Live Webinars for InfoSec Professionals in Asia Pacific Time Zone
Looking for expertise and information to advance your career and tackle your challenges? Subscribe and join us for the educational webinars in APAC time zone. Earn CPEs quickly and at no cost by attending webinars: 1 hour of webinar equals 1 CPE. We welcome members and non members alike.
Credential abuse attacks have become a prevalent threat in recent years, and a successful credential abuse attack campaign can result in damaging consequences such as losing access and control over the accounts, data breach and fraudulent transactions.
Many of the accounts being abused are compromised account, which are the result of information breach in vulnerable web applications. The problem starts once visitors of highly-secured web applications create login credentials and then recycle those credentials to access another potentially vulnerable web application.
In this webinar, Akamai will present our latest research on malicious activity that sheds new light on credential abuse attack campaigns characteristics. The research reveals the techniques that are being used and what make these campaigns difficult to detect over long periods of time. We will show how collaboration of attack evidence on different targets can become a solution to mitigate such attacks.
The speakers will also share key attack data and trends observed from the latest Akamai Q2 2017 State of the Internet Security Report.
Join Akamai and (ISC)² on Aug 30 (Wed) at 13:00 (Singapore time) to learn more about improving credential abuse threat mitigation.
- Or Katz, Principal Lead Security Researcher, Akamai
- James Tin, Principal Enterprise Security Architect, Akamai
Frequent cyber security attacks spreading around the world and affecting systems everywhere has become the "new norm". Recent changes in IT architecture such as virtual, mobile & cloud services, plus increasingly sophisticated cyber threats are forcing enterprise security practices and principles to be re-evaluated. Analyst research data shows that system vulnerabilities are still the largest contributing factor in enterprise data breaches. Thus, identifying vulnerable systems on your network and applying mitigations to them must continue to be a strong priority.
This webinar will provide you with insight into how successful organisations have evolved their Vulnerability Management programs to gain a deeper understanding of their overall Security posture. The presentation will share ideas to boost the effectiveness of your security program now and in future, taking into account the major new IT paradigms including Cloud, Containers & DevOps.
Join Tenable and (ISC)² on July 19 (Wed) at 14:00 (Singapore time) to learn more about the evolution of vulnerability management.
Continuous delivery of application is the new norm. Businesses recognize that applications are a competitive differentiator so they are creating and pushing them out at a lightning pace, thus putting a lot of pressure on development and security teams. HPE Enterprise Security, together with Mainstay Partners, studied data collected from a broad set of Fortify customers to quantify the business value they are experiencing by building security into each phase of development.
Join HPE and (ISC)² on July 12 (Wed) at 13:00 (Singapore time) to learn about the key findings from the research. Discover the ROI of application security practices for your organization to scale confidently for business growth.
Presenter: Shelly Yao, Security Architect – South East Asia, Hewlett-Packard Enterprise
Moderator: Clayton Jones, Regional Managing Director, Asia-Pacific, (ISC)²
Threats from within the enterprise can pose the biggest cybersecurity risk to the organisation. Whether intentionally or accidentally, users with legitimate credentials can go about the network without triggering suspicion or alert, making their unauthorised activity difficult to detect. Insider threat activity can sometimes hide in plain sight, but what happens when people deliberately cover their tracks?
In this webinar, you will learn:
- Where to look for suspicious activity
- How to set up traps that will catch malicious insiders
- What finding paths across seemingly disparate data can reveal.
According to a 2016 industry report, employees cause 77 percent of internal security breaches. Find out who is causing yours.
Join Nuix’s and (ISC)² on Jun 28 (Wed) at 13:00 (Singapore time) and uncover the six hidden signs that help you detect the presence of insider threat activity.
Presenter: Jon Piercey, SVP Security & Intelligence APAC, Nuix
Moderator: Ir. Tejinder Singh, Senior Development Expert,T-Systems Malaysia SGA Security Engineering
As the security industry has continued to underinvest in the human element of security, phishing has become the top attack vector for cyber criminals. Breaches continue to occur in record numbers, identification takes an exorbitantly long time, and the most preferred target is an organization’s human assets. Empowering human assets to provide vetted intelligence into your incident response teams is often overlooked. Every organization has these human sensors, and there’s a natural desire for these employees to want to help.
In this presentation, you will learn:
• Why the cybersecurity industry is broken
• How to reduce susceptibility to human-targeted attacks
• How to empower users to become human sensors to recognize and report suspected attacks
Join PhishMe and (ISC)² on Jun 21 (Wed) at 13:00 (Singapore time) and learn how you can empower your team and protect your organization from phishing attacks.
As an organization that delivers and protects 15-30% of the world’s web traffic on a daily basis, Akamai is uniquely positioned to observe a large amount of attacks ranging from 20 malicious HTTP requests containing SQL injection to DDoS attacks up to 650 Gbps. Our security experts analyze this information and share trends, observations, and findings in our quarterly State of the Internet / Security Report. We will present this information and associated insights in this webinar series.
In this webinar, you will learn:
• A summary of global findings from the State of the Internet Report
• Attack statistics for APJ
• How IoT botnets have changed the attack topology in APJ
• The responsibilities for security of IoT
Join Akamai and (ISC)² on May 24 (Wed) at 13:00 (Singapore time) for an overview and analysis of traffic and trends from Distributed Denial of Service (DDoS) and web application attacks.