Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

Security Culture in Global Industrial Organizations

SoSafe
05/12/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Effective global security requires cultural adaptation—awareness training must be delivered in native languages and tailored to regional work styles, with European employees showing more experimental behavior than Asian colleagues who follow structured approaches.
  • TDK successfully defended against an AI-powered voice phishing attack targeting their finance team by maintaining strong verification protocols, demonstrating that human awareness and procedural discipline remain critical defenses against sophisticated social engineering.
  • Supply chain security demands risk-based supplier categorization, with critical IT/OT partners required to meet certifications like TISAX and NIS2, while their employees participate directly in TDK's internal security training programs.
  • Shadow IT and shadow AI represent parallel challenges as employees seek unauthorized productivity tools, requiring security teams to build trust and open dialogue so they can evaluate and enable safe alternatives rather than simply blocking innovation.
  • The future threat landscape will be dominated by AI-driven attacks indistinguishable from legitimate communications, supply chain vulnerabilities from less mature partners, and the need for both technical solutions and enhanced human psychological awareness to detect manipulation.
  • Building security culture requires personal presence and direct employee engagement across global sites, with CISOs needing to understand not just technical requirements but the human motivations and challenges behind security behaviors.

Building Security Culture Across Global Operations

Thomas Zeulner, CISO and Global Head of Security at TDK Electronics, shares insights from managing cybersecurity across a global industrial organization with over 21,000 employees and production sites worldwide. He emphasizes that effective security cannot be managed from a desk alone—it requires personal presence, cultural understanding, and direct engagement with employees across different regions. Zeulner explains how security culture must be adapted to local contexts, with awareness training delivered in native languages and tailored to regional work styles. He contrasts European employees' tendency toward experimental workarounds with Asian colleagues' more structured approach, highlighting the need for culturally sensitive security programs that account for these differences.

Real-World Threats and Human-Centric Defense

The conversation explores concrete attack scenarios TDK has faced, including a sophisticated voice phishing attempt targeting a finance employee. The attacker impersonated the company president using AI-generated voice technology, creating urgency around a supposed acquisition. The employee's security awareness and verification protocols—including requesting a callback to the official number and recording the suspicious call—prevented the attack. Zeulner uses such incidents as learning opportunities, sharing them across the organization to demonstrate real threats and reinforce the importance of verification procedures. He stresses that technology alone cannot solve security challenges; the human element—from awareness to usability considerations—is equally critical in building effective defenses.

Supply Chain Risk and Shadow IT Challenges

Zeulner addresses the growing complexity of supply chain security in a global manufacturing context. TDK categorizes suppliers by criticality and risk level, with IT and OT service providers facing stricter requirements including certifications like TISAX for automotive suppliers and NIS2 compliance for European operations. The company requires suppliers to demonstrate security practices, including employee training programs, with critical partners' staff participating directly in TDK's internal security training. Beyond traditional supply chain concerns, Zeulner identifies shadow IT and shadow AI as parallel challenges, with employees seeking unauthorized tools to improve productivity. He advocates for open dialogue, encouraging employees to voice their needs so security teams can evaluate solutions that balance usability with protection.

The Future of Enterprise Security

Looking ahead, Zeulner identifies three major concerns for global organizations: AI-driven cyberattacks that will become increasingly difficult to distinguish from legitimate communications, the proliferation of shadow IT and shadow AI as employees seek productivity tools outside approved systems, and supply chain vulnerabilities where less technologically mature partners create entry points for attackers. He emphasizes that future security will require both advanced technical solutions and enhanced human psychological awareness to detect manipulation attempts. The key to success lies in building trust between security teams and employees, maintaining an open error culture where incidents become learning opportunities, and ensuring security enables rather than blocks business innovation. Zeulner's background in emergency services informs his people-first approach, viewing security professionals as having a helper syndrome—a desire to protect and enable others rather than simply enforce restrictions.

Chapters

0:00 - Introduction and Guest Background
2:27 - Icebreaker Questions
4:36 - TDK Electronics Overview
6:42 - Global Security Challenges
10:46 - Cultural Adaptation in Security
17:46 - AI Voice Phishing Attack Case Study
22:29 - Supply Chain Security Management
27:00 - Building Security Culture Globally
37:46 - Personal Security and Employee Motivation
42:56 - Personal Motivation and Background
45:26 - Skills for Security Professionals
47:37 - Future Security Challenges

Key Quotes

0:06 "Früher hat man immer gesagt, der Mitarbeiter ist der schwächste Glied in der Kette, das sage ich aber nicht."
0:10 "Für mich ist es wichtig, einfach den Kontakt und den Blick, Kontakt zu den Mitarbeitern vorzuhaben."
5:08 "TDK ist in everything, everywhere."
14:06 "Für mich ist es wichtig, einfach den Kontakt und den Blick, Kontakt zu den Mitarbeitern vorzuhaben."
27:22 "Du darfst nicht an einen Mitarbeiter rangehen mit Englisch oder mit Deutsch, der einer anderen Landessprache mächtig ist."
28:06 "Ich bin kein Freund von Schulungs-Sessions, die 15 Minuten, 30 Minuten dauern, wo der Mitarbeiter einfach nur durchblickt und nichts dabei rüberkommt letztendlich."
40:08 "Es ist wichtig in den Positionen, dass du einfach auch Informationen aufnimmst und Kritik auch annimmst, vor allem auch."
46:15 "Du hast ein gewisses Heldersyndrom. Zu sagen, ja, ich versuche eben nicht nur das theoretische Wissen zu haben, sondern versuche auch die Menschen zu verstehen, die dahinterstecken."

Categories:
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Security Operations
  • Best Practices
  • Technical Deep Dive
  • Identity & Access
  • Threat Intelligence
  • Compliance & Governance
  • Global security culture
  • Cross-cultural awareness training
  • AI-powered social engineering
  • Voice phishing
  • vishing
  • Supply chain security
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Security Culture in Global Industrial Organizations

              Upcoming Webinar Calendar

              • 05/12/2026
                11:30 PM
                05/12/2026
                Implementing Effective Strategies for Active Directory Security and Data Protection
                https://www.truthinit.com/index.php/channel/1888/implementing-effective-strategies-for-active-directory-security-and-data-protection/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Reveal Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-reveal-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases
                https://www.truthinit.com/index.php/channel/1936/establishing-a-robust-ai-governance-framework-for-genai-throughout-deployment-phases/
              • 05/20/2026
                08:00 AM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1937/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/20/2026
                10:00 PM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1953/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/27/2026
                10:00 AM
                05/27/2026
                Adopting AI: From Illusion to Intentional Control
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transitioning-from-illusion-to-purposeful-mastery/
              • 05/28/2026
                01:00 PM
                05/28/2026
                Harnessing AI for Smaller Teams: Strategies for Secure Implementation
                https://www.truthinit.com/index.php/channel/1951/harnessing-ai-for-smaller-teams-strategies-for-secure-implementation/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Spring of Satori: Delving into Recent Findings and the 2026 Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-delving-into-recent-findings-and-the-2026-threat-landscape/
              • 06/04/2026
                02:00 AM
                06/04/2026
                Mastering the Unseen: Managing Shadow AI and Agentic MCP Traffic
                https://www.truthinit.com/index.php/channel/1948/mastering-the-unseen-managing-shadow-ai-and-agentic-mcp-traffic/
              • 06/16/2026
                07:00 AM
                06/16/2026
                Transforming Data Risk into Actionable Priorities: Essential Fixes First
                https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-essential-fixes-first/

              Upcoming Events

              • May
                12

                Implementing Effective Strategies for Active Directory Security and Data Protection

                05/12/202611:30 PM ET
                • May
                  13

                  Transforming the Black Box: Reveal Hidden Threats and AI Risks through Data Lineage

                  05/13/202601:00 AM ET
                  • May
                    13

                    Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage

                    05/13/202605:00 AM ET
                    • May
                      19

                      Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases

                      05/19/202601:00 PM ET
                      • May
                        20

                        Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle

                        05/20/202608:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version