Hi [[ session.user.profile.firstName ]]

Third-Party Remote Access: The Hidden Weak Spot Exploited by Attackers

Outsourcing is a critical strategy for supporting user productivity and business growth. Remote third-party access to an organization’s internal systems is an inherent requirement for outsourced services, maintenance, and support.

Many companies overlook this remote vendor access as an area that requires tight security controls. But the fact is, 63% of attacks are caused by security vulnerabilities introduced by a third party.

Join CyberArk and (ISC)2 on Jun 29, 2016 at 2:00p.m. (Singapore Time) for a Security Briefing that you will learn more about this hidden security weak spot – and discover 5 ways to mitigate risk of attack through remote third-party access.
Recorded Jun 29 2016 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Zhihao Tan, Regional PS Manager-ASEAN, Professional Services APJ, CyberArk;Moderator: SC Leung, APAC Council Member, (ISC)2
Presentation preview: Third-Party Remote Access: The Hidden Weak Spot Exploited by Attackers

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Beyond Shadow IT: How Leading Organisations Protect Sensitive Cloud Data Apr 17 2019 3:00 am UTC 60 mins
    Richard Campagna, CMO & VP of Products, Bitglass; Brendon Thwaites, Director, Channels & Alliances APJ, Bitglass
    As more organisations deploy cloud apps like Office 365, AWS, and Slack securing corporate data becomes a challenge. While Cloud Access Security Brokers (CASBs) were originally used solely for shadow IT discovery, they have since emerged as the go-to solution for organisations that need end-to-end data security, from cloud to device. In fact, Gartner believes that by 2022, 60% of large enterprises will use a CASB to govern some cloud services.

    In this webinar, we'll explore:
    • Critical gaps in cloud applications that must be filled
    • Four sets of capabilities required for cybersecurity in the cloud
    • How CASBs provide specialized security that goes beyond native cloud app functionality like that of Office 365
    • Case studies on how leading enterprises leverage CASB to secure their cloud footprint.

    Join Bitglass and (ISC)² on Apr 17, 2019 (Wed) at 11:00 (GMT +8) to learn how a CASB can help you meet your security and compliance requirements.

    Presenter: Richard Campagna, CMO & VP of Products, Bitglass
    Presenter: Brendon Thwaites, Director, Channels & Alliances APJ, Bitglass
    Moderator: Chuan-Wei Hoo, CISSP, Technical Advisor, Asia-Pacific, (ISC)²
  • DevSecOps – Web Application Firewall in a CI/CD Workflow (以粵語進行) Apr 10 2019 7:00 am UTC 60 mins
    Clive Chan, Senior Consultant, F5 Networks
    Cloud, automated deployment and DevOps practices are reshaping IT, as developers increasingly bypass internal IT teams to meet business demands for speed.

    In this webinar, we will look at the changing landscape of DevOps and Continuous Integration. It explores the practice of scaling application security, controlling vulnerabilities, and controlling advanced threats with web application firewall in CI/CD environments.

    Join F5 Networks and (ISC)² on Apr 10, 2019 (Wed) at 15:00 (Hong Kong time) to learn about web application firewall in a CI/CD workflow.

    Presenter: Clive Chan, Senior Consultant, F5 Networks

    *This webinar will be conducted in Cantonese. (本次網上研討會將以粵語進行。)
  • (ISC)² Info Session: Get to know the CISSP Concentrations (ISSAP/ISSEP/ISSMP) Apr 9 2019 6:00 am UTC 60 mins
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)²
    Go beyond the CISSP and challenge yourself with a CISSP Concentration! Challenge yourself with a CISSP Concentration! These specialized credentials build upon the CISSP. Whether you’re interested in career growth, deeper knowledge or achieving elite status, CISSP Concentrations prove your subject matter mastery.

    Got questions on the certifications? We have the answers.

    In this info-session, you will learn:

    - How large is the cybersecurity workforce gap today
    - Why you should pursue CISSP concentrations – ISSAP/ISSEP/ISSMP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Are you ready to prove yourself? Register and begin your journey today!

    NOTE: This info-session is meant for CISSP credential holders only. Join this info-session and earn 1 CPE.
    ________________________________________________________________________

    CISSP Concentrations:

    • Information Systems Security Architecture Professional (ISSAP)
    This certification proves your expertise developing, designing and analyzing security solutions. It also shows you excel at giving risk-based guidance to senior management in order to meet organizational goals.

    • Information Systems Security Engineering Professional (ISSEP)
    This certification recognizes your keen ability to practically apply systems engineering principles and processes to develop secure systems. You have the knowledge and skills to incorporate security into projects, applications, business processes and all information systems.

    • Information Systems Security Management Professional (ISSMP)
    This certification shows you excel at establishing, presenting and governing information security programs. You also demonstrate deep management and leadership skills whether you’re leading incident handling and/or a breach mitigation team.
  • Fight the Good Fight Against the Bad Bots Apr 3 2019 6:00 am UTC 60 mins
    Shahnawaz Backer, Security Specialist, APAC, F5 Networks
    Identifying malicious bots and safeguarding against them is a top priority for organisations developing a sustainable security strategy.

    Attend this webinar to learn:
    • How bots infect, propagate, and attack applications
    • What types of application attacks are commonly performed by bots
    • How you can defend against bad bots without disrupting the good ones

    Join F5 Networks and (ISC)² on Apr 3, 2019 (Wed) at 14:00 (GMT +8) to learn how to fight against the malicious bots.

    Presenter: Shahnawaz Backer, Security Specialist, APAC, F5 Networks
    Moderator: Chuan-Wei Hoo, CISSP, Technical Advisor, Asia-Pacific, (ISC)²
  • 사용자 ID 기반의 보안 방식 Mar 27 2019 6:00 am UTC 60 mins
    한 준 형, Technical Account Manager, TSG-KR Media, Akamai Technologies; 김 현 도, Senior Solution Engineer, Akamai Technologies
    사용자 ID는 보안 및 생산성과 관련되어 있는 기업 보안의 핵심 요소입니다. 이 웨비나에서는 기업을 내부 및 외부적으로 보호하려면 ID를 어떻게 관리해야 하는지에 대해 중점적으로 다룰 예정입니다.

    • 이전에는 제로 트러스트 아키텍처의 개념에 대해 살펴봤습니다. 제로 트러스트 네트워크를 구축하는 많은 방법 중의 하나는 바로 IAP(Identity Aware Proxy)입니다. 웨비나의 전반부에는 네트워크가 아닌 애플리케이션 레이어에서 ID와 접속 룰을 적용하고 최소 접속 권한을 제공하는 IAP의 모범 사례에 대해 중점적으로 알아봅니다.

    • 후반부에는 아시아∙태평양∙일본 지역에서 증가하고 있는 크리덴셜 스터핑 활동에 대해 설명합니다. 크리덴셜 스터핑의 근본 원인, 경제적 손실, 공격자들이 사용하는 방법, 봇넷을 통한 자동화에 대해 중점적으로 살펴봅니다. 또한 봇넷 리스크를 성공적으로 차단하기 위해 여러 분야의 기업들이 도입한 솔루션에 대해 소개하는 사례 연구도 언급할 예정입니다.

    발표자: 한 준 형, Technical Account Manager, TSG-KR Media, Akamai Technologies
    발표자: 김 현 도, Senior Solution Engineer, Akamai Technologies
    진행자: 박 선 영, Senior Business Development Manager, APAC, (ISC)²
  • IDを使用して組織の内と外を防御する Mar 20 2019 8:00 am UTC 60 mins
    中西 一博, プロダクト・マーケティング・マネージャー, Akamai Technologies; 金子 春信, CISSP, シニア・プロダクト・マーケティング・マネージャー; Akamai Technologies
    ID は、セキュリティと生産性を両立するようなセキュリティプランを立てるための重要な要素です。このウェビナーでは、ID 管理による組織内外の防御について考察します。

    • ゼロトラスト・アーキテクチャの考え方についてはすでに取り上げてきましたが、ゼロトラスト・ネットワークを設計する際に利用できるオプションはたくさんあります。その 1 つが Identity Aware Proxy(IAP)です。 このウェビナーの前半では、IAP を実装する際のベストプラクティスを説明します。IAP を使用することで、ネットワークレイヤーではなくアプリケーションレイヤーで ID とアクセスルールを適用し、必要最小限のアクセス権の原則に基づいて確実にアクセスを制御します。

    • 後半では、アジア太平洋および日本における Credential Stuffing (ボットによる不正ログイン)犯罪の増加について取り上げます。このセッションでは、Credential Stuffing が生じる原因、攻撃による経済的損失、攻撃者が利用する手法、ボットによる自動化などについて解説します。また、ボットがもたらすリスクの緩和について、さまざまな業界での成功事例も紹介します。

    Presenter: 中西 一博, プロダクト・マーケティング・マネージャー, Akamai Technologies
    Presenter: 金子 春信, CISSP, シニア・プロダクト・マーケティング・マネージャー, Akamai Technologies
    Moderator:小熊慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • Best Practices in Securing DNS Mar 20 2019 6:00 am UTC 60 mins
    Rio Sibuea, Sr. Pre-Sales Systems Engineer, Infoblox
    NGFWs, IDS, sandboxes, DLP, etc are important - but increasingly, DNS is a major security weakness, allowing hackers to exfiltrate & infiltrate confidential data. This is a known issue because DNS was initially designed very simple and this attracts hackers to abuse the protocol. How do we protect our internal data and prevent hacker attacking the service?

    Join Infoblox and (ISC)² on Mar 20, 2019 (Wed) at 14:00 (GMT +8) to learn the best practices in securing DNS.

    Presenter: Rio Sibuea, Sr. Pre-Sales Systems Engineer, Infoblox
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • 避开2019年的安全威胁和物联网IoT的安全案例分析 Recorded: Mar 13 2019 63 mins
    郑伟, 大中华区产品市场部经理, Akamai Technologies; 陈家俊, CISSP, 高级安全系统架构师, Akamai Technologies
    当大家都在为已到来的2019年开始制定重要的安全规划时, 我们会回顾过去的2018年安全大事件以确保我们不会错过任何安全盲点。此外,该研讨会也会分享最新的物联网IoT(Internet of Things) 僵尸网络驱动的DDoS攻击,最真实的安全事件和最佳实践。

    您将了解到:
    • 分析安全行业的发展趋势以及这些趋势在未来一年可能会从哪些方面对我们产生影响?
    • 当您怀疑自己受到DDoS攻击时,该如何分析以及与您的安全厂商进行有效的沟通?
    • 我们如何面对物联网IoT DDoS攻击和如何实施防范措施?

    参加Akamai Technologies和 (ISC)² 在3月13日下午2:00至3:00的在线研讨会,聆听专家分析如何避开2019年的安全威胁和物联网IoT的安全案例分析,还等什么?赶紧加入我们吧。

    演讲人: 郑伟, 大中华区产品市场部经理, Akamai Technologies
    演讲人: 陈家俊, CISSP, 高级安全系统架构师, Akamai Technologies
    主持人: 卢佐华, CISSP-ISSAP, (ISC)² 北京分会主席

    *本次在线研讨会将以普通话进行
  • (ISC)² Info Session: CCSP - The Industry’s Premier Cloud Security Certification Recorded: Mar 12 2019 64 mins
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)²
    Earning the globally recognized CCSP cloud security certification is a proven way to build your career and better secure critical assets in the cloud.

    In this info-session, you will learn:
    - How large is the cybersecurity workforce gap today
    - Why you should pursue CCSP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    =====================================================================

    The CCSP shows you have the advanced technical skills and knowledge to design, manage and secure data, applications and infrastructure in the cloud using best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Prove your skills, advance your career, and gain support from a community of cybersecurity leaders here to help you throughout your professional journey.

    www.isc2.org/ccsp

    Are you ready to prove yourself? Register and begin your CCSP journey today!

    NOTE: Join this info-session and earn 1 CPE.
  • Cybersecurity Predictions 2019 and Advanced Technology on Endpoint Protection Recorded: Mar 6 2019 61 mins
    Wayne Lam, Solutions Systems Engineer, Symantec
    Cyber hacks of major corporate systems and websites continued apace and will inevitably be part of the 2019 cybersecurity scene. Many well-known organizations across the globe suffered significant breaches. Beyond all-too-common corporate attacks, 2018 was also marked by accelerated threat activity across a diverse range of targets and victims.

    Staying ahead of the evolving threat landscape requires an easy to implement endpoint security framework and simplified, yet powerful, security tools to protect against emerging threats. New techniques have vastly improved response to evolving attacks. Advanced Endpoint Security explains how these technologies work and sets forth an integrated framework for endpoint security that covers it all.

    Join Symantec and (ISC)² on Mar 6, 2019 (Wed) at 15:00 (Hong Kong time) to explore the cybersecurity predictions and advanced technology on endpoint protection.

    Presenter: Wayne Lam, Solutions Systems Engineer, Symantec
    Moderator: SC Leung, CISSP, CCSP, Member, Asia-Pacific Advisory Council, (ISC)²

    *This webinar will be conducted in Cantonese.
  • Access Denied! Decoding Identity Aware Proxies Recorded: Mar 6 2019 63 mins
    Nick Hawkins, Senior Director, Product Management, Enterprise; Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai
    Previously, we covered how identity is a key factor in a security plan when protecting your organization internally and externally. We heard your requests and hence, this upcoming webinar will be a deeper technical discussion on how to:

    • Protect your public-facing applications against malicious Javascript skimmer code such as Magecart credit card stealer. We’ll outline the common vectors used by such attackers and how organizations can protect their websites and customers.

    • Enhance your enterprise security perimeter and reduce your attack surface, minimizing the chance of an attack. Picking up from our previous webinar, we’ll do a deep dive on Identity Aware Proxies and examine how their architecture helps improve your security posture.

    Join Akamai Technologies and (ISC)² on Mar 6, 2019 (Wed) at 13:00 (GMT +8) to learn how to decode identity aware proxies.

    Presenter: Nick Hawkins, Senior Director, Product Management, Enterprise, Akamai Technologies
    Presenter: Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai Technologies
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • (ISC)² Info Session: CISSP - The World's Premier Cybersecurity Certification Recorded: Feb 26 2019 64 mins
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)²
    Accelerate your cybersecurity career with the CISSP certification.

    Join this online info-session hosted by (ISC)² and learn everything you need to know about the globally recognized credential CISSP!

    During the online info-session, you will:
    - Gain an insight into the CISSP credential-its domains and career benefits for credential holders
    - Hear about the practical application of the CISSP related to real world issues for security professionals
    - Ask questions about the credential, exam and experience requirements
    - Learn everything you need to know about getting certified

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    =====================================================================
    Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise and become an (ISC)² member, unlocking a broad array of exclusive resources, educational tools, and peer-to-peer networking opportunities.

    Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to support you throughout your career.

    https://www.isc2.org/cissp
  • (ISC)² Info Session: CSSLP-The Premier Secure Software Development Certification Recorded: Feb 22 2019 57 mins
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)²
    Earning the globally recognized CSSLP secure software development certification is a proven way to build your career and better incorporate security practices into each phase of the software development lifecycle (SDLC).

    In this info-session, you will learn:
    - How large is the cybersecurity workforce gap today
    - Why you should pursue CCSLP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    =====================================================================

    CSSLP certification recognizes leading application security skills. It shows employers and peers you have the advanced technical skills and knowledge necessary for authentication, authorization and auditing throughout the SDLC using best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Prove your skills, advance your career, and gain support from a community of cybersecurity leaders here to help you throughout your professional journey.

    www.isc2.org/csslp

    Are you ready to prove yourself? Register and begin your CSSLP journey today!

    NOTE: Join this info-session and earn 1 CPE.
  • Remediating Threats by Bridging Islands of Security Recorded: Feb 20 2019 63 mins
    Terence Grey, Senior Systems Engineer, ANZ, Infoblox
    Most organisations have multiple products and services, from multiple vendors and suppliers to address their cybersecurity needs. The lack of integration and inability to share critical information results in silos of technology that cause inefficiency, lack of agility, limited visibility and a poor security posture. How can an organization solve and streamline to improve their cybersecurity operations?

    Join Infoblox and (ISC)² on Feb 20, 2019 (Wed) at 14:00 (GMT +8) to learn how to assist organisations in improving their security operations and reducing time to containment.

    Presenter: Terence Grey, Senior Systems Engineer, ANZ, Infoblox
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • (ISC)² Info Session: SSCP -The Premier Security Administrator Certification Recorded: Feb 19 2019 46 mins
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)²
    Earning a globally recognized advanced security administration and operations certification like the SSCP is a great way to grow your career and better secure your organization’s critical assets.

    In this info-session, you will learn:
    - How large is the cybersecurity workforce gap today
    - Why you should pursue SSCP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    =====================================================================
    SSCP certification demonstrates you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to help you throughout your career.

    www.isc2.org/sscp

    Are you ready to prove yourself? Register and begin your SSCP journey today!

    NOTE: Join this info-session and earn 1 CPE.
  • How to Get the Most of Your (ISC)² Membership - Local Benefits and Global Reach Recorded: Feb 12 2019 55 mins
    Tony Vizza, CISSP , Director of Cyber Security Advocacy, APAC and Hazel Hung, Customer Services Manager, APAC
    As an (ISC)² Member, you now have access to a wide range of global resources, educational tools, peer networking opportunities, as well as exclusive discounts to industry events. There is so much more to discover to what your (ISC)² membership brings!

    In this webinar, you will learn about:
    - The latest news and developments across APAC and (ISC)² from around the world.
    - Exciting and upcoming CPE opportunities to help you stay sharp
    - Member benefits and perks including fantastic discounts on a range day to day items
    - New, upcoming and FREE professionally developed education courses just for members.
    - An update on (ISC)² certifications to help you take your career to the next level.
    - Networking opportunity with like-minded professionals locally and globally via ((ISC)² chapters
    - An opportunity to ask questions in our Q&A session

    Join us on Feb 12, 2019 (Tue) at 14:00 (GMT +8) to get the most of your (ISC)² membership globally and locally.
  • Reducing Vulnerability Overload is Key to Protecting Your Business Recorded: Jan 30 2019 64 mins
    Robert Healey, Senior Director Marketing, APAC, Tenable
    Today, every organization faces vulnerability overload. In 2018 alone, Tenable Research estimates nearly 19,000 new vulnerabilities will be disclosed. There are just too many to discover, assess and effectively mitigate.

    Reducing vulnerability overload means focusing like a laser on vulnerabilities most likely to impact your business right now. To learn how you can address this challenge, join Robert Healey, APAC Marketing Director with Tenable and (ISC)² at 14:00 (Singapore Time) on Jan 30, 2019 (Wed), for a webinar exploring best practices you can adopt to overcome vulnerability overload and better protect your business from cyber risk.

    Presenter: Robert Healey, Senior Director Marketing, APAC, Tenable
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • DDoS 방어를 위한 Cloudflare 활용법 Recorded: Dec 12 2018 54 mins
    유 지 영, Solutions Engineer, Cloudflare
    최근 몇 년 동안 한국, 싱가포르, 일본, 중국 같은 국가에서 DDoS 공격이 빈번하게 발생하고 있습니다. 또한 2018년에는 Memcached 서버를 이용하는 대규모 DDoS 공격 사례들이 새롭게 목격되고 있습니다. 이 웨비나에서는 날로 확대되는 DDoS 위협 환경에 대해 알아보고 공격의 유형과 규모에 관계없이 웹 사이트를 보호할 수 있는 Cloudflare의 이점을 소개합니다.

    웨비나를 통해 다음을 알아보십시오.

    -DDoS 공격의 유형 및 최신 트렌드
    -DDoS 방어를 위한 Cloudflare 활용법

    발표자: 유 지 영, Solutions Engineer, Cloudflare
    진행자: 박 선 영, Business Development Manager, APAC, (ISC)²
  • Get to know the (ISC)² CISSP Concentrations (ISSAP/ISSEP/ISSMP) Recorded: Dec 6 2018 60 mins
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)²
    Go beyond the CISSP and challenge yourself with a CISSP Concentration! Got questions on the certifications? We have the answers.

    In this info-session, you will learn:

    - How large is the cybersecurity workforce gap today
    - Why you should pursue CISSP concentrations – ISSAP/ISSEP/ISSMP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Are you ready to prove yourself? Register and begin your journey today!

    NOTE: This info-session is meant for CISSP credential holders only. Join this info-session and earn 1 CPE.
    ________________________________________________________________________

    CISSP Concentrations:

    • Information Systems Security Architecture Professional (ISSAP)
    This certification proves your expertise developing, designing and analyzing security solutions. It also shows you excel at giving risk-based guidance to senior management in order to meet organizational goals.

    • Information Systems Security Engineering Professional (ISSEP)
    This certification recognizes your keen ability to practically apply systems engineering principles and processes to develop secure systems. You have the knowledge and skills to incorporate security into projects, applications, business processes and all information systems.

    • Information Systems Security Management Professional (ISSMP)
    This certification shows you excel at establishing, presenting and governing information security programs. You also demonstrate deep management and leadership skills whether you’re leading incident handling and/or a breach mitigation team.
  • Protecting Your Organization Inside Out Using Identity Recorded: Dec 5 2018 61 mins
    Nick Hawkins, Senior Director, Product Management, Enterprise; Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai
    Identity is a key factor in an organization’s security plan, as it covers both security and productivity. In this webinar, we will look at using identity management to protect your organization internally and externally:

    • We have previously covered an overview of zero trust architecture concepts. There are plenty of options available when designing a zero trust network - one of them is Identity Aware Proxy (IAP). The first half of the webinar will focus on best practices when implementing an IAP to enforce identity and access rules at an application layer, rather than network layer, and ensuring access rights are based on “need to know” least access.

    • The second half will focus on the rise of credential stuffing criminal activities in Asia Pacific and Japan. This session will focus on the root cause of credential stuffing, financial losses, the methodology adopted by criminals and the automation employed via botnets. We’ll cover case studies of how organisations across different industries have deployed solutions to successfully mitigate the risks posed by botnets.

    Join Akamai Technologies and (ISC)² on Dec 5, 2018 (Wed) at 13:00 (Singapore time) to learn how to protect your organization inside out using identity.

    Presenter: Nick Hawkins, Senior Director, Product Management, Enterprise, Akamai Technologies
    Presenter: Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai Technologies
    Moderator: Paolo Miranda, CISSP, Partnership Director, (ISC)² Singapore Chapter
Live Webinars for InfoSec Professionals in Asia Pacific Time Zone
Looking for expertise and information to advance your career and tackle your challenges? Subscribe and join us for the educational webinars in APAC time zone. Earn CPEs quickly and at no cost by attending webinars: 1 hour of webinar equals 1 CPE. We welcome members and non members alike.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Third-Party Remote Access: The Hidden Weak Spot Exploited by Attackers
  • Live at: Jun 29 2016 6:00 am
  • Presented by: Zhihao Tan, Regional PS Manager-ASEAN, Professional Services APJ, CyberArk;Moderator: SC Leung, APAC Council Member, (ISC)2
  • From:
Your email has been sent.
or close