Hi [[ session.user.profile.firstName ]]

Third-Party Remote Access: The Hidden Weak Spot Exploited by Attackers

Outsourcing is a critical strategy for supporting user productivity and business growth. Remote third-party access to an organization’s internal systems is an inherent requirement for outsourced services, maintenance, and support.

Many companies overlook this remote vendor access as an area that requires tight security controls. But the fact is, 63% of attacks are caused by security vulnerabilities introduced by a third party.

Join CyberArk and (ISC)2 on Jun 29, 2016 at 2:00p.m. (Singapore Time) for a Security Briefing that you will learn more about this hidden security weak spot – and discover 5 ways to mitigate risk of attack through remote third-party access.
Recorded Jun 29 2016 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Zhihao Tan, Regional PS Manager-ASEAN, Professional Services APJ, CyberArk;Moderator: SC Leung, APAC Council Member, (ISC)2
Presentation preview: Third-Party Remote Access: The Hidden Weak Spot Exploited by Attackers

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • DDoS 방어를 위한 Cloudflare 활용법 Dec 12 2018 10:00 am UTC 60 mins
    Jean Ryu, Solutions Engineer, Cloudflare
    최근 몇 년 동안 한국, 싱가포르, 일본, 중국 같은 국가에서 DDoS 공격이 빈번하게 발생하고 있습니다. 또한 2018년에는 Memcached 서버를 이용하는 대규모 DDoS 공격 사례들이 새롭게 목격되고 있습니다. 이 웨비나에서는 날로 확대되는 DDoS 위협 환경에 대해 알아보고 공격의 유형과 규모에 관계없이 웹 사이트를 보호할 수 있는 Cloudflare의 이점을 소개합니다.

    웨비나를 통해 다음을 알아보십시오.

    -DDoS 공격의 유형 및 최신 트렌드
    -DDoS 방어를 위한 Cloudflare 활용법

    발표자: Jean Ryu, Solutions Engineer, Cloudflare
    진행자: 박 선 영, Business Development Manager, APAC, (ISC)²
  • Get to know the (ISC)² CISSP Concentrations (ISSAP/ISSEP/ISSMP) Dec 6 2018 6:00 am UTC 60 mins
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)²
    Go beyond the CISSP and challenge yourself with a CISSP Concentration! Got questions on the certifications? We have the answers.

    In this info-session, you will learn:

    - How large is the cybersecurity workforce gap today
    - Why you should pursue CISSP concentrations – ISSAP/ISSEP/ISSMP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Are you ready to prove yourself? Register and begin your journey today!

    NOTE: This info-session is meant for CISSP credential holders only. Join this info-session and earn 1 CPE.
    ________________________________________________________________________

    CISSP Concentrations:

    • Information Systems Security Architecture Professional (ISSAP)
    This certification proves your expertise developing, designing and analyzing security solutions. It also shows you excel at giving risk-based guidance to senior management in order to meet organizational goals.

    • Information Systems Security Engineering Professional (ISSEP)
    This certification recognizes your keen ability to practically apply systems engineering principles and processes to develop secure systems. You have the knowledge and skills to incorporate security into projects, applications, business processes and all information systems.

    • Information Systems Security Management Professional (ISSMP)
    This certification shows you excel at establishing, presenting and governing information security programs. You also demonstrate deep management and leadership skills whether you’re leading incident handling and/or a breach mitigation team.
  • Protecting Your Organization Inside Out Using Identity Dec 5 2018 5:00 am UTC 60 mins
    Nick Hawkins, Senior Director, Product Management, Enterprise; Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai
    Identity is a key factor in an organization’s security plan, as it covers both security and productivity. In this webinar, we will look at using identity management to protect your organization internally and externally:

    • We have previously covered an overview of zero trust architecture concepts. There are plenty of options available when designing a zero trust network - one of them is Identity Aware Proxy (IAP). The first half of the webinar will focus on best practices when implementing an IAP to enforce identity and access rules at an application layer, rather than network layer, and ensuring access rights are based on “need to know” least access.

    • The second half will focus on the rise of credential stuffing criminal activities in Asia Pacific and Japan. This session will focus on the root cause of credential stuffing, financial losses, the methodology adopted by criminals and the automation employed via botnets. We’ll cover case studies of how organisations across different industries have deployed solutions to successfully mitigate the risks posed by botnets.

    Join Akamai Technologies and (ISC)² on Dec 5, 2018 (Wed) at 13:00 (Singapore time) to learn how to protect your organization inside out using identity.

    Presenter: Nick Hawkins, Senior Director, Product Management, Enterprise, Akamai Technologies
    Presenter: Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai Technologies
    Moderator: Paolo Miranda, CISSP, Partnership Director, (ISC)² Singapore Chapter
  • デジタルデータを制し、ビジネスを成すために ~クラウドの100%活用とコンプライアンスを両立するための勘所~ Nov 28 2018 7:00 am UTC 60 mins
    髙岡 隆佳, エバンジェリスト, Symantec Japan
    企業は今、選択肢を迫られています。従来型のインフラに縛られたまま従来型のビジネスを継続するか、それとも今まで培ってきたデータをうまく先進的なデバイスやクラウドサービスを活用することで、新たな価値とスピードをビジネスに活かし、顧客だけでなく社員に対してもいかに恩恵をもたらすか。海外に目を向けると、すでにITやデジタルデータを活かした企業が成功を収める一方、デジタルデータのセキュリティ担保を怠った企業は大きな制裁や賠償を求められるニュースもよく目にします。本ウェビナーでは、デジタルデータをどのように担保してデジタルトランスフォーメーション(DX)を推進していくべきか、その勘所について解説します。

    Presenter: 髙岡 隆佳, エバンジェリスト, Symantec Japan
    Moderator: 小熊慶一郎 (Keiichiro Oguma), Director of Business Development, Japan, (ISC)²
  • Benchmarking Your Security Program Against Your Peers Recorded: Nov 14 2018 62 mins
    Robert Healey, Senior Director Marketing, APAC, Tenable
    Where are you exposed? Where should you prioritise, based on business risk? How is your cyber exposure changing over time? And how effective is your cyber security program, compared to your industry peers?

    Join Tenable and (ISC)² on Nov 14, 2018 (Wed) at 14:00 (Singapore time) to understand, measure, prioritise and now compare your Cyber Security posture, to see how effective your security investments & program are.

    Presenter: Robert Healey, Senior Director Marketing, APAC, Tenable
    Moderator: Paolo Miranda, CISSP, Partnership Director, (ISC)² Singapore Chapter
  • 《2018 年互联网现状/安全:Web 攻击》和有效爬虫程序管理案例研究 Recorded: Nov 12 2018 60 mins
    郑伟, 大中华区产品市场部经理, Akamai Technologies; 马俊, CISSP, 高级售前工程师, Akamai Technologies
    聆听 Akamai《2018 年夏季互联网现状/安全:Web攻击》的最新报告以及有关爬虫程序管理的案例研究,了解关于真实事件、安全最佳做法和趋势方面的最新信息。

    您将了解到:

    • 爬虫程序和黑客是如何通过撞库瞄准酒店行业(恶意登录百分比极高的行业),企业可以采取哪些措施 ?

    • 一些 DDoS 攻击如何采用非常规策略加强攻击效果,包括兴起的智能型自适应攻击者,他们会改变策略以通过自己的方式冲破防御;

    • 有关航空行业如何部署爬虫程序管理解决方案以保护其网站远离撞库攻击和其他形式 Web 欺诈的案例研究。

    参加Akamai Technologies和 (ISC)² 在11月7日下午2:00至3:00的在线研讨会《2018 年互联网现状/安全:Web 攻击》和有效爬虫程序管理案例研究,聆听专家分析有效的爬虫程序管理,还等什么?赶紧加入我们吧。

    *本次在线研讨会将以普通话进行

    演讲人: 郑伟, 大中华区产品市场部经理, Akamai Technologies
    演讲人: 马俊, CISSP, 高级售前工程师, Akamai Technologies
  • クラウドを使いこなせるか?CASBが解決できる課題とクラウドシフトのリアル Recorded: Oct 31 2018 58 mins
    髙岡 隆佳, エバンジェリスト, Symantec Japan
    企業間でクラウドシフトやCASBといった言葉が飛び交う昨今、日本企業はどれだけクラウドシフトを実現し、安全に活用できているのでしょう?そして、CASBは本当にクラウド利用の課題を解決しているのか?といった、誰もが明確な答えを持ち合わせていない中、クラウドセキュリティアライアンス(CSA Japan)などで日本企業のクラウドセキュリティの取り組みと向き合ってきたエバンジェリストが、その疑問に答え、後悔しないCASBの利用法について解説します。

    Presenter: 髙岡 隆佳, エバンジェリスト, Symantec Japan
    Moderator: 小熊慶一郎 (Keiichiro Oguma), Director of Business Development, Japan, (ISC)²
  • Cyber Exposure: 透视安全隐患 | 漏洞态势分析 Recorded: Oct 31 2018 59 mins
    全晓可, 资安顾问, Tenable Network Security
    哪些资产暴露于风险之下?
    我们应当根据怎样的优先顺序处理这些风险?
    我们如何逐渐减少暴露风险?
    我们需要提供所需的洞见,帮助我们管理并减少现代网络攻击面下的真正的风险。并且,范围包括传统 IT、公用云和私有云、网络应用程序和容器,以及 IoT 和 OT。

    参加Tenable和 (ISC)² 在10月31日下午2:00至3:00的在线研讨会《Cyber Exposure: 透视安全隐患 | 漏洞态势分析》,聆听专家探讨安全隐患和分析漏洞态势,还等什么?赶紧加入我们吧。

    演讲人: 全晓可, 资安顾问, Tenable Network Security
    主持人: 顾伟, CISSP, CCSP, (ISC)² 授权讲师及(ISC)²上海分会理事

    *本次在线研讨会将以普通话进行
  • Unified IT-OT Security Management: Strengthening Critical Infrastructure Defense Recorded: Oct 24 2018 58 mins
    Gerry Sillars, Vice President of APAC, Skybox Security
    Critical infrastructure — from energy production to manufacturing to public utilities — has become a prevalent attack vector for both nation-state threat actors as well as common cybercriminals. These attackers exploit vulnerabilities that exist due to the interconnectedness of IT and operational technology (OT) networks in order to establish a foothold in a victim’s environment and cause significant damage.

    In response, many organisations are looking to align their IT and OT security programs to better understand and tackle cyber risks in both environments. In this session, Skybox Security will cover what challenges to expect when seeking to achieve this, and how to use comprehensive visibility and contextual intelligence to overcome them.

    In this webinar, you will learn:
    • What are the inherent risks to OT security and how the continued integration with IT impact risk in both environments
    • What are the key concerns for IT and OT security teams and how can they can align to improve security throughout the organization
    • Which elements and capabilities are needed to gain seamless visibility of on-premises, cloud and OT networks
    • How to use modelling and analytics to understand your attack surface risk and effectively prioritize responses

    Join Skybox Security and (ISC)² on Oct 24, 2018 (Wed) at 14:00 (Singapore time) to learn how to strengthen the defense of critical infrastructure.

    Presenter: Gerry Sillars, Vice President of APAC, Skybox Security
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • Surfing the Global Waves of Phishing Recorded: Oct 10 2018 56 mins
    Nik Kalogirou, VP of Sales (APAC), Cofense; Ryan Jones, Sales Engineer, Cofense
    What’s keeping you up at night? Ransomware? Phishing? Spyware? Malware? Data Breaches? A malicious email typically opens the door to those threats.

    Organisations spend great energy (and budget) preventing users from falling prey, but threat actors continue to find ways to get past automated controls, staying one step ahead of artificial intelligence tools. Solving the phishing problem is more than just awareness: it’s about empowering humans to become instinctual nodes on the cyber defence network and feeding their real-time intelligence to security teams for immediate action.

    Join Cofense and (ISC)² on Oct 10, 2018 (Wed) at 13:00 (Singapore time) to hear about trends that we’ve been seeing around the globe and how they can impact the Asia-Pacific region.

    Presenter: Nik Kalogirou, VP of Sales (APAC), Cofense
    Presenter: Ryan Jones, Sales Engineer, Cofense
    Moderator: Kawin Boonyapredee, CISSP, Executive Security Advisor, IBM Security
  • Why Vulnerability Management Demands More Than Scan-and-Patch Recorded: Sep 26 2018 63 mins
    Greg Singh, Technical Director, APAC, Skybox Security
    Too many vulnerability management programs operate on incomplete or out-of-date scan data. What’s more, this data is rarely if ever correlated to their host’s place in the network, meaning efforts can be wasted on remediating already protected vulnerabilities while ignoring those left exposed to attack.

    To have a real impact on lowering your risk of cyberattack, organizations need to centralize and analyze data from their entire attack surface to narrow focus on the vulnerabilities most likely to be used in a cyberattack.

    In this webinar, you will learn:
    • What scanners miss in discovery, prioritization, remediation and oversight processes and how to fill in the gaps
    • How the intersection of your assets, networks, business and the threat landscape impact vulnerability risk
    • Why context-based approaches target remediation at your riskiest vulnerabilities and help identify patching alternatives
    • Insights from Skybox’s 2018 Vulnerability and Threat Trends Report mid-year update

    Join Skybox Security and (ISC)² on Sept 26, 2018 (Wed) at 14:00 (Singapore time), as we explore how to get more value out of your data, visualize your attack surface and centralize vulnerability management to systematically reduce your risk of cyberattack.

    Presenter: Greg Singh, Technical Director, APAC, Skybox Security
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • 2018 年インターネットの現状/セキュリティ:ウェブ攻撃とゼロ・トラストのベストプラクティス Recorded: Sep 19 2018 63 mins
    中西 一博, プロダクト・マーケティング・マネージャー, Akamai Technologies; 金子 春信, シニア・プロダクト・マーケティング・マネージャー; Akamai Technologies
    このライブウェビナーでは、ゼロ・トラスト・セキュリティのベストプラクティスについての詳細情報に加え、Akamai の 2018 年夏版「インターネットの現状/セキュリティ:ウェブ攻撃」レポートから、実際のインシデントや、セキュリティのベストプラクティスと傾向に関する最新情報を取り上げます。

    内容は次のとおりです。
    •サービス業界を標的にしたボットと Credential Abuse の解説、および悪質なログインの割合が著しく高かった同業界で実施可能な対処方法
    •防御対策を克服するために戦術を変えるインテリジェントで適応力のある敵の出現など、一部の DDoS 攻撃がどのようにして攻撃の有効性を高めるために通常とは異なる戦術を採用しているか
    •ゼロ・トラスト・セキュリティへ移行する際のさまざまなオプションの考察、および実装のベストプラクティスについての解説とともに、Akamai が推奨する最適なゼロ・トラスト・アーキテクチャについて共有します

    Presenter: 中西 一博 (Kazuhiro Nakanishi), プロダクト・マーケティング・マネージャー, Akamai Technologies;
    金子 春信 (Harunobu Kaneko), シニア・プロダクト・マーケティング・マネージャー; Akamai Technologies
    Moderator: 小熊慶一郎 (Keiichiro Oguma), Director of Business Development, Japan, (ISC)²
  • Show Me the Money! How Cybersecurity Breaches Impact the Bottom Line Recorded: Sep 19 2018 64 mins
    Jon Piercey, Security & Intelligence Lead, APAC, Nuix
    From stolen intellectual property to loss of reputation and customers, the consequences of a cybersecurity breach are not inconsequential to the bottom line of the business. In this webinar, we’ll take a close look at the true cost of a breach, what to be aware of and how you can mitigate the impact of a breach on your organization.

    •Learn the potential impact a breach can have on my organization
    •Understand all the potential costs and risks, including the intangible
    •How to mitigate the impact of a breach on your organization

    Join Nuix and (ISC)² on Sept 19, 2018 (Wed) at 13:00 (Singapore time) to learn how to mitigate the impact of a cybersecurity breach.

    Presenter: Jon Piercey, Security & Intelligence Lead, APAC, Nuix
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • Select and Deploy New Security Tools Faster Recorded: Sep 12 2018 62 mins
    Ian Farquhar, Distinguished Sales Engineer, WW Security Subject Matter Expert, Gigamon
    Sign up for this webinar and find out how to increase the efficiency of your security tools. Efficient prevention coupled with rapid detection and containment improves your overall security posture. Threats don't stand a chance.

    Discover how to select and deploy new security tools faster and more easily than you ever thought possible.

    You’ll learn how to:
    • Implement strategies for keeping up with ever-changing security tools.
    • Test multiple tools under consideration without impacting network performance.
    • Set up tests for inline tools.
    • Strengthen testing and streamline deployment of tools.

    See how to eliminate the challenges of testing and deploying security tools with a security delivery platform.

    Join Gigamon and (ISC)² on Sep 12, 2018 (Wed) at 12:00 noon (Singapore time) to learn how to select and deploy new security tools faster.

    Presenter: Ian Farquhar, Distinguished Sales Engineer, WW Security Subject Matter Expert, Gigamon
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • Best Practices for Building an Effective Insider Threat Program Recorded: Sep 5 2018 62 mins
    Simon Sharp, VP International, ObserveIT
    The greatest cyber security threat an organization faces is no longer the malicious outsider hacking from beyond network firewalls. It is the insiders – the contractors, vendors, privileged users and business users – who already have full access to your company’s systems and sensitive data. Addressing this type of threat requires a much different approach, but whether unintentional or malicious, you need to quickly identify and eliminate insider threat. Attend this session to learn best practices for building and maintaining an effective insider threat program.

    You will learn:
    - Why insider threats are prevalent, despite many organisations implementing a layered defence approach
    - How to stop insider threats in their tracks, through comprehensive visibility, real-time intelligence and policy enforcement
    - How to help organisations achieve data privacy and protection compliance in line with GDPR regulations
    - Why you need to focus on people, processes and technology, in that order

    Join ObserveIT and (ISC)² on Sep 5, 2018 (Wed) at 15:00 (Singapore time) to learn how to build an insider threat program.

    Presenter: Simon Sharp, VP International, ObserveIT;
    Jonathan Boyko, Senior Technical Manager, ObserveIT
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • State of the Internet / Security 2018: Web Attacks and Zero Trust Best Practices Recorded: Aug 8 2018 57 mins
    Nick Hawkins, Senior Director, Product Management, Enterprise; Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai
    Get the latest information on real-world incidents, security best practices and trends from Akamai’s Summer 2018 State of the Internet / Security Report: Web Attacks as well as more information on our Zero Trust security best practices in our upcoming live webinar.

    You’ll learn:

    · A deep dive into bots and credential abusers targeting the hospitality industry, which has seen an extremely high percentage of malicious logins and what can be done

    · How some DDoS attacks are employing unusual tactics to increase effectiveness, including the emergence of intelligent, adaptive enemies who change tactics to overcome the defenses in their way

    · How to explore the different options of moving into Zero Trust security, look at best practices for implementation and share Akamai’s recommendations of what optimal Zero Trust architecture should be

    Join Akamai and (ISC)² on Aug 8, 2018 (Wed) at 13:00 (Singapore time) to learn more about web attacks and zero trust best practices.

    Presenter: Nick Hawkins, Senior Director, Product Management, Enterprise, Akamai Technologies;
    Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai Technologies
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • Attacker’s Advantage - Understand How & Why Cyberattackers Beat Your Defence Recorded: Jul 18 2018 60 mins
    Robert Healey, Senior Director Marketing, Asia Pacific, Tenable Network Security
    In its inaugural report, Tenable Research explores who has the first-mover advantage – cyber criminals or security teams? What’s the difference in time between when an exploit is publicly available for a given vulnerability and the first time that security teams actually assess their systems? And why does this even matter to your organization?

    The research team analyzed the 50 most prevalent critical and high-severity vulnerabilities from just under 200,000 vulnerability assessment scans over a three-month period. What did they find?

    Alarmingly, all too often, the attackers have the advantage. On average, they have a seven-day head start on defenders. Threat actors are sprinting ahead, exploiting vulnerabilities before security teams have even left the starting blocks – before businesses even know they’re at risk.

    Join Tenable and (ISC)² on Jul 18, 2018 (Wed) at 14:00 (Singapore Time) to understand how and why cyber attackers are beating your defence.

    Presenter: Robert Healey, Senior Director Marketing, APAC, Tenable Network Security
    Moderator: Tony Vizza, CISSP Director, Cybersecurity Advocacy for APAC, (ISC)²
  • Inside (ISC)²: Virtual Town Hall – Enrich. Enable. Excel Recorded: Jul 17 2018 59 mins
    Wesley Simpson, (ISC)² COO, Mirtha Collin, (ISC)² Sr. Ed. & Training Mgr., Michelle Schweitz, (ISC)² Media Mgr.
    (ISC)² is committed to delivering value to our members, providing a transparent view of the organization’s developments and plans for the future. To that end, please join (ISC)² for a virtual Town Hall meeting on July 17, 2018 at 1:00PM Eastern to review many of our new member benefits, service offerings and look at what is still to come in 2018, including enriching professional development opportunities, Security Congress and more. Members and non members alike will enjoy the opportunity to learn how (ISC)² is delivering on its value promise.
  • Achieve Your Security Goals with Inline Prevention Tools Recorded: Jun 27 2018 61 mins
    Presenter:Ian Farquhar, Distinguished Engineer, Security, Gigamon; Moderator: SC Leung, Member, Asia-Pacific Advisory Council
    Inline security tools operate by actively preventing threats in your network, but deploying and optimizing these tools presents several challenges to both network and security engineers. The downsides can include a potential point of failure, degradation of network and application performance, difficulty to scale and upgrade. The use of a next-generation packet broker and its inline bypass functionality can mitigate these challenges. Join Gigamon and (ISC)² on Jun 27, 2018 (Wed) at 12:00 noon (Singapore Time) to examine how inline bypass can overcome physical deployment obstacles, maximize network availability, increase the scale of inspection and reduce the impact to network performance.
  • Taming the Cloud Together – CCSP & CCSK Cloud Certification Synergy Recorded: Jun 12 2018 58 mins
    David Shearer, CEO, (ISC)2; Jim Reavis, CEO, CSA; Kevin Jackson, GovCloudNetwork ; Rich Mogull, Securosis; B. Dunlap (Mod)
    Certain things go together to make the sum of their parts that much better. Peanut Butter and Jelly. Lennon and McCartney. Batman and Robin. In the ever-changing world of the cloud, cyber security professionals need continuous training and certifications to stay up-to-speed and pairing (ISC)2’s CCSP (Certified Cloud Security Professional) with CSA’s CCSK (Certificate of Cloud Security Knowledge) can put any cyber security practitioner ahead in terms of knowledge, skills and job opportunities. On June 12, 2018 at 1:00PM Eastern, join David Shearer, (ISC)2’s CEO and Jim Reavis, CSA’s CEO, along with other subject matter expects as we explore the differences between each program, the training options available for each, and how these programs are synergistic in nature and together were designed to build on one another.
Live Webinars for InfoSec Professionals in Asia Pacific Time Zone
Looking for expertise and information to advance your career and tackle your challenges? Subscribe and join us for the educational webinars in APAC time zone. Earn CPEs quickly and at no cost by attending webinars: 1 hour of webinar equals 1 CPE. We welcome members and non members alike.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Third-Party Remote Access: The Hidden Weak Spot Exploited by Attackers
  • Live at: Jun 29 2016 6:00 am
  • Presented by: Zhihao Tan, Regional PS Manager-ASEAN, Professional Services APJ, CyberArk;Moderator: SC Leung, APAC Council Member, (ISC)2
  • From:
Your email has been sent.
or close