Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesSecurity Leadership and ManagementTop Cybersecurity Leaders

Special Report

Hao-Wei Chen | Top Cybersecurity Leaders 2024

Learning to adapt in life and your security career

By Taelor Sutherland
Hao-Wei Chen | Top Cybersecurity Leaders 2024

Background image / DamienGeso / iStock / Getty Images Plus via Getty Images — Headshot courtesy of Chen

March 1, 2024

With frequent childhood moves, Hao-Wei Chen had to learn how to adapt from an early age. He frequently experienced culture shock while attending different schools to accommodate his father’s career shifts, having to learn new languages alongside his regular studies.

Chen’s introduction to the security field came when he was 17. Working as a developer and security tester, he launched the educational website Hacker.org.tw in Taiwan. Chen would ethically inform organizations of bugs located on their websites.

“There was one nonprofit organization that didn’t know how to fix the bug I reported. I consulted with them through phone calls, emails for a couple of weeks,” Chen says. The consultation landed Chen in a bit of trouble, as the organization doubted his original intentions of looking into the website. Once it was proven that Chen was attempting to do a good deed, the scrutiny went away and paved the path for him to pursue cybersecurity as a career.


BUILDING A SECURITY TEAM FROM THE GROUND UP

Chen moved to the U.S. to study cybersecurity at Carnegie Mellon University (CMU). Following graduation, Chen joined Amazon in 2014 as an Incident Response Engineer. Chen’s role included working within the “blue team” to protect the company from threats. Chen then switched to attack and research, and then moved to product security and investigations.

While working at Amazon, Chen advocated for creating a bug bounty program. Based on his own struggles from ethical hacking, Chen wanted to create a safe space for people to report security issues without fear of persecution. It was a challenge especially during the inception stage as Chen lacked resources. Chen conducted in-depth research and created data-driven justification to promote his idea. He relayed his pitch across leadership positions, eventually gaining access to funding to begin building out a team.

“When we eventually got the green light from a retail CEO, I built out a team from one to 10 people and then to launch Amazon’s first public bug bounty program. I didn't give up because that was something I really wanted to do. It was not only for the company, or company’s customers, but the global security community,” Chen says.


Chen currently serves as the Director of Information Security at Audible, a position he took in August of 2023. Chen found that his previous Amazon positions provided him with the necessary skills to thrive. His role involves protecting company and consumer data. This includes building security best practices as well as incorporating security into the products themselves. In addition to prevention, Chen’s role involves responding to incidents and creating plans to avoid them in the future.

“Our job is to safeguard customer data, and ensure the trust customers put in us. We wanted to ensure that customers could use our products securely, and they’re confident in our websites and our products,” Chen says. This management includes dozens of devices, including those owned by subsidiaries. Chen emphasizes the importance of understanding the scope of his work and the threats he needs to be aware of.



THE IMPORTANCE OF MULTINATIONAL SECURITY PARTNERSHIPS

Chen holds a lot of pride for his home of Taiwan, using his knowledge and skills to collaborate with public and government.

“I learned security because of the geopolitical cyberattacks I was witnessing. I was actively participating on the advisory roles for public sectors in Taiwan. I was their cyber advisor for the Ministry of National Defense from 2021 to 2023, which is the ministry equivalent to the DOD. I also contributed to the National Security Council. There, I gathered experts from overseas to help consult on security-related issues, research, policy analysis and even technical reviews for the top decision-maker of the Taiwan government,” Chen says.

In addition to government partnerships, Chen also works closely with nonprofits. One organization he works with is the NEX Foundation, a nonprofit established in Seattle and Taipei. Chen worked to secure funding, build online products to provide mentorship and education opportunities. The organization provides career advice for students, including cybersecurity study groups for prospective security leaders.

One organization Chen is incredibly proud of is the Taiwan International Foundation based in D.C. The organization is focused on sharing Taiwanese culture and history with the public.

“I feel that there are a lot of gaps in terms of global understanding of Taiwan. Eventually, the Foundation’s goal is to establish the first ever physical museum in D.C., with Taiwan as the focus. I wanted to take on some security issues through different angles, such as education, and cultural attempts,” Chen says.

Looking to the future, Chen advises security leaders to continue to make threat actors’ lives harder. Cyberattacks aren’t 100% avoidable, but security leaders can work to continue to reduce the chances of an attack.

“I would say one difficult part of being in this industry is that we need to advance ourselves as well. We need to understand the latest threats, the attack surface, what tactics and procedures are leveraged by actors. We need to understand their motivations and the latest kind of technologies that they may be using. We need to be able to innovate or enact countermeasures in order to raise the bar,” Chen says.



← VIEW MORE 2024 TOP CYBERSECURITY LEADERS →



KEYWORDS: application security device security network security security leaders

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Taelor daugherty 2023

Taelor Sutherland is the Associate Editor at Security magazine. Sutherland covers news affecting enterprise security leaders, from industry events to physical & cybersecurity threats and mitigation tactics. She is also responsible for coordinating and publishing web exclusives, multimedia content, social media posts, and a number of eMagazine departments. Sutherland graduated in 2022 with a BA in English Literature from Agnes Scott College.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Niel Harper — Top Cybersecurity Leaders 2025

    Niel Harper — Top Cybersecurity Leaders 2025

    See More
  • Sandra Cavazos — Top Cybersecurity Leaders 2025

    Sandra Cavazos — Top Cybersecurity Leaders 2025

    See More
  • 2024 physical security predictions header

    Top physical security predictions for 2024

    See More

Related Products

See More Products
  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing