Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementTop Cybersecurity LeadersBanking/Finance/Insurance

Special Report

Jason Lau — Top Cybersecurity Leaders 2025

Cybersecurity endgame: Staying ahead of the attack

By Rachelle Blair-Frasier, Editor in Chief
Jason Lau — Top Cybersecurity Leaders 2025

Background image / AliseFox / iStock / Getty Images Plus via Getty Images — Headshot courtesy of Lau

March 10, 2025

Chief Information Security Officer at Crypto.com, Jason Lau, discusses his cybersecurity career and the role of strategy in the industry.

There are many lessons security leaders can glean from games of strategy. With a passion for playing the game of chess, he’s been playing since the age of three, Jason Lau says the game has helped influence his style as a leader in the cybersecurity industry.

“Winning in chess isn’t just about the next move; it’s about controlling the board and adapting to every challenge. In cybersecurity, success isn’t just about defense — it’s about recognizing patterns, anticipating threats, and staying one step ahead.”

Many see chess as a simple win-or-lose game, a clear black-and-white contest. But in reality — just like in cybersecurity — the line between winning and losing isn’t always so clear. Every game, every move, whether it leads to victory or defeat, is an opportunity to learn. The more you play, the more you refine your strategy, anticipate threats, and prepare for the next attack, Lau says.

“Cybersecurity, like chess, requires a strong foundation — certifications, experience, and hands-on practice. Chess theory alone won’t win the game,” he continues. “You need to make your moves, test strategies, develop your own style, learn from mistakes, and adapt. The more you play, the sharper your skills become.”

Lau says that the lessons he has learned from chess have not only shaped his approach to cybersecurity but also influenced how he manages his teams.

“Building a strong team is much like positioning pieces on a chessboard — while some moves are obvious, supporting pieces can often be more strategically important than they first appear,” Lau says. “In the same way, a CISO must identify hidden skills and untapped potential within the team, ensuring the right people are in the right roles at the right time.”

Lau, an award-winning cybersecurity professional with 25 years of experience in the industry, is currently CISO at leading cryptocurrency trading platform Crypto.com. Previously he served as a Cybersecurity Advisor at Microsoft, and currently sits on the global Board of Directors for ISACA and the advisory board of BlackHat, adjunct professor of cybersecurity and data privacy, and contributes to various Think Tanks from the World Economic Forum expert network, Forbes Technology Council, and Centre for Information Policy Leadership – just to name a few.

Hacking, gaming, and the path to cybersecurity

Lau has always been fascinated with taking things apart and of putting them back together, he says which is what drew him to study Mechatronics Engineering – a unique field combining robotics, computer science, mechanical engineering and electrical engineering together.

“At university, we were encouraged to explore, take things apart, and understand how they worked. Following in my father’s footsteps, I was always looking for devices and gadgets to modify, enhance, and push beyond their intended limits.” he says.

At the time, PlayStation consoles and games were region-based, limiting access to the latest and most popular games in certain areas. Driven by a passion for ethical hacking and exploration, Lau took on the challenge of modifying his first-generation PlayStation, enabling it to bypass regional restrictions and play discs from around the world.

Cybersecurity, like chess, requires a strong foundation — certifications, experience, and hands-on practice. Chess theory alone won’t win the game. You need to make your moves, test strategies, develop your own style, learn from mistakes, and adapt. The more you play, the sharper your skills become.

Modifying gaming consoles was just the beginning of Lau’s deep dive into technology. At the time, the concept of cybersecurity as we know it today didn’t really exist. As the Internet was emerging, he began working for a software company specializing in systems management and monitoring, gaining exposure to how major organizations operated.

“I had the opportunity to work closely with some of the world’s largest organizations — including global corporations and governments — seeing first-hand how they approached security in its early stages, long before cybersecurity became a defined field,”

In his current role as Chief Information Security Officer at Crypto.com, Lau describes the job in two parts - an internal and an external role.

“Internally, consumer protection is my top priority. Securing our global customer base requires building and leading a team that oversees cybersecurity, data privacy, blockchain security, and — uniquely in our company — IT network management and operations as well,” Lau explains. “Externally, I work closely with regulators worldwide, from Europe to the Middle East, Singapore, the United States, and beyond, ensuring security compliance and shaping industry standards. Beyond regulatory engagement, I actively advocate for stronger security across the industry and work to bridge the gap between the cryptocurrency and Web3 ecosystem and the ethical hacker community. This commitment led to launching the largest-ever Bug Bounty Program with HackerOne, offering $2 million in rewards to strengthen our security posture.”

Being at Crypto.com has brought many career highlights and accomplishments, but for Lau, none surpass the opportunity to build a security team from the ground up. Unlike the typical CISO career path — where leaders often move up the ladder and inherit existing teams — Lau had the rare chance to assemble, develop, and scale a team from scratch, shaping its culture, strategy, and capabilities to meet the demands of a rapidly evolving industry.

“It’s rare to have the opportunity to build a security team from the ground up, especially at a large financial institution. Typically, that only happens in startups, and even then, scaling from a startup to a unicorn is far from common,” Lau reflects. “We’ve grown from a $0 business to a trillion-dollar enterprise with over 100 million customers — and we’re scaling even faster. Building a team that could grow alongside that trajectory has been one of my greatest accomplishments. At the end of the day, I am the sum of my team, and this success is not just mine — it’s a testament to the collective effort of an exceptional group of professionals.”

Lau recalls that when he joined in 2017, the crypto industry was like the Wild West — largely unregulated with no established playbooks or industry standards. Rather than waiting for guidelines to emerge, he took the initiative to apply the strictest banking security standards, including ISO 27001, ISO 27701, ISO 22301, SOC 1 Type 2, SOC 2 Type 2, and government-led frameworks like the NIST Cybersecurity and Privacy Frameworks. This proactive approach helped build Crypto.com's credibility, establish a strong security foundation, and position cybersecurity as a core pillar of the company’s strategy — a decision that, in hindsight, was instrumental in earning customer trust.

The CISO role

When it comes to success in cybersecurity, Lau cautions that the role of a Chief Information Security Officer (CISO) isn’t for everyone. It demands relentless passion, resilience under pressure, and the ability to navigate a constantly shifting battlefield.

“Being a CISO is not for the faint-hearted. The role is a delicate balance of governance, risk, and compliance, combined with deep technical and operational focus. You’re constantly adapting, always playing catch-up with evolving threats. The reality is, you’ll never be ahead of all of the attackers — you can only work to stay one step behind them while fortifying defenses and anticipating their next move, so that you can react faster with your incident response” Lau explains.

Lau believes that true success extends beyond securing an organization — it’s about giving back to the industry and leaving a lasting impact. He says the modern CISO is not just a defender of networks; they are thought leaders, educators, and strategists who help shape the future of security. Serving on boards, advising emerging companies, mentoring the next generation, and contributing to industry standards are all ways experienced CISOs can drive long-term resilience beyond their own enterprises, he says.

Mentorship, in particular, is a responsibility Lau takes to heart. He often reflects on the profound influence of his late mentor, Professor Kenneth Morgan, who Lau gives credit to shaping his approach to security and strategy.

“Prof. Morgan was by far the most influential person in my professional career. He was always discussing scenarios at the intersection of cybersecurity, economics, and politics — long before others were even thinking about it. He was a masterful strategist,” Lau recalls. “He emphasizes that true growth comes from learning from those with different backgrounds and experiences, reinforcing the idea that cybersecurity is as much about adaptability as it is about expertise.”



Security’s Top Cybersecurity Leaders 2025


KEYWORDS: Chief Information Security Officer (CISO) cryptocurrency enterprise security finance cybersecurity security leaders

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rachelle blairfrasier headshot white

Rachelle Blair-Frasier is Security magazine’s Editor in Chief. Blair-Frasier handles eMagazine features, as well as writes and publishes online news and web exclusives on topics including physical security, risk management, cybersecurity and emerging industry trends. She helps coordinate multimedia content and manages Security magazine's social media presence, in addition to working with security leaders to publish industry insights. Blair-Frasier brings more than 15 years of journalism and B2B writing and editorial experience to the role.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Jay Gonzales — Top Cybersecurity Leaders 2025

    Jay Gonzales — Top Cybersecurity Leaders 2025

    See More
  • Jennifer Franks | Top Cybersecurity Leaders 2024

    Jennifer Franks | Top Cybersecurity Leaders 2024

    See More
  • Jorge Mario Ochoa | Top Cybersecurity Leaders 2024

    Jorge Mario Ochoa | Top Cybersecurity Leaders 2024

    See More

Related Products

See More Products
  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • databasehacker

    The Database Hacker's Handboo

See More Products

Events

View AllSubmit An Event
  • September 3, 2024

    From DDoS Protection to WAAP: How Layered Protection Enhances Your Cybersecurity Strategy

    ON DEMAND: By participating in the webinar, attendees will gain enhanced knowledge of cyber threats and understand the current spectrum of cyber threats facing businesses.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing