Getting to Know: Royce Ho

I graduated from Singapore Management University with a double major in Information Systems and Information Security and Assurance.
That was when my curiosity in cybersecurity was piqued, and the knowledge that I gained throughout my academic days enabled me to start my career as a Security Analyst in a Security Operations Centre.
The Global Sales Associates Program equipped me with the knowledge of the latest trends and technologies in cybersecurity.
Check Point's recent 30th anniversary as a pure play cybersecurity vendor is a testament to the organization's dedication to pushing the boundaries of cybersecurity technologies over the years.
As an individual who is keen on keeping abreast of the latest cybersecurity trends and furthering my career in this industry, seeking opportunities within Check Point came naturally to me after the completion of the Program.
Over the years, Check Point has given me ample space and opportunities to grow from my previous role as an Associate Security Engineer to a Regional Threat Prevention Security Consultant.
The cybersecurity landscape has evolved significantly in the past 5 years, and remaining agile, adaptable and forward-looking is paramount.
Check Point has shaped and positioned me to better tackle future challenges in my professional capacity.
Meetingsand more meetings, but all with a purpose and impact.
As a Regional Threat Prevention Security Consultant, I interact with multiple stakeholders across the APAC region and support them on matters ranging from opportunities and deals, to enablement sessions.
I provide advice to teams in need to help them better address questions from clients and stakeholders with respect to my domain.
A typical day could be both exhausting, having to communicate with people across different time zones, and, fulfilling when objectives are met and deals are shaped.
It would definitely be receiving the 'Best Improved Security Engineer' award as a Global Sales Associate.
Some would say that success is less about means and more about meaning; with that in mind, I would say that my proudest work achievement is the attainment of my local and regional colleagues' trust.
The mutual feelings of trust and camaraderie has brought me great comfort during challenging periods, and also opened the doors to wider opportunities within the organization.
A myriad of opportunities are waiting for you if you are willing to take the plunge and put in the hard work.
Of course, your passion and interests are also important - these will keep you going when the going gets tough.
There are many domains within cybersecurity, so take the time to understand the various domains and find out which area your interest lies in.
There is a plethora of information on the Internet for you to learn from and build your skills from there - including Check Point's MIND training program.
To learn more about working at Check Point and join Royce in securing the world, visit our Careers page.


This Cyber News was published on blog.checkpoint.com. Publication date: Fri, 15 Dec 2023 13:58:05 +0000


Cyber News related to Getting to Know: Royce Ho

Getting to Know: Royce Ho - I graduated from Singapore Management University with a double major in Information Systems and Information Security and Assurance. That was when my curiosity in cybersecurity was piqued, and the knowledge that I gained throughout my academic days ...
1 year ago Blog.checkpoint.com
Knostic Raises $3.3M for Enterprise GenAI Access Control - PRESS RELEASE. RESTON, Va. and TEL AVIV, Israel, April 11, 2024/PRNewswire-PRWeb/ - Knostic, the world's first provider of need-to-know access controls for Generative AI, emerges today from stealth, having been named one of the top three finalists ...
8 months ago Darkreading.com
Top 10 Cybersecurity Interview Questions and Answers - Interviewing for a job in information security can be daunting. According to security experts, memorizing hundreds of terms isn't the ticket to a successful interview for a cybersecurity job. The best candidates have a sense of what they want to ...
5 months ago Techtarget.com
Windows 10 Extended Security Updates Promised for Small Businesses and Home Users - Already common for enterprises, for the first time, individuals will also get the option to pay for extended security updates for a Windows operating system that's out of support. Windows 10 will stop getting free updates, including security fixes, ...
1 year ago Techrepublic.com
Researchers Uncover Simple Technique to Extract ChatGPT Training Data - Can getting ChatGPT to repeat the same word over and over again cause it to regurgitate large amounts of its training data, including personally identifiable information and other data scraped from the Web? The answer is an emphatic yes, according to ...
1 year ago Darkreading.com
Meta's child safety challenges: A deep dive - Meta's top brands, including Facebook and Instagram, have lately been under fire for being unable to provide sufficient child safety measures on its social media platforms. Government reports, as well as media investigations coming predominantly from ...
1 year ago Pandasecurity.com
Best of 2023: Enterprises Are Getting Better at Breach Prevention. But Attackers Are Getting Better, Too. - As we close out 2023, we at Security Boulevard wanted to highlight the most popular articles of the year. 2023 ForgeRock Breach Report underscores the need for AI-powered identity. We are excited to announce the release of our fifth annual ForgeRock ...
11 months ago Securityboulevard.com
Beyond the Noise: Appreciating the Quiet Work of Effective Doers - In many cases, few, if any, are aware of the work that they do and how important it is. We as an industry are long overdue in appreciating those who talk little but deliver big for us time and time again. Getting things done requires more than talk - ...
1 year ago Securityweek.com
Honeytokens for Peace Of Mind - If you have been tackling the realities of secrets sprawl, getting a handle on all the hardcoded credentials in your organization, then we understand the stress and the restless nights that can bring. Even a small team can add hundreds of secrets a ...
11 months ago Feeds.dzone.com
You Don't Know Where Your Secrets Are - Do you know where your secrets are? If not, I can tell you: you are not alone. Hundreds of CISOs, CSOs, and security leaders, whether from small or large companies, don't know either. No matter the organization's size, the certifications, tools, ...
1 year ago Thehackernews.com
Should I get CISSP Certified? - CISSP's reputation as a certification is for being 'a mile wide and an inch deep'. That's a limitation too - CISSP means you understand something, but not that you know how to do it. But the exam is a six-hour marathon consisting of a vast array of ...
10 months ago Securityboulevard.com
OpenAI's board might have been dysfunctional-but they made the right choice. Their defeat shows that in the battle between AI profits and ethics, it's no contest - The drama around OpenAI, its board, and Sam Altman has been a fascinating story that raises a number of ethical leadership issues. What are the responsibilities that OpenAI's board, Sam Altman, and Microsoft held during these quickly moving events? ...
1 year ago Fortune.com
Schneier on Security - At the airport, I trusted ticket agents and maintenance engineers and everyone else who keeps airlines operating. We trust their intentions, and know that those intentions will inform their actions. We might not know someone personally, or know their ...
1 year ago Schneier.com
If you prepare, a data security incident will not cause an existential crisis - This happens when there's a lack of preparation, but we can all choose to take actionable steps to turn down the temperature during incident response and help others and ourselves re-frame the issue. Those who have built trusted internal and external ...
11 months ago Helpnetsecurity.com
How AI could bolster software supply chain security - SAN FRANCISCO - While supply chain risks remain prevalent across enterprises of all sizes, Synopsys' Tim Mackey said AI tools will enable developers more than attackers - at least for now. Supply chain security was a significant topic that speakers ...
6 months ago Techtarget.com
Meet the Ransomware Negotiators - We really thought it'd be really interesting for our listeners to know more about how it works in ransomware response process, how a company decides to pay the ransom, how that process works through a negotiator. I don't believe anybody really starts ...
5 months ago Darkreading.com
Botnet down and administrator arrested in 911 S5 case, FBI says - The FBI and international partners say they have dismantled a massive botnet that had infected more than 19 million IP addresses across 200 countries and was used for years to conceal cybercrime. The 911 S5 botnet's alleged administrator, Chinese ...
6 months ago Therecord.media
Is Your Computer Part of 'The Largest Botnet Ever?' - The Cloud Router homepage, which was seized by the FBI this past weekend. Cloud Router was previously called 911 S5. On May 24, authorities in Singapore arrested the alleged creator and operator of 911 S5, a 35-year-old Chinese national named YunHe ...
6 months ago Krebsonsecurity.com
"Largest Botnet Ever" Disrupted. 911 S5's Alleged Mastermind Arrested - A vast network of millions of compromised computers, being used to facilitate a wide range of cybercrime, has been disrupted by a multinational law enforcement operation. 35-year-old YunHe Wang, a dual citizen of China and St. Kitts and Nevis, is ...
6 months ago Tripwire.com
Poorly secured PostgreSQL, MySQL servers targeted by ransomware bot - Users exposing poorly secured PostgreSQL and MySQL servers online are in danger of getting their databases wiped by a ransomware bot, Border0 researchers are warning. The attackers asks for a small sum to return / not publish the data, but those who ...
11 months ago Helpnetsecurity.com
CVE-2024-26698 - In the Linux kernel, the following vulnerability has been resolved: hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove In commit ac5047671758 ("hv_netvsc: Disable NAPI before closing the VMBus channel"), napi_disable was getting ...
8 months ago Tenable.com
Majority in new survey worried about being tricked by scammer - The majority of respondents in a new survey say they are worried about being tricked by a scammer, making it the second-highest crime concern for Americans. In a Gallup survey released Tuesday, 57 percent of respondents say they either frequently or ...
1 year ago Thehill.com
The Importance of SOC 2 Templates - Between navigating the SOC 2 landscape and implementing the proper controls and security systems, the to-do list quickly becomes overwhelming. Many tasks required for successful SOC 2 compliance don't come with a 'how-to' manual. In this piece, we're ...
11 months ago Securityboulevard.com
CVE-2024-26939 - In the Linux kernel, the following vulnerability has been resolved: ...
7 months ago
Rootkit Turns Kubernetes from Orchestration to Subversion - As software development focuses on continuous integration and deployment, orchestration platforms like Kubernetes have taken off, but that popularity has put them in attackers' crosshairs. Most successful attacks - at least those publicly reported - ...
1 year ago Darkreading.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)