Jean-Baptiste Bres

Chief Information Security Officer

Looking for new CISO @ HSBC

We are on a look out for a great new ๐Ÿ” CISO in HSBC Australia. Lead a fantastical team and join a great organisation!
Plus you get to fix all the crazy ideas I had over the last 3 years! ๐Ÿ˜ No chance to get bored ๐Ÿ˜„
Apply now and feel free to reach out if you have questions.

๐Ÿ” Security Operations

Article


Get Certified in Cybersecurity - Part 6 of 6
๐Ÿ” Security Operations
Learn key elements of data security, including data handling, classification, logging, encryption, system hardening, configuration management, security policies, and social engineering defence through security awareness training.

Read Moreโ€ฆ

๐Ÿ” Network Security

Article

Get Certified in Cybersecurity - Part 5 of 6
๐Ÿ” Network Security
Delves into common threats and best practices for securing computer networks. It explores the array of network threats, from malware and ransomware to insider threats, and understand how network professionals mitigate these risks.

Read Moreโ€ฆ

๐Ÿ” Network Concepts

Article

Get Certified in Cybersecurity - Part 4 of 6
๐Ÿ” Network Concepts
Discover the intricate world of computer networks. This article covers topics such as network types, essential devices, IP addresses, DHCP, network ports, and key network terms. It also explores the OSI and TCP/IP models, showcasing their role in network communication. Furthermore, the article touches upon cloud computing, highlighting different service and deployment models.

Read Moreโ€ฆ

๐Ÿ” Access Management

Article

Get Certified in Cybersecurity - Part 3 of 6
๐Ÿ” Access Control
Delves into the importance of access control, covering concepts encompassing defence in depth, least privilege, segregation of duty, two-person integrity, passwords, multi-factor authentication, privileged access management, account provisioning, log management, physical access control, biometric access control, and logical access control.

Read Moreโ€ฆ

๐Ÿ” Incident Response, Business Continuity and Disaster Recovery

Article

Get Certified in Cybersecurity - Part 2 of 6
๐Ÿ” Incident Response, Business Continuity and Disaster Recovery
Explore the crucial aspects of cybersecurity incident response, business continuity, and disaster recover. We will talk about the importance of incident response plans, business impact analysis, recovery strategies, and crisis management in ensuring the resilience and continuity of organisations in the face of cyber threats and disruptive events.

Read Moreโ€ฆ

๐Ÿ” Key Security Principles

Article


Get Certified in Cybersecurity - Part 1 of 6
๐Ÿ” Key Security Principles
Discover the essentials of safeguarding sensitive data and protecting against cyber threats. From the CIA Triad to Risk Management and Privacy, this article breaks down key principles in an accessible way.

Read Moreโ€ฆ

๐Ÿ’ก Certified in CyberSecurity - Your Journey to Certification

Article

๐Ÿš€ Unlock your path to a career in cybersecurity with the ISC2 Certified in Cybersecurity (CC)!
As part of Cyber Awareness Month 2023, I'll be sharing a series of articles throughout October covering the all the knowledge needed to prepare for the ISC2 Certified in Cybersecurity (CC).
Ideal for IT professionals, career changers, executives, and recent grads, this entry-level certification offers free exam and online training for a limited time, making it more accessible than ever.
Find out more about the ISC2 CC Certification. Your cybersecurity journey starts here!

Read Moreโ€ฆ

๐Ÿ’ก Ensuring CyberSecurity in Vendor Management

Article

As our interconnected world amplifies cyber risks in the supply chain, the indispensable role of vendor managers in protecting valuable assets cannot be overlooked. With their unique insights and strategic position, they are instrumental in identifying and mitigating potential vulnerabilities.

This article provides vendor managers with invaluable guidance on elevating their role in safeguarding the supply chain. From selecting secure vendors to establishing robust contractual agreements, they will find actionable steps to fortify their organisation's cybersecurity posture.

Read Moreโ€ฆ

Adapt Security Edge 2023

I had an amazing time participating in the Adapt Security Edge conference last Thursday!
It was an incredible experience to be part of the panel discussion on "Latest Strategies from the Security Front Line," and share with Peter Hind, Bianca Wirth and Francis Ofungwu on Zero Trust, AI and more.

TPA07335

NSA's Best Practices for Security your Home Network

In a very recent piece of news, it was revealed that LastPass, a wildly used password manager, fail victim to a cyber attack and got all their customer data (i.e. the users stored passwords) stolen in the form of an encrypted database. Because the database was encrypted, the hackers could not access the content, so they proceed by attacking the personal home devices of one of the only 4 employees that had access to database password, and managed to break into his network and stole that password, getting access to all customer data.
That is a very committed hacker, but sadly, that is the reality: we are now all targets at home, because it is often easier to break into someone personal device and use it as a leverage to attack their organisation they work for.

Just as timely as this news is the recent publication by the NSA of their Best Practices for Security your Home Network. These are great recommendations that we can only recommend everyone to have a look at and, when possible, implement at your home!

๐Ÿ’ก ChatGPT and the future of CyberSecurity

Article

If you have been using ChatGPT, you probably feel now that nothing will never be the same. It is the same feeling you had when you used the internet for the first time, when you touched your first iPhone. There will be a before and an after Artificial Intelligence, and the tipping point is now.

It is hard to predict what a world supported by AI will look like. Some think it will be a scary place, some see a lot of exciting opportunities. But regardless what your views are, there is no denying that the cybersecurity industry will be - and already is - particularly affected. Tools like ChatGPT are a new set of capabilities, with both new opportunities and new challenges for security professionals.

Read Moreโ€ฆ

New certification: Certified Information System Security Professional (CISSP)

I’m happy to share that I’ve obtained a new certification: Certified Information System Security Professional (CISSP) from (ISC)²!