Join this important webinar as the Mandiant team explores trends that define today’s threat landscape based on Mandiant’s investigation of the year’s successful cyber attacks. Register today for an intelligence-led look into:
· New phishing trends breaching today’s companies.
· Changes in modern attack telemetry and methodology.
· Intelligence-led insights into emerging global threats.
· Modern defensive strategies to better protect your organization.
Special features spotlight trends in the APAC regions. Take a guided look at the M-Trends Report, pinpointing current and emerging global threats as discovered from the front lines of today’s leading forensic investigations.
Join our APAC demo webinar, hosted by an IR Solutions Engineer with live Q&A.Read more >
A sound data governance strategy not only ensures that organizations meet their regulatory obligations, it also engenders customer trust and enables businesses to carve out an advantage for themselves in a data-driven economy.
Join us in a live BrightTalk webinar as we discuss how businesses can navigate the APAC data governance landscape, the challenges and opportunities that present themselves, and how to get your organization compliance-ready.
The webinar will cover
•The APAC data governance landscape
•The challenges and opportunities
•Getting started on the data governance journeys
•Top compliance considerations
Transform your business with data center modernization. Learn how Hitachi Vantara’s robust set of systems, software and services are designed to help customers achieve desired business outcomes in the data center.
In this webinar, you’ll:
- Learn how to reduce cost, maximize efficiencies and effectiveness across all data center operations.
- See real-life examples of how Hitachi provides solutions to increase agility and improve customer experiences.
- Discuss key elements needed to achieve a modern data center.
2017 has been a watershed year in terms of digital transformation. It isn’t a year for major technology breakthroughs, but a year in which we have begun to change the way we use technology. Cloud adoption has taken off and more applications are being developed for the cloud. Corporate leadership is more committed than ever to digital transformation projects and early indications are that we have stopped the decline in productivity and are on an upturn. What’s next and what are the trends to watch out for in 2018?Read more >
This session will give a view on how to successfully troubleshoot Skype for Business scenarios:
- Conference Calls
- Soft phone
- Voice quality
Microsoft just announced the Skype Operations Framework (SOF) - which incorporates network pre-assessment. This session will take a deep dive in to how the program can be used to deliver and effective and reliable Skype for Business Deployment.
One of the most critical elements in a successful UC deployment in the cloud or a hybrid environment is ensuring the IT infrastructure is optimized to cope with the demands of real-time communications.
However, organizations often fail to pre-assess their network and UC environment and later find out during deployment the network is unable to handle the demands, causing a poor user experience.
Join us to learn more about the new SOF and network pre-assessment requirement.
Identifying and addressing financial crimes, including those associated with human trafficking, narcotics, terrorist financing and fraud, requires collaboration. Successful public-private partnerships enhance investigation outcomes by allowing both sectors to share the latest trends in financial crime. This webinar will look at joint investigations and offer insights on how banks can provide assistance to law enforcement in the fight against financial crime. Our panelists will also provide strategies for conducting a joint post-investigation review to determine best practices for future collaborative efforts.
•Detailing recent APAC initiatives in public-private partnerships such as the Fraud and Money Laundering Intelligence Taskforce (FMLIT) in Hong Kong and the Anti-Money Laundering and Countering the Financing of Terrorism Industry Partnership (ACIP) in Singapore
•Incorporating practical collaboration strategies to better detect, deter and defend APAC financial institutions against financial crimes
•Detailing APAC legal obligations and the limitations of public-private collaboration to prevent missteps
Cloud as the enabler of Internet of Things (IoT) and data analytics, the incorporation of cloud computing is critical for the successful implementation of these leading-edge technologies. Countries and organizations moving towards Industry 4.0 are highly dependent on cloud computing, as it is the basis for this revolutionary transition. However, complications and confusion arising from regulations (or lack thereof) surrounding cloud usage hinder cloud adoption.
During this webcast, we will discuss some of the findings from the CSA “State of Cloud Adoption in Asia Pacific (APAC) 2017” report and examine the availability and affordability of cloud computing in the APAC region.
Hospital information technology (Hospital IT) spending in Asia-Pacific (APAC) will grow at a compound annual growth rate of 9.7% between 2016 and 2021 to reach an estimated end-stage market size of more than $15 billion. Key growth opportunities in the region include solutions for Healthcare Data Continuity, Patient Engagement & Experience, Healthcare Cloud, Big Data & Analytics, and Healthcare Cybersecurity. However, the identification of these growth opportunities is only the first step toward succeeding as an ICT vendor in this market. The real demystification lies in understanding very specific target customer needs and then building a value proposition and business model that addresses those needs.Read more >
Identifying the UBO of customers who are establishing a business relationship or conducting transactions is often a difficult and cumbersome task. For example, identifying the UBO for a corporation seeking financial services will more than likely require digging through several layers of ownership and other legal arrangements. During the webinar, panelists will share their expertise and practical advice to achieve your organization’s compliance goals to meet UBO standards.
•Detailing APAC, US and EU jurisdictional requirements to aid UBO and ensure compliance with regulatory obligations
•Creating innovative processes to maintain the customer profile throughout the customer lifecycle
•Reviewing typologies of abusive trusts and shell firms to strengthen UBO identification processes
Despite increasingly strict and complex sanctions, financial institutions throughout the APAC region have are considering having business relationships with sanctioned nations such as Iran, Iraq and Myanmar. This webinar will provide attendees needed guidance on creating an effective sanctions management program and an updated, comprehensive compliance strategy for dealing with sanctioned nations. Industry experts will detail practical strategies to mitigate the risks and avoid potential penalties associated with doing business with sanctioned nations.
•Analyzing continuing risks with Iran and other sanctioned nations to ensure monitoring models are capable of real-time adjustments
•Creating institutional risk profile metrics that demonstrate appropriate KYC and CDD procedures
•Maintaining a risk-based approach to sanctions management that aligns with regulatory expectations
Corruption scandals, trade-based money laundering and rapidly changing sanctions requirements are among the complex challenges facing compliance professionals throughout the APAC region. This webinar examines these and other regional challenges, providing concrete guidance for regional financial institutions to combat emerging threats, strengthen compliance effectiveness and refine existing AML models to address regulatory changes in a robust manner.
•Detailing recent sanctions changes to assure current practices meet regulatory requirements
•Training staff on phantom shipping and other trade-based money laundering typologies to strengthen transaction monitoring
•Reviewing the Panama Papers case to aid monitoring of PEPs, shell firms and offshore havens
As organizations embrace cloud infrastructure, DevOps methodologies, PAAS, IoT and mobile workforce, there are new risks coming from a broader attack surface. Vulnerability management designed for traditional assets is not enough. To improve security, you need to rethink how you do things. For example, containers have become the de facto standard in cloud architectures today, which means that security needs to move into developers’ build processes while complementing existing solutions.
Attend this webinar to discover:
•Where vulnerability management for today’s assets needs to start
•What the new faces of attacks and remediation look like
•Why prioritization should not be based on scan results
•Why reports using Excel are no longer the answer
•How DevOps can be part of the solution to incorporate security
Join Tenable and (ISC)² on Jan 24, 2018 (Wed) at 14:00 (Singapore time) to learn how to minimize cyber exposure in a world of cloud, containers and other modern assets.
Presenter: Robert Healey, Senior Director Marketing, APAC, Tenable Network Security
Moderator: Clayton Jones, Regional Managing Director, APAC, (ISC)²
Adversarial use of artificial intelligence (AI) in cyberspace will lead to attacks that are more targeted, affect more people, and inflict more damage. It’s imperative that security professionals understand what this means for the future of conflict.
Additionally, as more companies integrate AI applications into their businesses, they must understand the risks associated with this technology.
Join Claudio Scarabello, Director Product, APAC, FireEye, for the final episode of our three-part series on AI as we discuss the:
• Changing geopolitical landscape as threat actors develop and implement AI capabilities
• Use of AI applications in businesses and associated vulnerabilities
As with other regions of the world, APAC financial institutions face financial crimes such as tax evasion, money laundering and organized crime. This webinar brings together a trans-national panel to spotlight the region’s biggest financial crime vulnerabilities, highlighting best practices to shield your institution from these ongoing threats.
•Scrutinizing recent regional financial crime cases to identify typologies and adjust compliance oversight
•Constructing effective systems to flag possible trade-based money laundering and other financial crimes
•Enhancing CDD to better identify PEPs and potential proceeds of corruption
Artificial intelligence (AI) is a transformative dual-use technology that can provide organizations with better cyber defense tools and help adversaries improve methods of attack. A better understanding of the current and potential future capabilities of AI will help users see how related emerging technologies can affect their business.In a live webinar, hear a key author of the report discuss what these findings reveal about advanced malware moving forward.
Join Claudio Scarabello, Director Product, APAC, FireEye for the first installation of our three-part webinar series to:
- Understand the fundamentals of AI, the differences between various techniques used to process data and the drawbacks to each approach.
- Discuss how AI tools can be used for offensive and defensive purposes in the cyber domain.
- Survey the future threat landscape and provide geopolitical context regarding how nations will use AI tools given their current levels of technological development and AI integration in civilian applications.
Every year consultants from Mandiant, a FireEye company, respond to a wide variety of cyber incidents by threat groups around the world. This experience is summarized in the annual M-Trends report, which explores changes in the cyber threat landscape.
During this webinar, Rob van der Ende, Vice President, Asia Pacific & Japan Mandiant Consulting Services and Bryce Boland, FireEye APAC CTO will discuss:
- Longer-term trends in today's threat landscape
- Sophisticated and harmful APT groups to look out for
- Which organizations are most likely to be retargeted by attackers
- The difficulty of finding skilled personnel and how it affects the security function
- How weaknesses in security fundamentals contributed to successful compromises
- Best practice red teaming tactics for improved security defense
The Asia-Pacific region is home to some of the world’s most vibrant financial centers, which translates into higher risks for financial crime and a need for stringent AML/CTF programs. This panel will look at some of the top challenges facing financial professionals in the APAC region and discuss efficient and thorough methods for meeting domestic and multi-jurisdictional regulatory obligations.
•Dissecting recent cases to formulate effective institutional defense measures
•Structuring multi-jurisdictional sanctions risk models for international organizations
•Reviewing recent U.S. and European regulatory changes to anticipate impacts on APAC institutions
The SAP on Microsoft approach has allowed Accenture to deliver on their business priorities while lowering costs and improving performance. In turn, a lower cost of ownership allows Accenture to position itself for the future by investing in other areas to expand its capabilities and continue driving a digital Accenture future forward.
Join Aman Dokania, Cloud APAC Managing Director at Accenture and Danette Seward, Senior Director of Advanced Cloud Workloads at Microsoft, as they provide real-world examples of this successful partnership in action.
Threats from within the enterprise can pose the biggest cybersecurity risk to the organisation. Whether intentionally or accidentally, users with legitimate credentials can go about the network without triggering suspicion or alert, making their unauthorised activity difficult to detect. Insider threat activity can sometimes hide in plain sight, but what happens when people deliberately cover their tracks?
In this webinar, you will learn:
- Where to look for suspicious activity
- How to set up traps that will catch malicious insiders
- What finding paths across seemingly disparate data can reveal.
According to a 2016 industry report, employees cause 77 percent of internal security breaches. Find out who is causing yours.
Join Nuix’s and (ISC)² on Jun 28 (Wed) at 13:00 (Singapore time) and uncover the six hidden signs that help you detect the presence of insider threat activity.
Presenter: Jon Piercey, SVP Security & Intelligence APAC, Nuix
Moderator: Ir. Tejinder Singh, Senior Development Expert,T-Systems Malaysia SGA Security Engineering