Hi [[ session.user.profile.firstName ]]

Protecting Privileged Accounts in the Cloud

Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide to organizations of all sizes. Whether organizations are using private, public or hybrid cloud environments for infrastructure or software-as-a-service, the common goal is to achieve operational and cost benefits without giving up full control over infrastructure and data.

Introducing a real challenge, privileged accounts in cloud environments are at a critical juncture of control and management because once an unauthorized user has access to privileged account credentials, control over the entire infrastructure is in the hands of the attacker. This is where securing privileged accounts plays a critical role in securing cloud environments and meeting audit and compliance requirements.

Join CyberArk and (ISC)2 on July 13 (Wednesday) at 2:00p.m. (Singapore time) for a Security Briefings to learn how to protect your privileged accounts in the Cloud.

Presenter:Troy Cunningham, CISSP, Sales Engineer, ANZ, APAC Professional Services, CyberArk
Moderator: Chuan-Wei Hoo, CISSP, CISA, CFE, BCCE, Technical Advisor, Asia-Pacific, (ISC)²
Recorded Jul 13 2016 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Troy Cunningham, CISSP, Sales Engineer, ANZ, APAC Professional Services, CyberArk
Presentation preview: Protecting Privileged Accounts in the Cloud

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Benchmarking your Security Program against your Peers Nov 14 2018 6:00 am UTC 60 mins
    Robert Healey, Senior Director Marketing, APAC, Tenable
    Where are you exposed? Where should you prioritise, based on business risk? How is your cyber exposure changing over time? And how effective is your cyber security program, compared to your industry peers?

    Join Tenable and (ISC)² on Nov 14, 2018 (Wed) at 14:00 (Singapore time) to understand, measure, prioritise and now compare your Cyber Security posture, to see how effective your security investments & program are.

    Presenter: Robert Healey, Senior Director Marketing, APAC, Tenable
    Moderator: Paolo Miranda, CISSP, Vice-President, (ISC)² Singapore Chapter
  • 《2018 年互联网现状/安全:Web 攻击》和有效爬虫程序管理案例研究 Nov 7 2018 6:00 am UTC 60 mins
    郑伟 Whyte Zheng, 大中华区产品市场部经理, Akamai Technologies
    聆听 Akamai《2018 年夏季互联网现状/安全:Web攻击》的最新报告以及有关爬虫程序管理的案例研究,了解关于真实事件、安全最佳做法和趋势方面的最新信息。


    • 爬虫程序和黑客是如何通过撞库瞄准酒店行业(恶意登录百分比极高的行业),企业可以采取哪些措施 ?

    • 一些 DDoS 攻击如何采用非常规策略加强攻击效果,包括兴起的智能型自适应攻击者,他们会改变策略以通过自己的方式冲破防御;

    • 有关香港航空如何部署爬虫程序管理解决方案以保护其网站远离撞库攻击和其他形式 Web 欺诈的案例研究。

    参加Akamai Technologies和 (ISC)² 在11月7日下午2:00至3:00的在线研讨会《2018 年互联网现状/安全:Web 攻击》和有效爬虫程序管理案例研究,聆听专家分析有效的爬虫程序管理,还等什么?赶紧加入我们吧。


    演讲人: 郑伟 Whyte Zheng, 大中华区产品市场部经理, Akamai Technologies
    主持人: 顾伟, CISSP, CCSP, (ISC)² 授权讲师及(ISC)²上海分会理事
  • Cyber Exposure: 透视安全隐患 | 漏洞态势分析 Oct 31 2018 6:00 am UTC 60 mins
    全晓可, CISSP, 资安顾问, Tenable Network Security
    我们需要提供所需的洞见,帮助我们管理并减少现代网络攻击面下的真正的风险。并且,范围包括传统 IT、公用云和私有云、网络应用程序和容器,以及 IoT 和 OT。

    参加Tenable和 (ISC)² 在10月31日下午2:00至3:00的在线研讨会《Cyber Exposure: 透视安全隐患 | 漏洞态势分析》,聆听专家探讨安全隐患和分析漏洞态势,还等什么?赶紧加入我们吧。

    演讲人: 全晓可, CISSP, 资安顾问, Tenable Network Security
    主持人: 顾伟, CISSP, CCSP, (ISC)² 授权讲师及(ISC)²上海分会理事

  • Unified IT-OT Security Management: Strengthening Critical Infrastructure Defense Oct 24 2018 6:00 am UTC 60 mins
    Greg Singh, Technical Director - APAC, Skybox Security
    Critical infrastructure — from energy production to manufacturing to public utilities — is becoming a more prevalent attack vector for nation-state threat actors as well as the common cybercriminal. These attackers are frequently exploiting the interconnectedness of IT and operational technology (OT) networks, finding their foothold in the disconnect between their security management.

    In response, many organizations are looking to unify and align their IT-OT security programs to better understand and tackle cyber risks in both environments. In this session, Skybox Security will cover what challenges to expect in this an endeavour, and how to use comprehensive visibility and contextual intelligence to overcome them.

    In this webinar, you will learn:
    •What are the inherent risks to OT security and how the continued integration with IT impact risk in both environments
    •What are the key concerns for IT and OT security teams and how can they can align to improve security throughout the organization
    •Which elements and capabilities needed to gain seamless visibility of on-prem, cloud and OT networks
    •How to use modelling and analytics to put risk in the context of your attack surface and effectively prioritize response

    Join Skybox Security and (ISC)² on Oct 24, 2018 (Wed) at 14:00 (Singapore time) to learn how to strengthen critical infrastructure defense.

    Presenter: Greg Singh, Technical Director - APAC, Skybox Security
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • Surfing the Global Waves of Phishing Oct 10 2018 5:00 am UTC 60 mins
    Nik Kalogirou, VP of Sales (APAC), Cofense
    What’s keeping you up at night? Ransomware? Phishing? Spyware? Malware? Data Breaches? A malicious email typically opens the door to those threats.

    Organisations spend great energy (and budget) preventing users from falling prey, but threat actors continue to find ways to get past automated controls, staying one step ahead of artificial intelligence tools. Solving the phishing problem is more than just awareness: it’s about empowering humans to become instinctual nodes on the cyber defence network and feeding their real-time intelligence to security teams for immediate action.

    Join Cofense and (ISC)² on Oct 10, 2018 (Wed) at 13:00 (Singapore time) to hear about trends that we’ve been seeing around the globe and how they can impact the Asia-Pacific region.

    Presenter: Nik Kalogirou, VP of Sales (APAC), Cofense
    Moderator: Kawin Boonyapredee, CISSP, Executive Security Advisor, IBM Security
  • Why Vulnerability Management Demands More Than Scan-and-Patch Sep 26 2018 6:00 am UTC 60 mins
    Greg Singh, Technical Director, APAC, Skybox Security
    Too many vulnerability management programs operate on incomplete or out-of-date scan data. What’s more, this data is rarely if ever correlated to their host’s place in the network, meaning efforts can be wasted on remediating already protected vulnerabilities while ignoring those left exposed to attack.

    To have a real impact on lowering your risk of cyberattack, organizations need to centralize and analyze data from their entire attack surface to narrow focus on the vulnerabilities most likely to be used in a cyberattack.

    In this webinar, you will learn:
    • What scanners miss in discovery, prioritization, remediation and oversight processes and how to fill in the gaps
    • How the intersection of your assets, networks, business and the threat landscape impact vulnerability risk
    • Why context-based approaches target remediation at your riskiest vulnerabilities and help identify patching alternatives
    • Insights from Skybox’s 2018 Vulnerability and Threat Trends Report mid-year update

    Join Skybox Security and (ISC)² on Sept 26, 2018 (Wed) at 14:00 (Singapore time), as we explore how to get more value out of your data, visualize your attack surface and centralize vulnerability management to systematically reduce your risk of cyberattack.

    Presenter: Greg Singh, Technical Director, APAC, Skybox Security
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • 2018 年インターネットの現状/セキュリティ:ウェブ攻撃とゼロ・トラストのベストプラクティス Recorded: Sep 19 2018 63 mins
    中西 一博, プロダクト・マーケティング・マネージャー, Akamai Technologies; 金子 春信, シニア・プロダクト・マーケティング・マネージャー; Akamai Technologies
    このライブウェビナーでは、ゼロ・トラスト・セキュリティのベストプラクティスについての詳細情報に加え、Akamai の 2018 年夏版「インターネットの現状/セキュリティ:ウェブ攻撃」レポートから、実際のインシデントや、セキュリティのベストプラクティスと傾向に関する最新情報を取り上げます。

    •サービス業界を標的にしたボットと Credential Abuse の解説、および悪質なログインの割合が著しく高かった同業界で実施可能な対処方法
    •防御対策を克服するために戦術を変えるインテリジェントで適応力のある敵の出現など、一部の DDoS 攻撃がどのようにして攻撃の有効性を高めるために通常とは異なる戦術を採用しているか
    •ゼロ・トラスト・セキュリティへ移行する際のさまざまなオプションの考察、および実装のベストプラクティスについての解説とともに、Akamai が推奨する最適なゼロ・トラスト・アーキテクチャについて共有します

    Presenter: 中西 一博 (Kazuhiro Nakanishi), プロダクト・マーケティング・マネージャー, Akamai Technologies;
    金子 春信 (Harunobu Kaneko), シニア・プロダクト・マーケティング・マネージャー; Akamai Technologies
    Moderator: 小熊慶一郎 (Keiichiro Oguma), Director of Business Development, Japan, (ISC)²
  • Show Me the Money! How Cybersecurity Breaches Impact the Bottom Line Recorded: Sep 19 2018 64 mins
    Jon Piercey, Security & Intelligence Lead, APAC, Nuix
    From stolen intellectual property to loss of reputation and customers, the consequences of a cybersecurity breach are not inconsequential to the bottom line of the business. In this webinar, we’ll take a close look at the true cost of a breach, what to be aware of and how you can mitigate the impact of a breach on your organization.

    •Learn the potential impact a breach can have on my organization
    •Understand all the potential costs and risks, including the intangible
    •How to mitigate the impact of a breach on your organization

    Join Nuix and (ISC)² on Sept 19, 2018 (Wed) at 13:00 (Singapore time) to learn how to mitigate the impact of a cybersecurity breach.

    Presenter: Jon Piercey, Security & Intelligence Lead, APAC, Nuix
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • Select and Deploy New Security Tools Faster Recorded: Sep 12 2018 62 mins
    Ian Farquhar, Distinguished Sales Engineer, WW Security Subject Matter Expert, Gigamon
    Sign up for this webinar and find out how to increase the efficiency of your security tools. Efficient prevention coupled with rapid detection and containment improves your overall security posture. Threats don't stand a chance.

    Discover how to select and deploy new security tools faster and more easily than you ever thought possible.

    You’ll learn how to:
    • Implement strategies for keeping up with ever-changing security tools.
    • Test multiple tools under consideration without impacting network performance.
    • Set up tests for inline tools.
    • Strengthen testing and streamline deployment of tools.

    See how to eliminate the challenges of testing and deploying security tools with a security delivery platform.

    Join Gigamon and (ISC)² on Sep 12, 2018 (Wed) at 12:00 noon (Singapore time) to learn how to select and deploy new security tools faster.

    Presenter: Ian Farquhar, Distinguished Sales Engineer, WW Security Subject Matter Expert, Gigamon
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • Best Practices for Building an Effective Insider Threat Program Recorded: Sep 5 2018 62 mins
    Simon Sharp, VP International, ObserveIT
    The greatest cyber security threat an organization faces is no longer the malicious outsider hacking from beyond network firewalls. It is the insiders – the contractors, vendors, privileged users and business users – who already have full access to your company’s systems and sensitive data. Addressing this type of threat requires a much different approach, but whether unintentional or malicious, you need to quickly identify and eliminate insider threat. Attend this session to learn best practices for building and maintaining an effective insider threat program.

    You will learn:
    - Why insider threats are prevalent, despite many organisations implementing a layered defence approach
    - How to stop insider threats in their tracks, through comprehensive visibility, real-time intelligence and policy enforcement
    - How to help organisations achieve data privacy and protection compliance in line with GDPR regulations
    - Why you need to focus on people, processes and technology, in that order

    Join ObserveIT and (ISC)² on Sep 5, 2018 (Wed) at 15:00 (Singapore time) to learn how to build an insider threat program.

    Presenter: Simon Sharp, VP International, ObserveIT;
    Jonathan Boyko, Senior Technical Manager, ObserveIT
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • State of the Internet / Security 2018: Web Attacks and Zero Trust Best Practices Recorded: Aug 8 2018 57 mins
    Nick Hawkins, Senior Director, Product Management, Enterprise; Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai
    Get the latest information on real-world incidents, security best practices and trends from Akamai’s Summer 2018 State of the Internet / Security Report: Web Attacks as well as more information on our Zero Trust security best practices in our upcoming live webinar.

    You’ll learn:

    · A deep dive into bots and credential abusers targeting the hospitality industry, which has seen an extremely high percentage of malicious logins and what can be done

    · How some DDoS attacks are employing unusual tactics to increase effectiveness, including the emergence of intelligent, adaptive enemies who change tactics to overcome the defenses in their way

    · How to explore the different options of moving into Zero Trust security, look at best practices for implementation and share Akamai’s recommendations of what optimal Zero Trust architecture should be

    Join Akamai and (ISC)² on Aug 8, 2018 (Wed) at 13:00 (Singapore time) to learn more about web attacks and zero trust best practices.

    Presenter: Nick Hawkins, Senior Director, Product Management, Enterprise, Akamai Technologies;
    Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai Technologies
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • Attacker’s Advantage - Understand How & Why Cyberattackers Beat Your Defence Recorded: Jul 18 2018 60 mins
    Robert Healey, Senior Director Marketing, Asia Pacific, Tenable Network Security
    In its inaugural report, Tenable Research explores who has the first-mover advantage – cyber criminals or security teams? What’s the difference in time between when an exploit is publicly available for a given vulnerability and the first time that security teams actually assess their systems? And why does this even matter to your organization?

    The research team analyzed the 50 most prevalent critical and high-severity vulnerabilities from just under 200,000 vulnerability assessment scans over a three-month period. What did they find?

    Alarmingly, all too often, the attackers have the advantage. On average, they have a seven-day head start on defenders. Threat actors are sprinting ahead, exploiting vulnerabilities before security teams have even left the starting blocks – before businesses even know they’re at risk.

    Join Tenable and (ISC)² on Jul 18, 2018 (Wed) at 14:00 (Singapore Time) to understand how and why cyber attackers are beating your defence.

    Presenter: Robert Healey, Senior Director Marketing, APAC, Tenable Network Security
    Moderator: Tony Vizza, CISSP Director, Cybersecurity Advocacy for APAC, (ISC)²
  • Inside (ISC)²: Virtual Town Hall – Enrich. Enable. Excel Recorded: Jul 17 2018 59 mins
    Wesley Simpson, (ISC)² COO, Mirtha Collin, (ISC)² Sr. Ed. & Training Mgr., Michelle Schweitz, (ISC)² Media Mgr.
    (ISC)² is committed to delivering value to our members, providing a transparent view of the organization’s developments and plans for the future. To that end, please join (ISC)² for a virtual Town Hall meeting on July 17, 2018 at 1:00PM Eastern to review many of our new member benefits, service offerings and look at what is still to come in 2018, including enriching professional development opportunities, Security Congress and more. Members and non members alike will enjoy the opportunity to learn how (ISC)² is delivering on its value promise.
  • Achieve Your Security Goals with Inline Prevention Tools Recorded: Jun 27 2018 61 mins
    Presenter:Ian Farquhar, Distinguished Engineer, Security, Gigamon; Moderator: SC Leung, Member, Asia-Pacific Advisory Council
    Inline security tools operate by actively preventing threats in your network, but deploying and optimizing these tools presents several challenges to both network and security engineers. The downsides can include a potential point of failure, degradation of network and application performance, difficulty to scale and upgrade. The use of a next-generation packet broker and its inline bypass functionality can mitigate these challenges. Join Gigamon and (ISC)² on Jun 27, 2018 (Wed) at 12:00 noon (Singapore Time) to examine how inline bypass can overcome physical deployment obstacles, maximize network availability, increase the scale of inspection and reduce the impact to network performance.
  • Taming the Cloud Together – CCSP & CCSK Cloud Certification Synergy Recorded: Jun 12 2018 58 mins
    David Shearer, CEO, (ISC)2; Jim Reavis, CEO, CSA; Kevin Jackson, GovCloudNetwork ; Rich Mogull, Securosis; B. Dunlap (Mod)
    Certain things go together to make the sum of their parts that much better. Peanut Butter and Jelly. Lennon and McCartney. Batman and Robin. In the ever-changing world of the cloud, cyber security professionals need continuous training and certifications to stay up-to-speed and pairing (ISC)2’s CCSP (Certified Cloud Security Professional) with CSA’s CCSK (Certificate of Cloud Security Knowledge) can put any cyber security practitioner ahead in terms of knowledge, skills and job opportunities. On June 12, 2018 at 1:00PM Eastern, join David Shearer, (ISC)2’s CEO and Jim Reavis, CSA’s CEO, along with other subject matter expects as we explore the differences between each program, the training options available for each, and how these programs are synergistic in nature and together were designed to build on one another.
  • Stronger Security Posture through Zero Trust and API Management Recorded: May 9 2018 64 mins
    Fernando Serto, Head of Security Tech & Strategy, APJ; Dawson Sewo, Senior Enterprise Security Architect, Akamai Technologies
    Organizations today are facing multiple challenges on providing an enhanced digital experience to their customers, whilst ensuring confidential data remains secure in accordance to evolving regulatory and compliance regimes. While APIs are the core of digital experiences, including single-page apps and mobile applications, traditional perimeter security architecture is no longer enough to protect your business and you must concurrently evolve your security approach.

    In this webinar, Akamai will be sharing findings on how adopting a zero trust model will increase the security posture of organisation through a “Never Trust, Always Verify” paradigm. We will also look at how the API threat landscape have evolved and share best practises in API security.

    Join Akamai and (ISC)² on May 9, 2018 (Wed) at 13:00 (Singapore time) to learn stronger security posture through zero trust and API management.
  • Security at Network Speeds Recorded: Apr 18 2018 62 mins
    Ian Farquhar, Principal Sales Engineer, Gigamon
    Exponentially increasing network traffic volumes and security tool sprawl are overwhelming security operations and network operations teams. A network packet broker is supposed to eliminate complexity and save costs, not add to them!

    Organizations need to:
    •Deliver just the right data to the right tools.
    •Drive consolidation across their security stack.
    •Manage a common platform across physical, virtual and public cloud environments.

    Hence, a next-generation network packet broker is required to deliver visibility to security tools focused on threat prevention, detection, analytics and forensics. The right tools get the right traffic at the right time, every time.

    Attend this webinar to learn how to:
    •Maximize tool performance and ROI by applying advanced traffic intelligence.
    •Rapidly detect and respond to new threats while eliminating security tool sprawl.
    •Have pervasive and consistent visibility across their physical, virtual and cloud infrastructure.

    Join Gigamon and (ISC)² on Apr 18, 2018 (Wed) at 14:00 (Singapore time) to learn how to increase efficiency of your security stack.
  • 近期重大数据外泄事件回顾 ─ 分析事件根源、探讨解决方案 Recorded: Mar 28 2018 61 mins
    演讲人: Shawn Xu 许晓晨, Tenable中国区安全顾问
    在绝大多数数据泄露事件中,受害者最终都是因为看上去非常简单的漏洞问题而给自身带来危害。以Equifax 灾难性泄露事件为例,它的发生归根于公司IT未能识别Web Server Apache Struts 的已知漏洞并及时打补丁,而针对此漏洞已有有效的更新和解决方案。直到事件发生之后数月,他们才对外公布此次事件造成的损失或超过 7500 万美元。 类似漏洞所导致的泄漏事件,还相继发生在其它知名企业,如 Merck、Yahoo、Home Depot、Target等,预计导致上亿美元的利润和信誉损失。


    这次将探讨如何通过 Tenable 解决方案,帮助企业准确发现资产并理解攻击面,识别漏洞对机构的威胁,达到自动化确认合规的目标。并以此为基础,让客户更容易调整网络安全策略,加速理解和减少企业安全风险。

    参加Tenable和 (ISC)² 在3月28日下午2:00至3:00的在线研讨会《Equifax:重大数据外泄事件回顾 ─ 分析事件根源、探讨解决方案》,聆听专家分析对数据泄露事件的深入解读,还等什么?赶紧加入我们吧。

  • Minimizing Cyber Exposure – An analysis of Meltdown and Spectre Recorded: Jan 24 2018 61 mins
    Robert Healey, Senior Director Marketing, APAC, Tenable Network Security
    As organizations embrace cloud infrastructure, DevOps methodologies, PAAS, IoT and mobile workforce, there are new risks coming from a broader attack surface. Vulnerability management designed for traditional assets is not enough. To improve security, you need to rethink how you do things. For example, containers have become the de facto standard in cloud architectures today, which means that security needs to move into developers’ build processes while complementing existing solutions.

    Attend this webinar to discover:
    •Where vulnerability management for today’s assets needs to start
    •What the new faces of attacks and remediation look like
    •Why prioritization should not be based on scan results
    •Why reports using Excel are no longer the answer
    •How DevOps can be part of the solution to incorporate security

    Join Tenable and (ISC)² on Jan 24, 2018 (Wed) at 14:00 (Singapore time) to learn how to minimize cyber exposure in a world of cloud, containers and other modern assets.

    Presenter: Robert Healey, Senior Director Marketing, APAC, Tenable Network Security
    Moderator: Clayton Jones, Regional Managing Director, APAC, (ISC)²
  • Security Management in the Cloud Recorded: Jan 17 2018 60 mins
    Presenter: Greg Singh, Technical Director-APAC, Skybox Security | Moderator: Clayton Jones, Managing Director, APAC, (ISC)2
    As organizations migrate workloads to cloud computing, they benefit from flexibility and agility, but network security operations grow increasingly difficult.

    Gaining visibility into cloud environments, extending existing security operations and workflows, ensuring compliance, and managing shared responsibility create new challenges for security professionals. Add to this the complexity of hybrid and multi-cloud environments — and the loss of control within those environments — and it’s no wonder security leaders are scratching their heads over how to best secure their organization’s journey to the cloud.

    This session will look at approaches to addressing the many challenges around cloud security management and best practices for translating on-prem security controls and processes into hybrid and multi-cloud environments.

    Join Skybox Security and (ISC)² on Jan 17, 2018 (Wed) at 14:00 Singapore time to learn more about security management in the cloud.
Live Webinars for InfoSec Professionals in Asia Pacific Time Zone
Looking for expertise and information to advance your career and tackle your challenges? Subscribe and join us for the educational webinars in APAC time zone. Earn CPEs quickly and at no cost by attending webinars: 1 hour of webinar equals 1 CPE. We welcome members and non members alike.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Protecting Privileged Accounts in the Cloud
  • Live at: Jul 13 2016 6:00 am
  • Presented by: Troy Cunningham, CISSP, Sales Engineer, ANZ, APAC Professional Services, CyberArk
  • From:
Your email has been sent.
or close