Ian Yip

Director, Cyber Security at EY

Sydney, Australia

About/ Ian Yip

Ian has worked with organisations worldwide to strategise, architect, and implement solutions, particularly in the areas of Digital Strategy, Identity & Access Management, API Management, Data Security, IT Governance, Risk & Compliance and Mobile & Cloud Security.

He has held a variety of leadership, advisory, sales, marketing, product management and consulting roles in both Europe and Australia in some of the world's leading companies, including EY, IBM, CA Technologies and NetIQ.

In addition to being a published author in Identity, Access & Security Management, Ian is often quoted in the press, has written articles for major publications, delivered keynote presentations at many events across the Asia Pacific region and authors a syndicated blog, which is read by technology executives, industry experts and IT professionals.

Media/ In the press

Articles Written

Publication Date Title
BRW March 27, 2014 Doing business in Asia: five etiquette tips
CSO Online December 18, 2013 IT security predictions for 2014
CIO Asia November 27, 2013 Usable identification - the key to a world without passwords
SCMagazine October 23, 2013 Gain RELIEF with future proof security
Business Spectator July 23, 2013 Securing the hybrid cloud
CSO Online May 9, 2013 Login to the real world with your Facebook account
SCMagazine December 17, 2012 Predictions 2013: NetIQ
CSO Online June 27, 2012 Consumerisation of IT
Enterprise Innovation May 28, 2012 Identity Management wrapped in access governance: A recipe for IT security risk management
CSO Online March 29, 2012 Addressing the security risks of BYO device

Quoted in the media

Publication Date Title
CRN August 12, 2014 CA Technologies brings in new ANZ security head
ARN August 11, 2014 CA Technologies appoints security lead
iTWire August 11, 2014 Yip takes on security strategy at CA
Government Technology Review July 23, 2014 Identity the burning question for Fire and Rescue NSW
Sky Business News January 29, 2014 TV Interview on Tech Behind Business
Sydney Morning Herald January 22, 2014 Seven signs your company has been hacked
ZDNet January 13, 2014 Is privacy too complex for social media to handle alone?
CSO Online June 18, 2013 2013: new technologies pose new risks
CSO Online June 7, 2013 CSO Roundtable: Effective Mobile Security
ZDNet May 24, 2013 Breach notification delays no excuse for poor security
CSO Online May 15, 2013 The new IAM: nailing shut the door on the Trojan horse
ZDNet January 10, 2013 M2M and the Internet of Things: How secure is it?
ZDNet December 21, 2012 Travel Tech Q&A: NetIQ's Ian Yip
Biztech2 October 23, 2012 Don't Re-Invent The Wheel For Cloud Security
CSO Online October 22, 2012 BYOD employee freedoms compromise security, expert warns
Technology Spectator October 16, 2012 The BYOD security commandments
iTWire October 11, 2012 BYOD? Just deal with it
ZDNet October 10, 2012 The 'Five Stages' of BYOD and why it's like 'Gangnam Style'
MySecurityTV September 19, 2012 NetIQ speaks about the trends that affect IT Security decisions in organisations
Reseller News September 7, 2012 Changing tech landscape requires new thinking on security
CSO Online July 26, 2012 Understanding identity underpins BYOD security
CSO Online July 25, 2012 Standards could turn social networks into trusted ID brokers: NetIQ
Express Computer July 11, 2012 We are looking to build intelligence into our SIEM solutions