thumbnail image

  • Home
  • About 
    • Who We Are
    • Code of Behavior
    • Excom
  • Join Us 
    • Membership
    • Membership Interest Form
    • Partnership
  • Events 
    • Events
  • Resources 
    • News
    • Cyber Threat Intelligence
    • Leadership Podcasts
    • Webinars
  • …  
    • Home
    • About 
      • Who We Are
      • Code of Behavior
      • Excom
    • Join Us 
      • Membership
      • Membership Interest Form
      • Partnership
    • Events 
      • Events
    • Resources 
      • News
      • Cyber Threat Intelligence
      • Leadership Podcasts
      • Webinars
Contact Us

  • Home
  • About 
    • Who We Are
    • Code of Behavior
    • Excom
  • Join Us 
    • Membership
    • Membership Interest Form
    • Partnership
  • Events 
    • Events
  • Resources 
    • News
    • Cyber Threat Intelligence
    • Leadership Podcasts
    • Webinars
  • …  
    • Home
    • About 
      • Who We Are
      • Code of Behavior
      • Excom
    • Join Us 
      • Membership
      • Membership Interest Form
      • Partnership
    • Events 
      • Events
    • Resources 
      • News
      • Cyber Threat Intelligence
      • Leadership Podcasts
      • Webinars
Contact Us
  • Asia-ISAC Leadership Podcast

    Real Leaders. Real Lessons. Real Resilience.

  • Ep. 7 - Bhuvnesh “BT” Tyagi,

    Head of APAC Cybersecurity Practices, Nokia

    What does it really take to defend a network against today's threat actors — and why do so many organizations remain exposed despite their best efforts?

    In this episode, BT, Head of Asia Pacific Cybersecurity Practices at Nokia, unpacks the hidden vulnerabilities that continue to catch organizations off guard, from untracked digital assets to the dangerous disconnect between those who sign off on risk and those who control the budget to address it. Drawing from direct field experience across the Asia Pacific region, BT takes us inside the 2025 SK Telecom breach — a sophisticated, multi-year attack that exploited gaps in network visibility and logging — to illustrate just how patient and methodical modern threat actors have become. He also explores how the growing adoption of AI is simultaneously expanding the attack surface and offering new tools for defense. BT closes with three actionable recommendations for business leaders, organized around people, process, and technology, including why joining a threat intelligence sharing community like Asia Isaac could be one of the most strategic moves an organization makes today.

  • Go to Episode 6
    Go to Podcast Home
Section image

Get Involved

Become a Member Become a Partner

Join our Linkedin Group

About

Who We Are

Events

Contact Us

Resources

Podcasts

News

FAQ's

Subscribe to our Newsletter

Asia Information Sharing & Analysis Center Limited

Terms & Conditions
Privacy Policy
    Home
Cookie Use
We use cookies to ensure a smooth browsing experience. By continuing we assume you accept the use of cookies.
Learn More