Hi [[ session.user.profile.firstName ]]

(ISC)2 APAC Secure Webinars

  • Date
  • Rating
  • Views
  • IoT와 웹 보안 위협의 실체와 대응방안
    IoT와 웹 보안 위협의 실체와 대응방안 Yongkhi Paek, Senior Security Sales Specialist, Akamai Technologies Korea Recorded: Sep 14 2017 59 mins
    최근 빈번하게 발생하고 주목해야 하는 보안 공격들의 패턴 및 특이사항들에 대해 살펴보고, 기업의 비즈니스 연속성과 안전성을 위해 이러한 공격 위협들에 대해 어떤 효과적이고 효율적인 방법으로 대응 및 대비해야 하는지 알아봅니다.

    1. 최신 웹 보안의 트렌드
    2. 2분기 주요 웹 애플리케이션 공격 분석
    3. 2분기 주요 디도스 공격에 대한 통계
    4. IoT 보안 공격 양상
    5. 웹 보안의 변화 추이
    6. 요약 및 질의답변
  • Improving Credential Abuse Threat Mitigation
    Improving Credential Abuse Threat Mitigation Or Katz, Principal Lead Security Researcher, Akamai & James Tin, Principal Enterprise Security Architect, Akamai Recorded: Aug 30 2017 58 mins
    Credential abuse attacks have become a prevalent threat in recent years, and a successful credential abuse attack campaign can result in damaging consequences such as losing access and control over the accounts, data breach and fraudulent transactions.

    Many of the accounts being abused are compromised account, which are the result of information breach in vulnerable web applications. The problem starts once visitors of highly-secured web applications create login credentials and then recycle those credentials to access another potentially vulnerable web application.

    In this webinar, Akamai will present our latest research on malicious activity that sheds new light on credential abuse attack campaigns characteristics. The research reveals the techniques that are being used and what make these campaigns difficult to detect over long periods of time. We will show how collaboration of attack evidence on different targets can become a solution to mitigate such attacks.

    The speakers will also share key attack data and trends observed from the latest Akamai Q2 2017 State of the Internet Security Report.

    Join Akamai and (ISC)² on Aug 30 (Wed) at 13:00 (Singapore time) to learn more about improving credential abuse threat mitigation.

    Presenters:
    - Or Katz, Principal Lead Security Researcher, Akamai
    - James Tin, Principal Enterprise Security Architect, Akamai

    Moderator:
    - Clayton Jones, Managing Director, APAC, (ISC)²
  • The Evolution of Vulnerability Management – Program Trends and Solutions
    The Evolution of Vulnerability Management – Program Trends and Solutions Michael Aboltins, Technical Product Manager Tenable Asia Pacific, Tenable Network Security Recorded: Jul 19 2017 61 mins
    Frequent cyber security attacks spreading around the world and affecting systems everywhere has become the "new norm". Recent changes in IT architecture such as virtual, mobile & cloud services, plus increasingly sophisticated cyber threats are forcing enterprise security practices and principles to be re-evaluated. Analyst research data shows that system vulnerabilities are still the largest contributing factor in enterprise data breaches. Thus, identifying vulnerable systems on your network and applying mitigations to them must continue to be a strong priority.

    This webinar will provide you with insight into how successful organisations have evolved their Vulnerability Management programs to gain a deeper understanding of their overall Security posture. The presentation will share ideas to boost the effectiveness of your security program now and in future, taking into account the major new IT paradigms including Cloud, Containers & DevOps.

    Join Tenable and (ISC)² on July 19 (Wed) at 14:00 (Singapore time) to learn more about the evolution of vulnerability management.
  • Research Findings: Quantifying ROI for Application Security
    Research Findings: Quantifying ROI for Application Security Shelly Yao, Security Architect – South East Asia, Hewlett-Packard Enterprise Recorded: Jul 12 2017 53 mins
    Continuous delivery of application is the new norm. Businesses recognize that applications are a competitive differentiator so they are creating and pushing them out at a lightning pace, thus putting a lot of pressure on development and security teams. HPE Enterprise Security, together with Mainstay Partners, studied data collected from a broad set of Fortify customers to quantify the business value they are experiencing by building security into each phase of development.

    Join HPE and (ISC)² on July 12 (Wed) at 13:00 (Singapore time) to learn about the key findings from the research. Discover the ROI of application security practices for your organization to scale confidently for business growth.

    Presenter: Shelly Yao, Security Architect – South East Asia, Hewlett-Packard Enterprise
    Moderator: Clayton Jones, Regional Managing Director, Asia-Pacific, (ISC)²
  • The Evolution of Vulnerability Management 進化を迫られる脆弱性管理
    The Evolution of Vulnerability Management 進化を迫られる脆弱性管理 花檀 明伸 (Akinobu Kadan), Senior System Engineer, Tenable Network Security Recorded: Jun 28 2017 61 mins
    現代のサイバーセキュリティ攻撃は全世界規模で発生し、数時間で数百万台のシステムが被害を被るケースもあります。短時間で大規模な被害が発生する要因のひとつにIT環境の変化があると、テナブルは考えています。仮想化やクラウドサービス、モバイル技術などの新しいテクノロジーの普及はサイバー攻撃の可能性を拡大し、従来型のエンタープライズ向けセキュリティ対策では十分な対応をおこなうことができません。一方で、システムが持つ脆弱性がセキュリティ侵害の最大の原因となっていることが、さまざまな調査から明らかになっています。新しい時代のITインフラに適応した総合的な脆弱性管理を実現し、攻撃のリスクを軽減することが求められているのです。

    このセッションでは、 IT環境の変化が必要とする脆弱性管理製品の新たな要件についてご紹介します。

    - 包括的な脆弱性管理の重要性
    - 脆弱性管理は定期診断から継続的監視へ
    - 継続的な脆弱性管理の効果 〜 統合化された分析、可視化機能と、コンプライアンス評価
    - 新しいインフラへの対応 〜 モバイル、仮想化、クラウド、コンテナ

    テナブルは、可視化やリスクの優先度評価、必要となるアクション、セキュリティコンプライアンスへの準拠状況などを包括的に管理するソリューションを提供して、IT資産に対するセキュリティの向上に貢献します。
  • The Dangers Within: 6 Hidden Signs of Cybersecurity Insider Threats
    The Dangers Within: 6 Hidden Signs of Cybersecurity Insider Threats Jon Piercey, SVP Security & Intelligence APAC, Nuix Recorded: Jun 28 2017 61 mins
    Threats from within the enterprise can pose the biggest cybersecurity risk to the organisation. Whether intentionally or accidentally, users with legitimate credentials can go about the network without triggering suspicion or alert, making their unauthorised activity difficult to detect. Insider threat activity can sometimes hide in plain sight, but what happens when people deliberately cover their tracks?

    In this webinar, you will learn:

    - Where to look for suspicious activity
    - How to set up traps that will catch malicious insiders
    - What finding paths across seemingly disparate data can reveal.

    According to a 2016 industry report, employees cause 77 percent of internal security breaches. Find out who is causing yours.

    Join Nuix’s and (ISC)² on Jun 28 (Wed) at 13:00 (Singapore time) and uncover the six hidden signs that help you detect the presence of insider threat activity.

    Presenter: Jon Piercey, SVP Security & Intelligence APAC, Nuix
    Moderator: Ir. Tejinder Singh, Senior Development Expert,T-Systems Malaysia SGA Security Engineering
  • Collective Security – Prairie Dogs vs Humans
    Collective Security – Prairie Dogs vs Humans Duncan Thomas, Director of Sales for APAC, PhishMe; Chuan-Wei Hoo, Technical Advisor, Asia-Pacific, (ISC)² Recorded: Jun 21 2017 61 mins
    As the security industry has continued to underinvest in the human element of security, phishing has become the top attack vector for cyber criminals. Breaches continue to occur in record numbers, identification takes an exorbitantly long time, and the most preferred target is an organization’s human assets. Empowering human assets to provide vetted intelligence into your incident response teams is often overlooked. Every organization has these human sensors, and there’s a natural desire for these employees to want to help.

    In this presentation, you will learn:

    • Why the cybersecurity industry is broken
    • How to reduce susceptibility to human-targeted attacks
    • How to empower users to become human sensors to recognize and report suspected attacks

    Join PhishMe and (ISC)² on Jun 21 (Wed) at 13:00 (Singapore time) and learn how you can empower your team and protect your organization from phishing attacks.
  • 互联网现状/互联网安全现状报告——最新DDoS及Web App攻击趋势概览
    互联网现状/互联网安全现状报告——最新DDoS及Web App攻击趋势概览 马俊 James, 阿卡迈中国高级售前工程师, 阿卡迈中国; Moderator: 阎光, (ISC)² 上海分会 会员主席, 德勤风险咨询, 副总监 Recorded: Jun 7 2017 60 mins
    参加这个网络研讨会,您可获取DDoS及Web应用攻击的流量和趋势的概览及深度分析。

    Akamai每天都承载了全球 15%到30%的Web流量,因此可以观察到大量的互联网攻击,从包含SQL注入的恶意HTTP请求,到规模高达650Gbps的DDoS攻击。我们的安全专家会对此信息进行分析,对相关趋势和发现进行分享,这些信息都包含在我们按照季度发布的互联网现状/互联网安全现状报告中。我们将在本系列在线研讨会中发布相关信息。

    主要话题:
    - 互联网现状报告中的全球网络流量概况
    - APJ区域的网络攻击情况
    - IoT(物联网)僵尸网络是如何改变APJ地区网络攻击的拓扑结构的
    - IoT的安全责任

    参加Akamai 和 (ISC)² 在06月07日下午2:00至3:00的在线论坛《互联网现状/互联网安全现状报告——最新DDoS及Web App攻击趋势概览》,获取DDoS及Web应用攻击的流量和趋势的概览及深度分析,还等什么?赶紧加入我们吧。
  • 전세계 인터넷 보안 현황 보고서를 통해 살펴보는 최근 DDoS 및 웹 보안 공격 트렌드
    전세계 인터넷 보안 현황 보고서를 통해 살펴보는 최근 DDoS 및 웹 보안 공격 트렌드 인승진 (Howard Leen), 이사 (Enterprise Security Senior Architect), 아카마이코리아 Recorded: May 31 2017 61 mins
    아카마이는 방대한 양의 데이터를 분석하여 전세계 인터넷 보안에 대한 가장 정확도 높은 가시성을 제공하는 인터넷 보안 현황 보고서(State of the Internet Security Report)를 매 분기마다 발표하고 있습니다.

    해당 보고서를 통해 살펴보면 인터넷 상의 위협 트렌드가 최근 크게 변화하고 있다는 것을 알 수 있으며, 무엇보다도 IoT 기반의 봇넷을 활용한 DDoS 공격의 등장으로 최대 650Gbps에 이르는 대형 공격들이 벌어지고 있음을 확인할 수 있습니다.

    본 웨비나에서는 가장 최근에 발표된 인터넷 보안 현황 보고서를 기반으로 아래와 같은 내용들을 중점적으로 살펴볼 예정입니다.

    - 최근 인터넷 보안 현황 보고서를 통해 알아보는 글로벌 주요 보안 이슈들
    - 아시아 지역에서 발생한 보안 공격 통계
    - IoT 봇넷이 아시아 지역의 보안에 가져온 영향
    - IoT 보안 대비의 중요성
  • State of the Internet/ Security Report–Latest DDoS and Web App Attack Trends
    State of the Internet/ Security Report–Latest DDoS and Web App Attack Trends Nick Rieniets, Senior Security Specialist, Akamai Technologies Recorded: May 24 2017 60 mins
    As an organization that delivers and protects 15-30% of the world’s web traffic on a daily basis, Akamai is uniquely positioned to observe a large amount of attacks ranging from 20 malicious HTTP requests containing SQL injection to DDoS attacks up to 650 Gbps. Our security experts analyze this information and share trends, observations, and findings in our quarterly State of the Internet / Security Report. We will present this information and associated insights in this webinar series.

    In this webinar, you will learn:

    • A summary of global findings from the State of the Internet Report
    • Attack statistics for APJ
    • How IoT botnets have changed the attack topology in APJ
    • The responsibilities for security of IoT

    Join Akamai and (ISC)² on May 24 (Wed) at 13:00 (Singapore time) for an overview and analysis of traffic and trends from Distributed Denial of Service (DDoS) and web application attacks.

Embed in website or blog