu.my\/FCSE\/wp-content\/uploads\/2025\/05\/P1-Group-Photo.jpeg\" class=\"attachment-full size-full wp-image-1818\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-23cfe17 e-flex e-con-boxed e-con e-parent\" data-id=\"23cfe17\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-96033d3 elementor-widget elementor-widget-text-editor\" data-id=\"96033d3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.16.0 - 09-10-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<table><tbody><tr><td><p>[Kuching, 30<sup>th<\/sup> April 2025] \u2013 The Faculty of Computing and Software Engineering invited experts to share their insights to staff and students on the topics of cybersecurity and risk management featuring Mr. Hairishahril Bin Harudin (Microsoft Certified Technology Specialist &amp; PSMB Accredited Trainer) and Mdm. Dayang Zuliana Bt Abang Abdul Rahman (Risk Management Certified &amp; Professional Certified in Quality Assurance).\u00a0 Mr Hairishahril , who presented via Zoom, began by highlighting security incidents in Malaysia.\u00a0 Apparently, fraud topped the list.\u00a0 He went into some length on password authentication precautions. The climax of his sharing was when he demonstrated how he created a phishing website for one of i-CATS UC websites on the spot. \u00a0In this way, the cybersecurity expert underscored the gravity of cybersecurity related risk.\u00a0 This transitioned well to the second sharing by \u00a0Mdm. Dayang Zuliana on risk management, which according to her now an overarching concern in the latest ISO certification. She shared her personal experiences in guiding others in her institution namely UNIMAS to adopt risk management culture.\u00a0 She explained how risk identification can be systematically tracked, monitored and controlled through the use of a system.\u00a0 She also pointed out the role of management and department level risk committee to ensure successful adoption of risk management.\u00a0 Also in attendance in this event was Professor Ts Dr. Leo Sing Lim, the Deputy Vice Chancellor (Industry &amp; Community, Engagement), who kindly graced the event with his welcoming address, alumni from SAINS (Mr. Jason Lee &amp; Mr. Max Law), alumni and industry representative from ARx Media Sdn Bhd (Andy Choo, our alumnus and Mr. Jismley, Director), representative of SDEC in the person of our intern Mr Jacky Jong, \u00a0as well as other university members and friends.\u00a0 After the official talks, all presents were treated to a feast themed <em>\u201cTerlajak Raya\u201d<\/em> in view of post faculty level celebration of the just concluded Hari Raya Aidilfitri.\u00a0 The Dean, Asst. Prof Dr Ting Kung Chuang, hoped that more such similar event would be held in future.<\/p><p dir=\"ltr\" style=\"line-height: 1.2; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Prepared by Tay Chung Ang<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.2; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Faculty of Computing and Software Engineering<\/span><\/p><\/td><\/tr><\/tbody><\/table>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>[Kuching, 30th April 2025] \u2013 The Faculty of Computing and Software Engineering invited experts to share their insights to staff and students on the topics of cybersecurity and risk management featuring Mr. Hairishahril Bin Harudin (Microsoft Certified Technology Specialist &#038; PSMB Accredited Trainer) and Mdm. Dayang Zuliana Bt Abang Abdul Rahman (Risk Management Certified &#038; Professional Certified in Quality Assurance).  Mr Hairishahril , who presented via Zoom, began by highlighting security incidents in Malaysia.  Apparently, fraud topped the list.  He went into some length on password authentication precautions. The climax of his sharing was when he demonstrated how he created a phishing website for one of i-CATS UC websites on the spot.  In this way, the cybersecurity expert underscored the gravity of cybersecurity related risk.  This transitioned well to the second sharing by  Mdm. Dayang Zuliana on risk management, which according to her now an overarching concern in the latest ISO certification. She shared her personal experiences in guiding others in her institution namely UNIMAS to adopt risk management culture.  She explained how risk identification can be systematically tracked, monitored and controlled through the use of a system.  She also pointed out the role of management and department level risk committee to ensure successful adoption of risk management.  Also in attendance in this event was Professor Ts Dr. Leo Sing Lim, the Deputy Vice Chancellor (Industry &#038; Community, Engagement), who kindly graced the event with his welcoming address, alumni from SAINS (Mr. Jason Lee &#038; Mr. Max Law), alumni and industry representative from ARx Media Sdn Bhd (Andy Choo, our alumnus and Mr. Jismley, Director), representative of SDEC in the person of our intern Mr Jacky Jong,  as well as other university members and friends.  After the official talks, all presents were treated to a feast themed \u201cTerlajak Raya\u201d in view of post faculty level celebration of the just concluded Hari Raya Aidilfitri.  The Dean, Asst. Prof Dr Ting Kung Chuang, hoped that more such similar event would be held in future.<\/p>\n","protected":false},"author":5,"featured_media":1818,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[],"class_list":["post-1816","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-spotlight"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Expert Insights: Cybersecurity &amp; Risk Management From Industry and Beyond - Faculty of Computing and Software Engineering, i-CATS UC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/icats.edu.my\/FCSE\/the-expert-insights-cybersecurity-risk-management-from-industry-and-beyond\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Expert Insights: Cybersecurity &amp; Risk Management From Industry and Beyond - Faculty of Computing and Software Engineering, i-CATS UC\" \/>\n<meta property=\"og:description\" content=\"[Kuching, 30th April 2025] \u2013 The Faculty of Computing and Software Engineering invited experts to share their insights to staff and students on the topics of cybersecurity and risk management featuring Mr. Hairishahril Bin Harudin (Microsoft Certified Technology Specialist &amp; PSMB Accredited Trainer) and Mdm. Dayang Zuliana Bt Abang Abdul Rahman (Risk Management Certified &amp; Professional Certified in Quality Assurance). Mr Hairishahril , who presented via Zoom, began by highlighting security incidents in Malaysia. Apparently, fraud topped the list. He went into some length on password authentication precautions. The climax of his sharing was when he demonstrated how he created a phishing website for one of i-CATS UC websites on the spot. In this way, the cybersecurity expert underscored the gravity of cybersecurity related risk. This transitioned well to the second sharing by Mdm. Dayang Zuliana on risk management, which according to her now an overarching concern in the latest ISO certification. She shared her personal experiences in guiding others in her institution namely UNIMAS to adopt risk management culture. She explained how risk identification can be systematically tracked, monitored and controlled through the use of a system. She also pointed out the role of management and department level risk committee to ensure successful adoption of risk management. Also in attendance in this event was Professor Ts Dr. Leo Sing Lim, the Deputy Vice Chancellor (Industry &amp; Community, Engagement), who kindly graced the event with his welcoming address, alumni from SAINS (Mr. Jason Lee &amp; Mr. Max Law), alumni and industry representative from ARx Media Sdn Bhd (Andy Choo, our alumnus and Mr. Jismley, Director), representative of SDEC in the person of our intern Mr Jacky Jong, as well as other university members and friends. After the official talks, all presents were treated to a feast themed \u201cTerlajak Raya\u201d in view of post faculty level celebration of the just concluded Hari Raya Aidilfitri. The Dean, Asst. Prof Dr Ting Kung Chuang, hoped that more such similar event would be held in future.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/icats.edu.my\/FCSE\/the-expert-insights-cybersecurity-risk-management-from-industry-and-beyond\/\" \/>\n<meta property=\"og:site_name\" content=\"Faculty of Computing and Software Engineering, i-CATS UC\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-06T04:09:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-06T04:13:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/icats.edu.my\/FCSE\/wp-content\/uploads\/2025\/05\/P1-Group-Photo.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1448\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Faculty of Computing and Software Engineering (Webmaster) i-CATS UC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Faculty of Computing and Software Engineering (Webmaster) i-CATS UC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/icats.edu.my\/FCSE\/the-expert-insights-cybersecurity-risk-management-from-industry-and-beyond\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/icats.edu.my\/FCSE\/the-expert-insights-cybersecurity-risk-management-from-industry-and-beyond\/\"},\"author\":{\"name\":\"Faculty of Computing and Software Engineering (Webmaster) i-CATS UC\",\"@id\":\"https:\/\/icats.edu.my\/FCSE\/#\/schema\/person\/c168746a85de5ceccff84cf3a5ebf9ba\"},\"headline\":\"The Expert Insights: Cybersecurity &#038; Risk Management From Industry and Beyond\",\"datePublished\":\"2025-05-06T04:09:48+00:00\",\"dateModified\":\"2025-05-06T04:13:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/icats.edu.my\/FCSE\/the-expert-insights-cybersecurity-risk-management-from-industry-and-beyond\/\"},\"wordCount\":350,\"publisher\":{\"@id\":\"https:\/\/icats.edu.my\/FCSE\/#organization\"},\"articleSection\":[\"Spotlight\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/icats.edu.my\/FCSE\/the-expert-insights-cybersecurity-risk-management-from-industry-and-beyond\/\",\"url\":\"https:\/\/icats.edu.my\/FCSE\/the-expert-insights-cybersecurity-risk-management-from-industry-and-beyond\/\",\"name\":\"The Expert Insights: Cybersecurity & Risk Management From Industry and Beyond - Faculty of Computing and Software Engineering, i-CATS UC\",\"isPartOf\":{\"@id\":\"https:\/\/icats.edu.my\/FCSE\/#website\"},\"datePublished\":\"2025-05-06T04:09:48+00:00\",\"dateModified\":\"2025-05-06T04:13:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/icats.edu.my\/FCSE\/the-expert-insights-cybersecurity-risk-management-from-industry-and-beyond\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/icats.edu.my\/FCSE\/the-expert-insights-cybersecurity-risk-management-from-industry-and-beyond\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/icats.edu.my\/FCSE\/the-expert-insights-cybersecurity-risk-management-from-industry-and-beyond\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/icats.edu.my\/FCSE\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Expert Insights: Cybersecurity &#038; Risk Management From Industry and Beyond\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/icats.edu.my\/FCSE\/#website\",\"url\":\"https:\/\/icats.edu.my\/FCSE\/\",\"name\":\"Faculty of Computing and Software Engineering, i-CATS UC\",\"description\":\"Faculty of Testing\",\"publisher\":{\"@id\":\"https:\/\/icats.edu.my\/FCSE\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/icats.edu.my\/FCSE\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/icats.edu.my\/FCSE\/#organization\",\"name\":\"Faculty of Computing and Software Engineering, i-CATS UC\",\"url\":\"https:\/\/icats.edu.my\/FCSE\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/icats.edu.my\/FCSE\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/icats.edu.my\/FCSE\/wp-content\/uploads\/2023\/10\/ICATS-LOGO-VERSION-1.1-1.png\",\"contentUrl\":\"https:\/\/icats.edu.my\/FCSE\/wp-content\/uploads\/2023\/10\/ICATS-LOGO-VERSION-1.1-1.png\",\"width\":3822,\"height\":2278,\"caption\":\"Faculty of Computing and Software Engineering, i-CATS UC\"},\"image\":{\"@id\":\"https:\/\/icats.edu.my\/FCSE\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/icats.edu.my\/FCSE\/#\/schema\/person\/c168746a85de5ceccff84cf3a5ebf9ba\",\"name\":\"Faculty of Computing and Software Engineering (Webmaster) i-CATS UC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/icats.edu.my\/FCSE\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a7ed61e19c2ab29ea2739dc4d73b9cde?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a7ed61e19c2ab29ea2739dc4d73b9cde?s=96&d=mm&r=g\",\"caption\":\"Faculty of Computing and Software Engineering (Webmaster) i-CATS UC\"},\"url\":\"https:\/\/icats.edu.my\/FCSE\/author\/fcse_webmaster\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Expert Insights: Cybersecurity & Risk Management From Industry and Beyond - Faculty of Computing and Software Engineering, i-CATS UC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/icats.edu.my\/FCSE\/the-expert-insights-cybersecurity-risk-management-from-industry-and-beyond\/","og_locale":"en_US","og_type":"article","og_title":"The Expert Insights: Cybersecurity & Risk Management From Industry and Beyond - Faculty of Computing and Software Engineering, i-CATS UC","og_description":"[Kuching, 30th April 2025] \u2013 The Faculty of Computing and Software Engineering invited experts to share their insights to staff and students on the topics of cybersecurity and risk management featuring Mr. Hairishahril Bin Harudin (Microsoft Certified Technology Specialist & PSMB Accredited Trainer) and Mdm. Dayang Zuliana Bt Abang Abdul Rahman (Risk Management Certified & Professional Certified in Quality Assurance). Mr Hairishahril , who presented via Zoom, began by highlighting security incidents in Malaysia. Apparently, fraud topped the list. He went into some length on password authentication precautions. The climax of his sharing was when he demonstrated how he created a phishing website for one of i-CATS UC websites on the spot. In this way, the cybersecurity expert underscored the gravity of cybersecurity related risk. This transitioned well to the second sharing by Mdm. Dayang Zuliana on risk management, which according to her now an overarching concern in the latest ISO certification. She shared her personal experiences in guiding others in her institution namely UNIMAS to adopt risk management culture. She explained how risk identification can be systematically tracked, monitored and controlled through the use of a system. She also pointed out the role of management and department level risk committee to ensure successful adoption of risk management. Also in attendance in this event was Professor Ts Dr. Leo Sing Lim, the Deputy Vice Chancellor (Industry & Community, Engagement), who kindly graced the event with his welcoming address, alumni from SAINS (Mr. Jason Lee & Mr. Max Law), alumni and industry representative from ARx Media Sdn Bhd (Andy Choo, our alumnus and Mr. Jismley, Director), representative of SDEC in the person of our intern Mr Jacky Jong, as well as other university members and friends. After the official talks, all presents were treated to a feast themed \u201cTerlajak Raya\u201d in view of post faculty level celebration of the just concluded Hari Raya Aidilfitri. The Dean, Asst. Prof Dr Ting Kung Chuang, hoped that more such similar event would be held in future.","og_url":"https:\/\/icats.edu.my\/FCSE\/the-expert-insights-cybersecurity-risk-management-from-industry-and-beyond\/","og_site_name":"Faculty of Computing and Software Engineering, i-CATS UC","article_published_time":"2025-05-06T04:09:48+00:00","article_modified_time":"2025-05-06T04:13:27+00:00","og_image":[{"width":2560,"height":1448,"url":"https:\/\/icats.edu.my\/FCSE\/wp-content\/uploads\/2025\/05\/P1-Group-Photo.jpeg","type":"image\/jpeg"}],"author":"Faculty of Computing and Software Engineering (Webmaster) i-CATS UC","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Faculty of Computing and Software Engineering (Webmaster) i-CATS UC","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/icats.edu.my\/FCSE\/the-expert-insights-cybersecurity-risk-management-from-industry-and-beyond\/#article","isPartOf":{"@id":"https:\/\/icats.edu.my\/FCSE\/the-expert-insights-cybersecurity-risk-management-from-industry-and-beyond\/"},"author":{"name":"Faculty of Computing and Software Engineering (Webmaster) i-CATS UC","@id":"https:\/\/icats.edu.my\/FCSE\/#\/schema\/person\/c168746a85de5ceccff84cf3a5ebf9ba"},"headline":"The Expert Insights: Cybersecurity &#038; Risk Management From Industry and Beyond","datePublished":"2025-05-06T04:09:48+00:00","dateModified":"2025-05-06T04:13:27+00:00","mainEntityOfPage":{"@id":"https:\/\/icats.edu.my\/FCSE\/the-expert-insights-cybersecurity-risk-management-from-industry-and-beyond\/"},"wordCount":350,"publisher":{"@id":"https:\/\/icats.edu.my\/FCSE\/#organization"},"articleSection":["Spotlight"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/icats.edu.my\/FCSE\/the-expert-insights-cybersecurity-risk-management-from-industry-and-beyond\/","url":"https:\/\/icats.edu.my\/FCSE\/the-expert-insights-cybersecurity-risk-management-from-industry-and-beyond\/","name":"The Expert Insights: Cybersecurity & Risk Management From Industry and Beyond - Faculty of Computing and Software Engineering, i-CATS UC","isPartOf":{"@id":"https:\/\/icats.edu.my\/FCSE\/#website"},"datePublished":"2025-05-06T04:09:48+00:00","dateModified":"2025-05-06T04:13:27+00:00","breadcrumb":{"@id":"https:\/\/icats.edu.my\/FCSE\/the-expert-insights-cybersecurity-risk-management-from-industry-and-beyond\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/icats.edu.my\/FCSE\/the-expert-insights-cybersecurity-risk-management-from-industry-and-beyond\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/icats.edu.my\/FCSE\/the-expert-insights-cybersecurity-risk-management-from-industry-and-beyond\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/icats.edu.my\/FCSE\/"},{"@type":"ListItem","position":2,"name":"The Expert Insights: Cybersecurity &#038; Risk Management From Industry and Beyond"}]},{"@type":"WebSite","@id":"https:\/\/icats.edu.my\/FCSE\/#website","url":"https:\/\/icats.edu.my\/FCSE\/","name":"Faculty of Computing and Software Engineering, i-CATS UC","description":"Faculty of Testing","publisher":{"@id":"https:\/\/icats.edu.my\/FCSE\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/icats.edu.my\/FCSE\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/icats.edu.my\/FCSE\/#organization","name":"Faculty of Computing and Software Engineering, i-CATS UC","url":"https:\/\/icats.edu.my\/FCSE\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/icats.edu.my\/FCSE\/#\/schema\/logo\/image\/","url":"https:\/\/icats.edu.my\/FCSE\/wp-content\/uploads\/2023\/10\/ICATS-LOGO-VERSION-1.1-1.png","contentUrl":"https:\/\/icats.edu.my\/FCSE\/wp-content\/uploads\/2023\/10\/ICATS-LOGO-VERSION-1.1-1.png","width":3822,"height":2278,"caption":"Faculty of Computing and Software Engineering, i-CATS UC"},"image":{"@id":"https:\/\/icats.edu.my\/FCSE\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/icats.edu.my\/FCSE\/#\/schema\/person\/c168746a85de5ceccff84cf3a5ebf9ba","name":"Faculty of Computing and Software Engineering (Webmaster) i-CATS UC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/icats.edu.my\/FCSE\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a7ed61e19c2ab29ea2739dc4d73b9cde?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a7ed61e19c2ab29ea2739dc4d73b9cde?s=96&d=mm&r=g","caption":"Faculty of Computing and Software Engineering (Webmaster) i-CATS UC"},"url":"https:\/\/icats.edu.my\/FCSE\/author\/fcse_webmaster\/"}]}},"_links":{"self":[{"href":"https:\/\/icats.edu.my\/FCSE\/wp-json\/wp\/v2\/posts\/1816"}],"collection":[{"href":"https:\/\/icats.edu.my\/FCSE\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icats.edu.my\/FCSE\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icats.edu.my\/FCSE\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/icats.edu.my\/FCSE\/wp-json\/wp\/v2\/comments?post=1816"}],"version-history":[{"count":8,"href":"https:\/\/icats.edu.my\/FCSE\/wp-json\/wp\/v2\/posts\/1816\/revisions"}],"predecessor-version":[{"id":1825,"href":"https:\/\/icats.edu.my\/FCSE\/wp-json\/wp\/v2\/posts\/1816\/revisions\/1825"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/icats.edu.my\/FCSE\/wp-json\/wp\/v2\/media\/1818"}],"wp:attachment":[{"href":"https:\/\/icats.edu.my\/FCSE\/wp-json\/wp\/v2\/media?parent=1816"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icats.edu.my\/FCSE\/wp-json\/wp\/v2\/categories?post=1816"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icats.edu.my\/FCSE\/wp-json\/wp\/v2\/tags?post=1816"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}