Join this important webinar as the Mandiant team explores trends that define today’s threat landscape based on Mandiant’s investigation of the year’s successful cyber attacks. Register today for an intelligence-led look into:
· New phishing trends breaching today’s companies.
· Changes in modern attack telemetry and methodology.
· Intelligence-led insights into emerging global threats.
· Modern defensive strategies to better protect your organization.
Special features spotlight trends in the APAC regions. Take a guided look at the M-Trends Report, pinpointing current and emerging global threats as discovered from the front lines of today’s leading forensic investigations.
A sound data governance strategy not only ensures that organizations meet their regulatory obligations, it also engenders customer trust and enables businesses to carve out an advantage for themselves in a data-driven economy.
Join us in a live BrightTalk webinar as we discuss how businesses can navigate the APAC data governance landscape, the challenges and opportunities that present themselves, and how to get your organization compliance-ready.
The webinar will cover
•The APAC data governance landscape
•The challenges and opportunities
•Getting started on the data governance journeys
•Top compliance considerations
2017 has been a watershed year in terms of digital transformation. It isn’t a year for major technology breakthroughs, but a year in which we have begun to change the way we use technology. Cloud adoption has taken off and more applications are being developed for the cloud. Corporate leadership is more committed than ever to digital transformation projects and early indications are that we have stopped the decline in productivity and are on an upturn. What’s next and what are the trends to watch out for in 2018?Read more >
Cloud is changing the landscape of traditional information technologies. The impact of cloud on business-grade video collaboration has been felt in the Asia Pacific region in recent years. The increasing availability of cloud solutions empowers video collaboration among the entire workforce anytime and anywhere. Early adopters also contribute to the direction of localization and integrations, which helps further improve the feature set and capabilities of the solutions. As a result, there are prospective market growth opportunities for cloud-based video collaboration solutions.
Questions this webinar will answer:
· What are the trends in the Asia-Pacific cloud video collaboration services market?
· What are the growth opportunities for video communications powered by a cloud?
· How is the technology evolving and what are the impacts on end users?
· What are the promising partnerships emerging in the market?
· Why are IT teams and end users facing challenges with video calls?
This session will give a view on how to successfully troubleshoot Skype for Business scenarios:
- Conference Calls
- Soft phone
- Voice quality
Microsoft just announced the Skype Operations Framework (SOF) - which incorporates network pre-assessment. This session will take a deep dive in to how the program can be used to deliver and effective and reliable Skype for Business Deployment.
One of the most critical elements in a successful UC deployment in the cloud or a hybrid environment is ensuring the IT infrastructure is optimized to cope with the demands of real-time communications.
However, organizations often fail to pre-assess their network and UC environment and later find out during deployment the network is unable to handle the demands, causing a poor user experience.
Join us to learn more about the new SOF and network pre-assessment requirement.
Cloud as the enabler of Internet of Things (IoT) and data analytics, the incorporation of cloud computing is critical for the successful implementation of these leading-edge technologies. Countries and organizations moving towards Industry 4.0 are highly dependent on cloud computing, as it is the basis for this revolutionary transition. However, complications and confusion arising from regulations (or lack thereof) surrounding cloud usage hinder cloud adoption.
During this webcast, we will discuss some of the findings from the CSA “State of Cloud Adoption in Asia Pacific (APAC) 2017” report and examine the availability and affordability of cloud computing in the APAC region.
Hospital information technology (Hospital IT) spending in Asia-Pacific (APAC) will grow at a compound annual growth rate of 9.7% between 2016 and 2021 to reach an estimated end-stage market size of more than $15 billion. Key growth opportunities in the region include solutions for Healthcare Data Continuity, Patient Engagement & Experience, Healthcare Cloud, Big Data & Analytics, and Healthcare Cybersecurity. However, the identification of these growth opportunities is only the first step toward succeeding as an ICT vendor in this market. The real demystification lies in understanding very specific target customer needs and then building a value proposition and business model that addresses those needs.Read more >
Identifying the UBO of customers who are establishing a business relationship or conducting transactions is often a difficult and cumbersome task. For example, identifying the UBO for a corporation seeking financial services will more than likely require digging through several layers of ownership and other legal arrangements. During the webinar, panelists will share their expertise and practical advice to achieve your organization’s compliance goals to meet UBO standards.
•Detailing APAC, US and EU jurisdictional requirements to aid UBO and ensure compliance with regulatory obligations
•Creating innovative processes to maintain the customer profile throughout the customer lifecycle
•Reviewing typologies of abusive trusts and shell firms to strengthen UBO identification processes
Despite increasingly strict and complex sanctions, financial institutions throughout the APAC region have are considering having business relationships with sanctioned nations such as Iran, Iraq and Myanmar. This webinar will provide attendees needed guidance on creating an effective sanctions management program and an updated, comprehensive compliance strategy for dealing with sanctioned nations. Industry experts will detail practical strategies to mitigate the risks and avoid potential penalties associated with doing business with sanctioned nations.
•Analyzing continuing risks with Iran and other sanctioned nations to ensure monitoring models are capable of real-time adjustments
•Creating institutional risk profile metrics that demonstrate appropriate KYC and CDD procedures
•Maintaining a risk-based approach to sanctions management that aligns with regulatory expectations
Corruption scandals, trade-based money laundering and rapidly changing sanctions requirements are among the complex challenges facing compliance professionals throughout the APAC region. This webinar examines these and other regional challenges, providing concrete guidance for regional financial institutions to combat emerging threats, strengthen compliance effectiveness and refine existing AML models to address regulatory changes in a robust manner.
•Detailing recent sanctions changes to assure current practices meet regulatory requirements
•Training staff on phantom shipping and other trade-based money laundering typologies to strengthen transaction monitoring
•Reviewing the Panama Papers case to aid monitoring of PEPs, shell firms and offshore havens
As with other regions of the world, APAC financial institutions face financial crimes such as tax evasion, money laundering and organized crime. This webinar brings together a trans-national panel to spotlight the region’s biggest financial crime vulnerabilities, highlighting best practices to shield your institution from these ongoing threats.
•Scrutinizing recent regional financial crime cases to identify typologies and adjust compliance oversight
•Constructing effective systems to flag possible trade-based money laundering and other financial crimes
•Enhancing CDD to better identify PEPs and potential proceeds of corruption
The Asia-Pacific region is home to some of the world’s most vibrant financial centers, which translates into higher risks for financial crime and a need for stringent AML/CTF programs. This panel will look at some of the top challenges facing financial professionals in the APAC region and discuss efficient and thorough methods for meeting domestic and multi-jurisdictional regulatory obligations.
•Dissecting recent cases to formulate effective institutional defense measures
•Structuring multi-jurisdictional sanctions risk models for international organizations
•Reviewing recent U.S. and European regulatory changes to anticipate impacts on APAC institutions
The SAP on Microsoft approach has allowed Accenture to deliver on their business priorities while lowering costs and improving performance. In turn, a lower cost of ownership allows Accenture to position itself for the future by investing in other areas to expand its capabilities and continue driving a digital Accenture future forward.
Join Aman Dokania, Cloud APAC Managing Director at Accenture and Danette Seward, Senior Director of Advanced Cloud Workloads at Microsoft, as they provide real-world examples of this successful partnership in action.
Threats from within the enterprise can pose the biggest cybersecurity risk to the organisation. Whether intentionally or accidentally, users with legitimate credentials can go about the network without triggering suspicion or alert, making their unauthorised activity difficult to detect. Insider threat activity can sometimes hide in plain sight, but what happens when people deliberately cover their tracks?
In this webinar, you will learn:
- Where to look for suspicious activity
- How to set up traps that will catch malicious insiders
- What finding paths across seemingly disparate data can reveal.
According to a 2016 industry report, employees cause 77 percent of internal security breaches. Find out who is causing yours.
Join Nuix’s and (ISC)² on Jun 28 (Wed) at 13:00 (Singapore time) and uncover the six hidden signs that help you detect the presence of insider threat activity.
Presenter: Jon Piercey, SVP Security & Intelligence APAC, Nuix
Moderator: Ir. Tejinder Singh, Senior Development Expert,T-Systems Malaysia SGA Security Engineering
Register now for this series of webinars to help educate firms on the different aspects of MiFIR reporting before the January 2018 go-live.
London Stock Exchange Group and guest speakers will be providing clarity on how MiFIR will affect different industry segments across the most important parts of the regulation. Firms can turn MiFIR into an opportunity to improve their business, register to find out more.
All sessions will include a live Q&A with the speakers and a chance to get all your questions answered.
One of the biggest challenges faced by information security teams today is how to effectively prioritize their vulnerability remediation work. Burdened with this overload of vulnerability disclosures, Infosec teams often get overwhelmed by the task at hand and throw up their hands in frustration. After all, no IT department has enough staff and resources to promptly patch every single vulnerability within their environment.
Join Qualys and (ISC)² on Sept 14 (Wednesday) at 2:00p.m. (Singapore time) for a Security Briefing on how to prioritize remediation.
Presenter: Deb J, SME & Solution Architect – APAC & Middle east, Qualys
Deb J (DJ) works with Qualys as a Subject Matter Expert for all products and platforms at Qualys. He is also a Field Solution architect responsible for customer success in the region. Deb has over 12 years of experience of which a large amount of time was spent on security. Started his career as a Code Quality Governance Specialist, so attention to details comes naturally. In the past he has worked with Compuware, NetIQ, LogLogic & ArcSight that adds a lot of experience for him to understand customer problems and identify solutions that work for them.
Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide to organizations of all sizes. Whether organizations are using private, public or hybrid cloud environments for infrastructure or software-as-a-service, the common goal is to achieve operational and cost benefits without giving up full control over infrastructure and data.
Introducing a real challenge, privileged accounts in cloud environments are at a critical juncture of control and management because once an unauthorized user has access to privileged account credentials, control over the entire infrastructure is in the hands of the attacker. This is where securing privileged accounts plays a critical role in securing cloud environments and meeting audit and compliance requirements.
Join CyberArk and (ISC)2 on July 13 (Wednesday) at 2:00p.m. (Singapore time) for a Security Briefings to learn how to protect your privileged accounts in the Cloud.
Presenter:Troy Cunningham, CISSP, Sales Engineer, ANZ, APAC Professional Services, CyberArk
Moderator: Chuan-Wei Hoo, CISSP, CISA, CFE, BCCE, Technical Advisor, Asia-Pacific, (ISC)²
As AML experts have long observed, compliance at any financial organization is everyone’s responsibility. An effective method of reaching that achievement is creating a strong institutional culture of compliance – with support of everyone from senior management to front-line workers. In this webinar, experts detail the fundamental building blocks of a culture of compliance, and provide practical strategies for creating, implementing and maintaining that culture.
•Gaining senior management backing to establish a culture of compliance as an institutional priority
•Integrating compliance culture concepts into risk assessment models to measure whether operational changes are needed
•Incentivizing ethical behavior by measuring it in performance reviews
As organizations migrate workloads to cloud computing, they benefit from flexibility and agility, but network security operations grow increasingly difficult.
Gaining visibility into cloud environments, extending existing security operations and workflows, ensuring compliance, and managing shared responsibility create new challenges for security professionals. Add to this the complexity of hybrid and multi-cloud environments — and the loss of control within those environments — and it’s no wonder security leaders are scratching their heads over how to best secure their organization’s journey to the cloud.
This session will look at approaches to addressing the many challenges around cloud security management and best practices for translating on-prem security controls and processes into hybrid and multi-cloud environments.
Join Skybox Security and (ISC)² on Jan 17, 2018 (Wed) at 14:00 Singapore time to learn more about security management in the cloud.
As a truly global organization, (ISC)2 membership stretches to over 110,000 members in over 160 countries. To help serve the needs of the membership, (ISC)2 has regional offices to oversee the operations and efforts in North America (NA), Asia-Pacific (APAC), Europe, Middle East, & Africa (EMEA) and Latam America (Latam). These offices are managed by regional directors with their own teams to offer regional support and resources and to be the voice of the region. On January 28, 2016 at 1:00PM Eastern you'll have the opportunity to discover what's going on in each of these regions as we gather our three Regional Directors Dan Waddell (NA), Clayton Jones (APAC), Adrian Davis (EMEA) and Gina Van Dijk (Latam) for a view into what they have planned for 2016.Read more >