{"id":12505,"date":"2022-04-27T06:43:27","date_gmt":"2022-04-27T06:43:27","guid":{"rendered":"https:\/\/test.uploadbook.com\/syscom\/?p=12505"},"modified":"2022-04-29T15:19:30","modified_gmt":"2022-04-29T15:19:30","slug":"employee-spotlight-kobayashi-oyama","status":"publish","type":"post","link":"https:\/\/test.uploadbook.com\/syscom\/en\/employee-spotlight-kobayashi-oyama\/","title":{"rendered":"Employee Spotlight: Kaito Kobayashi &#038; Tokio Oyama"},"content":{"rendered":"<p>[vc_row el_class=&#8221;pt-80 pb-80 padding-box padding-full-left&#8221;][vc_column][vc_column_text]<\/p>\n<h6 class=\"dred mb-0\">FEATURED EMPLOYEE<\/h6>\n<h2 class=\"mb-10\">How Kaito Kobayashi and Tokio Oyama Keep SYSCOM at the Frontier of Security Solutions<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row row_mask_bg=&#8221;&#8221; row_arrow=&#8221;&#8221; el_class=&#8221;pb-30 padding-box padding-full-left&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;first-column&#8221;][vc_row_inner][vc_column_inner el_class=&#8221;rounded-image pb-40&#8243;][vc_single_image image=&#8221;12506&#8243; img_size=&#8221;syscom_image_rounded&#8221; vc_none_hover_effect=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner cms_row_inner_overflow=&#8221;&#8221; el_class=&#8221;pb-40&#8243;][vc_column_inner][vc_column_text]<\/p>\n<table class=\"employee dual\">\n<tbody>\n<tr>\n<td>\n<h4 class=\"light\">Name:<\/h4>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p class=\"s1\">Kaito Kobayashi<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h4 class=\"light\">Role:<\/h4>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p class=\"s1\">Assistant Manager \/ Senior Security Analyst<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h4 class=\"light\">Division:<\/h4>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p class=\"s1\">SOC (Security Operations Center)<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h4 class=\"light\">Location:<\/h4>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p class=\"s1\">New York Office<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h4 class=\"light\">Expertise:<\/h4>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p class=\"s1\">Incident Response and Handling<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h4 class=\"light\">Experience:<\/h4>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p class=\"s1\">3 years in SYSCOM<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h4 class=\"light\">Hobbies:<\/h4>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p class=\"s1\">Keeping houseplant<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_row_inner][vc_column_inner el_class=&#8221;rounded-image pb-40&#8243;][vc_single_image image=&#8221;12508&#8243; img_size=&#8221;syscom_image_rounded&#8221; vc_none_hover_effect=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner cms_row_inner_overflow=&#8221;&#8221; el_class=&#8221;pb-40&#8243;][vc_column_inner][vc_column_text]<\/p>\n<table class=\"employee dual\">\n<tbody>\n<tr>\n<td>\n<h4 class=\"light\">Name:<\/h4>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p class=\"s1\">Tokio Oyama<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h4 class=\"light\">Role:<\/h4>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p class=\"s1\">Security Analyst<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h4 class=\"light\">Division:<\/h4>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p class=\"s1\">SOC (Security Operations Center)<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h4 class=\"light\">Location:<\/h4>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p class=\"s1\">New York Office<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h4 class=\"light\">Expertise:<\/h4>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p class=\"s1\">Cybersecurity<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h4 class=\"light\">Experience:<\/h4>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p class=\"s1\">9 months in SYSCOM (Major in Computer Science w\/ Concentration in Cybersecurity)<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h4 class=\"light\">Hobbies:<\/h4>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p class=\"s1\">Skiing, Hiking<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8221;pb-80 padding-box padding-full-left&#8221;][vc_column][vc_column_text]Much has changed in the past two years. How we work, where we work, and the nature of work itself have been fundamentally altered by a pandemic, social upheaval, and technology advancing to meet the moment. In many ways, the cybersecurity approach of the mid-2010s isn\u2019t just out of date\u2014it\u2019s downright dangerous for modern companies to adopt.<\/p>\n<p>Few know this better than Kaito Kobayashi and Tokio Oyama at SYSCOM GLOBAL SOLUTIONS\u2019 Security Operations Center in New York. \u201cBefore Covid, it was simple,\u201d says Kaito, Senior Security Analyst. \u201cEveryone at the office used their office computer to access an office server on an office network. The office meant safety, and everything else meant danger.\u201d[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;pb-80 padding-box padding-full-left&#8221;][vc_column][vc_single_image image=&#8221;12512&#8243; img_size=&#8221;syscom_image_center&#8221; vc_none_hover_effect=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;pb-120 padding-box padding-full-left&#8221;][vc_column][vc_column_text]That kind of control over internal systems is gone, says Kaito. \u201cNow, everyone\u2019s working from home, from the cafe. They\u2019re using their PC, a phone, and different wifi networks.\u201d With so many different locations, devices, and networks in your distributed workforce\u2019s day-to-day work, the opportunities for viruses and spyware to get through increases dramatically. \u201cThe infrastructure has to protect everything. You can\u2019t just secure the network or server or PC. Threats can come in from any angle, so you have to protect from every angle.\u201d<\/p>\n<p>The question today isn\u2019t <strong>if<\/strong> your tech stack will be breached, but <strong>when<\/strong> and <strong>how<\/strong>. And as far as Tokio, Security Analyst in New York, is concerned, any security posture that\u2019s still trying to prevent breaches is lacking. \u201cWe have to be concerned about what happens in user home environments,\u201d says Tokio. \u201cThey don\u2019t have enterprise-grade firewalls or the protections of internal networks. If the user is WFH, bad actors just have to hack the home router. So we have to protect that environment, too.\u201d[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;pt-120 pb-120 padding-box padding-full-left gray-d0-bg&#8221;][vc_column][vc_column_text]<\/p>\n<h2 class=\"big_quote dred\">Use all solutions available to solve the problem. Having the latest firewall in your office isn\u2019t enough anymore.<\/h2>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Tokio Oyama<\/h4>\n<p>Security Analyst[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;pt-120 pb-80 padding-box padding-full-left&#8221;][vc_column][vc_column_text]So what\u2019s a cybersecurity analyst to do in an age where malware breaches <strong>can\u2019t<\/strong> be stopped? Expect them, anticipate them, and make sure the damage is limited. \u201cWe have to use all solutions available to solve that problem,\u201d says Tokio. \u201cHaving the latest firewall in your office isn\u2019t enough anymore.\u201d<\/p>\n<p>Tokio had to put this idea into action recently. A client had accidentally distributed a file containing sensitive information to his employees, and contacted the Security Operations Center to figure out who had accessed it and if any duplicates existed within his cybersecurity environment. While not necessarily a cybersecurity threat, this was still a major incident that required the SOC.<\/p>\n<p>\u201cI came up with the idea of using Crowdstrike\u2019s EDR tools, normally used for tracking down malware, to help track down all the copies of this file in the environment.\u201d Crowdstrike is an Endpoint Detection and Response tool that logs actions taken on all computers with the Crowdstrike sensor in them. \u201cI managed to extract the list of users who had downloaded or accessed this file, and the client was able to track them down and delete the files.\u201d[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;pb-80 padding-box padding-full-left&#8221;][vc_column][vc_single_image image=&#8221;12514&#8243; img_size=&#8221;syscom_image_center&#8221; vc_none_hover_effect=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;pb-120 padding-box padding-full-left&#8221;][vc_column][vc_column_text]While unconventional, Tokio still effectively assessed the threat, took stock of the Endpoint Detection and Response tools available to him, and was able to contain the threat. In this new world of multiple devices, networks, and an increasingly digitally-literate populace, preparing oneself to react quickly to breaches is essential.<\/p>\n<p>Kaito is a firm believer in Next-Gen Anti-Virus tools. \u201cTraditional AV can\u2019t catch new viruses,\u201d says Kaito. Rather than trying to stay on top of the current state of cyber warfare, \u201cNGAV monitors user activity and behavior to determine safety and trustworthiness. Zero-trust comes into play here.\u201d<\/p>\n<p>If you assume everything is a threat, you\u2019ll catch and corrall the threats before they can run rampant through your entire system. In fact, analyzing user behavior and anticipating security breaches can often pay even greater dividends than adding layer after layer of robust anti-virus measures. \u201cMake it simple,\u201d says Kaito. \u201cIf there\u2019s too much product, too much stuff, you might create a little hole. Make it simple, make it improve the security, and make it user-friendly.\u201d[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;pt-120 pb-120 padding-box padding-full-left gray-d0-bg&#8221;][vc_column][vc_column_text]<\/p>\n<h2 class=\"big_quote dred\">Threats can come in from any angle, so you have to protect from every angle.<\/h2>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Kaito Kobayashi<\/h4>\n<p>Senior Security Analyst[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;pt-120 pb-80 padding-box padding-full-left&#8221;][vc_column][vc_column_text]\u201cIt\u2019s about controlling for the human element,\u201d chimes in Tokio. \u201cLet\u2019s say I create an admin account on a directory server, just to adjust a setting or add a user. I never use it again, but I don\u2019t delete it either. Now it\u2019s there and I\u2019ve forgotten about it. If a hacker accesses that, they can access the entire server.\u201d<\/p>\n<p>An element of common sense is needed in tandem with cutting-edge cybersecurity measures. \u201cKeep in mind the environment and where you can strengthen your security environment,\u201d summarizes Tokio. \u201cClosing one hole can make the difference between corrupting your whole environment or just one computer.\u201d[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;pb-80 padding-box padding-full-left&#8221;][vc_column][vc_single_image image=&#8221;12516&#8243; img_size=&#8221;syscom_image_center&#8221; vc_none_hover_effect=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;pb-120 padding-box padding-full-left&#8221;][vc_column][vc_column_text]It\u2019s clear that Kaito and Tokio love what they do. These two defenders at the frontier of security solutions talk about what working with SYSCOM clients is like. \u201cThe security products we offer are cutting edge and we are very flexible when it comes to implementation and monitoring,\u201d says Tokio. \u201cWe want to work with our customers to support their needs. We are not afraid to look for other solutions even if we do not yet offer it, or find new technology they\u2019re interested in.\u201d<\/p>\n<p>\u201cI started the Security Operations Center a year ago. We have over 500 users now and 20-30 customers,\u201d says Kaito. \u201cThe cyber security market has been expanding; in the next five years it will explode.\u201d<\/p>\n<p>To get started on your path towards a cybersecurity posture that\u2019s prepared for the future, reach out to our Security Operations Center , <a class=\"custom_link\" href=\"https:\/\/test.uploadbook.com\/syscom\/contact-us\/\">click here<\/a>.[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;pt-5per mt-120 padding-box padding-full-left gray-d0-bg&#8221;][vc_column][vc_column_text el_class=&#8221;pb-60&#8243;]<\/p>\n<h2>All Employee<br \/>\nSpotlight Pages<\/h2>\n<p>[\/vc_column_text][vc_raw_html]JTNDJTIxLS0lMjBUSElTJTIwSVMlMjBBJTIwQ1VTVE9NJTIwQkxPRyUyMExJU1QlMjAtJTNFJTIwU0VMRUNUJTIwVEhFJTIwUEFSRU5UJTIwQ0FURUdPUlklMjBPTiUyMFNFTEVDVE9SJTIwLS0lM0U=[\/vc_raw_html][cms_grid col_xs=&#8221;1&#8243; col_sm=&#8221;2&#8243; col_md=&#8221;3&#8243; col_lg=&#8221;3&#8243; source=&#8221;size:3|order_by:date|order:DESC|post_type:post|categories:190&#8243; cms_template=&#8221;cms_grid&#8211;blog-columns-syscom-little.php&#8221;][vc_column_text el_class=&#8221;block-text-with-link pt-40&#8243;]<a class=\"cms-button md mt-0\" href=\"https:\/\/test.uploadbook.com\/syscom\/category\/resources\/blog-posts\/employee-spotlight\/\">read more<\/a>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;pt-5per padding-box padding-top padding-bottom footer-bg padding-bottom-gray-d0&#8243;][vc_column][vc_raw_html el_id=&#8221;footer-block&#8221;]JTNDJTIxLS0lMjBUSElTJTIwSVMlMjBBJTIwRk9PVEVSJTIwQkxPQ0slMjAtLSUzRQ==[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How Kaito Kobayashi and Tokio Oyama Keep SYSCOM at the Frontier of Security Solutions. &#8220;Having the latest firewall in your office isn\u2019t enough anymore. Threats can come in from any angle, so you have to protect from every angle.&#8221;<\/p>\n","protected":false},"author":1,"featured_media":12512,"comment_status":"open","ping_status":"open","sticky":false,"template":"single-interview.php","format":"standard","meta":[],"categories":[104,190,100,99],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Employee Spotlight: Kaito Kobayashi &amp; Tokio Oyama - SYSCOM GLOBAL SOLUTIONS<\/title>\n<meta name=\"description\" content=\"How Kaito Kobayashi and Tokio Oyama Keep SYSCOM at the Frontier of Security Solutions. &quot;Having the latest firewall in your office isn\u2019t enough anymore. Threats can come in from any angle, so you have to protect from every angle.&quot;\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/test.uploadbook.com\/syscom\/en\/employee-spotlight-kobayashi-oyama\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Employee Spotlight: Kaito Kobayashi &amp; Tokio Oyama - SYSCOM GLOBAL SOLUTIONS\" \/>\n<meta property=\"og:description\" content=\"How Kaito Kobayashi and Tokio Oyama Keep SYSCOM at the Frontier of Security Solutions. &quot;Having the latest firewall in your office isn\u2019t enough anymore. Threats can come in from any angle, so you have to protect from every angle.&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/test.uploadbook.com\/syscom\/en\/employee-spotlight-kobayashi-oyama\/\" \/>\n<meta property=\"og:site_name\" content=\"SYSCOM GLOBAL SOLUTIONS\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-27T06:43:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-29T15:19:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/test.uploadbook.com\/syscom\/wp-content\/uploads\/2022\/04\/image-wide.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1144\" \/>\n\t<meta property=\"og:image:height\" content=\"644\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/employee-spotlight-kobayashi-oyama\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/employee-spotlight-kobayashi-oyama\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#\/schema\/person\/9d19ea7253c352b443066e0697f0cffa\"},\"headline\":\"Employee Spotlight: Kaito Kobayashi &#038; Tokio Oyama\",\"datePublished\":\"2022-04-27T06:43:27+00:00\",\"dateModified\":\"2022-04-29T15:19:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/employee-spotlight-kobayashi-oyama\/\"},\"wordCount\":1565,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#organization\"},\"articleSection\":[\"Blog Posts\",\"Employee Spotlight\",\"News\",\"Resources\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/test.uploadbook.com\/syscom\/en\/employee-spotlight-kobayashi-oyama\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/employee-spotlight-kobayashi-oyama\/\",\"url\":\"https:\/\/test.uploadbook.com\/syscom\/en\/employee-spotlight-kobayashi-oyama\/\",\"name\":\"Employee Spotlight: Kaito Kobayashi & Tokio Oyama - SYSCOM GLOBAL SOLUTIONS\",\"isPartOf\":{\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#website\"},\"datePublished\":\"2022-04-27T06:43:27+00:00\",\"dateModified\":\"2022-04-29T15:19:30+00:00\",\"description\":\"How Kaito Kobayashi and Tokio Oyama Keep SYSCOM at the Frontier of Security Solutions. \\\"Having the latest firewall in your office isn\u2019t enough anymore. Threats can come in from any angle, so you have to protect from every angle.\\\"\",\"breadcrumb\":{\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/employee-spotlight-kobayashi-oyama\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/test.uploadbook.com\/syscom\/en\/employee-spotlight-kobayashi-oyama\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/employee-spotlight-kobayashi-oyama\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/test.uploadbook.com\/syscom\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Employee Spotlight: Kaito Kobayashi &#038; Tokio Oyama\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#website\",\"url\":\"https:\/\/test.uploadbook.com\/syscom\/en\/\",\"name\":\"Syscom Global Solutions\",\"description\":\"Introduce IT &amp; digital solutions and services by SYSCOM GLOBAL SOLUTIONS\",\"publisher\":{\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/test.uploadbook.com\/syscom\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#organization\",\"name\":\"syscom global solutions\",\"url\":\"https:\/\/test.uploadbook.com\/syscom\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/test.uploadbook.com\/syscom\/wp-content\/uploads\/2020\/12\/logo_final.png\",\"contentUrl\":\"https:\/\/test.uploadbook.com\/syscom\/wp-content\/uploads\/2020\/12\/logo_final.png\",\"width\":204,\"height\":46,\"caption\":\"syscom global solutions\"},\"image\":{\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#\/schema\/person\/9d19ea7253c352b443066e0697f0cffa\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/61f8a19cc78b7c67a7be934b260464aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/61f8a19cc78b7c67a7be934b260464aa?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/test.uploadbook.com\/syscom\"],\"url\":\"https:\/\/test.uploadbook.com\/syscom\/en\/author\/info_5ff8xebk\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Employee Spotlight: Kaito Kobayashi & Tokio Oyama - SYSCOM GLOBAL SOLUTIONS","description":"How Kaito Kobayashi and Tokio Oyama Keep SYSCOM at the Frontier of Security Solutions. \"Having the latest firewall in your office isn\u2019t enough anymore. Threats can come in from any angle, so you have to protect from every angle.\"","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/test.uploadbook.com\/syscom\/en\/employee-spotlight-kobayashi-oyama\/","og_locale":"en_US","og_type":"article","og_title":"Employee Spotlight: Kaito Kobayashi & Tokio Oyama - SYSCOM GLOBAL SOLUTIONS","og_description":"How Kaito Kobayashi and Tokio Oyama Keep SYSCOM at the Frontier of Security Solutions. \"Having the latest firewall in your office isn\u2019t enough anymore. Threats can come in from any angle, so you have to protect from every angle.\"","og_url":"https:\/\/test.uploadbook.com\/syscom\/en\/employee-spotlight-kobayashi-oyama\/","og_site_name":"SYSCOM GLOBAL SOLUTIONS","article_published_time":"2022-04-27T06:43:27+00:00","article_modified_time":"2022-04-29T15:19:30+00:00","og_image":[{"width":1144,"height":644,"url":"https:\/\/test.uploadbook.com\/syscom\/wp-content\/uploads\/2022\/04\/image-wide.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/employee-spotlight-kobayashi-oyama\/#article","isPartOf":{"@id":"https:\/\/test.uploadbook.com\/syscom\/en\/employee-spotlight-kobayashi-oyama\/"},"author":{"name":"admin","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#\/schema\/person\/9d19ea7253c352b443066e0697f0cffa"},"headline":"Employee Spotlight: Kaito Kobayashi &#038; Tokio Oyama","datePublished":"2022-04-27T06:43:27+00:00","dateModified":"2022-04-29T15:19:30+00:00","mainEntityOfPage":{"@id":"https:\/\/test.uploadbook.com\/syscom\/en\/employee-spotlight-kobayashi-oyama\/"},"wordCount":1565,"commentCount":0,"publisher":{"@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#organization"},"articleSection":["Blog Posts","Employee Spotlight","News","Resources"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/test.uploadbook.com\/syscom\/en\/employee-spotlight-kobayashi-oyama\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/employee-spotlight-kobayashi-oyama\/","url":"https:\/\/test.uploadbook.com\/syscom\/en\/employee-spotlight-kobayashi-oyama\/","name":"Employee Spotlight: Kaito Kobayashi & Tokio Oyama - SYSCOM GLOBAL SOLUTIONS","isPartOf":{"@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#website"},"datePublished":"2022-04-27T06:43:27+00:00","dateModified":"2022-04-29T15:19:30+00:00","description":"How Kaito Kobayashi and Tokio Oyama Keep SYSCOM at the Frontier of Security Solutions. \"Having the latest firewall in your office isn\u2019t enough anymore. Threats can come in from any angle, so you have to protect from every angle.\"","breadcrumb":{"@id":"https:\/\/test.uploadbook.com\/syscom\/en\/employee-spotlight-kobayashi-oyama\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/test.uploadbook.com\/syscom\/en\/employee-spotlight-kobayashi-oyama\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/employee-spotlight-kobayashi-oyama\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/test.uploadbook.com\/syscom\/en\/"},{"@type":"ListItem","position":2,"name":"Employee Spotlight: Kaito Kobayashi &#038; Tokio Oyama"}]},{"@type":"WebSite","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#website","url":"https:\/\/test.uploadbook.com\/syscom\/en\/","name":"Syscom Global Solutions","description":"Introduce IT &amp; digital solutions and services by SYSCOM GLOBAL SOLUTIONS","publisher":{"@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/test.uploadbook.com\/syscom\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#organization","name":"syscom global solutions","url":"https:\/\/test.uploadbook.com\/syscom\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#\/schema\/logo\/image\/","url":"https:\/\/test.uploadbook.com\/syscom\/wp-content\/uploads\/2020\/12\/logo_final.png","contentUrl":"https:\/\/test.uploadbook.com\/syscom\/wp-content\/uploads\/2020\/12\/logo_final.png","width":204,"height":46,"caption":"syscom global solutions"},"image":{"@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#\/schema\/person\/9d19ea7253c352b443066e0697f0cffa","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/61f8a19cc78b7c67a7be934b260464aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/61f8a19cc78b7c67a7be934b260464aa?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/test.uploadbook.com\/syscom"],"url":"https:\/\/test.uploadbook.com\/syscom\/en\/author\/info_5ff8xebk\/"}]}},"_links":{"self":[{"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/posts\/12505"}],"collection":[{"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/comments?post=12505"}],"version-history":[{"count":25,"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/posts\/12505\/revisions"}],"predecessor-version":[{"id":12541,"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/posts\/12505\/revisions\/12541"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/media\/12512"}],"wp:attachment":[{"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/media?parent=12505"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/categories?post=12505"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/tags?post=12505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}