
Sign up to save your podcasts
Or
In 2025, AI and quantum computing are transforming Asia's cybersecurity landscape, reshaping threats and roles. AI enhances defence capabilities but also fuels sophisticated attacks. Quantum computing threatens current encryption methods, necessitating a shift to quantum-safe algorithms.
CISOs will do well to prioritize AI and quantum literacy to navigate these challenges. They must invest in post-quantum cryptography to safeguard against "harvest now, decrypt later" attacks and ensure AI defences are robust against adversarial attacks. Managing expectations while ensuring compliance is crucial as CEOs increasingly rely on these technologies for innovation and efficiency. Proactive strategies are essential for maintaining security and trust.
In this PodChats for FutureCISO, Paul Tan, head of systems integration at Ensign InfoSecurity, talks about the evolving nature of cybersecurity strategies as technologies like AI and quantum computing accelerate their influence in cybersecurity defence and offense, and redefining the cybersecurity profession.
In 2025, AI and quantum computing are transforming Asia's cybersecurity landscape, reshaping threats and roles. AI enhances defence capabilities but also fuels sophisticated attacks. Quantum computing threatens current encryption methods, necessitating a shift to quantum-safe algorithms.
CISOs will do well to prioritize AI and quantum literacy to navigate these challenges. They must invest in post-quantum cryptography to safeguard against "harvest now, decrypt later" attacks and ensure AI defences are robust against adversarial attacks. Managing expectations while ensuring compliance is crucial as CEOs increasingly rely on these technologies for innovation and efficiency. Proactive strategies are essential for maintaining security and trust.
In this PodChats for FutureCISO, Paul Tan, head of systems integration at Ensign InfoSecurity, talks about the evolving nature of cybersecurity strategies as technologies like AI and quantum computing accelerate their influence in cybersecurity defence and offense, and redefining the cybersecurity profession.