Join this important webinar as the Mandiant team explores trends that define today’s threat landscape based on Mandiant’s investigation of the year’s successful cyber attacks. Register today for an intelligence-led look into:
· New phishing trends breaching today’s companies.
· Changes in modern attack telemetry and methodology.
· Intelligence-led insights into emerging global threats.
· Modern defensive strategies to better protect your organization.
Special features spotlight trends in the APAC regions. Take a guided look at the M-Trends Report, pinpointing current and emerging global threats as discovered from the front lines of today’s leading forensic investigations.
A sound data governance strategy not only ensures that organizations meet their regulatory obligations, it also engenders customer trust and enables businesses to carve out an advantage for themselves in a data-driven economy.
Join us in a live BrightTalk webinar as we discuss how businesses can navigate the APAC data governance landscape, the challenges and opportunities that present themselves, and how to get your organization compliance-ready.
The webinar will cover
•The APAC data governance landscape
•The challenges and opportunities
•Getting started on the data governance journeys
•Top compliance considerations
This session will give a view on how to successfully troubleshoot Skype for Business scenarios:
- Conference Calls
- Soft phone
- Voice quality
Microsoft just announced the Skype Operations Framework (SOF) - which incorporates network pre-assessment. This session will take a deep dive in to how the program can be used to deliver and effective and reliable Skype for Business Deployment.
One of the most critical elements in a successful UC deployment in the cloud or a hybrid environment is ensuring the IT infrastructure is optimized to cope with the demands of real-time communications.
However, organizations often fail to pre-assess their network and UC environment and later find out during deployment the network is unable to handle the demands, causing a poor user experience.
Join us to learn more about the new SOF and network pre-assessment requirement.
Cloud as the enabler of Internet of Things (IoT) and data analytics, the incorporation of cloud computing is critical for the successful implementation of these leading-edge technologies. Countries and organizations moving towards Industry 4.0 are highly dependent on cloud computing, as it is the basis for this revolutionary transition. However, complications and confusion arising from regulations (or lack thereof) surrounding cloud usage hinder cloud adoption.
During this webcast, we will discuss some of the findings from the CSA “State of Cloud Adoption in Asia Pacific (APAC) 2017” report and examine the availability and affordability of cloud computing in the APAC region.
Hospital information technology (Hospital IT) spending in Asia-Pacific (APAC) will grow at a compound annual growth rate of 9.7% between 2016 and 2021 to reach an estimated end-stage market size of more than $15 billion. Key growth opportunities in the region include solutions for Healthcare Data Continuity, Patient Engagement & Experience, Healthcare Cloud, Big Data & Analytics, and Healthcare Cybersecurity. However, the identification of these growth opportunities is only the first step toward succeeding as an ICT vendor in this market. The real demystification lies in understanding very specific target customer needs and then building a value proposition and business model that addresses those needs.Read more >
Identifying the UBO of customers who are establishing a business relationship or conducting transactions is often a difficult and cumbersome task. For example, identifying the UBO for a corporation seeking financial services will more than likely require digging through several layers of ownership and other legal arrangements. During the webinar, panelists will share their expertise and practical advice to achieve your organization’s compliance goals to meet UBO standards.
•Detailing APAC, US and EU jurisdictional requirements to aid UBO and ensure compliance with regulatory obligations
•Creating innovative processes to maintain the customer profile throughout the customer lifecycle
•Reviewing typologies of abusive trusts and shell firms to strengthen UBO identification processes
Despite increasingly strict and complex sanctions, financial institutions throughout the APAC region have are considering having business relationships with sanctioned nations such as Iran, Iraq and Myanmar. This webinar will provide attendees needed guidance on creating an effective sanctions management program and an updated, comprehensive compliance strategy for dealing with sanctioned nations. Industry experts will detail practical strategies to mitigate the risks and avoid potential penalties associated with doing business with sanctioned nations.
•Analyzing continuing risks with Iran and other sanctioned nations to ensure monitoring models are capable of real-time adjustments
•Creating institutional risk profile metrics that demonstrate appropriate KYC and CDD procedures
•Maintaining a risk-based approach to sanctions management that aligns with regulatory expectations
Corruption scandals, trade-based money laundering and rapidly changing sanctions requirements are among the complex challenges facing compliance professionals throughout the APAC region. This webinar examines these and other regional challenges, providing concrete guidance for regional financial institutions to combat emerging threats, strengthen compliance effectiveness and refine existing AML models to address regulatory changes in a robust manner.
•Detailing recent sanctions changes to assure current practices meet regulatory requirements
•Training staff on phantom shipping and other trade-based money laundering typologies to strengthen transaction monitoring
•Reviewing the Panama Papers case to aid monitoring of PEPs, shell firms and offshore havens
As with other regions of the world, APAC financial institutions face financial crimes such as tax evasion, money laundering and organized crime. This webinar brings together a trans-national panel to spotlight the region’s biggest financial crime vulnerabilities, highlighting best practices to shield your institution from these ongoing threats.
•Scrutinizing recent regional financial crime cases to identify typologies and adjust compliance oversight
•Constructing effective systems to flag possible trade-based money laundering and other financial crimes
•Enhancing CDD to better identify PEPs and potential proceeds of corruption
The Asia-Pacific region is home to some of the world’s most vibrant financial centers, which translates into higher risks for financial crime and a need for stringent AML/CTF programs. This panel will look at some of the top challenges facing financial professionals in the APAC region and discuss efficient and thorough methods for meeting domestic and multi-jurisdictional regulatory obligations.
•Dissecting recent cases to formulate effective institutional defense measures
•Structuring multi-jurisdictional sanctions risk models for international organizations
•Reviewing recent U.S. and European regulatory changes to anticipate impacts on APAC institutions
The SAP on Microsoft approach has allowed Accenture to deliver on their business priorities while lowering costs and improving performance. In turn, a lower cost of ownership allows Accenture to position itself for the future by investing in other areas to expand its capabilities and continue driving a digital Accenture future forward.
Join Aman Dokania, Cloud APAC Managing Director at Accenture and Danette Seward, Senior Director of Advanced Cloud Workloads at Microsoft, as they provide real-world examples of this successful partnership in action.
Threats from within the enterprise can pose the biggest cybersecurity risk to the organisation. Whether intentionally or accidentally, users with legitimate credentials can go about the network without triggering suspicion or alert, making their unauthorised activity difficult to detect. Insider threat activity can sometimes hide in plain sight, but what happens when people deliberately cover their tracks?
In this webinar, you will learn:
- Where to look for suspicious activity
- How to set up traps that will catch malicious insiders
- What finding paths across seemingly disparate data can reveal.
According to a 2016 industry report, employees cause 77 percent of internal security breaches. Find out who is causing yours.
Join Nuix’s and (ISC)² on Jun 28 (Wed) at 13:00 (Singapore time) and uncover the six hidden signs that help you detect the presence of insider threat activity.
Presenter: Jon Piercey, SVP Security & Intelligence APAC, Nuix
Moderator: Ir. Tejinder Singh, Senior Development Expert,T-Systems Malaysia SGA Security Engineering
Register now for this series of webinars to help educate firms on the different aspects of MiFIR reporting before the January 2018 go-live.
London Stock Exchange Group and guest speakers will be providing clarity on how MiFIR will affect different industry segments across the most important parts of the regulation. Firms can turn MiFIR into an opportunity to improve their business, register to find out more.
All sessions will include a live Q&A with the speakers and a chance to get all your questions answered.
One of the biggest challenges faced by information security teams today is how to effectively prioritize their vulnerability remediation work. Burdened with this overload of vulnerability disclosures, Infosec teams often get overwhelmed by the task at hand and throw up their hands in frustration. After all, no IT department has enough staff and resources to promptly patch every single vulnerability within their environment.
Join Qualys and (ISC)² on Sept 14 (Wednesday) at 2:00p.m. (Singapore time) for a Security Briefing on how to prioritize remediation.
Presenter: Deb J, SME & Solution Architect – APAC & Middle east, Qualys
Deb J (DJ) works with Qualys as a Subject Matter Expert for all products and platforms at Qualys. He is also a Field Solution architect responsible for customer success in the region. Deb has over 12 years of experience of which a large amount of time was spent on security. Started his career as a Code Quality Governance Specialist, so attention to details comes naturally. In the past he has worked with Compuware, NetIQ, LogLogic & ArcSight that adds a lot of experience for him to understand customer problems and identify solutions that work for them.
Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide to organizations of all sizes. Whether organizations are using private, public or hybrid cloud environments for infrastructure or software-as-a-service, the common goal is to achieve operational and cost benefits without giving up full control over infrastructure and data.
Introducing a real challenge, privileged accounts in cloud environments are at a critical juncture of control and management because once an unauthorized user has access to privileged account credentials, control over the entire infrastructure is in the hands of the attacker. This is where securing privileged accounts plays a critical role in securing cloud environments and meeting audit and compliance requirements.
Join CyberArk and (ISC)2 on July 13 (Wednesday) at 2:00p.m. (Singapore time) for a Security Briefings to learn how to protect your privileged accounts in the Cloud.
Presenter:Troy Cunningham, CISSP, Sales Engineer, ANZ, APAC Professional Services, CyberArk
Moderator: Chuan-Wei Hoo, CISSP, CISA, CFE, BCCE, Technical Advisor, Asia-Pacific, (ISC)²
As AML experts have long observed, compliance at any financial organization is everyone’s responsibility. An effective method of reaching that achievement is creating a strong institutional culture of compliance – with support of everyone from senior management to front-line workers. In this webinar, experts detail the fundamental building blocks of a culture of compliance, and provide practical strategies for creating, implementing and maintaining that culture.
•Gaining senior management backing to establish a culture of compliance as an institutional priority
•Integrating compliance culture concepts into risk assessment models to measure whether operational changes are needed
•Incentivizing ethical behavior by measuring it in performance reviews
As a truly global organization, (ISC)2 membership stretches to over 110,000 members in over 160 countries. To help serve the needs of the membership, (ISC)2 has regional offices to oversee the operations and efforts in North America (NA), Asia-Pacific (APAC), Europe, Middle East, & Africa (EMEA) and Latam America (Latam). These offices are managed by regional directors with their own teams to offer regional support and resources and to be the voice of the region. On January 28, 2016 at 1:00PM Eastern you'll have the opportunity to discover what's going on in each of these regions as we gather our three Regional Directors Dan Waddell (NA), Clayton Jones (APAC), Adrian Davis (EMEA) and Gina Van Dijk (Latam) for a view into what they have planned for 2016.Read more >
Once your enterprise makes the decision to implement SD-WAN, the question arises: how to migrate the network infrastructure with minimal disruption to business operations. Having the right feature set is important, yes, but it is just as critical to come up with the right strategy of connecting the SD-WAN to the existing network.
Join this webinar to learn
- Challenges enterprises face during SD-WAN migration
- Key considerations for a successful SD-WAN deployment
- Step-by-step guide to transition from a traditional WAN to SD-WAN
Lin Huang, VeloCloud's Field Solutions Engineer for APAC, uses real-life customer use cases to discuss the optimal steps to a successful SD-WAN deployment in Asia Pacific.
As the security industry has continued to underinvest in the human element of security, phishing has become the top attack vector for cyber criminals. Breaches continue to occur in record numbers, identification takes an exorbitantly long time, and the most preferred target is an organization’s human assets. Empowering human assets to provide vetted intelligence into your incident response teams is often overlooked. Every organization has these human sensors, and there’s a natural desire for these employees to want to help.
In this presentation, you will learn:
• Why the cybersecurity industry is broken
• How to reduce susceptibility to human-targeted attacks
• How to empower users to become human sensors to recognize and report suspected attacks
Join PhishMe and (ISC)² on Jun 21 (Wed) at 13:00 (Singapore time) and learn how you can empower your team and protect your organization from phishing attacks.