{"id":23210,"date":"2025-09-26T11:18:51","date_gmt":"2025-09-26T04:18:51","guid":{"rendered":"https:\/\/fpt-is.com\/en\/?p=23210"},"modified":"2025-10-29T11:28:40","modified_gmt":"2025-10-29T04:28:40","slug":"fpt-and-ibm-join-forces-to-build-proactive-cybersecurity-strategies-for-businesses-in-the-ai-era","status":"publish","type":"post","link":"https:\/\/fpt-is.com\/en\/fpt-and-ibm-join-forces-to-build-proactive-cybersecurity-strategies-for-businesses-in-the-ai-era\/","title":{"rendered":"FPT and IBM join forces to build proactive cybersecurity strategies for businesses in the AI era"},"content":{"rendered":"<p><span style=\"font-size: 12pt\"><b>Recently, FPT, in collaboration with IBM Vietnam, hosted a seminar titled \u201cCybersecurity Strategies in the AI Era: Gaining the Edge with Proactive Defense.\u201d The event brought together cybersecurity experts, business leaders, and representatives from both public and private sectors to discuss emerging trends, strategies, and practical solutions that enable organizations to proactively respond to cyber threats in the age of AI.<\/b><\/span><\/p>\n<p><a href=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2025\/10\/T1-1761711940.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-23211\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2025\/10\/T1-1761711940.jpg\" alt=\"T1 1761711940\" width=\"1200\" height=\"800\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2025\/10\/T1-1761711940.jpg 1200w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2025\/10\/T1-1761711940-700x467.jpg 700w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2025\/10\/T1-1761711940-406x271.jpg 406w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em><span style=\"font-size: 12pt\"><span style=\"font-weight: 400\">Mr. Vu Minh Quang from FPT delivered the opening remarks at the seminar \u201cCybersecurity Strategies in the AI Era: Gaining the Edge with Proactive Defense.\u201d<\/span><\/span><\/em><\/p>\n<p><span style=\"font-size: 12pt\"><span style=\"font-weight: 400\">In 2024 alone, more than 659,000 cybersecurity incidents were recorded, impacting nearly half of public and private organizations, according to OpenGov Asia. Another survey by FACTS Asia revealed that 46% of businesses in Vietnam experienced at least one cyberattack over the past year. Against this backdrop, the question is no longer <\/span><i><span style=\"font-weight: 400\">\u201cShould we invest in cybersecurity?\u201d<\/span><\/i><span style=\"font-weight: 400\"> but rather <\/span><i><span style=\"font-weight: 400\">\u201cWhat is the right strategy and the right technology to safeguard organizations, data, and customer trust in the AI era?\u201d<\/span><\/i><\/span><\/p>\n<p><span style=\"font-weight: 400;font-size: 12pt\">Delivering the opening remarks, Mr. Vu Minh Quang, Consulting Director of the Enterprise Sector at FPT IS under FPT Corporation, emphasized: \u201cCybersecurity is not only a shield that protects data but also the foundation for building trust and driving digital economic growth. This is also the mission that FPT, together with global technology partners like IBM, has always pursued &#8211; to create a safe, trusted, and sustainable digital foundation for businesses and society. FPT and IBM will continue to be leading partners, helping enterprises turn cybersecurity challenges into opportunities and transform it into a new competitive advantage in the AI era.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;font-size: 12pt\">The seminar \u201cCybersecurity Strategies in the AI Era: Gaining the Edge with Proactive Defense\u201d focused on three in-depth topics, offering a comprehensive perspective &#8211; from global trends to practical solutions tailored for the Vietnamese market.<\/span><\/p>\n<h2><span style=\"font-size: 12pt\"><b>1. \u201cDual Boundaries\u201d \u2013 A Unified Strategy for AI Defense and Management<\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400;font-size: 12pt\">In the opening presentation, Dr. Nguyen Thanh Binh, Global Cybersecurity Consultant at FPT IS under FPT Corporation, emphasized that while AI brings tremendous opportunities, it also opens up a new battleground for cybercriminals. To survive and thrive, organizations must simultaneously defend against AI-driven threats from the outside while effectively harnessing AI from within.<\/span><\/p>\n<p><a href=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2025\/10\/T2-1761711942.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-23212\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2025\/10\/T2-1761711942.jpg\" alt=\"T2 1761711942\" width=\"1200\" height=\"800\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2025\/10\/T2-1761711942.jpg 1200w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2025\/10\/T2-1761711942-700x467.jpg 700w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2025\/10\/T2-1761711942-406x271.jpg 406w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em><span style=\"font-size: 12pt\"><span style=\"font-weight: 400\">Dr. Nguyen Thanh Binh from FPT shared updates on the latest cybersecurity trends and offered insights into how organizations can \u201cdefend against AI from the outside while effectively harnessing it from within.\u201d<\/span><\/span><\/em><\/p>\n<p><span style=\"font-weight: 400;font-size: 12pt\">According to Mr. Binh, external threats are becoming increasingly sophisticated: hackers can now craft emails, websites, video calls, or even voice imitations that appear completely authentic and target victims with precision. AI is also being used to automatically generate malware at unprecedented speed, making it difficult for traditional defense systems to keep pace. At the same time, internal risks are no less severe &#8211; from data leaks and misuse of AI models to industry regulation breaches (in sectors such as banking, insurance, and healthcare) and excessive reliance on AI that may compromise operational resilience.<\/span><\/p>\n<p><span style=\"font-weight: 400;font-size: 12pt\">\u201cThat\u2019s why business leaders can no longer focus solely on short-term profits or efficiency; cybersecurity and regulatory compliance must be elevated to a strategic priority,\u201d Mr. Binh emphasized.<\/span><\/p>\n<p><span style=\"font-weight: 400;font-size: 12pt\">Addressing the challenge of \u201cdefending against AI from the outside while effectively harnessing it from within,\u201d the FPT representative introduced the AI-Ready SOC (Security Operations Center) \u2014 a 24\/7, internationally certified cybersecurity monitoring and incident response service. FPT\u2019s SOC leverages machine learning to detect anomalies, analyze big data, and correlate findings with global cybersecurity intelligence sources, enabling early detection and prevention of AI-driven attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;font-size: 12pt\">In parallel, FPT also offers consulting and implementation services for ISO 27001, as well as PCI DSS assessment and certification, helping businesses standardize their risk management systems and ensure compliance with international security standards.<\/span><\/p>\n<p><span style=\"font-weight: 400;font-size: 12pt\">According to Mr. Binh, SOC and GRC form the two key pillars of FPT\u2019s unified security strategy \u2014 but they alone are not enough. Businesses also need a comprehensive cybersecurity ecosystem spanning data, applications, networks, and endpoints, which FPT has built based on the Zero Trust model \u2014 never trust by default, always verify. This ecosystem empowers organizations not only to strengthen their defenses but also to safely leverage AI as a new source of competitive advantage in the digital era.<\/span><\/p>\n<h2><span style=\"font-size: 12pt\"><b>2. AI Security and Sustainable Data Protection Strategies<\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400;font-size: 12pt\">From a data management perspective, Mr. Nguyen Manh Linh, Data Security Solution Consultant of IBM Vietnam, emphasized that data is both the most valuable and the most vulnerable asset of any organization. As businesses operate in hybrid cloud environments where data is dispersed across multiple locations and formats &#8211; both structured and unstructured &#8211; the challenges of ensuring data security become increasingly complex.<\/span><\/p>\n<p><a href=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2025\/10\/T3-1761711943.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-23213\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2025\/10\/T3-1761711943.jpg\" alt=\"T3 1761711943\" width=\"1200\" height=\"799\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2025\/10\/T3-1761711943.jpg 1200w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2025\/10\/T3-1761711943-700x466.jpg 700w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2025\/10\/T3-1761711943-406x271.jpg 406w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em><span style=\"font-size: 12pt\"><span style=\"font-weight: 400\">Mr. Nguyen Manh Linh from IBM introduced the Guardium Data Protection platform, which leverages artificial intelligence to enable early risk detection, enhance incident response capabilities, and ensure long-term data protection<\/span><\/span><\/em><\/p>\n<p><span style=\"font-weight: 400;font-size: 12pt\">IBM introduced the Guardium Data Protection platform, which classifies data, provides a comprehensive visibility dashboard, identifies vulnerabilities, ranks risks, and continuously monitors activity from login to logout. The technology enables organizations to implement multiple protective measures such as temporary isolation and data masking, thereby minimizing the risk of data leakage.<\/span><\/p>\n<p><span style=\"font-weight: 400;font-size: 12pt\">Mr. Linh also highlighted the risks posed by AI itself: 76% of AI applications remain unsecured, while 51% of IT leaders express concern about emerging AI-driven attack methods. IBM\u2019s approach is a multi-layered security strategy that protects not only data but also AI models and the entire AI lifecycle.<\/span><\/p>\n<p><span style=\"font-weight: 400;font-size: 12pt\">Another key highlight is Quantum Computing, which is predicted to have the capability to break many existing encryption algorithms. IBM is at the forefront of research and development of new cryptographic methods to \u201cfuture-proof\u201d data security in the years to come.<\/span><\/p>\n<h2><span style=\"font-size: 12pt\"><b>3. IBM Cyber Vault &amp; FlashSystem \u2013 The Data Safety Net Against Ransomware Attacks<\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400;font-size: 12pt\">In the closing session, Mr. Tran Quang Huy, Storage Solutions Consultant at IBM Vietnam, presented the Cyber Vault &amp; FlashSystem solution suite &#8211; designed as a \u201csafety net\u201d to help businesses defend against next-generation ransomware attacks.<\/span><\/p>\n<p><a href=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2025\/10\/T4-1761711945.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-23214\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2025\/10\/T4-1761711945.jpg\" alt=\"T4 1761711945\" width=\"1200\" height=\"799\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2025\/10\/T4-1761711945.jpg 1200w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2025\/10\/T4-1761711945-700x466.jpg 700w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2025\/10\/T4-1761711945-406x271.jpg 406w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em><span style=\"font-size: 12pt\"><span style=\"font-weight: 400\">Mr. Tran Quang Huy from IBM introduced two next-generation ransomware protection solutions that enable businesses to detect threats early, recover quickly, and maintain continuous operations<\/span><\/span><\/em><\/p>\n<p><span style=\"font-weight: 400;font-size: 12pt\">The solution integrates early threat detection, secure data isolation, and rapid recovery capabilities, ensuring business continuity even in the event of a cyberattack. By incorporating AI into the process, detection and response times are significantly shortened, minimizing damage and enhancing the long-term resilience of IT systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;font-size: 12pt\">Beyond technology showcases, the seminar also featured a dynamic panel discussion where experts and business representatives exchanged practical insights. Key topics included balancing cost and efficiency, securing data across multi-cloud environments, and safely applying AI to drive business value.<\/span><\/p>\n<p><span style=\"font-weight: 400;font-size: 12pt\">Participants highly appreciated the partnership between FPT and IBM &#8211; combining FPT\u2019s deep understanding of the Vietnamese market with IBM\u2019s world-leading cybersecurity technologies. This collaboration marks a concrete step forward in strengthening Vietnamese enterprises\u2019 defensive capabilities and building a secure, trusted digital foundation.<\/span><\/p>\n<p><span style=\"font-weight: 400;font-size: 12pt\">Concluding the event, representatives from FPT and IBM reaffirmed their commitment to a long-term strategic partnership, delivering proactive, end-to-end cybersecurity solutions powered by AI to enable early risk detection and sustainable data protection. \u201cCybersecurity is not merely a defensive shield \u2014 it is a cornerstone for the sustainable growth of businesses in the AI era,\u201d emphasized the FPT leadership.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently, FPT, in collaboration with IBM Vietnam, hosted a seminar titled \u201cCybersecurity Strategies in the AI Era: Gaining the Edge with Proactive Defense.\u201d The event brought together cybersecurity experts, business leaders, and representatives from both public and private sectors to discuss emerging trends, strategies, and practical solutions that enable organizations to proactively respond to cyber [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":23211,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[851],"tags":[],"nang_luc":[],"dich_vu":[537,859,712],"khu_vuc":[],"linh_vuc":[856,862],"platform":[],"san_pham":[],"class_list":["post-23210","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","dich_vu-insights-data-ai","dich_vu-public-sector-news","dich_vu-security","linh_vuc-enterprises","linh_vuc-partners"],"acf":[],"_links":{"self":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/posts\/23210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/comments?post=23210"}],"version-history":[{"count":2,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/posts\/23210\/revisions"}],"predecessor-version":[{"id":23216,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/posts\/23210\/revisions\/23216"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/media\/23211"}],"wp:attachment":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/media?parent=23210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/categories?post=23210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/tags?post=23210"},{"taxonomy":"nang_luc","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/nang_luc?post=23210"},{"taxonomy":"dich_vu","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/dich_vu?post=23210"},{"taxonomy":"khu_vuc","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/khu_vuc?post=23210"},{"taxonomy":"linh_vuc","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/linh_vuc?post=23210"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/platform?post=23210"},{"taxonomy":"san_pham","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/san_pham?post=23210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}