Hi [[ session.user.profile.firstName ]]

A Dissection of Recent High Profile Attacks

We examine the Ukraine attack which turned off the lights for 225,000 customers, and Bangladesh Heist where USD81m was siphoned off. Learn from these high profile breaches that made headlines, investigate what happened, and make sure this does not happen in your company.

Most large organisation knows they have been breached. The lesson to be learnt, is that in every case, the attacker had been present in the network long before the breach was discovered, looking for ways to move around, using higher and higher access credentials to get to the end goal.

When you understand how this happened, you can reduce the risk your company faces.

It’s also key to remember that the goal of attackers is not to impersonate people. The goal is to get to something that the attacker wants – whether to make money, obtain some kind of data leverage, or simply cause disruption to the organisation.

This session will equip you with the knowledge on how you can better protect your organisation from these risks. Join CyberArk and (ISC)2 on Jun 15, 2016 at 2:00p.m. (Singapore Time) for a Security Briefings that will examine that the Ukraine attack which turned off the lights for 225,000 customers, and Bangladesh Heist where USD81m was siphoned off.

Presenter: Prasad Kulkarni, Pre-Sales and Professional Services Manager India, Professional Services, APJ, CyberArk
Moderator: Chuan-Wei Hoo, Technical Advisor, Asia-Pacific, (ISC)²
Recorded Jun 15 2016 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Prasad Kulkarni, Pre-Sales and Professional Services Manager India, Professional Services, APJ, CyberArk
Presentation preview: A Dissection of Recent High Profile Attacks

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • 了解安全威胁态势和凭据滥用攻击 Sep 27 2017 6:00 am UTC 60 mins
    演講人: 李文涛,阿卡迈(Akamai)大中华区解决方案部门总经理;萧锦明,Akamai亚太高级企业安全系统架构师;主持人: 阎光,(ISC)² 上海分会主席,德勤风险咨询副总监
    安全威胁态势不断变化,并且极为迅速。因此,组织应持续了解最新的攻击信息,以此来确定在当前的威胁态势下应该寻找的应对方式并预计攻击在未来变化的方式,从而免受该类威胁的影响。这一点至关重要。

    在今天的会议当中,Akamai 将基于已发布的《2017 年第二季度互联网安全现状》报告,与大家分享有关安全威胁态势的深度见解。


    近些年来,凭据滥用攻击已成为一种普遍的威胁,而且复杂性正日益增加。我们也将对此进行详细介绍。凭据滥用攻击活动一旦成功,用户将遭受无法访问、数据泄露或欺诈性交易等损失。Akamai 将揭示这些攻击活动中使用的技术以及难以检测出这些活动的原因。我们还将展示抵御此类攻击的方法和解决方案,从而使您的组织不再遭受此类攻击的影响。


    参加Akamai 和 (ISC)² 在09月27日下午2:00至3:00的在线论坛,了解安全威胁态势和凭据滥用攻击。
  • IoT와 웹 보안 위협의 실체와 대응방안 Sep 14 2017 7:00 am UTC 60 mins
    Yongkhi Paek, Senior Security Sales Specialist, Akamai Technologies Korea
    최근 빈번하게 발생하고 주목해야 하는 보안 공격들의 패턴 및 특이사항들에 대해 살펴보고, 기업의 비즈니스 연속성과 안전성을 위해 이러한 공격 위협들에 대해 어떤 효과적이고 효율적인 방법으로 대응 및 대비해야 하는지 알아봅니다.

    1. 최신 웹 보안의 트렌드
    2. 2분기 주요 웹 애플리케이션 공격 분석
    3. 2분기 주요 디도스 공격에 대한 통계
    4. IoT 보안 공격 양상
    5. 웹 보안의 변화 추이
    6. 요약 및 질의답변
  • Improving Credential Abuse Threat Mitigation Aug 30 2017 5:00 am UTC 60 mins
    Or Katz, Principal Lead Security Researcher, Akamai & James Tin, Principal Enterprise Security Architect, Akamai
    Credential abuse attacks have become a prevalent threat in recent years, and a successful credential abuse attack campaign can result in damaging consequences such as losing access and control over the accounts, data breach and fraudulent transactions.

    Many of the accounts being abused are compromised account, which are the result of information breach in vulnerable web applications. The problem starts once visitors of highly-secured web applications create login credentials and then recycle those credentials to access another potentially vulnerable web application.

    In this webinar, Akamai will present our latest research on malicious activity that sheds new light on credential abuse attack campaigns characteristics. The research reveals the techniques that are being used and what make these campaigns difficult to detect over long periods of time. We will show how collaboration of attack evidence on different targets can become a solution to mitigate such attacks.

    The speakers will also share key attack data and trends observed from the latest Akamai Q2 2017 State of the Internet Security Report.

    Join Akamai and (ISC)² on Aug 30 (Wed) at 13:00 (Singapore time) to learn more about improving credential abuse threat mitigation.
  • The Evolution of Vulnerability Management – Program Trends and Solutions Recorded: Jul 19 2017 61 mins
    Michael Aboltins, Technical Product Manager Tenable Asia Pacific, Tenable Network Security
    Frequent cyber security attacks spreading around the world and affecting systems everywhere has become the "new norm". Recent changes in IT architecture such as virtual, mobile & cloud services, plus increasingly sophisticated cyber threats are forcing enterprise security practices and principles to be re-evaluated. Analyst research data shows that system vulnerabilities are still the largest contributing factor in enterprise data breaches. Thus, identifying vulnerable systems on your network and applying mitigations to them must continue to be a strong priority.

    This webinar will provide you with insight into how successful organisations have evolved their Vulnerability Management programs to gain a deeper understanding of their overall Security posture. The presentation will share ideas to boost the effectiveness of your security program now and in future, taking into account the major new IT paradigms including Cloud, Containers & DevOps.

    Join Tenable and (ISC)² on July 19 (Wed) at 14:00 (Singapore time) to learn more about the evolution of vulnerability management.
  • Research Findings: Quantifying ROI for Application Security Recorded: Jul 12 2017 53 mins
    Shelly Yao, Security Architect – South East Asia, Hewlett-Packard Enterprise
    Continuous delivery of application is the new norm. Businesses recognize that applications are a competitive differentiator so they are creating and pushing them out at a lightning pace, thus putting a lot of pressure on development and security teams. HPE Enterprise Security, together with Mainstay Partners, studied data collected from a broad set of Fortify customers to quantify the business value they are experiencing by building security into each phase of development.

    Join HPE and (ISC)² on July 12 (Wed) at 13:00 (Singapore time) to learn about the key findings from the research. Discover the ROI of application security practices for your organization to scale confidently for business growth.

    Presenter: Shelly Yao, Security Architect – South East Asia, Hewlett-Packard Enterprise
    Moderator: Clayton Jones, Regional Managing Director, Asia-Pacific, (ISC)²
  • The Evolution of Vulnerability Management 進化を迫られる脆弱性管理 Recorded: Jun 28 2017 61 mins
    花檀 明伸 (Akinobu Kadan), Senior System Engineer, Tenable Network Security
    現代のサイバーセキュリティ攻撃は全世界規模で発生し、数時間で数百万台のシステムが被害を被るケースもあります。短時間で大規模な被害が発生する要因のひとつにIT環境の変化があると、テナブルは考えています。仮想化やクラウドサービス、モバイル技術などの新しいテクノロジーの普及はサイバー攻撃の可能性を拡大し、従来型のエンタープライズ向けセキュリティ対策では十分な対応をおこなうことができません。一方で、システムが持つ脆弱性がセキュリティ侵害の最大の原因となっていることが、さまざまな調査から明らかになっています。新しい時代のITインフラに適応した総合的な脆弱性管理を実現し、攻撃のリスクを軽減することが求められているのです。

    このセッションでは、 IT環境の変化が必要とする脆弱性管理製品の新たな要件についてご紹介します。

    - 包括的な脆弱性管理の重要性
    - 脆弱性管理は定期診断から継続的監視へ
    - 継続的な脆弱性管理の効果 〜 統合化された分析、可視化機能と、コンプライアンス評価
    - 新しいインフラへの対応 〜 モバイル、仮想化、クラウド、コンテナ

    テナブルは、可視化やリスクの優先度評価、必要となるアクション、セキュリティコンプライアンスへの準拠状況などを包括的に管理するソリューションを提供して、IT資産に対するセキュリティの向上に貢献します。
  • The Dangers Within: 6 Hidden Signs of Cybersecurity Insider Threats Recorded: Jun 28 2017 61 mins
    Jon Piercey, SVP Security & Intelligence APAC, Nuix
    Threats from within the enterprise can pose the biggest cybersecurity risk to the organisation. Whether intentionally or accidentally, users with legitimate credentials can go about the network without triggering suspicion or alert, making their unauthorised activity difficult to detect. Insider threat activity can sometimes hide in plain sight, but what happens when people deliberately cover their tracks?

    In this webinar, you will learn:

    - Where to look for suspicious activity
    - How to set up traps that will catch malicious insiders
    - What finding paths across seemingly disparate data can reveal.

    According to a 2016 industry report, employees cause 77 percent of internal security breaches. Find out who is causing yours.

    Join Nuix’s and (ISC)² on Jun 28 (Wed) at 13:00 (Singapore time) and uncover the six hidden signs that help you detect the presence of insider threat activity.

    Presenter: Jon Piercey, SVP Security & Intelligence APAC, Nuix
    Moderator: Ir. Tejinder Singh, Senior Development Expert,T-Systems Malaysia SGA Security Engineering
  • Collective Security – Prairie Dogs vs Humans Recorded: Jun 21 2017 61 mins
    Duncan Thomas, Director of Sales for APAC, PhishMe; Chuan-Wei Hoo, Technical Advisor, Asia-Pacific, (ISC)²
    As the security industry has continued to underinvest in the human element of security, phishing has become the top attack vector for cyber criminals. Breaches continue to occur in record numbers, identification takes an exorbitantly long time, and the most preferred target is an organization’s human assets. Empowering human assets to provide vetted intelligence into your incident response teams is often overlooked. Every organization has these human sensors, and there’s a natural desire for these employees to want to help.

    In this presentation, you will learn:

    • Why the cybersecurity industry is broken
    • How to reduce susceptibility to human-targeted attacks
    • How to empower users to become human sensors to recognize and report suspected attacks

    Join PhishMe and (ISC)² on Jun 21 (Wed) at 13:00 (Singapore time) and learn how you can empower your team and protect your organization from phishing attacks.
  • 互联网现状/互联网安全现状报告——最新DDoS及Web App攻击趋势概览 Recorded: Jun 7 2017 60 mins
    马俊 James, 阿卡迈中国高级售前工程师, 阿卡迈中国; Moderator: 阎光, (ISC)² 上海分会 会员主席, 德勤风险咨询, 副总监
    参加这个网络研讨会,您可获取DDoS及Web应用攻击的流量和趋势的概览及深度分析。

    Akamai每天都承载了全球 15%到30%的Web流量,因此可以观察到大量的互联网攻击,从包含SQL注入的恶意HTTP请求,到规模高达650Gbps的DDoS攻击。我们的安全专家会对此信息进行分析,对相关趋势和发现进行分享,这些信息都包含在我们按照季度发布的互联网现状/互联网安全现状报告中。我们将在本系列在线研讨会中发布相关信息。

    主要话题:
    - 互联网现状报告中的全球网络流量概况
    - APJ区域的网络攻击情况
    - IoT(物联网)僵尸网络是如何改变APJ地区网络攻击的拓扑结构的
    - IoT的安全责任

    参加Akamai 和 (ISC)² 在06月07日下午2:00至3:00的在线论坛《互联网现状/互联网安全现状报告——最新DDoS及Web App攻击趋势概览》,获取DDoS及Web应用攻击的流量和趋势的概览及深度分析,还等什么?赶紧加入我们吧。
  • 전세계 인터넷 보안 현황 보고서를 통해 살펴보는 최근 DDoS 및 웹 보안 공격 트렌드 Recorded: May 31 2017 61 mins
    인승진 (Howard Leen), 이사 (Enterprise Security Senior Architect), 아카마이코리아
    아카마이는 방대한 양의 데이터를 분석하여 전세계 인터넷 보안에 대한 가장 정확도 높은 가시성을 제공하는 인터넷 보안 현황 보고서(State of the Internet Security Report)를 매 분기마다 발표하고 있습니다.

    해당 보고서를 통해 살펴보면 인터넷 상의 위협 트렌드가 최근 크게 변화하고 있다는 것을 알 수 있으며, 무엇보다도 IoT 기반의 봇넷을 활용한 DDoS 공격의 등장으로 최대 650Gbps에 이르는 대형 공격들이 벌어지고 있음을 확인할 수 있습니다.

    본 웨비나에서는 가장 최근에 발표된 인터넷 보안 현황 보고서를 기반으로 아래와 같은 내용들을 중점적으로 살펴볼 예정입니다.

    - 최근 인터넷 보안 현황 보고서를 통해 알아보는 글로벌 주요 보안 이슈들
    - 아시아 지역에서 발생한 보안 공격 통계
    - IoT 봇넷이 아시아 지역의 보안에 가져온 영향
    - IoT 보안 대비의 중요성
  • State of the Internet/ Security Report–Latest DDoS and Web App Attack Trends Recorded: May 24 2017 60 mins
    Nick Rieniets, Senior Security Specialist, Akamai Technologies
    As an organization that delivers and protects 15-30% of the world’s web traffic on a daily basis, Akamai is uniquely positioned to observe a large amount of attacks ranging from 20 malicious HTTP requests containing SQL injection to DDoS attacks up to 650 Gbps. Our security experts analyze this information and share trends, observations, and findings in our quarterly State of the Internet / Security Report. We will present this information and associated insights in this webinar series.

    In this webinar, you will learn:

    • A summary of global findings from the State of the Internet Report
    • Attack statistics for APJ
    • How IoT botnets have changed the attack topology in APJ
    • The responsibilities for security of IoT

    Join Akamai and (ISC)² on May 24 (Wed) at 13:00 (Singapore time) for an overview and analysis of traffic and trends from Distributed Denial of Service (DDoS) and web application attacks.
  • 商业化犯罪软件猖獗 亟需新Threat-centric漏洞管理方案 Recorded: May 17 2017 55 mins
    Presenter: Glenn Tan, Solutions Architect, East Asia, Skybox Security; Moderator: 毛宇, (ISC)²官方授权讲师, 普华永道风险及控制服务 高级经理
    近年来,网络犯罪日益组织化、自动化,结合外包欺诈技术的运用,使伪装在商业包装下的种种威胁变得更复杂,更难以发现。网络犯罪的产业化态势,使得组织很难迎头赶上:疲惫的安全团队所依赖的漏洞检测及应对工具,与犯罪分子采用的攻击策略不相匹配。如此情形下,最好的解决方案是什么?安全官们应如何面对日益增长的网络犯罪产业化的趋势?

    据2016年高德纳公司的报告(Gartner report)显示:诸多组织采取“逐步降低风险、特定时间内进行漏洞与补丁管理”的方针。比如,许多漏洞管理程序把风险分为 “低、中、高和高危”四等级风险值的“通用漏洞评分系统(CVSS)”的分数,通常这些程序将成千上万的漏洞评为“高危”并需要即时修复。但此方式常常无效,因为诸多风险发生在与组织网络断开或未知区域中。

    最新研究报告显示:大多数被黑客攻击或反复攻击的漏洞,已经在暗网(Dark Web)上进行交易了。通过识别这些漏洞(未知的或已知的),结合“通用漏洞评分系统(CVSS)”信息以及组织IT环境的逻辑关系,安全官们可以改变这一态势。他们能真正理解潜在威胁、严重漏洞,当然还有漏洞攻击的可能性。此Threat-centric漏洞管理方案考虑到组织内外的多种因素,从而逐步降低风险。这套崭新方案需要管理者理解组织受攻击的优先级:潜在的、紧急的、产生实际威胁的。采用这种方式,安全官们能够提高综合防御优势,了解对手及入侵者真正要攻击的漏洞、以及伪装的潜在威胁。
  • Commercialized Crimeware and Threat-Centric Vulnerability Management Recorded: May 10 2017 60 mins
    Kevin Flynn, Worldwide Director, Product Marketing, Skybox Security
    In recent years, cybercriminals have organized, automated and outsourced fraud techniques, resulting in an increase in commercial packages of complex threats. This productization of cybercrime is making it harder for organizations to keep up: the tools that overworked security teams rely on to discover and mitigate vulnerabilities don’t match the exploit tactics used by the criminals. So, what is the best approach in light of this dynamic threat landscape? How should security leaders stand up to the growing threat of industrialized cybercrime?

    Recent reports show that the majority of successful breaches are executed by threat actors that use and re-use a subset of old vulnerabilities whose exploits are being commercially exchanged in the “Dark Web.” By identifying these vulnerabilities — those for which exploits exist in the wild and are being used in attacks — and combining this information with CVSS scores and contextual intelligence of an organization’s IT environment, security leaders can change the game. They gain a true understanding of not only the potential impact and severity of a vulnerability but also the probability of exploitation. This threat-centric vulnerability management augments gradual risk reduction by considering multiple factors inside and outside the organization. It’s a new approach to vulnerability management that requires comprehensive understanding of an organization’s attack surface combined with the prioritization of vulnerabilities by potential, imminent and actual threat levels. Using this approach, security leaders gain the advantage of integrated intelligence, including what vulnerabilities are truly being targeted by adversaries and threat actors in the wild.

    Join Skybox Security and (ISC)² on May 10 (Wed) at 12:00 noon (Hong Kong time) to learn more about Commercialized Crimeware and Threat-Centric Vulnerability Management.
  • The Nuix Black Report: Find Out What Hackers are Really Thinking Recorded: Mar 1 2017 59 mins
    Christopher Pogue, Chief Information Security Officer, Nuix
    The Nuix Black Report takes a unique perspective on cybersecurity. Most security industry reports compile data about incidents that have already taken place or trends in data breaches—but these are clearly the symptoms of a deeper problem. Instead, Nuix has focused on the source of the threat landscape: the attackers themselves.

    Join this webinar with report author and Nuix Chief Information Security Officer Chris Pogue to discover the true nexus between attacker methodology and defensive posture:

    • Which countermeasures will actually improve your security posture (they’re not the ones you think)?
    • What is the best spend for your security dollar and why?
    • If hackers could speak to your CEO or board of directors, what would they say?

    Join Nuix and (ISC)² on Mar 1 (Wed) at 13:00 (Singapore time) and find out what hackers are really thinking.
  • DDoS Threats of Past, Present and Future Recorded: Feb 15 2017 62 mins
    John Ellis, Chief Strategist, Cyber Security (APJ), Akamai & Michael Smith, Chief Technology Officer, Security (APJ), Akamai
    The Fourth Industrial Revolution is in all full swing with the Internet at its core. While the Internet is connecting everyone and everything it also connects us to a variety of nefarious threat actors, who have found ways to exploit and monetize many aspects of our digital world. In recent times, one area has been DDoS, which has become one of the top cyber threats du jour.

    In this webinar, you will learn:

    - Historical developments in the DDoS threat landscape
    - How criminal operators are building out their botnets – discover, infect, operate and maintain
    - Technical examination of new botnet trends such as the Mirai IoT botnet
    - Architectural concepts and design for DDoS mitigation solutions - covering cloud and data centre environments
    - Response strategies to defending and responding to DDoS attacks
    - Predictions for future and next steps.

    Join Akamai and (ISC)² on Feb 15 (Wed) at 13:00 (Singapore time) and learn about the DDoS threats of past, present and future.

    Presenters:
    - John Ellis, Chief Strategist, Cyber Security (Asia-Pacific & Japan), Akamai
    - Michael Smith, Chief Technology Officer, Security (Asia-Pacific & Japan), Akamai

    Moderator:
    - Clayton Jones, Managing Director, Asia-Pacific, (ISC)²
  • Addressing a Key Challenge in Network Security – ZERO DOWNTIME Recorded: Dec 21 2016 60 mins
    Joshua Kooh, Strategic Security Solutions Consultant, Forcepoint
    One of the top CIO challenges is to maintain 100% uptime. Access to applications, data, and resources on the network is mission-critical for every organization. Downtime costs can be high and in various forms - loss of revenue and productivity, the cost of recovery and other intangible costs, such as damage to their reputation and brand value. Downtime is simply unacceptable. Hence, security for that network must be highly available and not cause any performance degradation of the network - in migration, deployment or through human error.

    In this session, we will explore these questions:
    • Is it possible to have no downtime when maintaining network security?
    • What are the different causes of downtime?
    • What are the different approaches to minimize downtime?
    • How do you manage the costs to achieve 99.999% uptime in the network security solutions?

    Join Forcepoint and (ISC)² on Dec 21 (Wed) at 1:00p.m. (Singapore time) and learn how to maintain 100% uptime.
  • IoT普及で急拡大するDDoS, Web攻撃リスクと防衛のための検討ポイント Recorded: Dec 14 2016 61 mins
    中西一博, セキュリティプロダクトマーケティングマネージャ, アカマイ・テクノロジーズ 合同会社
    現在、最も頻繁に用いられるサイバー攻撃のひとつとなったDDoS攻撃。Mirai Botnetに代表されるIoTを媒介する新たな攻撃手法によって、ビジネス停止のリスクがかつてないほど高まっています。実際にその攻撃を受け止めたAkamaiが観測した最新の攻撃データに基づき、現在のDDoSの特徴としくみ、その対策を用意する際に留意すべきポイントを中心に、企業Webを中心にしたシステムが今まさに直面しているリスクを解説します。
  • Adding Intelligence to Investigations (Focus on data breach investigations) Recorded: Dec 7 2016 61 mins
    Stuart Clarke, CTO, Cybersecurity, Nuix; John Douglas, Technical Director, First Response
    Data volumes are growing in both size and complexity; we have increasingly less control and awareness of the data we hold. In this session, we will highlight the benefits of information governance practices enabling organisations to build intelligence about their own data and identify their critical information assets. In the event of a data breach or security incident, this information provides actionable intelligence, allowing you to discover and respond to an incident before the matter escalates into a crisis.

    Key takeaways:
    1. Understand the basic principles required to understand your data
    2. See how leveraging intelligence can get you to the answer faster
    3. Extract hidden links and relationships with analytics

    Join Nuix and (ISC)² on Dec 07 (Wed) at 02:00p.m. (Singapore time) in learning how to add intelligence to investigations (focus on data breach investigations).

    Presenters:
    - Stuart Clarke, Chief Technical Officer, Cybersecurity, Nuix
    - John Douglas, Technical Director, First Response

    Moderator:
    SC Leung, CISSP, CCSP, CISA, CBCP;
    Member, Asia-Pacific Advisory Council, (ISC)²
  • A Dissection of Recent High Profile特権アカウント乗っ取り事件の事例とその真相 Recorded: Nov 30 2016 62 mins
    Naohiko Yamanouchi 山之内 真彦, マーケティングマネージャー、APJ, CyberArk Software
    ~ ウクライナの電力会社とバングラデッシュ中央銀行はどのように攻撃されたか ~

    22万5千人の顧客の停電を起こしたウクライナの電力会社への攻撃と、8100万ドルが盗まれたバングラディッシュ中央銀行への攻撃は、特権アカウントを乗っ取られたハッキング事件でした。これらの事件がどのように起きたのか、特権アカウントがどのように悪用されたのか、そして、これらの事件を防ぐためには何ができたのか、をご紹介します。

    大企業、大きな組織であれば、既にハッカーが侵入している可能性が低くありません。これらの攻撃から学べることは、侵入が発見されるタイミングより大分前に攻撃者は既にネットワークに入り込んでおり、どのようにネットワークの中で自由に動けるか、その方法を探していたということではないでしょうか。これがどのように行われたかを把握することによって、リスクを削減することが可能となります。

    また、攻撃者の目的は、内部の人間になりすますことではありません。本当の目的は、攻撃者が狙っているものを「入手」すること。それは、お金、データ、または組織の運用を中断することかもしれません。今回のセッションでは、これらのリスクからどのように組織を守ることが出来るか、そして事例から何を学ぶ事が出来るかをご紹介します。
  • Best Practices on Operational Efficiency in Network Security Recorded: Oct 26 2016 63 mins
    Presenter: Michael Ferguson, Strategic Security Solutions Consultant, Forcepoint
    Most businesses prefer to control the day-to-day operations of their networks using their own resources. The increasing complexity of modern networks means that the overall acquisition, control and deployment for network security projects is far more challenging than before. With decreasing IT budgets and limited resources within high growth businesses; how are network teams expected to improve operational efficiency without sacrificing quality of service and service level agreements?

    In a world that is fraught with new security exploits, maintaining operational efficiency with a low impact on resource and cost can be very difficult.

    What are the best practices for maintaining an operationally efficient network security deployment? How do network teams stay on-top of daily routine tasks, such as policy configuration, upgrades and network security monitoring? How can network teams be enabled to focus on mission critical projects through automation?

    Learn from case studies about network security and firewalls which enable the deployment of firewalls within highly distributed networks without sacrificing time or security.

    Join Forcepoint and (ISC)² on Oct 26 (Wed) at 1:00p.m. (Singapore time) in learning the best practices on operational efficiency in network security.

    Presenter: Michael Ferguson, Strategic Security Solutions Consultant, Forcepoint

    Moderator: Clayton Jones, Managing Director, Asia-Pacific, (ISC)²
Live Webinars for InfoSec Professionals in Asia Pacific Time Zone
Looking for expertise and information to advance your career and tackle your challenges? Subscribe and join us for the educational webinars in APAC time zone. Earn CPEs quickly and at no cost by attending webinars: 1 hour of webinar equals 1 CPE. We welcome members and non members alike.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: A Dissection of Recent High Profile Attacks
  • Live at: Jun 15 2016 6:00 am
  • Presented by: Prasad Kulkarni, Pre-Sales and Professional Services Manager India, Professional Services, APJ, CyberArk
  • From:
Your email has been sent.
or close