Hi [[ session.user.profile.firstName ]]

A New Approach to Data Security

With the phenomenal growth of data and the IT trends toward cloud and mobility adoption, enterprises are facing rising threats to sensitive data from both inside and outside the organization. They need to be able to protect data end to end without introducing complexities to users, while lowering the implementation and management costs of security solutions.

Join Hewlett Packard Enterprise and (ISC)2 on Aug 03 (Wednesday) at 2:00p.m. (Singapore time) for a Security Briefing on how to protect data from end to end.
Recorded Aug 3 2016 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ted Hendriks, Data Security Pre-Sales Architect, APJ, HP Enterprise Security
Presentation preview: A New Approach to Data Security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • (ISC)² Info Session: Get to know the CISSP Concentrations (ISSAP/ISSEP/ISSMP) Apr 9 2019 6:00 am UTC 60 mins
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)²
    Go beyond the CISSP and challenge yourself with a CISSP Concentration! Challenge yourself with a CISSP Concentration! These specialized credentials build upon the CISSP. Whether you’re interested in career growth, deeper knowledge or achieving elite status, CISSP Concentrations prove your subject matter mastery.

    Got questions on the certifications? We have the answers.

    In this info-session, you will learn:

    - How large is the cybersecurity workforce gap today
    - Why you should pursue CISSP concentrations – ISSAP/ISSEP/ISSMP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Are you ready to prove yourself? Register and begin your journey today!

    NOTE: This info-session is meant for CISSP credential holders only. Join this info-session and earn 1 CPE.
    ________________________________________________________________________

    CISSP Concentrations:

    • Information Systems Security Architecture Professional (ISSAP)
    This certification proves your expertise developing, designing and analyzing security solutions. It also shows you excel at giving risk-based guidance to senior management in order to meet organizational goals.

    • Information Systems Security Engineering Professional (ISSEP)
    This certification recognizes your keen ability to practically apply systems engineering principles and processes to develop secure systems. You have the knowledge and skills to incorporate security into projects, applications, business processes and all information systems.

    • Information Systems Security Management Professional (ISSMP)
    This certification shows you excel at establishing, presenting and governing information security programs. You also demonstrate deep management and leadership skills whether you’re leading incident handling and/or a breach mitigation team.
  • (ISC)² Info Session: CCSP - The Industry’s Premier Cloud Security Certification Mar 12 2019 6:00 am UTC 60 mins
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)²
    Earning the globally recognized CCSP cloud security certification is a proven way to build your career and better secure critical assets in the cloud.

    In this info-session, you will learn:
    - How large is the cybersecurity workforce gap today
    - Why you should pursue CCSP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    =====================================================================

    The CCSP shows you have the advanced technical skills and knowledge to design, manage and secure data, applications and infrastructure in the cloud using best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Prove your skills, advance your career, and gain support from a community of cybersecurity leaders here to help you throughout your professional journey.

    www.isc2.org/ccsp

    Are you ready to prove yourself? Register and begin your CCSP journey today!

    NOTE: Join this info-session and earn 1 CPE.
  • (ISC)² Info Session: CISSP - The World's Premier Cybersecurity Certification Feb 26 2019 6:00 am UTC 60 mins
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)²
    Accelerate your cybersecurity career with the CISSP certification.

    Join this online info-session hosted by (ISC)² and learn everything you need to know about the globally recognized credential CISSP!

    During the online info-session, you will:
    - Gain an insight into the CISSP credential-its domains and career benefits for credential holders
    - Hear about the practical application of the CISSP related to real world issues for security professionals
    - Ask questions about the credential, exam and experience requirements
    - Learn everything you need to know about getting certified

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    =====================================================================
    Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise and become an (ISC)² member, unlocking a broad array of exclusive resources, educational tools, and peer-to-peer networking opportunities.

    Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to support you throughout your career.

    https://www.isc2.org/cissp
  • (ISC)² Info Session: CSSLP-The Premier Secure Software Development Certification Feb 22 2019 6:00 am UTC 60 mins
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)²
    Earning the globally recognized CSSLP secure software development certification is a proven way to build your career and better incorporate security practices into each phase of the software development lifecycle (SDLC).

    In this info-session, you will learn:
    - How large is the cybersecurity workforce gap today
    - Why you should pursue CCSLP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    =====================================================================

    CSSLP certification recognizes leading application security skills. It shows employers and peers you have the advanced technical skills and knowledge necessary for authentication, authorization and auditing throughout the SDLC using best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Prove your skills, advance your career, and gain support from a community of cybersecurity leaders here to help you throughout your professional journey.

    www.isc2.org/csslp

    Are you ready to prove yourself? Register and begin your CSSLP journey today!

    NOTE: Join this info-session and earn 1 CPE.
  • Remediating Threats by Bridging Islands of Security Feb 20 2019 6:00 am UTC 60 mins
    Terence Grey, Senior Systems Engineer, ANZ, Infoblox
    Most organisations have multiple products and services, from multiple vendors and suppliers to address their cybersecurity needs. The lack of integration and inability to share critical information results in silos of technology that cause inefficiency, lack of agility, limited visibility and a poor security posture. How can an organization solve and streamline this improve their cybersecurity operations?

    Join Infoblox and (ISC)² on Feb 20, 2019 (Wed) at 14:00 (Singapore time) to learn how to assist organisations in improving their security operations and reducing time to containment.

    Presenter: Terence Grey, Senior Systems Engineer, ANZ, Infoblox
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • (ISC)² Info Session: SSCP -The Premier Security Administrator Certification Feb 19 2019 6:00 am UTC 60 mins
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)²
    Earning a globally recognized advanced security administration and operations certification like the SSCP is a great way to grow your career and better secure your organization’s critical assets.

    In this info-session, you will learn:
    - How large is the cybersecurity workforce gap today
    - Why you should pursue SSCP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    =====================================================================
    SSCP certification demonstrates you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to help you throughout your career.

    www.isc2.org/sscp

    Are you ready to prove yourself? Register and begin your SSCP journey today!

    NOTE: Join this info-session and earn 1 CPE.
  • How to Get the Most of Your (ISC)² Membership - Local Benefits and Global Reach Feb 12 2019 6:00 am UTC 60 mins
    Tony Vizza, CISSP , Director of Cyber Security Advocacy, APAC and Hazel Hung, Customer Services Manager, APAC
    As an (ISC)² Member, you now have access to a wide range of global resources, educational tools, peer networking opportunities, as well as exclusive discounts to industry events. There is so much more to discover to what your (ISC)² membership brings!

    In this webinar, you will learn about:
    - The latest news and developments across APAC and (ISC)² from around the world.
    - Exciting and upcoming CPE opportunities to help you stay sharp
    - Member benefits and perks including fantastic discounts on a range day to day items
    - New, upcoming and FREE professionally developed education courses just for members.
    - An update on (ISC)² certifications to help you take your career to the next level.
    - Networking opportunity with like-minded professionals locally and globally via ((ISC)² chapters
    - An opportunity to ask questions in our Q&A session

    Join us on Feb 12, 2019 (Tue) at 14:00 (GMT +8) to get the most of your (ISC)² membership globally and locally.
  • Reducing Vulnerability Overload Is Key To Protecting Your Business Jan 30 2019 6:00 am UTC 60 mins
    Robert Healey, Senior Director Marketing, APAC, Tenable
    Today, every organization faces vulnerability overload. In 2018 alone, Tenable Research estimates nearly 19,000 new vulnerabilities will be disclosed. There are just too many to discover, assess and effectively mitigate.

    Reducing vulnerability overload means focusing like a laser on vulnerabilities most likely to impact your business right now. To learn how you can address this challenge, join Robert Healey, APAC Marketing Director with Tenable and (ISC)² at 14:00 (Singapore Time) on Jan 30, 2019 (Wed), for a webinar exploring best practices you can adopt to overcome vulnerability overload and better protect your business from cyber risk.

    Presenter: Robert Healey, Senior Director Marketing, APAC, Tenable
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • DDoS 방어를 위한 Cloudflare 활용법 Recorded: Dec 12 2018 54 mins
    유 지 영, Solutions Engineer, Cloudflare
    최근 몇 년 동안 한국, 싱가포르, 일본, 중국 같은 국가에서 DDoS 공격이 빈번하게 발생하고 있습니다. 또한 2018년에는 Memcached 서버를 이용하는 대규모 DDoS 공격 사례들이 새롭게 목격되고 있습니다. 이 웨비나에서는 날로 확대되는 DDoS 위협 환경에 대해 알아보고 공격의 유형과 규모에 관계없이 웹 사이트를 보호할 수 있는 Cloudflare의 이점을 소개합니다.

    웨비나를 통해 다음을 알아보십시오.

    -DDoS 공격의 유형 및 최신 트렌드
    -DDoS 방어를 위한 Cloudflare 활용법

    발표자: 유 지 영, Solutions Engineer, Cloudflare
    진행자: 박 선 영, Business Development Manager, APAC, (ISC)²
  • Get to know the (ISC)² CISSP Concentrations (ISSAP/ISSEP/ISSMP) Recorded: Dec 6 2018 60 mins
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)²
    Go beyond the CISSP and challenge yourself with a CISSP Concentration! Got questions on the certifications? We have the answers.

    In this info-session, you will learn:

    - How large is the cybersecurity workforce gap today
    - Why you should pursue CISSP concentrations – ISSAP/ISSEP/ISSMP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Are you ready to prove yourself? Register and begin your journey today!

    NOTE: This info-session is meant for CISSP credential holders only. Join this info-session and earn 1 CPE.
    ________________________________________________________________________

    CISSP Concentrations:

    • Information Systems Security Architecture Professional (ISSAP)
    This certification proves your expertise developing, designing and analyzing security solutions. It also shows you excel at giving risk-based guidance to senior management in order to meet organizational goals.

    • Information Systems Security Engineering Professional (ISSEP)
    This certification recognizes your keen ability to practically apply systems engineering principles and processes to develop secure systems. You have the knowledge and skills to incorporate security into projects, applications, business processes and all information systems.

    • Information Systems Security Management Professional (ISSMP)
    This certification shows you excel at establishing, presenting and governing information security programs. You also demonstrate deep management and leadership skills whether you’re leading incident handling and/or a breach mitigation team.
  • Protecting Your Organization Inside Out Using Identity Recorded: Dec 5 2018 61 mins
    Nick Hawkins, Senior Director, Product Management, Enterprise; Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai
    Identity is a key factor in an organization’s security plan, as it covers both security and productivity. In this webinar, we will look at using identity management to protect your organization internally and externally:

    • We have previously covered an overview of zero trust architecture concepts. There are plenty of options available when designing a zero trust network - one of them is Identity Aware Proxy (IAP). The first half of the webinar will focus on best practices when implementing an IAP to enforce identity and access rules at an application layer, rather than network layer, and ensuring access rights are based on “need to know” least access.

    • The second half will focus on the rise of credential stuffing criminal activities in Asia Pacific and Japan. This session will focus on the root cause of credential stuffing, financial losses, the methodology adopted by criminals and the automation employed via botnets. We’ll cover case studies of how organisations across different industries have deployed solutions to successfully mitigate the risks posed by botnets.

    Join Akamai Technologies and (ISC)² on Dec 5, 2018 (Wed) at 13:00 (Singapore time) to learn how to protect your organization inside out using identity.

    Presenter: Nick Hawkins, Senior Director, Product Management, Enterprise, Akamai Technologies
    Presenter: Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai Technologies
    Moderator: Paolo Miranda, CISSP, Partnership Director, (ISC)² Singapore Chapter
  • デジタルデータを制し、ビジネスを成すために ~クラウドの100%活用とコンプライアンスを両立するための勘所~ Recorded: Nov 28 2018 56 mins
    髙岡 隆佳, エバンジェリスト, Symantec Japan
    企業は今、選択肢を迫られています。従来型のインフラに縛られたまま従来型のビジネスを継続するか、それとも今まで培ってきたデータをうまく先進的なデバイスやクラウドサービスを活用することで、新たな価値とスピードをビジネスに活かし、顧客だけでなく社員に対してもいかに恩恵をもたらすか。海外に目を向けると、すでにITやデジタルデータを活かした企業が成功を収める一方、デジタルデータのセキュリティ担保を怠った企業は大きな制裁や賠償を求められるニュースもよく目にします。本ウェビナーでは、デジタルデータをどのように担保してデジタルトランスフォーメーション(DX)を推進していくべきか、その勘所について解説します。

    Presenter: 髙岡 隆佳, エバンジェリスト, Symantec Japan
    Moderator: 小熊慶一郎 (Keiichiro Oguma), Director of Business Development, Japan, (ISC)²
  • Benchmarking Your Security Program Against Your Peers Recorded: Nov 14 2018 62 mins
    Robert Healey, Senior Director Marketing, APAC, Tenable
    Where are you exposed? Where should you prioritise, based on business risk? How is your cyber exposure changing over time? And how effective is your cyber security program, compared to your industry peers?

    Join Tenable and (ISC)² on Nov 14, 2018 (Wed) at 14:00 (Singapore time) to understand, measure, prioritise and now compare your Cyber Security posture, to see how effective your security investments & program are.

    Presenter: Robert Healey, Senior Director Marketing, APAC, Tenable
    Moderator: Paolo Miranda, CISSP, Partnership Director, (ISC)² Singapore Chapter
  • 《2018 年互联网现状/安全:Web 攻击》和有效爬虫程序管理案例研究 Recorded: Nov 12 2018 60 mins
    郑伟, 大中华区产品市场部经理, Akamai Technologies; 马俊, CISSP, 高级售前工程师, Akamai Technologies
    聆听 Akamai《2018 年夏季互联网现状/安全:Web攻击》的最新报告以及有关爬虫程序管理的案例研究,了解关于真实事件、安全最佳做法和趋势方面的最新信息。

    您将了解到:

    • 爬虫程序和黑客是如何通过撞库瞄准酒店行业(恶意登录百分比极高的行业),企业可以采取哪些措施 ?

    • 一些 DDoS 攻击如何采用非常规策略加强攻击效果,包括兴起的智能型自适应攻击者,他们会改变策略以通过自己的方式冲破防御;

    • 有关航空行业如何部署爬虫程序管理解决方案以保护其网站远离撞库攻击和其他形式 Web 欺诈的案例研究。

    参加Akamai Technologies和 (ISC)² 在11月7日下午2:00至3:00的在线研讨会《2018 年互联网现状/安全:Web 攻击》和有效爬虫程序管理案例研究,聆听专家分析有效的爬虫程序管理,还等什么?赶紧加入我们吧。

    *本次在线研讨会将以普通话进行

    演讲人: 郑伟, 大中华区产品市场部经理, Akamai Technologies
    演讲人: 马俊, CISSP, 高级售前工程师, Akamai Technologies
  • クラウドを使いこなせるか?CASBが解決できる課題とクラウドシフトのリアル Recorded: Oct 31 2018 58 mins
    髙岡 隆佳, エバンジェリスト, Symantec Japan
    企業間でクラウドシフトやCASBといった言葉が飛び交う昨今、日本企業はどれだけクラウドシフトを実現し、安全に活用できているのでしょう?そして、CASBは本当にクラウド利用の課題を解決しているのか?といった、誰もが明確な答えを持ち合わせていない中、クラウドセキュリティアライアンス(CSA Japan)などで日本企業のクラウドセキュリティの取り組みと向き合ってきたエバンジェリストが、その疑問に答え、後悔しないCASBの利用法について解説します。

    Presenter: 髙岡 隆佳, エバンジェリスト, Symantec Japan
    Moderator: 小熊慶一郎 (Keiichiro Oguma), Director of Business Development, Japan, (ISC)²
  • Cyber Exposure: 透视安全隐患 | 漏洞态势分析 Recorded: Oct 31 2018 59 mins
    全晓可, 资安顾问, Tenable Network Security
    哪些资产暴露于风险之下?
    我们应当根据怎样的优先顺序处理这些风险?
    我们如何逐渐减少暴露风险?
    我们需要提供所需的洞见,帮助我们管理并减少现代网络攻击面下的真正的风险。并且,范围包括传统 IT、公用云和私有云、网络应用程序和容器,以及 IoT 和 OT。

    参加Tenable和 (ISC)² 在10月31日下午2:00至3:00的在线研讨会《Cyber Exposure: 透视安全隐患 | 漏洞态势分析》,聆听专家探讨安全隐患和分析漏洞态势,还等什么?赶紧加入我们吧。

    演讲人: 全晓可, 资安顾问, Tenable Network Security
    主持人: 顾伟, CISSP, CCSP, (ISC)² 授权讲师及(ISC)²上海分会理事

    *本次在线研讨会将以普通话进行
  • Unified IT-OT Security Management: Strengthening Critical Infrastructure Defense Recorded: Oct 24 2018 58 mins
    Gerry Sillars, Vice President of APAC, Skybox Security
    Critical infrastructure — from energy production to manufacturing to public utilities — has become a prevalent attack vector for both nation-state threat actors as well as common cybercriminals. These attackers exploit vulnerabilities that exist due to the interconnectedness of IT and operational technology (OT) networks in order to establish a foothold in a victim’s environment and cause significant damage.

    In response, many organisations are looking to align their IT and OT security programs to better understand and tackle cyber risks in both environments. In this session, Skybox Security will cover what challenges to expect when seeking to achieve this, and how to use comprehensive visibility and contextual intelligence to overcome them.

    In this webinar, you will learn:
    • What are the inherent risks to OT security and how the continued integration with IT impact risk in both environments
    • What are the key concerns for IT and OT security teams and how can they can align to improve security throughout the organization
    • Which elements and capabilities are needed to gain seamless visibility of on-premises, cloud and OT networks
    • How to use modelling and analytics to understand your attack surface risk and effectively prioritize responses

    Join Skybox Security and (ISC)² on Oct 24, 2018 (Wed) at 14:00 (Singapore time) to learn how to strengthen the defense of critical infrastructure.

    Presenter: Gerry Sillars, Vice President of APAC, Skybox Security
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • Surfing the Global Waves of Phishing Recorded: Oct 10 2018 56 mins
    Nik Kalogirou, VP of Sales (APAC), Cofense; Ryan Jones, Sales Engineer, Cofense
    What’s keeping you up at night? Ransomware? Phishing? Spyware? Malware? Data Breaches? A malicious email typically opens the door to those threats.

    Organisations spend great energy (and budget) preventing users from falling prey, but threat actors continue to find ways to get past automated controls, staying one step ahead of artificial intelligence tools. Solving the phishing problem is more than just awareness: it’s about empowering humans to become instinctual nodes on the cyber defence network and feeding their real-time intelligence to security teams for immediate action.

    Join Cofense and (ISC)² on Oct 10, 2018 (Wed) at 13:00 (Singapore time) to hear about trends that we’ve been seeing around the globe and how they can impact the Asia-Pacific region.

    Presenter: Nik Kalogirou, VP of Sales (APAC), Cofense
    Presenter: Ryan Jones, Sales Engineer, Cofense
    Moderator: Kawin Boonyapredee, CISSP, Executive Security Advisor, IBM Security
  • Why Vulnerability Management Demands More Than Scan-and-Patch Recorded: Sep 26 2018 63 mins
    Greg Singh, Technical Director, APAC, Skybox Security
    Too many vulnerability management programs operate on incomplete or out-of-date scan data. What’s more, this data is rarely if ever correlated to their host’s place in the network, meaning efforts can be wasted on remediating already protected vulnerabilities while ignoring those left exposed to attack.

    To have a real impact on lowering your risk of cyberattack, organizations need to centralize and analyze data from their entire attack surface to narrow focus on the vulnerabilities most likely to be used in a cyberattack.

    In this webinar, you will learn:
    • What scanners miss in discovery, prioritization, remediation and oversight processes and how to fill in the gaps
    • How the intersection of your assets, networks, business and the threat landscape impact vulnerability risk
    • Why context-based approaches target remediation at your riskiest vulnerabilities and help identify patching alternatives
    • Insights from Skybox’s 2018 Vulnerability and Threat Trends Report mid-year update

    Join Skybox Security and (ISC)² on Sept 26, 2018 (Wed) at 14:00 (Singapore time), as we explore how to get more value out of your data, visualize your attack surface and centralize vulnerability management to systematically reduce your risk of cyberattack.

    Presenter: Greg Singh, Technical Director, APAC, Skybox Security
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • 2018 年インターネットの現状/セキュリティ:ウェブ攻撃とゼロ・トラストのベストプラクティス Recorded: Sep 19 2018 63 mins
    中西 一博, プロダクト・マーケティング・マネージャー, Akamai Technologies; 金子 春信, シニア・プロダクト・マーケティング・マネージャー; Akamai Technologies
    このライブウェビナーでは、ゼロ・トラスト・セキュリティのベストプラクティスについての詳細情報に加え、Akamai の 2018 年夏版「インターネットの現状/セキュリティ:ウェブ攻撃」レポートから、実際のインシデントや、セキュリティのベストプラクティスと傾向に関する最新情報を取り上げます。

    内容は次のとおりです。
    •サービス業界を標的にしたボットと Credential Abuse の解説、および悪質なログインの割合が著しく高かった同業界で実施可能な対処方法
    •防御対策を克服するために戦術を変えるインテリジェントで適応力のある敵の出現など、一部の DDoS 攻撃がどのようにして攻撃の有効性を高めるために通常とは異なる戦術を採用しているか
    •ゼロ・トラスト・セキュリティへ移行する際のさまざまなオプションの考察、および実装のベストプラクティスについての解説とともに、Akamai が推奨する最適なゼロ・トラスト・アーキテクチャについて共有します

    Presenter: 中西 一博 (Kazuhiro Nakanishi), プロダクト・マーケティング・マネージャー, Akamai Technologies;
    金子 春信 (Harunobu Kaneko), シニア・プロダクト・マーケティング・マネージャー; Akamai Technologies
    Moderator: 小熊慶一郎 (Keiichiro Oguma), Director of Business Development, Japan, (ISC)²
Live Webinars for InfoSec Professionals in Asia Pacific Time Zone
Looking for expertise and information to advance your career and tackle your challenges? Subscribe and join us for the educational webinars in APAC time zone. Earn CPEs quickly and at no cost by attending webinars: 1 hour of webinar equals 1 CPE. We welcome members and non members alike.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: A New Approach to Data Security
  • Live at: Aug 3 2016 6:00 am
  • Presented by: Ted Hendriks, Data Security Pre-Sales Architect, APJ, HP Enterprise Security
  • From:
Your email has been sent.
or close