Join this important webinar as the Mandiant team explores trends that define today’s threat landscape based on Mandiant’s investigation of the year’s successful cyber attacks. Register today for an intelligence-led look into:
· New phishing trends breaching today’s companies.
· Changes in modern attack telemetry and methodology.
· Intelligence-led insights into emerging global threats.
· Modern defensive strategies to better protect your organization.
Special features spotlight trends in the APAC regions. Take a guided look at the M-Trends Report, pinpointing current and emerging global threats as discovered from the front lines of today’s leading forensic investigations.
A sound data governance strategy not only ensures that organizations meet their regulatory obligations, it also engenders customer trust and enables businesses to carve out an advantage for themselves in a data-driven economy.
Join us in a live BrightTalk webinar as we discuss how businesses can navigate the APAC data governance landscape, the challenges and opportunities that present themselves, and how to get your organization compliance-ready.
The webinar will cover
•The APAC data governance landscape
•The challenges and opportunities
•Getting started on the data governance journeys
•Top compliance considerations
2017 has been a watershed year in terms of digital transformation. It isn’t a year for major technology breakthroughs, but a year in which we have begun to change the way we use technology. Cloud adoption has taken off and more applications are being developed for the cloud. Corporate leadership is more committed than ever to digital transformation projects and early indications are that we have stopped the decline in productivity and are on an upturn. What’s next and what are the trends to watch out for in 2018?Read more >
This session will give a view on how to successfully troubleshoot Skype for Business scenarios:
- Conference Calls
- Soft phone
- Voice quality
Microsoft just announced the Skype Operations Framework (SOF) - which incorporates network pre-assessment. This session will take a deep dive in to how the program can be used to deliver and effective and reliable Skype for Business Deployment.
One of the most critical elements in a successful UC deployment in the cloud or a hybrid environment is ensuring the IT infrastructure is optimized to cope with the demands of real-time communications.
However, organizations often fail to pre-assess their network and UC environment and later find out during deployment the network is unable to handle the demands, causing a poor user experience.
Join us to learn more about the new SOF and network pre-assessment requirement.
Identifying and addressing financial crimes, including those associated with human trafficking, narcotics, terrorist financing and fraud, requires collaboration. Successful public-private partnerships enhance investigation outcomes by allowing both sectors to share the latest trends in financial crime. This webinar will look at joint investigations and offer insights on how banks can provide assistance to law enforcement in the fight against financial crime. Our panelists will also provide strategies for conducting a joint post-investigation review to determine best practices for future collaborative efforts.
•Detailing recent APAC initiatives in public-private partnerships such as the Fraud and Money Laundering Intelligence Taskforce (FMLIT) in Hong Kong and the Anti-Money Laundering and Countering the Financing of Terrorism Industry Partnership (ACIP) in Singapore
•Incorporating practical collaboration strategies to better detect, deter and defend APAC financial institutions against financial crimes
•Detailing APAC legal obligations and the limitations of public-private collaboration to prevent missteps
Cloud as the enabler of Internet of Things (IoT) and data analytics, the incorporation of cloud computing is critical for the successful implementation of these leading-edge technologies. Countries and organizations moving towards Industry 4.0 are highly dependent on cloud computing, as it is the basis for this revolutionary transition. However, complications and confusion arising from regulations (or lack thereof) surrounding cloud usage hinder cloud adoption.
During this webcast, we will discuss some of the findings from the CSA “State of Cloud Adoption in Asia Pacific (APAC) 2017” report and examine the availability and affordability of cloud computing in the APAC region.
Hospital information technology (Hospital IT) spending in Asia-Pacific (APAC) will grow at a compound annual growth rate of 9.7% between 2016 and 2021 to reach an estimated end-stage market size of more than $15 billion. Key growth opportunities in the region include solutions for Healthcare Data Continuity, Patient Engagement & Experience, Healthcare Cloud, Big Data & Analytics, and Healthcare Cybersecurity. However, the identification of these growth opportunities is only the first step toward succeeding as an ICT vendor in this market. The real demystification lies in understanding very specific target customer needs and then building a value proposition and business model that addresses those needs.Read more >
Identifying the UBO of customers who are establishing a business relationship or conducting transactions is often a difficult and cumbersome task. For example, identifying the UBO for a corporation seeking financial services will more than likely require digging through several layers of ownership and other legal arrangements. During the webinar, panelists will share their expertise and practical advice to achieve your organization’s compliance goals to meet UBO standards.
•Detailing APAC, US and EU jurisdictional requirements to aid UBO and ensure compliance with regulatory obligations
•Creating innovative processes to maintain the customer profile throughout the customer lifecycle
•Reviewing typologies of abusive trusts and shell firms to strengthen UBO identification processes
Despite increasingly strict and complex sanctions, financial institutions throughout the APAC region have are considering having business relationships with sanctioned nations such as Iran, Iraq and Myanmar. This webinar will provide attendees needed guidance on creating an effective sanctions management program and an updated, comprehensive compliance strategy for dealing with sanctioned nations. Industry experts will detail practical strategies to mitigate the risks and avoid potential penalties associated with doing business with sanctioned nations.
•Analyzing continuing risks with Iran and other sanctioned nations to ensure monitoring models are capable of real-time adjustments
•Creating institutional risk profile metrics that demonstrate appropriate KYC and CDD procedures
•Maintaining a risk-based approach to sanctions management that aligns with regulatory expectations
Corruption scandals, trade-based money laundering and rapidly changing sanctions requirements are among the complex challenges facing compliance professionals throughout the APAC region. This webinar examines these and other regional challenges, providing concrete guidance for regional financial institutions to combat emerging threats, strengthen compliance effectiveness and refine existing AML models to address regulatory changes in a robust manner.
•Detailing recent sanctions changes to assure current practices meet regulatory requirements
•Training staff on phantom shipping and other trade-based money laundering typologies to strengthen transaction monitoring
•Reviewing the Panama Papers case to aid monitoring of PEPs, shell firms and offshore havens
As organizations embrace cloud infrastructure, DevOps methodologies, PAAS, IoT and mobile workforce, there are new risks coming from a broader attack surface. Vulnerability management designed for traditional assets is not enough. To improve security, you need to rethink how you do things. For example, containers have become the de facto standard in cloud architectures today, which means that security needs to move into developers’ build processes while complementing existing solutions.
Attend this webinar to discover:
•Where vulnerability management for today’s assets needs to start
•What the new faces of attacks and remediation look like
•Why prioritization should not be based on scan results
•Why reports using Excel are no longer the answer
•How DevOps can be part of the solution to incorporate security
Join Tenable and (ISC)² on Jan 24, 2018 (Wed) at 14:00 (Singapore time) to learn how to minimize cyber exposure in a world of cloud, containers and other modern assets.
Presenter: Robert Healey, Senior Director Marketing, APAC, Tenable Network Security
Moderator: Clayton Jones, Regional Managing Director, APAC, (ISC)²
As with other regions of the world, APAC financial institutions face financial crimes such as tax evasion, money laundering and organized crime. This webinar brings together a trans-national panel to spotlight the region’s biggest financial crime vulnerabilities, highlighting best practices to shield your institution from these ongoing threats.
•Scrutinizing recent regional financial crime cases to identify typologies and adjust compliance oversight
•Constructing effective systems to flag possible trade-based money laundering and other financial crimes
•Enhancing CDD to better identify PEPs and potential proceeds of corruption
The Asia-Pacific region is home to some of the world’s most vibrant financial centers, which translates into higher risks for financial crime and a need for stringent AML/CTF programs. This panel will look at some of the top challenges facing financial professionals in the APAC region and discuss efficient and thorough methods for meeting domestic and multi-jurisdictional regulatory obligations.
•Dissecting recent cases to formulate effective institutional defense measures
•Structuring multi-jurisdictional sanctions risk models for international organizations
•Reviewing recent U.S. and European regulatory changes to anticipate impacts on APAC institutions
The SAP on Microsoft approach has allowed Accenture to deliver on their business priorities while lowering costs and improving performance. In turn, a lower cost of ownership allows Accenture to position itself for the future by investing in other areas to expand its capabilities and continue driving a digital Accenture future forward.
Join Aman Dokania, Cloud APAC Managing Director at Accenture and Danette Seward, Senior Director of Advanced Cloud Workloads at Microsoft, as they provide real-world examples of this successful partnership in action.
Threats from within the enterprise can pose the biggest cybersecurity risk to the organisation. Whether intentionally or accidentally, users with legitimate credentials can go about the network without triggering suspicion or alert, making their unauthorised activity difficult to detect. Insider threat activity can sometimes hide in plain sight, but what happens when people deliberately cover their tracks?
In this webinar, you will learn:
- Where to look for suspicious activity
- How to set up traps that will catch malicious insiders
- What finding paths across seemingly disparate data can reveal.
According to a 2016 industry report, employees cause 77 percent of internal security breaches. Find out who is causing yours.
Join Nuix’s and (ISC)² on Jun 28 (Wed) at 13:00 (Singapore time) and uncover the six hidden signs that help you detect the presence of insider threat activity.
Presenter: Jon Piercey, SVP Security & Intelligence APAC, Nuix
Moderator: Ir. Tejinder Singh, Senior Development Expert,T-Systems Malaysia SGA Security Engineering
Register now for this series of webinars to help educate firms on the different aspects of MiFIR reporting before the January 2018 go-live.
London Stock Exchange Group and guest speakers will be providing clarity on how MiFIR will affect different industry segments across the most important parts of the regulation. Firms can turn MiFIR into an opportunity to improve their business, register to find out more.
All sessions will include a live Q&A with the speakers and a chance to get all your questions answered.
One of the biggest challenges faced by information security teams today is how to effectively prioritize their vulnerability remediation work. Burdened with this overload of vulnerability disclosures, Infosec teams often get overwhelmed by the task at hand and throw up their hands in frustration. After all, no IT department has enough staff and resources to promptly patch every single vulnerability within their environment.
Join Qualys and (ISC)² on Sept 14 (Wednesday) at 2:00p.m. (Singapore time) for a Security Briefing on how to prioritize remediation.
Presenter: Deb J, SME & Solution Architect – APAC & Middle east, Qualys
Deb J (DJ) works with Qualys as a Subject Matter Expert for all products and platforms at Qualys. He is also a Field Solution architect responsible for customer success in the region. Deb has over 12 years of experience of which a large amount of time was spent on security. Started his career as a Code Quality Governance Specialist, so attention to details comes naturally. In the past he has worked with Compuware, NetIQ, LogLogic & ArcSight that adds a lot of experience for him to understand customer problems and identify solutions that work for them.
As organizations migrate workloads to cloud computing, they benefit from flexibility and agility, but network security operations grow increasingly difficult.
Gaining visibility into cloud environments, extending existing security operations and workflows, ensuring compliance, and managing shared responsibility create new challenges for security professionals. Add to this the complexity of hybrid and multi-cloud environments — and the loss of control within those environments — and it’s no wonder security leaders are scratching their heads over how to best secure their organization’s journey to the cloud.
This session will look at approaches to addressing the many challenges around cloud security management and best practices for translating on-prem security controls and processes into hybrid and multi-cloud environments.
Join Skybox Security and (ISC)² on Jan 17, 2018 (Wed) at 14:00 Singapore time to learn more about security management in the cloud.
在绝大多数数据泄露事件中，受害者最终都是因为看上去非常简单的漏洞问题而给自身带来危害。以Equifax 灾难性泄露事件为例，它的发生归根于公司IT未能识别Web Server Apache Struts 的已知漏洞并及时打补丁，而针对此漏洞已有有效的更新和解决方案。直到事件发生之后数月，他们才对外公布此次事件造成的损失或超过 7500 万美元。 类似漏洞所导致的泄漏事件，还相继发生在其它知名企业，如 Merck、Yahoo、Home Depot、Target等，预计导致上亿美元的利润和信誉损失。
这次将探讨如何通过 Tenable 解决方案，帮助企业准确发现资产并理解攻击面，识别漏洞对机构的威胁，达到自动化确认合规的目标。并以此为基础，让客户更容易调整网络安全策略，加速理解和减少企业安全风险。
Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide to organizations of all sizes. Whether organizations are using private, public or hybrid cloud environments for infrastructure or software-as-a-service, the common goal is to achieve operational and cost benefits without giving up full control over infrastructure and data.
Introducing a real challenge, privileged accounts in cloud environments are at a critical juncture of control and management because once an unauthorized user has access to privileged account credentials, control over the entire infrastructure is in the hands of the attacker. This is where securing privileged accounts plays a critical role in securing cloud environments and meeting audit and compliance requirements.
Join CyberArk and (ISC)2 on July 13 (Wednesday) at 2:00p.m. (Singapore time) for a Security Briefings to learn how to protect your privileged accounts in the Cloud.
Presenter:Troy Cunningham, CISSP, Sales Engineer, ANZ, APAC Professional Services, CyberArk
Moderator: Chuan-Wei Hoo, CISSP, CISA, CFE, BCCE, Technical Advisor, Asia-Pacific, (ISC)²