Hi [[ session.user.profile.firstName ]]

(ISC)2 APAC Secure Webinars

  • Date
  • Rating
  • Views
  • State of the Internet/ Security Report–Latest DDoS and Web App Attack Trends
    State of the Internet/ Security Report–Latest DDoS and Web App Attack Trends Nick Rieniets, Senior Security Specialist, Akamai Technologies Recorded: May 24 2017 60 mins
    As an organization that delivers and protects 15-30% of the world’s web traffic on a daily basis, Akamai is uniquely positioned to observe a large amount of attacks ranging from 20 malicious HTTP requests containing SQL injection to DDoS attacks up to 650 Gbps. Our security experts analyze this information and share trends, observations, and findings in our quarterly State of the Internet / Security Report. We will present this information and associated insights in this webinar series.

    In this webinar, you will learn:

    • A summary of global findings from the State of the Internet Report
    • Attack statistics for APJ
    • How IoT botnets have changed the attack topology in APJ
    • The responsibilities for security of IoT

    Join Akamai and (ISC)² on May 24 (Wed) at 13:00 (Singapore time) for an overview and analysis of traffic and trends from Distributed Denial of Service (DDoS) and web application attacks.
  • 商业化犯罪软件猖獗  亟需新Threat-centric漏洞管理方案
    商业化犯罪软件猖獗 亟需新Threat-centric漏洞管理方案 Presenter: Glenn Tan, Solutions Architect, East Asia, Skybox Security; Moderator: 毛宇, (ISC)²官方授权讲师, 普华永道风险及控制服务 高级经理 Recorded: May 17 2017 55 mins
    近年来,网络犯罪日益组织化、自动化,结合外包欺诈技术的运用,使伪装在商业包装下的种种威胁变得更复杂,更难以发现。网络犯罪的产业化态势,使得组织很难迎头赶上:疲惫的安全团队所依赖的漏洞检测及应对工具,与犯罪分子采用的攻击策略不相匹配。如此情形下,最好的解决方案是什么?安全官们应如何面对日益增长的网络犯罪产业化的趋势?

    据2016年高德纳公司的报告(Gartner report)显示:诸多组织采取“逐步降低风险、特定时间内进行漏洞与补丁管理”的方针。比如,许多漏洞管理程序把风险分为 “低、中、高和高危”四等级风险值的“通用漏洞评分系统(CVSS)”的分数,通常这些程序将成千上万的漏洞评为“高危”并需要即时修复。但此方式常常无效,因为诸多风险发生在与组织网络断开或未知区域中。

    最新研究报告显示:大多数被黑客攻击或反复攻击的漏洞,已经在暗网(Dark Web)上进行交易了。通过识别这些漏洞(未知的或已知的),结合“通用漏洞评分系统(CVSS)”信息以及组织IT环境的逻辑关系,安全官们可以改变这一态势。他们能真正理解潜在威胁、严重漏洞,当然还有漏洞攻击的可能性。此Threat-centric漏洞管理方案考虑到组织内外的多种因素,从而逐步降低风险。这套崭新方案需要管理者理解组织受攻击的优先级:潜在的、紧急的、产生实际威胁的。采用这种方式,安全官们能够提高综合防御优势,了解对手及入侵者真正要攻击的漏洞、以及伪装的潜在威胁。
  • Commercialized Crimeware and Threat-Centric Vulnerability Management
    Commercialized Crimeware and Threat-Centric Vulnerability Management Kevin Flynn, Worldwide Director, Product Marketing, Skybox Security Recorded: May 10 2017 60 mins
    In recent years, cybercriminals have organized, automated and outsourced fraud techniques, resulting in an increase in commercial packages of complex threats. This productization of cybercrime is making it harder for organizations to keep up: the tools that overworked security teams rely on to discover and mitigate vulnerabilities don’t match the exploit tactics used by the criminals. So, what is the best approach in light of this dynamic threat landscape? How should security leaders stand up to the growing threat of industrialized cybercrime?

    Recent reports show that the majority of successful breaches are executed by threat actors that use and re-use a subset of old vulnerabilities whose exploits are being commercially exchanged in the “Dark Web.” By identifying these vulnerabilities — those for which exploits exist in the wild and are being used in attacks — and combining this information with CVSS scores and contextual intelligence of an organization’s IT environment, security leaders can change the game. They gain a true understanding of not only the potential impact and severity of a vulnerability but also the probability of exploitation. This threat-centric vulnerability management augments gradual risk reduction by considering multiple factors inside and outside the organization. It’s a new approach to vulnerability management that requires comprehensive understanding of an organization’s attack surface combined with the prioritization of vulnerabilities by potential, imminent and actual threat levels. Using this approach, security leaders gain the advantage of integrated intelligence, including what vulnerabilities are truly being targeted by adversaries and threat actors in the wild.

    Join Skybox Security and (ISC)² on May 10 (Wed) at 12:00 noon (Hong Kong time) to learn more about Commercialized Crimeware and Threat-Centric Vulnerability Management.
  • The Nuix Black Report: Find Out What Hackers are Really Thinking
    The Nuix Black Report: Find Out What Hackers are Really Thinking Christopher Pogue, Chief Information Security Officer, Nuix Recorded: Mar 1 2017 59 mins
    The Nuix Black Report takes a unique perspective on cybersecurity. Most security industry reports compile data about incidents that have already taken place or trends in data breaches—but these are clearly the symptoms of a deeper problem. Instead, Nuix has focused on the source of the threat landscape: the attackers themselves.

    Join this webinar with report author and Nuix Chief Information Security Officer Chris Pogue to discover the true nexus between attacker methodology and defensive posture:

    • Which countermeasures will actually improve your security posture (they’re not the ones you think)?
    • What is the best spend for your security dollar and why?
    • If hackers could speak to your CEO or board of directors, what would they say?

    Join Nuix and (ISC)² on Mar 1 (Wed) at 13:00 (Singapore time) and find out what hackers are really thinking.
  • DDoS Threats of Past, Present and Future
    DDoS Threats of Past, Present and Future John Ellis, Chief Strategist, Cyber Security (APJ), Akamai & Michael Smith, Chief Technology Officer, Security (APJ), Akamai Recorded: Feb 15 2017 62 mins
    The Fourth Industrial Revolution is in all full swing with the Internet at its core. While the Internet is connecting everyone and everything it also connects us to a variety of nefarious threat actors, who have found ways to exploit and monetize many aspects of our digital world. In recent times, one area has been DDoS, which has become one of the top cyber threats du jour.

    In this webinar, you will learn:

    - Historical developments in the DDoS threat landscape
    - How criminal operators are building out their botnets – discover, infect, operate and maintain
    - Technical examination of new botnet trends such as the Mirai IoT botnet
    - Architectural concepts and design for DDoS mitigation solutions - covering cloud and data centre environments
    - Response strategies to defending and responding to DDoS attacks
    - Predictions for future and next steps.

    Join Akamai and (ISC)² on Feb 15 (Wed) at 13:00 (Singapore time) and learn about the DDoS threats of past, present and future.

    Presenters:
    - John Ellis, Chief Strategist, Cyber Security (Asia-Pacific & Japan), Akamai
    - Michael Smith, Chief Technology Officer, Security (Asia-Pacific & Japan), Akamai

    Moderator:
    - Clayton Jones, Managing Director, Asia-Pacific, (ISC)²
  • Addressing a Key Challenge in Network Security – ZERO DOWNTIME
    Addressing a Key Challenge in Network Security – ZERO DOWNTIME Joshua Kooh, Strategic Security Solutions Consultant, Forcepoint Recorded: Dec 21 2016 60 mins
    One of the top CIO challenges is to maintain 100% uptime. Access to applications, data, and resources on the network is mission-critical for every organization. Downtime costs can be high and in various forms - loss of revenue and productivity, the cost of recovery and other intangible costs, such as damage to their reputation and brand value. Downtime is simply unacceptable. Hence, security for that network must be highly available and not cause any performance degradation of the network - in migration, deployment or through human error.

    In this session, we will explore these questions:
    • Is it possible to have no downtime when maintaining network security?
    • What are the different causes of downtime?
    • What are the different approaches to minimize downtime?
    • How do you manage the costs to achieve 99.999% uptime in the network security solutions?

    Join Forcepoint and (ISC)² on Dec 21 (Wed) at 1:00p.m. (Singapore time) and learn how to maintain 100% uptime.
  • IoT普及で急拡大するDDoS, Web攻撃リスクと防衛のための検討ポイント
    IoT普及で急拡大するDDoS, Web攻撃リスクと防衛のための検討ポイント 中西一博, セキュリティプロダクトマーケティングマネージャ, アカマイ・テクノロジーズ 合同会社 Recorded: Dec 14 2016 61 mins
    現在、最も頻繁に用いられるサイバー攻撃のひとつとなったDDoS攻撃。Mirai Botnetに代表されるIoTを媒介する新たな攻撃手法によって、ビジネス停止のリスクがかつてないほど高まっています。実際にその攻撃を受け止めたAkamaiが観測した最新の攻撃データに基づき、現在のDDoSの特徴としくみ、その対策を用意する際に留意すべきポイントを中心に、企業Webを中心にしたシステムが今まさに直面しているリスクを解説します。
  • Adding Intelligence to Investigations (Focus on data breach investigations)
    Adding Intelligence to Investigations (Focus on data breach investigations) Stuart Clarke, CTO, Cybersecurity, Nuix; John Douglas, Technical Director, First Response Recorded: Dec 7 2016 61 mins
    Data volumes are growing in both size and complexity; we have increasingly less control and awareness of the data we hold. In this session, we will highlight the benefits of information governance practices enabling organisations to build intelligence about their own data and identify their critical information assets. In the event of a data breach or security incident, this information provides actionable intelligence, allowing you to discover and respond to an incident before the matter escalates into a crisis.

    Key takeaways:
    1. Understand the basic principles required to understand your data
    2. See how leveraging intelligence can get you to the answer faster
    3. Extract hidden links and relationships with analytics

    Join Nuix and (ISC)² on Dec 07 (Wed) at 02:00p.m. (Singapore time) in learning how to add intelligence to investigations (focus on data breach investigations).

    Presenters:
    - Stuart Clarke, Chief Technical Officer, Cybersecurity, Nuix
    - John Douglas, Technical Director, First Response

    Moderator:
    SC Leung, CISSP, CCSP, CISA, CBCP;
    Member, Asia-Pacific Advisory Council, (ISC)²
  • A Dissection of Recent High Profile特権アカウント乗っ取り事件の事例とその真相
    A Dissection of Recent High Profile特権アカウント乗っ取り事件の事例とその真相 Naohiko Yamanouchi 山之内 真彦, マーケティングマネージャー、APJ, CyberArk Software Recorded: Nov 30 2016 62 mins
    ~ ウクライナの電力会社とバングラデッシュ中央銀行はどのように攻撃されたか ~

    22万5千人の顧客の停電を起こしたウクライナの電力会社への攻撃と、8100万ドルが盗まれたバングラディッシュ中央銀行への攻撃は、特権アカウントを乗っ取られたハッキング事件でした。これらの事件がどのように起きたのか、特権アカウントがどのように悪用されたのか、そして、これらの事件を防ぐためには何ができたのか、をご紹介します。

    大企業、大きな組織であれば、既にハッカーが侵入している可能性が低くありません。これらの攻撃から学べることは、侵入が発見されるタイミングより大分前に攻撃者は既にネットワークに入り込んでおり、どのようにネットワークの中で自由に動けるか、その方法を探していたということではないでしょうか。これがどのように行われたかを把握することによって、リスクを削減することが可能となります。

    また、攻撃者の目的は、内部の人間になりすますことではありません。本当の目的は、攻撃者が狙っているものを「入手」すること。それは、お金、データ、または組織の運用を中断することかもしれません。今回のセッションでは、これらのリスクからどのように組織を守ることが出来るか、そして事例から何を学ぶ事が出来るかをご紹介します。
  • Best Practices on Operational Efficiency in Network Security
    Best Practices on Operational Efficiency in Network Security Presenter: Michael Ferguson, Strategic Security Solutions Consultant, Forcepoint Recorded: Oct 26 2016 63 mins
    Most businesses prefer to control the day-to-day operations of their networks using their own resources. The increasing complexity of modern networks means that the overall acquisition, control and deployment for network security projects is far more challenging than before. With decreasing IT budgets and limited resources within high growth businesses; how are network teams expected to improve operational efficiency without sacrificing quality of service and service level agreements?

    In a world that is fraught with new security exploits, maintaining operational efficiency with a low impact on resource and cost can be very difficult.

    What are the best practices for maintaining an operationally efficient network security deployment? How do network teams stay on-top of daily routine tasks, such as policy configuration, upgrades and network security monitoring? How can network teams be enabled to focus on mission critical projects through automation?

    Learn from case studies about network security and firewalls which enable the deployment of firewalls within highly distributed networks without sacrificing time or security.

    Join Forcepoint and (ISC)² on Oct 26 (Wed) at 1:00p.m. (Singapore time) in learning the best practices on operational efficiency in network security.

    Presenter: Michael Ferguson, Strategic Security Solutions Consultant, Forcepoint

    Moderator: Clayton Jones, Managing Director, Asia-Pacific, (ISC)²

Embed in website or blog