Hi [[ session.user.profile.firstName ]]

(ISC)2 APAC Secure Webinars

  • Date
  • Rating
  • Views
  • Top 3 Critical Factors to Consider for Network Protection Top 3 Critical Factors to Consider for Network Protection Michael Ferguson, Strategic Security Solutions Consultant, Forcepoint Recorded: Sep 28 2016 61 mins
    Next Generation Firewalls are Next Generation Firewalls…or maybe NOT.

    In the light of new advanced attacks and the demands to lower security infrastructure costs, just how can one get the most out of the Next Generation Firewall (NGFW) solutions? Are all NGFW solutions the same?

    What criteria should one consider for a NGFW solution that is best for your distributed enterprise environment? Join Forcepoint™’s Michael Ferguson and find out key value points when selecting a network security solution catered to your environment:

    • Latest trends in NGFW
    • Addressing total cost of ownership
    • Security effectiveness in increasingly complex threat landscape
    • Challenges in policy management

    Also, find out why Forcepoint Stonesoft NGFW has won NSS Labs' coveted highest rating of “Recommended” for the 4th year in a row. Learn how it can provide the scalability, protection and visibility needed to effectively manage your distributed networks. Plus, rapidly and easily deploy, monitor and manage thousands of firewalls from a single pane of glass.
  • Phishing Awareness and Response: Can Technology Alone Make a Difference? Phishing Awareness and Response: Can Technology Alone Make a Difference? Jim Hansen, Chief Operating Officer, PhishMe Recorded: Sep 21 2016 63 mins
    Phishing has been well established as the top entry method for hackers trying to access corporate networks. Yet, in spite of record spending on security technology, data breach reports continue to highlight the substantial lag between incident occurrence and detection.
    That technology- those investments are failing while organizations continue to neglect their final and best line of defense – their employees. Employees hold the key to fortifying the last line of defense and providing IT and Security teams with critical real-time attack intelligence.
    In this presentation, PhishMe’s COO, Jim Hansen, will draw on his 25 years in law enforcement and IT security to discuss:
    •The current state of phishing
    •The success and failure of technology systems and how human systems can protect the last mile
    •How conditioning – not training - activates employees to identify and report phishing attacks
    •The critical attack intelligence generated from employees and how it can be used to detect attacks-in progress and aid phishing incident response

    Join PhishMe and (ISC)² on Sept 21 (Wed) at 2:00p.m. (Singapore time) for a security briefing on phishing awareness and response.

    Presenter: Jim Hansen, Chief Operating Officer, PhishMe
    Bios:
    Jim has over twenty-two years’ experience in sales, operations and
    executive management in the information security industry,
    including co-founding and serving as COO of Mandiant. He has also
    held numerous executive and management positions in both sales
    and consulting organizations, and regularly speaks and publishes
    articles on information security topics.
  • Overwhelmed by Security Vulnerabilities? Learn How to Prioritize Remediation Overwhelmed by Security Vulnerabilities? Learn How to Prioritize Remediation Deb J, SME & Solution Architect – APAC & Middle East, Qualys Inc. Recorded: Sep 14 2016 63 mins
    One of the biggest challenges faced by information security teams today is how to effectively prioritize their vulnerability remediation work. Burdened with this overload of vulnerability disclosures, Infosec teams often get overwhelmed by the task at hand and throw up their hands in frustration. After all, no IT department has enough staff and resources to promptly patch every single vulnerability within their environment.

    Join Qualys and (ISC)² on Sept 14 (Wednesday) at 2:00p.m. (Singapore time) for a Security Briefing on how to prioritize remediation.

    Presenter: Deb J, SME & Solution Architect – APAC & Middle east, Qualys
    Bios:
    Deb J (DJ) works with Qualys as a Subject Matter Expert for all products and platforms at Qualys. He is also a Field Solution architect responsible for customer success in the region. Deb has over 12 years of experience of which a large amount of time was spent on security. Started his career as a Code Quality Governance Specialist, so attention to details comes naturally. In the past he has worked with Compuware, NetIQ, LogLogic & ArcSight that adds a lot of experience for him to understand customer problems and identify solutions that work for them.
  • Using Behavior Analysis to Prevent Data Leakage 프로파일링의 기반의 이상 행위 분석을 통한 보안 전략 Using Behavior Analysis to Prevent Data Leakage 프로파일링의 기반의 이상 행위 분석을 통한 보안 전략 홍세진, 부장, HPE 소프트웨어 보안사업부, 휴렛팩커드 엔터프라이즈(HPE) Recorded: Sep 7 2016 63 mins
    공격자들은 지하 시장에서 점점 전문화 , 조직화하고 있으며, 공격 기법도 무서운 속도로 고도화하고 있습니다.
    정보 보호 업체인 “Websense Security Labs”이 미국, 영국, 캐나다, 호주의 IT관리자 1,000명 을 대상으로 조사한 결과 보고서에 따르면 대부분의 데이터 유출 사고는 “인가된 사용자”에 의해 이루어지고 있다고 합니다.
    또한 그 동안 국내/외 많은 보안 사고 사례를 통해 알 수 있듯이 대부분의 정보 유출 사고는 탈취된 정상 사용자 계정 권한을 이용해서 이루졌다는 사례를 언론 등을 통해서 접할 수 있었습니다.

    정보 유출 사고 예방을 위해 대부분의 보안 담당자는 이러한 알려진/알려지지 않은 다양한 보안 위협과 고도화된 내/외부에서 발생되는 위협을 식별 및 대응을 위한 위협 관리 체계의 필요성을 느끼고 있으며, 가트너에서는 향후 내/외부 다양한 보안 위협 예측 그리고 예방을 위해User Behavior Analytics (UBA) 사용은 필수이며, 2018년까지 최소 25%이상의 보안사고가 UBA 기술에 의해 탐지될 것이라고 리포트를 통해 예측하고 있습니다.

    프로파일링 기반 이상행위 분석은 정상적인 사용자 및 시스템의 행동과 적절한 연관성의 정상 기준선을 설정하고 사용자 및 동료 그룹 간 이상 현상을 실시간으로 분석을 통해 권한 보유 사용자의 비정상 행위를 시각화 및 위협 예측 그리고 예방합니다.

    또한 전체 IT 환경에 대한 보안을 더욱 민첩하고 지능적으로 변모하도록 요구하고 있으며, SIEM 보안 플랫폼과 연계 가능하며 UBA 기술은 알려진 위협과 알려지지 않은 위협에 관한 조치 가능한 정보를 생성하여, 사용자 및 시스템에 대한 세부적인 가시성을 제공함으로써 위협을 선제적으로 대응할 수 있는 보안 인텔리전스와 내부 위협를 보다 신속하게 해결할 수 있습니다.
  • 利用大数据实现积极且具有高度关联性的安全防御Using Big Data For Active And Contextual Security 利用大数据实现积极且具有高度关联性的安全防御Using Big Data For Active And Contextual Security 周德振(Adam), 高级解决方案顾问, Akamai Technologies Recorded: Aug 24 2016 59 mins
    *This webinar will be conducted in Mandarin
    Organizations are turning to leverage big data and analytics to ‘look’ for indicators of intent or indicators of compromise, thus helping organizations focus their security resources on the threats at hand. The challenge though is how to process the vast amount of data, and furthermore, keep it relevant, timely, actionable – contextual. The challenge becomes harder when threat actors utilize a variety of techniques to maintain anonymity, reduce their ‘fingerprint’ and mask their intent.

    In this webinar, Adam will share how Akamai leverages the vast amount of data that it sees daily to help its customers improve their security decisions, when the threat would otherwise be unclear. John will showcase how Akamai’s big data and analytics platform, Cloud Security Intelligence, powers its Client Reputation service. A service that provides the ability to forecast intent and protect applications against Distributed Denial of Service (DDoS) and application layer attacks, and how active defence can be applied to a variety of response mechanisms, delivering an intelligent contextually aware defence.

    各家机构正越来越倾向于使用大数据资源来“查找”各种恶意行为的迹象、甚至是破坏的先兆,来帮助机构把有限的安全资源集中在关注现有的威胁之上。但是,挑战在于如何处理这样大量的数据,而且保证数据的相关性、及时性和可用性不会受到影响。而且,随着安全威胁使用了更多样的技术来保证其匿名性、减少留痕并掩盖其意图,机构所面临的安全挑战也越来越严峻。

    在本次的网络研讨会中,Akamai 高级解决方案顾问-周德振先生(Adam),将会向您展示Akamai是如何在威胁尙不明确的情况下,使用每日承载的海量数据来帮助客户做出更加明智的网络安全决策的。Adam将会展示Akamai的大数据及分析平台、云安全智能是如何强化其客户端信誉(Client Reputation)服务。这种服务能够提前预告各种行为的迹象,并保护应用程序不会受到DDoS和应用层攻击。此外,您还将看到这种积极的安全防御是如何帮助各种响应机制,是如何交付智能化、高度关联的防御。

    8月24日(周三)| 时长60分钟 | 北京时间 14:00
    演讲人: 周德振(Adam), 高级解决方案顾问, Akamai Technologies
    主持人: 毛宇, CISSP, AMBCI, CCNP, PRINCE2, (ISC)²官方授权讲师


    预留席位,就在此刻!

    *This webinar will be conducted in Mandarin
  • Using Big Data For Active And Contextual Security Using Big Data For Active And Contextual Security John Ellis, Chief Strategist, Cyber Security (APJ), Akamai Technologies; Moderator: Chuan-Wei Hoo, Technical Advisor, (ISC)² Recorded: Aug 17 2016 62 mins
    Organizations are turning to leverage big data and analytics to ‘look’ for indicators of intent or indicators of compromise, thus helping organizations focus their security resources on the threats at hand. The challenge though is how to process the vast amount of data, and furthermore, keep it relevant, timely, actionable – contextual. The challenge becomes harder when threat actors utilize a variety of techniques to maintain anonymity, reduce their ‘fingerprint’ and mask their intent.

    In this webinar, John Ellis, Akamai’s Chief Strategist for Cyber Security (APJ) will share how Akamai leverages the vast amount of data that it sees daily to help its customers improve their security decisions, when the threat would otherwise be unclear. John will showcase how Akamai’s big data and analytics platform, Cloud Security Intelligence, powers its Client Reputation service. A service that provides the ability to forecast intent and protect applications against Distributed Denial of Service (DDoS) and application layer attacks, and how active defence can be applied to a variety of response mechanisms, delivering an intelligent contextually aware defence.

    Join Akamai and (ISC)² on Aug 17 (Wednesday) at 2:00p.m. (Singapore time) for a Security Briefing on how to use Big Data for active and contextual security.
  • A New Approach to Data Security A New Approach to Data Security Ted Hendriks, Data Security Pre-Sales Architect, APJ, HP Enterprise Security Recorded: Aug 3 2016 59 mins
    With the phenomenal growth of data and the IT trends toward cloud and mobility adoption, enterprises are facing rising threats to sensitive data from both inside and outside the organization. They need to be able to protect data end to end without introducing complexities to users, while lowering the implementation and management costs of security solutions.

    Join Hewlett Packard Enterprise and (ISC)2 on Aug 03 (Wednesday) at 2:00p.m. (Singapore time) for a Security Briefing on how to protect data from end to end.
  • Protecting Privileged Accounts in the Cloud Protecting Privileged Accounts in the Cloud Troy Cunningham, CISSP, Sales Engineer, ANZ, APAC Professional Services, CyberArk Recorded: Jul 13 2016 59 mins
    Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide to organizations of all sizes. Whether organizations are using private, public or hybrid cloud environments for infrastructure or software-as-a-service, the common goal is to achieve operational and cost benefits without giving up full control over infrastructure and data.

    Introducing a real challenge, privileged accounts in cloud environments are at a critical juncture of control and management because once an unauthorized user has access to privileged account credentials, control over the entire infrastructure is in the hands of the attacker. This is where securing privileged accounts plays a critical role in securing cloud environments and meeting audit and compliance requirements.

    Join CyberArk and (ISC)2 on July 13 (Wednesday) at 2:00p.m. (Singapore time) for a Security Briefings to learn how to protect your privileged accounts in the Cloud.

    Presenter:Troy Cunningham, CISSP, Sales Engineer, ANZ, APAC Professional Services, CyberArk
    Moderator: Chuan-Wei Hoo, CISSP, CISA, CFE, BCCE, Technical Advisor, Asia-Pacific, (ISC)²
  • Third-Party Remote Access: The Hidden Weak Spot Exploited by Attackers Third-Party Remote Access: The Hidden Weak Spot Exploited by Attackers Zhihao Tan, Regional PS Manager-ASEAN, Professional Services APJ, CyberArk;Moderator: SC Leung, APAC Council Member, (ISC)2 Recorded: Jun 29 2016 62 mins
    Outsourcing is a critical strategy for supporting user productivity and business growth. Remote third-party access to an organization’s internal systems is an inherent requirement for outsourced services, maintenance, and support.

    Many companies overlook this remote vendor access as an area that requires tight security controls. But the fact is, 63% of attacks are caused by security vulnerabilities introduced by a third party.

    Join CyberArk and (ISC)2 on Jun 29, 2016 at 2:00p.m. (Singapore Time) for a Security Briefing that you will learn more about this hidden security weak spot – and discover 5 ways to mitigate risk of attack through remote third-party access.
  • 网络安全措施中被忽略的重要一环-解读特权账号安全A Dissection of Recent High Profile Attacks 网络安全措施中被忽略的重要一环-解读特权账号安全A Dissection of Recent High Profile Attacks 路军龙Sam Lu, CISSP 大中华区资深技术顾问 Professional Services APJ, CyberArk Recorded: Jun 22 2016 63 mins
    随着网络威胁更为复杂、高级,网络安全事件将带来更大损失。针对近期两起国际上重大信息安全事件的分析:乌克兰电网遭黑客攻击发生大面积停电事件和堪称史上最大银行劫案的孟加拉央行巨款失窃案,特权账户安全专家CyberArk为您解读网络安全措施中被忽略的重要一环-特权账号,新的安全形势下亟需对特权账号提供全面保护、监控、检测和报告,确保您的业务安全。CyberArk拥有新型针对性的安全解决方案策略,使领导者无需应对网络威胁,并在其采取措施造成重大伤害前防止攻击升级。

    多数大型企业都能检测到当前已遭受到攻击。值得吸取的教训是:在每起类似事件中,攻击者往往已经侵入企业网络并潜伏了相当一段时间,他们不断寻找可以利用的安全漏洞,获取越来越高级别的访问凭证以达到其最终目的。而企业往往是直到泄露事件发生才后知后觉,此时为之晚矣。只有当您对网络攻击原理和攻击过程有深入了解,才能帮助企业降低信息安全风险。

    另一点值得警醒的是攻击者的目标往往不是为了冒用他人身份信息,而是为了达到某些物质利益:如获取金钱和财物、窃取并利用企业数据,或是造成企业运营中断等。
    参加本次研讨会,您将学习到如何更好地保护组织免遭网络攻击的实用知识。

    6月22日(周三)| 时长60分钟 | 北京时间 14:00
    演讲人: 路军龙, CISSP, CyberArk大中华区资深技术顾问
    主持人: 毛宇, CISSP, AMBCI, CCNP, PRINCE2, (ISC)²官方授权讲师


    预留席位,就在此刻!

    *This webinar will be conducted in Mandarin.

Embed in website or blog