Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesSecurity Leadership and ManagementTop Cybersecurity Leaders

Special Report

Hao-Wei Chen | Top Cybersecurity Leaders 2024

Learning to adapt in life and your security career

By Taelor Sutherland
Hao-Wei Chen | Top Cybersecurity Leaders 2024

Background image / DamienGeso / iStock / Getty Images Plus via Getty Images — Headshot courtesy of Chen

March 1, 2024

With frequent childhood moves, Hao-Wei Chen had to learn how to adapt from an early age. He frequently experienced culture shock while attending different schools to accommodate his father’s career shifts, having to learn new languages alongside his regular studies.

Chen’s introduction to the security field came when he was 17. Working as a developer and security tester, he launched the educational website Hacker.org.tw in Taiwan. Chen would ethically inform organizations of bugs located on their websites.

“There was one nonprofit organization that didn’t know how to fix the bug I reported. I consulted with them through phone calls, emails for a couple of weeks,” Chen says. The consultation landed Chen in a bit of trouble, as the organization doubted his original intentions of looking into the website. Once it was proven that Chen was attempting to do a good deed, the scrutiny went away and paved the path for him to pursue cybersecurity as a career.


BUILDING A SECURITY TEAM FROM THE GROUND UP

Chen moved to the U.S. to study cybersecurity at Carnegie Mellon University (CMU). Following graduation, Chen joined Amazon in 2014 as an Incident Response Engineer. Chen’s role included working within the “blue team” to protect the company from threats. Chen then switched to attack and research, and then moved to product security and investigations.

While working at Amazon, Chen advocated for creating a bug bounty program. Based on his own struggles from ethical hacking, Chen wanted to create a safe space for people to report security issues without fear of persecution. It was a challenge especially during the inception stage as Chen lacked resources. Chen conducted in-depth research and created data-driven justification to promote his idea. He relayed his pitch across leadership positions, eventually gaining access to funding to begin building out a team.

“When we eventually got the green light from a retail CEO, I built out a team from one to 10 people and then to launch Amazon’s first public bug bounty program. I didn't give up because that was something I really wanted to do. It was not only for the company, or company’s customers, but the global security community,” Chen says.


Chen currently serves as the Director of Information Security at Audible, a position he took in August of 2023. Chen found that his previous Amazon positions provided him with the necessary skills to thrive. His role involves protecting company and consumer data. This includes building security best practices as well as incorporating security into the products themselves. In addition to prevention, Chen’s role involves responding to incidents and creating plans to avoid them in the future.

“Our job is to safeguard customer data, and ensure the trust customers put in us. We wanted to ensure that customers could use our products securely, and they’re confident in our websites and our products,” Chen says. This management includes dozens of devices, including those owned by subsidiaries. Chen emphasizes the importance of understanding the scope of his work and the threats he needs to be aware of.



THE IMPORTANCE OF MULTINATIONAL SECURITY PARTNERSHIPS

Chen holds a lot of pride for his home of Taiwan, using his knowledge and skills to collaborate with public and government.

“I learned security because of the geopolitical cyberattacks I was witnessing. I was actively participating on the advisory roles for public sectors in Taiwan. I was their cyber advisor for the Ministry of National Defense from 2021 to 2023, which is the ministry equivalent to the DOD. I also contributed to the National Security Council. There, I gathered experts from overseas to help consult on security-related issues, research, policy analysis and even technical reviews for the top decision-maker of the Taiwan government,” Chen says.

In addition to government partnerships, Chen also works closely with nonprofits. One organization he works with is the NEX Foundation, a nonprofit established in Seattle and Taipei. Chen worked to secure funding, build online products to provide mentorship and education opportunities. The organization provides career advice for students, including cybersecurity study groups for prospective security leaders.

One organization Chen is incredibly proud of is the Taiwan International Foundation based in D.C. The organization is focused on sharing Taiwanese culture and history with the public.

“I feel that there are a lot of gaps in terms of global understanding of Taiwan. Eventually, the Foundation’s goal is to establish the first ever physical museum in D.C., with Taiwan as the focus. I wanted to take on some security issues through different angles, such as education, and cultural attempts,” Chen says.

Looking to the future, Chen advises security leaders to continue to make threat actors’ lives harder. Cyberattacks aren’t 100% avoidable, but security leaders can work to continue to reduce the chances of an attack.

“I would say one difficult part of being in this industry is that we need to advance ourselves as well. We need to understand the latest threats, the attack surface, what tactics and procedures are leveraged by actors. We need to understand their motivations and the latest kind of technologies that they may be using. We need to be able to innovate or enact countermeasures in order to raise the bar,” Chen says.



← VIEW MORE 2024 TOP CYBERSECURITY LEADERS →



KEYWORDS: application security device security network security security leaders

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Taelor daugherty 2023

Taelor Sutherland is the Associate Editor at Security magazine. Sutherland covers news affecting enterprise security leaders, from industry events to physical & cybersecurity threats and mitigation tactics. She is also responsible for coordinating and publishing web exclusives, multimedia content, social media posts, and a number of eMagazine departments. Sutherland graduated in 2022 with a BA in English Literature from Agnes Scott College.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Niel Harper — Top Cybersecurity Leaders 2025

    Niel Harper — Top Cybersecurity Leaders 2025

    See More
  • Sandra Cavazos — Top Cybersecurity Leaders 2025

    Sandra Cavazos — Top Cybersecurity Leaders 2025

    See More
  • Bobby Ford

    Bobby Ford — Top Cybersecurity Leaders 2026

    See More

Related Products

See More Products
  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing