Hi [[ session.user.profile.firstName ]]

(ISC)2 APAC Secure Webinars

  • Date
  • Rating
  • Views
  • IDを使用して組織の内と外を防御する
    IDを使用して組織の内と外を防御する
    中西 一博, プロダクト・マーケティング・マネージャー, Akamai Technologies; 金子 春信, CISSP, シニア・プロダクト・マーケティング・マネージャー; Akamai Technologies Recorded: Mar 20 2019 62 mins
    ID は、セキュリティと生産性を両立するようなセキュリティプランを立てるための重要な要素です。このウェビナーでは、ID 管理による組織内外の防御について考察します。

    • ゼロトラスト・アーキテクチャの考え方についてはすでに取り上げてきましたが、ゼロトラスト・ネットワークを設計する際に利用できるオプションはたくさんあります。その 1 つが Identity Aware Proxy(IAP)です。 このウェビナーの前半では、IAP を実装する際のベストプラクティスを説明します。IAP を使用することで、ネットワークレイヤーではなくアプリケーションレイヤーで ID とアクセスルールを適用し、必要最小限のアクセス権の原則に基づいて確実にアクセスを制御します。

    • 後半では、アジア太平洋および日本における Credential Stuffing (ボットによる不正ログイン)犯罪の増加について取り上げます。このセッションでは、Credential Stuffing が生じる原因、攻撃による経済的損失、攻撃者が利用する手法、ボットによる自動化などについて解説します。また、ボットがもたらすリスクの緩和について、さまざまな業界での成功事例も紹介します。

    Presenter: 中西 一博, プロダクト・マーケティング・マネージャー, Akamai Technologies
    Presenter: 金子 春信, CISSP, シニア・プロダクト・マーケティング・マネージャー, Akamai Technologies
    Moderator:小熊慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • Best Practices in Securing DNS
    Best Practices in Securing DNS
    Rio Sibuea, Sr. Pre-Sales Systems Engineer, Infoblox Recorded: Mar 20 2019 63 mins
    NGFWs, IDS, sandboxes, DLP, etc are important - but increasingly, DNS is a major security weakness, allowing hackers to exfiltrate & infiltrate confidential data. This is a known issue because DNS was initially designed very simple and this attracts hackers to abuse the protocol. How do we protect our internal data and prevent hacker attacking the service?

    Join Infoblox and (ISC)² on Mar 20, 2019 (Wed) at 14:00 (GMT +8) to learn the best practices in securing DNS.

    Presenter: Rio Sibuea, Sr. Pre-Sales Systems Engineer, Infoblox
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • 避开2019年的安全威胁和物联网IoT的安全案例分析
    避开2019年的安全威胁和物联网IoT的安全案例分析
    郑伟, 大中华区产品市场部经理, Akamai Technologies; 陈家俊, CISSP, 高级安全系统架构师, Akamai Technologies Recorded: Mar 13 2019 63 mins
    当大家都在为已到来的2019年开始制定重要的安全规划时, 我们会回顾过去的2018年安全大事件以确保我们不会错过任何安全盲点。此外,该研讨会也会分享最新的物联网IoT(Internet of Things) 僵尸网络驱动的DDoS攻击,最真实的安全事件和最佳实践。

    您将了解到:
    • 分析安全行业的发展趋势以及这些趋势在未来一年可能会从哪些方面对我们产生影响?
    • 当您怀疑自己受到DDoS攻击时,该如何分析以及与您的安全厂商进行有效的沟通?
    • 我们如何面对物联网IoT DDoS攻击和如何实施防范措施?

    参加Akamai Technologies和 (ISC)² 在3月13日下午2:00至3:00的在线研讨会,聆听专家分析如何避开2019年的安全威胁和物联网IoT的安全案例分析,还等什么?赶紧加入我们吧。

    演讲人: 郑伟, 大中华区产品市场部经理, Akamai Technologies
    演讲人: 陈家俊, CISSP, 高级安全系统架构师, Akamai Technologies
    主持人: 卢佐华, CISSP-ISSAP, (ISC)² 北京分会主席

    *本次在线研讨会将以普通话进行
  • (ISC)² Info Session: CCSP - The Industry’s Premier Cloud Security Certification
    (ISC)² Info Session: CCSP - The Industry’s Premier Cloud Security Certification
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)² Recorded: Mar 12 2019 64 mins
    Earning the globally recognized CCSP cloud security certification is a proven way to build your career and better secure critical assets in the cloud.

    In this info-session, you will learn:
    - How large is the cybersecurity workforce gap today
    - Why you should pursue CCSP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    =====================================================================

    The CCSP shows you have the advanced technical skills and knowledge to design, manage and secure data, applications and infrastructure in the cloud using best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Prove your skills, advance your career, and gain support from a community of cybersecurity leaders here to help you throughout your professional journey.

    www.isc2.org/ccsp

    Are you ready to prove yourself? Register and begin your CCSP journey today!

    NOTE: Join this info-session and earn 1 CPE.
  • Cybersecurity Predictions 2019 and Advanced Technology on Endpoint Protection
    Cybersecurity Predictions 2019 and Advanced Technology on Endpoint Protection
    Wayne Lam, Solutions Systems Engineer, Symantec Recorded: Mar 6 2019 61 mins
    Cyber hacks of major corporate systems and websites continued apace and will inevitably be part of the 2019 cybersecurity scene. Many well-known organizations across the globe suffered significant breaches. Beyond all-too-common corporate attacks, 2018 was also marked by accelerated threat activity across a diverse range of targets and victims.

    Staying ahead of the evolving threat landscape requires an easy to implement endpoint security framework and simplified, yet powerful, security tools to protect against emerging threats. New techniques have vastly improved response to evolving attacks. Advanced Endpoint Security explains how these technologies work and sets forth an integrated framework for endpoint security that covers it all.

    Join Symantec and (ISC)² on Mar 6, 2019 (Wed) at 15:00 (Hong Kong time) to explore the cybersecurity predictions and advanced technology on endpoint protection.

    Presenter: Wayne Lam, Solutions Systems Engineer, Symantec
    Moderator: SC Leung, CISSP, CCSP, Member, Asia-Pacific Advisory Council, (ISC)²

    *This webinar will be conducted in Cantonese.
  • Access Denied! Decoding Identity Aware Proxies
    Access Denied! Decoding Identity Aware Proxies
    Nick Hawkins, Senior Director, Product Management, Enterprise; Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai Recorded: Mar 6 2019 63 mins
    Previously, we covered how identity is a key factor in a security plan when protecting your organization internally and externally. We heard your requests and hence, this upcoming webinar will be a deeper technical discussion on how to:

    • Protect your public-facing applications against malicious Javascript skimmer code such as Magecart credit card stealer. We’ll outline the common vectors used by such attackers and how organizations can protect their websites and customers.

    • Enhance your enterprise security perimeter and reduce your attack surface, minimizing the chance of an attack. Picking up from our previous webinar, we’ll do a deep dive on Identity Aware Proxies and examine how their architecture helps improve your security posture.

    Join Akamai Technologies and (ISC)² on Mar 6, 2019 (Wed) at 13:00 (GMT +8) to learn how to decode identity aware proxies.

    Presenter: Nick Hawkins, Senior Director, Product Management, Enterprise, Akamai Technologies
    Presenter: Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai Technologies
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • (ISC)² Info Session: CISSP - The World's Premier Cybersecurity Certification
    (ISC)² Info Session: CISSP - The World's Premier Cybersecurity Certification
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)² Recorded: Feb 26 2019 64 mins
    Accelerate your cybersecurity career with the CISSP certification.

    Join this online info-session hosted by (ISC)² and learn everything you need to know about the globally recognized credential CISSP!

    During the online info-session, you will:
    - Gain an insight into the CISSP credential-its domains and career benefits for credential holders
    - Hear about the practical application of the CISSP related to real world issues for security professionals
    - Ask questions about the credential, exam and experience requirements
    - Learn everything you need to know about getting certified

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    =====================================================================
    Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise and become an (ISC)² member, unlocking a broad array of exclusive resources, educational tools, and peer-to-peer networking opportunities.

    Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to support you throughout your career.

    https://www.isc2.org/cissp
  • (ISC)² Info Session: CSSLP-The Premier Secure Software Development Certification
    (ISC)² Info Session: CSSLP-The Premier Secure Software Development Certification
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)² Recorded: Feb 22 2019 57 mins
    Earning the globally recognized CSSLP secure software development certification is a proven way to build your career and better incorporate security practices into each phase of the software development lifecycle (SDLC).

    In this info-session, you will learn:
    - How large is the cybersecurity workforce gap today
    - Why you should pursue CCSLP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    =====================================================================

    CSSLP certification recognizes leading application security skills. It shows employers and peers you have the advanced technical skills and knowledge necessary for authentication, authorization and auditing throughout the SDLC using best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Prove your skills, advance your career, and gain support from a community of cybersecurity leaders here to help you throughout your professional journey.

    www.isc2.org/csslp

    Are you ready to prove yourself? Register and begin your CSSLP journey today!

    NOTE: Join this info-session and earn 1 CPE.
  • Remediating Threats by Bridging Islands of Security
    Remediating Threats by Bridging Islands of Security
    Terence Grey, Senior Systems Engineer, ANZ, Infoblox Recorded: Feb 20 2019 63 mins
    Most organisations have multiple products and services, from multiple vendors and suppliers to address their cybersecurity needs. The lack of integration and inability to share critical information results in silos of technology that cause inefficiency, lack of agility, limited visibility and a poor security posture. How can an organization solve and streamline to improve their cybersecurity operations?

    Join Infoblox and (ISC)² on Feb 20, 2019 (Wed) at 14:00 (GMT +8) to learn how to assist organisations in improving their security operations and reducing time to containment.

    Presenter: Terence Grey, Senior Systems Engineer, ANZ, Infoblox
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • (ISC)² Info Session: SSCP -The Premier Security Administrator Certification
    (ISC)² Info Session: SSCP -The Premier Security Administrator Certification
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)² Recorded: Feb 19 2019 46 mins
    Earning a globally recognized advanced security administration and operations certification like the SSCP is a great way to grow your career and better secure your organization’s critical assets.

    In this info-session, you will learn:
    - How large is the cybersecurity workforce gap today
    - Why you should pursue SSCP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    =====================================================================
    SSCP certification demonstrates you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to help you throughout your career.

    www.isc2.org/sscp

    Are you ready to prove yourself? Register and begin your SSCP journey today!

    NOTE: Join this info-session and earn 1 CPE.

Embed in website or blog