Hi [[ session.user.profile.firstName ]]

(ISC)2 APAC Secure Webinars

  • Date
  • Rating
  • Views
  • Taming the Cloud Together – CCSP & CCSK Cloud Certification Synergy
    Taming the Cloud Together – CCSP & CCSK Cloud Certification Synergy David Shearer, CEO, (ISC)2; Jim Reavis, CEO, CSA; Kevin Jackson, GovCloudNetwork ; Rich Mogull, Securosis; B. Dunlap (Mod) Recorded: Jun 12 2018 58 mins
    Certain things go together to make the sum of their parts that much better. Peanut Butter and Jelly. Lennon and McCartney. Batman and Robin. In the ever-changing world of the cloud, cyber security professionals need continuous training and certifications to stay up-to-speed and pairing (ISC)2’s CCSP (Certified Cloud Security Professional) with CSA’s CCSK (Certificate of Cloud Security Knowledge) can put any cyber security practitioner ahead in terms of knowledge, skills and job opportunities. On June 12, 2018 at 1:00PM Eastern, join David Shearer, (ISC)2’s CEO and Jim Reavis, CSA’s CEO, along with other subject matter expects as we explore the differences between each program, the training options available for each, and how these programs are synergistic in nature and together were designed to build on one another.
  • Stronger Security Posture through Zero Trust and API Management
    Stronger Security Posture through Zero Trust and API Management Fernando Serto, Head of Security Tech & Strategy, APJ; Dawson Sewo, Senior Enterprise Security Architect, Akamai Technologies Recorded: May 9 2018 64 mins
    Organizations today are facing multiple challenges on providing an enhanced digital experience to their customers, whilst ensuring confidential data remains secure in accordance to evolving regulatory and compliance regimes. While APIs are the core of digital experiences, including single-page apps and mobile applications, traditional perimeter security architecture is no longer enough to protect your business and you must concurrently evolve your security approach.

    In this webinar, Akamai will be sharing findings on how adopting a zero trust model will increase the security posture of organisation through a “Never Trust, Always Verify” paradigm. We will also look at how the API threat landscape have evolved and share best practises in API security.

    Join Akamai and (ISC)² on May 9, 2018 (Wed) at 13:00 (Singapore time) to learn stronger security posture through zero trust and API management.
  • Security at Network Speeds
    Security at Network Speeds Ian Farquhar, Principal Sales Engineer, Gigamon Recorded: Apr 18 2018 62 mins
    Exponentially increasing network traffic volumes and security tool sprawl are overwhelming security operations and network operations teams. A network packet broker is supposed to eliminate complexity and save costs, not add to them!

    Organizations need to:
    •Deliver just the right data to the right tools.
    •Drive consolidation across their security stack.
    •Manage a common platform across physical, virtual and public cloud environments.

    Hence, a next-generation network packet broker is required to deliver visibility to security tools focused on threat prevention, detection, analytics and forensics. The right tools get the right traffic at the right time, every time.

    Attend this webinar to learn how to:
    •Maximize tool performance and ROI by applying advanced traffic intelligence.
    •Rapidly detect and respond to new threats while eliminating security tool sprawl.
    •Have pervasive and consistent visibility across their physical, virtual and cloud infrastructure.

    Join Gigamon and (ISC)² on Apr 18, 2018 (Wed) at 14:00 (Singapore time) to learn how to increase efficiency of your security stack.
  • 近期重大数据外泄事件回顾 ─  分析事件根源、探讨解决方案
    近期重大数据外泄事件回顾 ─ 分析事件根源、探讨解决方案 演讲人: Shawn Xu 许晓晨, Tenable中国区安全顾问 Recorded: Mar 28 2018 61 mins
    在绝大多数数据泄露事件中,受害者最终都是因为看上去非常简单的漏洞问题而给自身带来危害。以Equifax 灾难性泄露事件为例,它的发生归根于公司IT未能识别Web Server Apache Struts 的已知漏洞并及时打补丁,而针对此漏洞已有有效的更新和解决方案。直到事件发生之后数月,他们才对外公布此次事件造成的损失或超过 7500 万美元。 类似漏洞所导致的泄漏事件,还相继发生在其它知名企业,如 Merck、Yahoo、Home Depot、Target等,预计导致上亿美元的利润和信誉损失。

    问题的根源在于:资产和漏洞的可视度十分有限,导致未能及时修补漏洞!

    这次将探讨如何通过 Tenable 解决方案,帮助企业准确发现资产并理解攻击面,识别漏洞对机构的威胁,达到自动化确认合规的目标。并以此为基础,让客户更容易调整网络安全策略,加速理解和减少企业安全风险。

    参加Tenable和 (ISC)² 在3月28日下午2:00至3:00的在线研讨会《Equifax:重大数据外泄事件回顾 ─ 分析事件根源、探讨解决方案》,聆听专家分析对数据泄露事件的深入解读,还等什么?赶紧加入我们吧。

    *本次在线研讨会将以普通话进行
  • Minimizing Cyber Exposure – An analysis of Meltdown and Spectre
    Minimizing Cyber Exposure – An analysis of Meltdown and Spectre Robert Healey, Senior Director Marketing, APAC, Tenable Network Security Recorded: Jan 24 2018 61 mins
    As organizations embrace cloud infrastructure, DevOps methodologies, PAAS, IoT and mobile workforce, there are new risks coming from a broader attack surface. Vulnerability management designed for traditional assets is not enough. To improve security, you need to rethink how you do things. For example, containers have become the de facto standard in cloud architectures today, which means that security needs to move into developers’ build processes while complementing existing solutions.

    Attend this webinar to discover:
    •Where vulnerability management for today’s assets needs to start
    •What the new faces of attacks and remediation look like
    •Why prioritization should not be based on scan results
    •Why reports using Excel are no longer the answer
    •How DevOps can be part of the solution to incorporate security

    Join Tenable and (ISC)² on Jan 24, 2018 (Wed) at 14:00 (Singapore time) to learn how to minimize cyber exposure in a world of cloud, containers and other modern assets.

    Presenter: Robert Healey, Senior Director Marketing, APAC, Tenable Network Security
    Moderator: Clayton Jones, Regional Managing Director, APAC, (ISC)²
  • Security Management in the Cloud
    Security Management in the Cloud Presenter: Greg Singh, Technical Director-APAC, Skybox Security | Moderator: Clayton Jones, Managing Director, APAC, (ISC)2 Recorded: Jan 17 2018 60 mins
    As organizations migrate workloads to cloud computing, they benefit from flexibility and agility, but network security operations grow increasingly difficult.

    Gaining visibility into cloud environments, extending existing security operations and workflows, ensuring compliance, and managing shared responsibility create new challenges for security professionals. Add to this the complexity of hybrid and multi-cloud environments — and the loss of control within those environments — and it’s no wonder security leaders are scratching their heads over how to best secure their organization’s journey to the cloud.

    This session will look at approaches to addressing the many challenges around cloud security management and best practices for translating on-prem security controls and processes into hybrid and multi-cloud environments.

    Join Skybox Security and (ISC)² on Jan 17, 2018 (Wed) at 14:00 Singapore time to learn more about security management in the cloud.
  • 국내외 보안관제솔루션 시장과 Best Practice
    국내외 보안관제솔루션 시장과 Best Practice 황원섭, 차장 Security Presales, Micro Focus Korea Recorded: Jan 10 2018 60 mins
    빠르게 진화하는 사이버 위협에 대해 보다 신속·효율적인 보호와 대응을 위해서는 IT 인프라 전반에서 가시성을 확보하고, 보안 사고를 탐지·조사·대응할 수 있어야 합니다. 현재 국내외 다양한 통합로그 분석 및 보안관제 솔루션이 존재하며, 이를 보통 가트너에서 정의한 SIEM(Security Information and Event Management)이라는 명칭으로 불리우고 있습니다. 본 웨비나를 통해서 국내/외 대형 보안관제센터에서 사용 중인 솔루션의 특징 및 고려사항 등을 파악한 후, 향후 관련 솔루션 도입을 검토하신다면 많은 시행착오를 줄일 수 있을 것으로 생각됩니다.
  • 万能なエンドポイントセキュリティを目指して
    万能なエンドポイントセキュリティを目指して Presenter: 株式会社シマンテック エバンジェリスト 髙岡 隆佳 / Moderator: (ISC)2 Director of Business Development, Japan小熊慶一郎 Recorded: Dec 20 2017 52 mins
    ~多様なモバイル環境と多角的な脅威に対応するために~

    昨今では高度な脅威は境界線をすり抜け、または公衆にさらされたモバイル環境から直接ユーザのエンドポイントを脅かし続けています。クラウドシフトや働き方改革により今まで以上にエンドポイントの保護が求められる中、多角的で高度な脅威からエンドポイントを包括的に保護するための最新の技術動向(機械分析・EDR・要塞化・詐称など)について解説いたします。
  • Endpoint Security for Cloud Generation & New Integrations Extend Data Protection
    Endpoint Security for Cloud Generation & New Integrations Extend Data Protection Sam Tong, Senior Principal Systems Engineer, Symantec; Moderator: S.C. Leung, Member, Asia-Pacific Advisory Council, (ISC)² Recorded: Dec 13 2017 64 mins
    First in the Industry to deliver Deception, Mobile Threat Defense, and Endpoint Detection and Response (EDR) in a Single-Agent Architecture. Join us to learn the latest Evolution of Endpoint Security & Data Protection:

    •Defend against ransomware with multi-layered protection
    •Gain enhanced visibility into suspicious files via tunable protection to make better policy decisions
    •Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
    •Extend advanced security to mobile devices
    •Use deception techniques to expose hidden adversaries and determine their intent to improve security posture
    •Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications

    New Integrations Extend Data Protection Beyond Traditional DLP

    Powered by the industry’s leading data loss prevention technology, to give you greater visibility and control over your confidential data.

    •Expanded Information Centric (ICE) Encryption integration
    •Enhanced data classification integration
    •Sensitive Image Recognition
    •Stronger endpoint controls
    •Enhanced data at rest discovery
    •Improved cloud app policy and incident management
    •Flexibility on cloud deployment
    •And More …

    Join Symantec and (ISC)² on Dec 13 at 14:00 (Hong Kong time) and learn about the latest Evolution of Endpoint Security & Data Protection.

    This webinar will be conducted in Cantonese.
  • 深入分析FastFlux僵尸网络
    深入分析FastFlux僵尸网络 演講人: 欧志鹏, Akamai 亚太和日本地区高级企业安全架构师; 主持人:卢佐华, (ISC)² 北京分会理事长 Recorded: Nov 29 2017 59 mins
    近年来,我们看到大规模的僵尸网络被用于发动过去极为罕见的攻击——这些僵尸网络采用全新功能特性和比以往任何时候都要强大的攻击能力。此类僵尸网络如何以及为何能保持弹性,这是一个需要回答的问题,而原因之一是FastFlux。

    FastFlux 是一种 DNS 技术,僵尸网络利用其将各种类型的恶意活动(例如网络钓鱼、网络代理、恶意软件交付和恶意软件通信)隐藏于不断变化的受感染主机(充当代理)网络背后。一般来说,FastFlux网络主要用于使恶意软件与其命令和控制服务器 (C&C) 之间的通信更不易于发现。Akamai 对网络和企业流量进行了深入了解,并提供了有关此类FastFlux网络行为的全新独特见解。

    欢迎您加入本次在线研讨会,与 Akamai 亚太及日本地区的企业架构师 Sunny Au (欧展鹏)一起进行深入分析,了解以下内容的更多信息:

    •Flux网络如何利用域名、IP 地址甚至是名称服务器来避开检测
    •FastFlux网络如何提供各种服务,比如恶意软件通信和恶意内容托管
    •僵尸网络如何用于进行FastFlux通信和发动各种网络攻击,例如网络数据抓取和凭据滥用(撞库)
    •检测和防御此类僵尸网络的最佳实践

    参加Akamai 和 (ISC)² 在11月29日下午3:00至4:00的在线论坛《深入分析FastFlux 僵尸网络》,聆听专家对僵尸网络的深入解读,还等什么?赶紧加入我们吧。

    *本次在线研讨会将以普通话进行

Embed in website or blog