APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Unified Communication
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    Editor's Pick (1 - 4 of 8)
    left
    Taming the flow monster in real-time payments

    Bhupendra Warathe, Chief Information Officer (Corporate and Institutional Banking, Information Technology and Operations)

    Benefits in Unifying Business Communications

    Liam Mallett, CIO, Kings Group

    Innovation-Operations- Transformation - The New IOT Challenge of CIO

    Chin Seng Teo, Global CIO & SVP Global Information Systems, DP World

    Changing Face of Unified Communications from the 80's to Now

    Darshan Appayanna, CIO, Happiest Minds Technologies

    IntelligenceBank Digital Asset Management: Managing the Marketing Process, Easier

    CEO, Intelligence Bank

    ZWCAD Software Co., Ltd. : Integrated CAD/CAM Solution Provider

    CEO, ZWSOFT

    SIPEF

    Daniel Suraboyini, Head Global Chief Information Officer, Information Technology, SIPEF

    Distributed Ledger Tech for Public Good?

    Steven Koh, Director, Agile Consultancy & Engineering, Government Digital Services (GDS), GovTech Singapore

    right

    The Ever-Changing Landscape of Hospitality Industry

    Virgil Michael, IT Director, Hoiana Resort & Golf

    Tweet
    content-image

    Virgil Michael, IT Director, Hoiana Resort & Golf

    Hoiana Resort & Golf is a five-star luxury resort, tucked between Hoi An and Da Nang on Vietnam’s scenic central coast. Hoiana Resort & Golf offers world class gaming, hospitality, golf, beachfront and entertainment facilities as part of the phase one offering. It’s the perfect curated experience for guests wanting to escape the rush, enjoy the thrills or simply kick back and relax.

    Hoiana Resort & Golf’s IT Director, Virgil Michael, has over 20 years’ experience in the gaming, entertainment and hospitality industry and was involved in the project development since 2017. To architect the IT framework for such a large resort during the first phase, our IT strategy factored, compliance, trust models, digital ethics, cybersecurity and privacy to share technologies between multiple operators to reduce overall operating expenses.

    The gaming and hospitality industry is heavily regulated and in todays ever evolving cyber threat landscape some of our main concerns from business partners and executives were to ensure that our business is protected when using shared resources. When designing safeguards, we considered both local and international legislation for information asset protection. We researched on local IT laws, by partnering with our legal teams to design IT controls that enforces compliance. Part of this includes, data retention policies, data protection policies and overall IT governance.

    Corporate governance and IT security policies are only effective if people, processes and technology are aligned with the controls. We ensure that polices are enforced by applying technical controls to compliment IT governance. For example, password complexity policy is enforced by a credential provider that aligns modern day safeguards for identity protection and prevents weak passwords.

    There are always growing concerns on personal data protection and new laws are being ratified to protect citizens. Personal data protection is a challenge in any organization and we factor for cross-border data flows, processes when collecting personal data, encrypting data in transit with modern day strong ciphers and evolving controls to enhance the way we process personal data. The personal data protection program involves collaboration and IT has partnered with key stakeholders to ensure that the organization maintains compliance in the way we conduct business.

    User awareness is part and parcel of ensuring adoption to security techniques.

    For example, staff may perceive jumping through hurdles to access corporate resources such as not able to access certain websites, complexity in multifactor authentication and privacy concerns when using personal devices. We describe the need to protect corporate data in the policies so that staff buy-in to controls and understand that the protection of information assets is a shared responsibility.

    To create a balance, we always consider the cost of the asset vs the safeguard. This enables us to allow adequate protection for data assets. There are many technologies in todays market to safe guard information assets. When choosing safeguards, we opted for market leaders as modern-day attacks are so sophisticated, making use of obfuscating techniques to bypass security controls, not to mention the risk of nation state-sponsored attacks. Safeguards are configured for automation in defence, least privilege, monitoring, alerts and transparent auditing that enforces non-repudiation that allows us real time management on security events.

    Using personal devices to access corporate resources is a growing concern for IT security professionals, and we have again opted for a market leading solution in securing corporate data on BYOD devices. Using a mobile device management solution ensures that corporate data has strong encryption and that personal data is separated from corporate data that aligns with privacy concerns. The solution allows IT to enforce compliance for corporate data on BYOD devices and enables us to automatically disconnect the device from corporate resources if the device is compromised or remotely erase corporate data if the device is lost or stolen.

    You can only protect what you can see and as security gatekeepers, we only allow trusted devices to connect to our environment by enforcing 802.1x network access control and apply least privilege to networks and devices. Application and device control policies are key to end-point security. We invested in technology that consolidates the end-point host protection, to cater for IPS/ IDS, antimalware, application and device control that mitigates cyber-attacks and data leakage.

    • In today’s ever evolving cyber threat landscape some of our main concerns from business partners and executives were to ensure that our business is protected when using shared resources

    The network infrastructure and solutions at Hoiana Resort & Golf is complex and integrations between interoperable systems ensures that business processes are optimized so that staff can focus on customer service. When deploying complex integrations, stringent controls and least privilege are applied to ensure that data is not overexposed or compromised. The implementation of international standards such as ISO27000 series, NIST 800, CIS Controls, PCIDSS, ITILv4 and other best practices help to improve IT compliance and mitigates business risks.

    IT partnered with our HR team to build a strong workforce and culture that promotes awareness on IT security techniques to thwart cyber-attacks. IT also partnered with the facilities management team to address physical controls to protect IT datacentre dependencies, such as strong security access control to the data center, structured cabling, crac units, ups, fire suppression, generators and environmental monitoring to help support 24-hour business operations.

    At Hoiana Resort & Golf we celebrate shared success and none of this would possible without the support from our board, executive leadership, business partners, vendors and most all…the highly skilled, passionate and dedicated staff that make IT possible.

    tag

    Entertainment

    HR

    Facilities Management

    Weekly Brief

    loading
    Top 10 Unified Communication Solution Companies - 2018
    ON THE DECK

    Unified Communication 2018

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://unified-communication.apacciooutlook.com/cxoinsights/the-everchanging-landscape-of-hospitality-industry-nwid-9023.html?utm_source=google&utm_campaign=apacciooutlook_topslider