This biographical article is written like a résumé. (November 2024) |
Aloysius Cheang is the Managing Director APAC for the Cloud Security Alliance. He has another role as their Standards Secretariat overseeing all standardization efforts within CSA (Cloud Security Alliance) and owning the relationships with other SDOs. Aloysius was a former member of the Singapore government's Chief Security Officer roundtable, and founder of SIG^2[1] in 2001.[2][3] He also held senior executive positions with various consulting companies and telco with a worldwide remit.
Aloysius Cheang | |
---|---|
Occupation | Managing Director |
Employer | Cloud Security Alliance |
SIG^2 rose to become the de facto security community in Asia,[citation needed] and lead to the formalisation of the Singapore government-backed Association of Information Security Professionals (AISP), where Cheang was pro tem chairman from 2006 to 2007. He was also co-editor for the ISO/IEC 27032 "Guidelines for Cybersecurity", and represented Singapore on ISO/IEC/JTC 1 SC 27 WG4. His previous contribution for SS 507 "Business Continuity/Disaster Recovery Industry Standard" was adopted as ISO/IEC 24762. Cheang sits on the Singapore IT Standards Committee and the National Infocomm Competency Framework Security Sub-Committee.
Cheang's professional certifications include CISA, CISSP and GCIH, and is the first Microsoft Security MVP in South Asia, and a member of the Microsoft SEA MVP Hall of Fame.[4] His views have been presented in Times Asia,[5] CIO Asia,[6] ZDNet,[7] Computerworld, The New Paper,[8] MyPaper, Sin Chew Daily, Wen Wei Po,[9] The Straits Times[10] and ChannelNewsAsia as an independent source of specialist opinion.
Publications
edit- A framework for managing information systems security[11]
- Analysis of the Linux.Ramen Worm[12]
- Singapore Standard 493 Specification For IT Security Standards Framework[13]
- Singapore Standard 507 Singapore standard for information and communications technology disaster recovery services, which has been adopted as ISO/IEC24762 Guidelines for Information and Communications Technology (ICT) Disaster Recovery Services[14][15][16]
- Security MVP Article of the Month – August 2007 and Security Technet Article of the Month, Role of Security in Infrastructure Optimization, August 15, 2007[17]
- Security MVP Article of the Month – May 2008 and Security Technet Article of the Month, Privacy Issues – Business Disabler or Enabler?, May 14, 2008[18]
References
edit- ^ "SIG^2". Archived from the original on 2009-05-05. Retrieved 2009-05-11.
- ^ "Profile on SIG^2". Archived from the original on 2009-05-05. Retrieved 2009-05-11.
- ^ Microsoft MVP site[permanent dead link ]
- ^ "Aloysius Cheang | CROW". crow.org.nz. Retrieved 2020-12-12.
- ^ Paris Hilton's Hack Attack
- ^ "The Mobility Threat". Archived from the original on 2006-10-19. Retrieved 2009-05-11.
- ^ Do former black hats make good hires?
- ^ "banks not hit yet but warned to be vigilant". Archived from the original on 2008-03-14. Retrieved 2009-05-12.
- ^ WiFi炒股 易遭盜密碼
- ^ "New media: A case of Jekyll & Hyde". Archived from the original on 2011-07-07. Retrieved 2009-05-12.
- ^ PACIS 2001 Proceeds, Paper 22
- ^ Analysis of the Linux.Ramen Worm[permanent dead link ]
- ^ IT Standards Committee list of IT standard
- ^ S'pore pushes business continuity, disaster recovery standard
- ^ "Singapore Standards on Business Continuity and Disaster Recovery on its way to become an International Standard". Archived from the original on 2009-03-09. Retrieved 2009-05-12.
- ^ "PSB Certification Body – Business Continuity & Disaster Recovery (BC/DR)". Archived from the original on 2009-04-14. Retrieved 2009-05-12.
- ^ Role of Security in Infrastructure Optimization
- ^ "Privacy Issues – Business Disabler or Enabler?". Microsoft. Archived from the original on 2009-03-26. Retrieved 2009-05-12.