Hi [[ session.user.profile.firstName ]]

(ISC)2 APAC Secure Webinars

  • Date
  • Rating
  • Views
  • Beyond Shadow IT:  How Leading Organisations Protect Sensitive Cloud Data
    Beyond Shadow IT: How Leading Organisations Protect Sensitive Cloud Data
    Richard Campagna, CMO & VP of Products, Bitglass; Brendon Thwaites, Director, Channels & Alliances APJ, Bitglass Recorded: Apr 17 2019 62 mins
    As more organisations deploy cloud apps like Office 365, AWS, and Slack securing corporate data becomes a challenge. While Cloud Access Security Brokers (CASBs) were originally used solely for shadow IT discovery, they have since emerged as the go-to solution for organisations that need end-to-end data security, from cloud to device. In fact, Gartner believes that by 2022, 60% of large enterprises will use a CASB to govern some cloud services.

    In this webinar, we'll explore:
    • Critical gaps in cloud applications that must be filled
    • Four sets of capabilities required for cybersecurity in the cloud
    • How CASBs provide specialized security that goes beyond native cloud app functionality like that of Office 365
    • Case studies on how leading enterprises leverage CASB to secure their cloud footprint.

    Join Bitglass and (ISC)² on Apr 17, 2019 (Wed) at 11:00 (GMT +8) to learn how a CASB can help you meet your security and compliance requirements.

    Presenter: Richard Campagna, CMO & VP of Products, Bitglass
    Presenter: Brendon Thwaites, Director, Channels & Alliances APJ, Bitglass
    Moderator: Chuan-Wei Hoo, CISSP, Technical Advisor, Asia-Pacific, (ISC)²
  • DevSecOps – Web Application Firewall in a CI/CD Workflow  (以粵語進行)
    DevSecOps – Web Application Firewall in a CI/CD Workflow (以粵語進行)
    Clive Chan, Senior Consultant, F5 Networks Recorded: Apr 10 2019 61 mins
    IT automation and orchestration, the key enabler of digitization is the number one IT initiate globally according to our state of application services report 2019. In addition, Zero Trust and Security-By-Design are key imperatives of organizations pursuing digital transformation as these organizations accelerate adoption of cloud technologies to gain speed, scale and accessibility to innovative technologies like AI and blockchains.

    In this webinar, we will look at the changing landscape of DevOps. We will explore the practice of scaling application security, controlling vulnerabilities and controlling advanced threats with the web application firewall in CI/CD environments. We will also take a look at how the technologies enable close collaboration between security teams and development teams on securing APPs without requiring application teams having in-depth knowledge of security.

    Join F5 Networks and (ISC)² on Apr 10, 2019 (Wed) at 15:00 (Hong Kong time) to learn about web application firewall in a CI/CD workflow.

    Presenter: Clive Chan, Senior Consultant, F5 Networks
    Moderator: Otto Lee, CISSP, CSSLP, Membership Chair, (ISC)² Hong Kong Chapter

    *This webinar will be conducted in Cantonese. (本次網上研討會將以粵語進行。)
  • (ISC)² Info Session: Get to know the CISSP Concentrations (ISSAP/ISSEP/ISSMP)
    (ISC)² Info Session: Get to know the CISSP Concentrations (ISSAP/ISSEP/ISSMP)
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)² Recorded: Apr 9 2019 62 mins
    Go beyond the CISSP and challenge yourself with a CISSP Concentration! Challenge yourself with a CISSP Concentration! These specialized credentials build upon the CISSP. Whether you’re interested in career growth, deeper knowledge or achieving elite status, CISSP Concentrations prove your subject matter mastery.

    Got questions on the certifications? We have the answers.

    In this info-session, you will learn:

    - How large is the cybersecurity workforce gap today
    - Why you should pursue CISSP concentrations – ISSAP/ISSEP/ISSMP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Are you ready to prove yourself? Register and begin your journey today!

    NOTE: This info-session is meant for CISSP credential holders only. Join this info-session and earn 1 CPE.
    ________________________________________________________________________

    CISSP Concentrations:

    • Information Systems Security Architecture Professional (ISSAP)
    This certification proves your expertise developing, designing and analyzing security solutions. It also shows you excel at giving risk-based guidance to senior management in order to meet organizational goals.

    • Information Systems Security Engineering Professional (ISSEP)
    This certification recognizes your keen ability to practically apply systems engineering principles and processes to develop secure systems. You have the knowledge and skills to incorporate security into projects, applications, business processes and all information systems.

    • Information Systems Security Management Professional (ISSMP)
    This certification shows you excel at establishing, presenting and governing information security programs. You also demonstrate deep management and leadership skills whether you’re leading incident handling and/or a breach mitigation team.
  • Fight the Good Fight Against the Bad Bots
    Fight the Good Fight Against the Bad Bots
    Shahnawaz Backer, Security Specialist, APAC, F5 Networks Recorded: Apr 3 2019 61 mins
    Identifying malicious bots and safeguarding against them is a top priority for organisations developing a sustainable security strategy.

    Attend this webinar to learn:
    • How bots infect, propagate, and attack applications
    • What types of application attacks are commonly performed by bots
    • How you can defend against bad bots without disrupting the good ones

    Join F5 Networks and (ISC)² on Apr 3, 2019 (Wed) at 14:00 (GMT +8) to learn how to fight against the malicious bots.

    Presenter: Shahnawaz Backer, Security Specialist, APAC, F5 Networks
    Moderator: Chuan-Wei Hoo, CISSP, Technical Advisor, Asia-Pacific, (ISC)²
  • 사용자 ID 기반의 보안 방식
    사용자 ID 기반의 보안 방식
    한 준 형, Technical Account Manager, TSG-KR Media, Akamai Technologies; 김 현 도, Senior Solution Engineer, Akamai Technologies Recorded: Mar 27 2019 63 mins
    사용자 ID는 보안 및 생산성과 관련되어 있는 기업 보안의 핵심 요소입니다. 이 웨비나에서는 기업을 내부 및 외부적으로 보호하려면 ID를 어떻게 관리해야 하는지에 대해 중점적으로 다룰 예정입니다.

    • 이전에는 제로 트러스트 아키텍처의 개념에 대해 살펴봤습니다. 제로 트러스트 네트워크를 구축하는 많은 방법 중의 하나는 바로 IAP(Identity Aware Proxy)입니다. 웨비나의 전반부에는 네트워크가 아닌 애플리케이션 레이어에서 ID와 접속 룰을 적용하고 최소 접속 권한을 제공하는 IAP의 모범 사례에 대해 중점적으로 알아봅니다.

    • 후반부에는 아시아∙태평양∙일본 지역에서 증가하고 있는 크리덴셜 스터핑 활동에 대해 설명합니다. 크리덴셜 스터핑의 근본 원인, 경제적 손실, 공격자들이 사용하는 방법, 봇넷을 통한 자동화에 대해 중점적으로 살펴봅니다. 또한 봇넷 리스크를 성공적으로 차단하기 위해 여러 분야의 기업들이 도입한 솔루션에 대해 소개하는 사례 연구도 언급할 예정입니다.

    발표자: 한 준 형, Technical Account Manager, TSG-KR Media, Akamai Technologies
    발표자: 김 현 도, Senior Solution Engineer, Akamai Technologies
    진행자: 박 선 영, Senior Business Development Manager, APAC, (ISC)²
  • IDを使用して組織の内と外を防御する
    IDを使用して組織の内と外を防御する
    中西 一博, プロダクト・マーケティング・マネージャー, Akamai Technologies; 金子 春信, CISSP, シニア・プロダクト・マーケティング・マネージャー; Akamai Technologies Recorded: Mar 20 2019 62 mins
    ID は、セキュリティと生産性を両立するようなセキュリティプランを立てるための重要な要素です。このウェビナーでは、ID 管理による組織内外の防御について考察します。

    • ゼロトラスト・アーキテクチャの考え方についてはすでに取り上げてきましたが、ゼロトラスト・ネットワークを設計する際に利用できるオプションはたくさんあります。その 1 つが Identity Aware Proxy(IAP)です。 このウェビナーの前半では、IAP を実装する際のベストプラクティスを説明します。IAP を使用することで、ネットワークレイヤーではなくアプリケーションレイヤーで ID とアクセスルールを適用し、必要最小限のアクセス権の原則に基づいて確実にアクセスを制御します。

    • 後半では、アジア太平洋および日本における Credential Stuffing (ボットによる不正ログイン)犯罪の増加について取り上げます。このセッションでは、Credential Stuffing が生じる原因、攻撃による経済的損失、攻撃者が利用する手法、ボットによる自動化などについて解説します。また、ボットがもたらすリスクの緩和について、さまざまな業界での成功事例も紹介します。

    Presenter: 中西 一博, プロダクト・マーケティング・マネージャー, Akamai Technologies
    Presenter: 金子 春信, CISSP, シニア・プロダクト・マーケティング・マネージャー, Akamai Technologies
    Moderator:小熊慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • Best Practices in Securing DNS
    Best Practices in Securing DNS
    Rio Sibuea, Sr. Pre-Sales Systems Engineer, Infoblox Recorded: Mar 20 2019 63 mins
    NGFWs, IDS, sandboxes, DLP, etc are important - but increasingly, DNS is a major security weakness, allowing hackers to exfiltrate & infiltrate confidential data. This is a known issue because DNS was initially designed very simple and this attracts hackers to abuse the protocol. How do we protect our internal data and prevent hacker attacking the service?

    Join Infoblox and (ISC)² on Mar 20, 2019 (Wed) at 14:00 (GMT +8) to learn the best practices in securing DNS.

    Presenter: Rio Sibuea, Sr. Pre-Sales Systems Engineer, Infoblox
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • 避开2019年的安全威胁和物联网IoT的安全案例分析
    避开2019年的安全威胁和物联网IoT的安全案例分析
    郑伟, 大中华区产品市场部经理, Akamai Technologies; 陈家俊, CISSP, 高级安全系统架构师, Akamai Technologies Recorded: Mar 13 2019 63 mins
    当大家都在为已到来的2019年开始制定重要的安全规划时, 我们会回顾过去的2018年安全大事件以确保我们不会错过任何安全盲点。此外,该研讨会也会分享最新的物联网IoT(Internet of Things) 僵尸网络驱动的DDoS攻击,最真实的安全事件和最佳实践。

    您将了解到:
    • 分析安全行业的发展趋势以及这些趋势在未来一年可能会从哪些方面对我们产生影响?
    • 当您怀疑自己受到DDoS攻击时,该如何分析以及与您的安全厂商进行有效的沟通?
    • 我们如何面对物联网IoT DDoS攻击和如何实施防范措施?

    参加Akamai Technologies和 (ISC)² 在3月13日下午2:00至3:00的在线研讨会,聆听专家分析如何避开2019年的安全威胁和物联网IoT的安全案例分析,还等什么?赶紧加入我们吧。

    演讲人: 郑伟, 大中华区产品市场部经理, Akamai Technologies
    演讲人: 陈家俊, CISSP, 高级安全系统架构师, Akamai Technologies
    主持人: 卢佐华, CISSP-ISSAP, (ISC)² 北京分会主席

    *本次在线研讨会将以普通话进行
  • (ISC)² Info Session: CCSP - The Industry’s Premier Cloud Security Certification
    (ISC)² Info Session: CCSP - The Industry’s Premier Cloud Security Certification
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)² Recorded: Mar 12 2019 64 mins
    Earning the globally recognized CCSP cloud security certification is a proven way to build your career and better secure critical assets in the cloud.

    In this info-session, you will learn:
    - How large is the cybersecurity workforce gap today
    - Why you should pursue CCSP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    =====================================================================

    The CCSP shows you have the advanced technical skills and knowledge to design, manage and secure data, applications and infrastructure in the cloud using best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Prove your skills, advance your career, and gain support from a community of cybersecurity leaders here to help you throughout your professional journey.

    www.isc2.org/ccsp

    Are you ready to prove yourself? Register and begin your CCSP journey today!

    NOTE: Join this info-session and earn 1 CPE.
  • Cybersecurity Predictions 2019 and Advanced Technology on Endpoint Protection
    Cybersecurity Predictions 2019 and Advanced Technology on Endpoint Protection
    Wayne Lam, Solutions Systems Engineer, Symantec Recorded: Mar 6 2019 61 mins
    Cyber hacks of major corporate systems and websites continued apace and will inevitably be part of the 2019 cybersecurity scene. Many well-known organizations across the globe suffered significant breaches. Beyond all-too-common corporate attacks, 2018 was also marked by accelerated threat activity across a diverse range of targets and victims.

    Staying ahead of the evolving threat landscape requires an easy to implement endpoint security framework and simplified, yet powerful, security tools to protect against emerging threats. New techniques have vastly improved response to evolving attacks. Advanced Endpoint Security explains how these technologies work and sets forth an integrated framework for endpoint security that covers it all.

    Join Symantec and (ISC)² on Mar 6, 2019 (Wed) at 15:00 (Hong Kong time) to explore the cybersecurity predictions and advanced technology on endpoint protection.

    Presenter: Wayne Lam, Solutions Systems Engineer, Symantec
    Moderator: SC Leung, CISSP, CCSP, Member, Asia-Pacific Advisory Council, (ISC)²

    *This webinar will be conducted in Cantonese.

Embed in website or blog