Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesSecurity Leadership and ManagementTop Cybersecurity Leaders

Special Report

Hao-Wei Chen | Top Cybersecurity Leaders 2024

Learning to adapt in life and your security career

By Taelor Sutherland
Hao-Wei Chen | Top Cybersecurity Leaders 2024

Background image / DamienGeso / iStock / Getty Images Plus via Getty Images — Headshot courtesy of Chen

March 1, 2024

With frequent childhood moves, Hao-Wei Chen had to learn how to adapt from an early age. He frequently experienced culture shock while attending different schools to accommodate his father’s career shifts, having to learn new languages alongside his regular studies.

Chen’s introduction to the security field came when he was 17. Working as a developer and security tester, he launched the educational website Hacker.org.tw in Taiwan. Chen would ethically inform organizations of bugs located on their websites.

“There was one nonprofit organization that didn’t know how to fix the bug I reported. I consulted with them through phone calls, emails for a couple of weeks,” Chen says. The consultation landed Chen in a bit of trouble, as the organization doubted his original intentions of looking into the website. Once it was proven that Chen was attempting to do a good deed, the scrutiny went away and paved the path for him to pursue cybersecurity as a career.


BUILDING A SECURITY TEAM FROM THE GROUND UP

Chen moved to the U.S. to study cybersecurity at Carnegie Mellon University (CMU). Following graduation, Chen joined Amazon in 2014 as an Incident Response Engineer. Chen’s role included working within the “blue team” to protect the company from threats. Chen then switched to attack and research, and then moved to product security and investigations.

While working at Amazon, Chen advocated for creating a bug bounty program. Based on his own struggles from ethical hacking, Chen wanted to create a safe space for people to report security issues without fear of persecution. It was a challenge especially during the inception stage as Chen lacked resources. Chen conducted in-depth research and created data-driven justification to promote his idea. He relayed his pitch across leadership positions, eventually gaining access to funding to begin building out a team.

“When we eventually got the green light from a retail CEO, I built out a team from one to 10 people and then to launch Amazon’s first public bug bounty program. I didn't give up because that was something I really wanted to do. It was not only for the company, or company’s customers, but the global security community,” Chen says.


Chen currently serves as the Director of Information Security at Audible, a position he took in August of 2023. Chen found that his previous Amazon positions provided him with the necessary skills to thrive. His role involves protecting company and consumer data. This includes building security best practices as well as incorporating security into the products themselves. In addition to prevention, Chen’s role involves responding to incidents and creating plans to avoid them in the future.

“Our job is to safeguard customer data, and ensure the trust customers put in us. We wanted to ensure that customers could use our products securely, and they’re confident in our websites and our products,” Chen says. This management includes dozens of devices, including those owned by subsidiaries. Chen emphasizes the importance of understanding the scope of his work and the threats he needs to be aware of.



THE IMPORTANCE OF MULTINATIONAL SECURITY PARTNERSHIPS

Chen holds a lot of pride for his home of Taiwan, using his knowledge and skills to collaborate with public and government.

“I learned security because of the geopolitical cyberattacks I was witnessing. I was actively participating on the advisory roles for public sectors in Taiwan. I was their cyber advisor for the Ministry of National Defense from 2021 to 2023, which is the ministry equivalent to the DOD. I also contributed to the National Security Council. There, I gathered experts from overseas to help consult on security-related issues, research, policy analysis and even technical reviews for the top decision-maker of the Taiwan government,” Chen says.

In addition to government partnerships, Chen also works closely with nonprofits. One organization he works with is the NEX Foundation, a nonprofit established in Seattle and Taipei. Chen worked to secure funding, build online products to provide mentorship and education opportunities. The organization provides career advice for students, including cybersecurity study groups for prospective security leaders.

One organization Chen is incredibly proud of is the Taiwan International Foundation based in D.C. The organization is focused on sharing Taiwanese culture and history with the public.

“I feel that there are a lot of gaps in terms of global understanding of Taiwan. Eventually, the Foundation’s goal is to establish the first ever physical museum in D.C., with Taiwan as the focus. I wanted to take on some security issues through different angles, such as education, and cultural attempts,” Chen says.

Looking to the future, Chen advises security leaders to continue to make threat actors’ lives harder. Cyberattacks aren’t 100% avoidable, but security leaders can work to continue to reduce the chances of an attack.

“I would say one difficult part of being in this industry is that we need to advance ourselves as well. We need to understand the latest threats, the attack surface, what tactics and procedures are leveraged by actors. We need to understand their motivations and the latest kind of technologies that they may be using. We need to be able to innovate or enact countermeasures in order to raise the bar,” Chen says.



← VIEW MORE 2024 TOP CYBERSECURITY LEADERS →



KEYWORDS: application security device security network security security leaders

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Taelor daugherty 2023

Taelor Sutherland is the Associate Editor at Security magazine. Sutherland covers news affecting enterprise security leaders, from industry events to physical & cybersecurity threats and mitigation tactics. She is also responsible for coordinating and publishing web exclusives, multimedia content, social media posts, and a number of eMagazine departments. Sutherland graduated in 2022 with a BA in English Literature from Agnes Scott College.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Niel Harper — Top Cybersecurity Leaders 2025

    Niel Harper — Top Cybersecurity Leaders 2025

    See More
  • Sandra Cavazos — Top Cybersecurity Leaders 2025

    Sandra Cavazos — Top Cybersecurity Leaders 2025

    See More
  • Blue digital background that says "2024 Cybersecurity Trends"

    5 Cybersecurity trends in 2024

    See More

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing