Hi [[ session.user.profile.firstName ]]

(ISC)2 APAC Secure Webinars

  • Date
  • Rating
  • Views
  • DDoS 방어를 위한 Cloudflare 활용법
    DDoS 방어를 위한 Cloudflare 활용법
    유 지 영, Solutions Engineer, Cloudflare Recorded: Dec 12 2018 54 mins
    최근 몇 년 동안 한국, 싱가포르, 일본, 중국 같은 국가에서 DDoS 공격이 빈번하게 발생하고 있습니다. 또한 2018년에는 Memcached 서버를 이용하는 대규모 DDoS 공격 사례들이 새롭게 목격되고 있습니다. 이 웨비나에서는 날로 확대되는 DDoS 위협 환경에 대해 알아보고 공격의 유형과 규모에 관계없이 웹 사이트를 보호할 수 있는 Cloudflare의 이점을 소개합니다.

    웨비나를 통해 다음을 알아보십시오.

    -DDoS 공격의 유형 및 최신 트렌드
    -DDoS 방어를 위한 Cloudflare 활용법

    발표자: 유 지 영, Solutions Engineer, Cloudflare
    진행자: 박 선 영, Business Development Manager, APAC, (ISC)²
  • Get to know the (ISC)² CISSP Concentrations (ISSAP/ISSEP/ISSMP)
    Get to know the (ISC)² CISSP Concentrations (ISSAP/ISSEP/ISSMP)
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)² Recorded: Dec 6 2018 60 mins
    Go beyond the CISSP and challenge yourself with a CISSP Concentration! Got questions on the certifications? We have the answers.

    In this info-session, you will learn:

    - How large is the cybersecurity workforce gap today
    - Why you should pursue CISSP concentrations – ISSAP/ISSEP/ISSMP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Are you ready to prove yourself? Register and begin your journey today!

    NOTE: This info-session is meant for CISSP credential holders only. Join this info-session and earn 1 CPE.
    ________________________________________________________________________

    CISSP Concentrations:

    • Information Systems Security Architecture Professional (ISSAP)
    This certification proves your expertise developing, designing and analyzing security solutions. It also shows you excel at giving risk-based guidance to senior management in order to meet organizational goals.

    • Information Systems Security Engineering Professional (ISSEP)
    This certification recognizes your keen ability to practically apply systems engineering principles and processes to develop secure systems. You have the knowledge and skills to incorporate security into projects, applications, business processes and all information systems.

    • Information Systems Security Management Professional (ISSMP)
    This certification shows you excel at establishing, presenting and governing information security programs. You also demonstrate deep management and leadership skills whether you’re leading incident handling and/or a breach mitigation team.
  • Protecting Your Organization Inside Out Using Identity
    Protecting Your Organization Inside Out Using Identity
    Nick Hawkins, Senior Director, Product Management, Enterprise; Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai Recorded: Dec 5 2018 61 mins
    Identity is a key factor in an organization’s security plan, as it covers both security and productivity. In this webinar, we will look at using identity management to protect your organization internally and externally:

    • We have previously covered an overview of zero trust architecture concepts. There are plenty of options available when designing a zero trust network - one of them is Identity Aware Proxy (IAP). The first half of the webinar will focus on best practices when implementing an IAP to enforce identity and access rules at an application layer, rather than network layer, and ensuring access rights are based on “need to know” least access.

    • The second half will focus on the rise of credential stuffing criminal activities in Asia Pacific and Japan. This session will focus on the root cause of credential stuffing, financial losses, the methodology adopted by criminals and the automation employed via botnets. We’ll cover case studies of how organisations across different industries have deployed solutions to successfully mitigate the risks posed by botnets.

    Join Akamai Technologies and (ISC)² on Dec 5, 2018 (Wed) at 13:00 (Singapore time) to learn how to protect your organization inside out using identity.

    Presenter: Nick Hawkins, Senior Director, Product Management, Enterprise, Akamai Technologies
    Presenter: Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai Technologies
    Moderator: Paolo Miranda, CISSP, Partnership Director, (ISC)² Singapore Chapter
  • デジタルデータを制し、ビジネスを成すために ~クラウドの100%活用とコンプライアンスを両立するための勘所~
    デジタルデータを制し、ビジネスを成すために ~クラウドの100%活用とコンプライアンスを両立するための勘所~
    髙岡 隆佳, エバンジェリスト, Symantec Japan Recorded: Nov 28 2018 56 mins
    企業は今、選択肢を迫られています。従来型のインフラに縛られたまま従来型のビジネスを継続するか、それとも今まで培ってきたデータをうまく先進的なデバイスやクラウドサービスを活用することで、新たな価値とスピードをビジネスに活かし、顧客だけでなく社員に対してもいかに恩恵をもたらすか。海外に目を向けると、すでにITやデジタルデータを活かした企業が成功を収める一方、デジタルデータのセキュリティ担保を怠った企業は大きな制裁や賠償を求められるニュースもよく目にします。本ウェビナーでは、デジタルデータをどのように担保してデジタルトランスフォーメーション(DX)を推進していくべきか、その勘所について解説します。

    Presenter: 髙岡 隆佳, エバンジェリスト, Symantec Japan
    Moderator: 小熊慶一郎 (Keiichiro Oguma), Director of Business Development, Japan, (ISC)²
  • Benchmarking Your Security Program Against Your Peers
    Benchmarking Your Security Program Against Your Peers
    Robert Healey, Senior Director Marketing, APAC, Tenable Recorded: Nov 14 2018 62 mins
    Where are you exposed? Where should you prioritise, based on business risk? How is your cyber exposure changing over time? And how effective is your cyber security program, compared to your industry peers?

    Join Tenable and (ISC)² on Nov 14, 2018 (Wed) at 14:00 (Singapore time) to understand, measure, prioritise and now compare your Cyber Security posture, to see how effective your security investments & program are.

    Presenter: Robert Healey, Senior Director Marketing, APAC, Tenable
    Moderator: Paolo Miranda, CISSP, Partnership Director, (ISC)² Singapore Chapter
  • 《2018 年互联网现状/安全:Web 攻击》和有效爬虫程序管理案例研究
    《2018 年互联网现状/安全:Web 攻击》和有效爬虫程序管理案例研究
    郑伟, 大中华区产品市场部经理, Akamai Technologies; 马俊, CISSP, 高级售前工程师, Akamai Technologies Recorded: Nov 12 2018 60 mins
    聆听 Akamai《2018 年夏季互联网现状/安全:Web攻击》的最新报告以及有关爬虫程序管理的案例研究,了解关于真实事件、安全最佳做法和趋势方面的最新信息。

    您将了解到:

    • 爬虫程序和黑客是如何通过撞库瞄准酒店行业(恶意登录百分比极高的行业),企业可以采取哪些措施 ?

    • 一些 DDoS 攻击如何采用非常规策略加强攻击效果,包括兴起的智能型自适应攻击者,他们会改变策略以通过自己的方式冲破防御;

    • 有关航空行业如何部署爬虫程序管理解决方案以保护其网站远离撞库攻击和其他形式 Web 欺诈的案例研究。

    参加Akamai Technologies和 (ISC)² 在11月7日下午2:00至3:00的在线研讨会《2018 年互联网现状/安全:Web 攻击》和有效爬虫程序管理案例研究,聆听专家分析有效的爬虫程序管理,还等什么?赶紧加入我们吧。

    *本次在线研讨会将以普通话进行

    演讲人: 郑伟, 大中华区产品市场部经理, Akamai Technologies
    演讲人: 马俊, CISSP, 高级售前工程师, Akamai Technologies
  • クラウドを使いこなせるか?CASBが解決できる課題とクラウドシフトのリアル
    クラウドを使いこなせるか?CASBが解決できる課題とクラウドシフトのリアル
    髙岡 隆佳, エバンジェリスト, Symantec Japan Recorded: Oct 31 2018 58 mins
    企業間でクラウドシフトやCASBといった言葉が飛び交う昨今、日本企業はどれだけクラウドシフトを実現し、安全に活用できているのでしょう?そして、CASBは本当にクラウド利用の課題を解決しているのか?といった、誰もが明確な答えを持ち合わせていない中、クラウドセキュリティアライアンス(CSA Japan)などで日本企業のクラウドセキュリティの取り組みと向き合ってきたエバンジェリストが、その疑問に答え、後悔しないCASBの利用法について解説します。

    Presenter: 髙岡 隆佳, エバンジェリスト, Symantec Japan
    Moderator: 小熊慶一郎 (Keiichiro Oguma), Director of Business Development, Japan, (ISC)²
  • Cyber Exposure: 透视安全隐患 | 漏洞态势分析
    Cyber Exposure: 透视安全隐患 | 漏洞态势分析
    全晓可, 资安顾问, Tenable Network Security Recorded: Oct 31 2018 59 mins
    哪些资产暴露于风险之下?
    我们应当根据怎样的优先顺序处理这些风险?
    我们如何逐渐减少暴露风险?
    我们需要提供所需的洞见,帮助我们管理并减少现代网络攻击面下的真正的风险。并且,范围包括传统 IT、公用云和私有云、网络应用程序和容器,以及 IoT 和 OT。

    参加Tenable和 (ISC)² 在10月31日下午2:00至3:00的在线研讨会《Cyber Exposure: 透视安全隐患 | 漏洞态势分析》,聆听专家探讨安全隐患和分析漏洞态势,还等什么?赶紧加入我们吧。

    演讲人: 全晓可, 资安顾问, Tenable Network Security
    主持人: 顾伟, CISSP, CCSP, (ISC)² 授权讲师及(ISC)²上海分会理事

    *本次在线研讨会将以普通话进行
  • Unified IT-OT Security Management: Strengthening Critical Infrastructure Defense
    Unified IT-OT Security Management: Strengthening Critical Infrastructure Defense
    Gerry Sillars, Vice President of APAC, Skybox Security Recorded: Oct 24 2018 58 mins
    Critical infrastructure — from energy production to manufacturing to public utilities — has become a prevalent attack vector for both nation-state threat actors as well as common cybercriminals. These attackers exploit vulnerabilities that exist due to the interconnectedness of IT and operational technology (OT) networks in order to establish a foothold in a victim’s environment and cause significant damage.

    In response, many organisations are looking to align their IT and OT security programs to better understand and tackle cyber risks in both environments. In this session, Skybox Security will cover what challenges to expect when seeking to achieve this, and how to use comprehensive visibility and contextual intelligence to overcome them.

    In this webinar, you will learn:
    • What are the inherent risks to OT security and how the continued integration with IT impact risk in both environments
    • What are the key concerns for IT and OT security teams and how can they can align to improve security throughout the organization
    • Which elements and capabilities are needed to gain seamless visibility of on-premises, cloud and OT networks
    • How to use modelling and analytics to understand your attack surface risk and effectively prioritize responses

    Join Skybox Security and (ISC)² on Oct 24, 2018 (Wed) at 14:00 (Singapore time) to learn how to strengthen the defense of critical infrastructure.

    Presenter: Gerry Sillars, Vice President of APAC, Skybox Security
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • Surfing the Global Waves of Phishing
    Surfing the Global Waves of Phishing
    Nik Kalogirou, VP of Sales (APAC), Cofense; Ryan Jones, Sales Engineer, Cofense Recorded: Oct 10 2018 56 mins
    What’s keeping you up at night? Ransomware? Phishing? Spyware? Malware? Data Breaches? A malicious email typically opens the door to those threats.

    Organisations spend great energy (and budget) preventing users from falling prey, but threat actors continue to find ways to get past automated controls, staying one step ahead of artificial intelligence tools. Solving the phishing problem is more than just awareness: it’s about empowering humans to become instinctual nodes on the cyber defence network and feeding their real-time intelligence to security teams for immediate action.

    Join Cofense and (ISC)² on Oct 10, 2018 (Wed) at 13:00 (Singapore time) to hear about trends that we’ve been seeing around the globe and how they can impact the Asia-Pacific region.

    Presenter: Nik Kalogirou, VP of Sales (APAC), Cofense
    Presenter: Ryan Jones, Sales Engineer, Cofense
    Moderator: Kawin Boonyapredee, CISSP, Executive Security Advisor, IBM Security

Embed in website or blog