Hi [[ session.user.profile.firstName ]]

Using Big Data For Active And Contextual Security

Organizations are turning to leverage big data and analytics to ‘look’ for indicators of intent or indicators of compromise, thus helping organizations focus their security resources on the threats at hand. The challenge though is how to process the vast amount of data, and furthermore, keep it relevant, timely, actionable – contextual. The challenge becomes harder when threat actors utilize a variety of techniques to maintain anonymity, reduce their ‘fingerprint’ and mask their intent.

In this webinar, John Ellis, Akamai’s Chief Strategist for Cyber Security (APJ) will share how Akamai leverages the vast amount of data that it sees daily to help its customers improve their security decisions, when the threat would otherwise be unclear. John will showcase how Akamai’s big data and analytics platform, Cloud Security Intelligence, powers its Client Reputation service. A service that provides the ability to forecast intent and protect applications against Distributed Denial of Service (DDoS) and application layer attacks, and how active defence can be applied to a variety of response mechanisms, delivering an intelligent contextually aware defence.

Join Akamai and (ISC)² on Aug 17 (Wednesday) at 2:00p.m. (Singapore time) for a Security Briefing on how to use Big Data for active and contextual security.
Recorded Aug 17 2016 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
John Ellis, Chief Strategist, Cyber Security (APJ), Akamai Technologies; Moderator: Chuan-Wei Hoo, Technical Advisor, (ISC)²
Presentation preview: Using Big Data For Active And Contextual Security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Best Practices for Building an Insider Threat Program Sep 5 2018 7:00 am UTC 60 mins
    Simon Sharp, VP International, ObserveIT
    The greatest cyber security threat an organization faces is no longer the malicious outsider hacking from beyond network firewalls. It is the insiders – the contractors, vendors, privileged users and business users – who already have full access to your company’s systems and sensitive data. Addressing this type of threat requires a much different approach, but whether unintentional or malicious, you need to quickly identify and eliminate insider threat. Attend this session to learn best practices for building and maintaining an effective insider threat program.

    You will learn:
    - Why insider threats are prevalent, despite many organisations implementing a layered defence approach
    - How to stop insider threats in their tracks, through comprehensive visibility, real-time intelligence and policy enforcement
    - How to help organisations achieve data privacy and protection compliance in line with GDPR regulations
    - Why you need to focus on people, processes and technology, in that order

    Join ObserveIT and (ISC)² on Sept 5, 2018 (Wed) at 15:00 (Singapore time) to learn how to build an insider threat program.

    Presenter: Simon Sharp, VP International, ObserveIT
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • State of the Internet / Security 2018: Web Attacks and Zero Trust Best Practices Aug 8 2018 5:00 am UTC 60 mins
    Nick Hawkins, Senior Director, Product Management, Enterprise; Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai
    Get the latest information on real-world incidents, security best practices and trends from Akamai’s Summer 2018 State of the Internet / Security Report: Web Attacks as well as more information on our Zero Trust security best practices in our upcoming live webinar.

    You’ll learn:

    · A deep dive into bots and credential abusers targeting the hospitality industry, which has seen an extremely high percentage of malicious logins and what can be done

    · How some DDoS attacks are employing unusual tactics to increase effectiveness, including the emergence of intelligent, adaptive enemies who change tactics to overcome the defenses in their way

    · How to explore the different options of moving into Zero Trust security, look at best practices for implementation and share Akamai’s recommendations of what optimal Zero Trust architecture should be

    Join Akamai and (ISC)² on Aug 8, 2018 (Wed) at 13:00 (Singapore time) to learn more about web attacks and zero trust best practices.

    Presenter: Nick Hawkins, Senior Director, Product Management, Enterprise, Akamai Technologies;
    Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai Technologies
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • Attacker’s Advantage - Understand How & Why Cyberattackers Beat Your Defence Recorded: Jul 18 2018 60 mins
    Robert Healey, Senior Director Marketing, Asia Pacific, Tenable Network Security
    In its inaugural report, Tenable Research explores who has the first-mover advantage – cyber criminals or security teams? What’s the difference in time between when an exploit is publicly available for a given vulnerability and the first time that security teams actually assess their systems? And why does this even matter to your organization?

    The research team analyzed the 50 most prevalent critical and high-severity vulnerabilities from just under 200,000 vulnerability assessment scans over a three-month period. What did they find?

    Alarmingly, all too often, the attackers have the advantage. On average, they have a seven-day head start on defenders. Threat actors are sprinting ahead, exploiting vulnerabilities before security teams have even left the starting blocks – before businesses even know they’re at risk.

    Join Tenable and (ISC)² on Jul 18, 2018 (Wed) at 14:00 (Singapore Time) to understand how and why cyber attackers are beating your defence.

    Presenter: Robert Healey, Senior Director Marketing, APAC, Tenable Network Security
    Moderator: Tony Vizza, CISSP Director, Cybersecurity Advocacy for APAC, (ISC)²
  • Inside (ISC)²: Virtual Town Hall – Enrich. Enable. Excel Recorded: Jul 17 2018 59 mins
    Wesley Simpson, (ISC)² COO, Mirtha Collin, (ISC)² Sr. Ed. & Training Mgr., Michelle Schweitz, (ISC)² Media Mgr.
    (ISC)² is committed to delivering value to our members, providing a transparent view of the organization’s developments and plans for the future. To that end, please join (ISC)² for a virtual Town Hall meeting on July 17, 2018 at 1:00PM Eastern to review many of our new member benefits, service offerings and look at what is still to come in 2018, including enriching professional development opportunities, Security Congress and more. Members and non members alike will enjoy the opportunity to learn how (ISC)² is delivering on its value promise.
  • Achieve Your Security Goals with Inline Prevention Tools Recorded: Jun 27 2018 61 mins
    Presenter:Ian Farquhar, Distinguished Engineer, Security, Gigamon; Moderator: SC Leung, Member, Asia-Pacific Advisory Council
    Inline security tools operate by actively preventing threats in your network, but deploying and optimizing these tools presents several challenges to both network and security engineers. The downsides can include a potential point of failure, degradation of network and application performance, difficulty to scale and upgrade. The use of a next-generation packet broker and its inline bypass functionality can mitigate these challenges. Join Gigamon and (ISC)² on Jun 27, 2018 (Wed) at 12:00 noon (Singapore Time) to examine how inline bypass can overcome physical deployment obstacles, maximize network availability, increase the scale of inspection and reduce the impact to network performance.
  • Taming the Cloud Together – CCSP & CCSK Cloud Certification Synergy Recorded: Jun 12 2018 58 mins
    David Shearer, CEO, (ISC)2; Jim Reavis, CEO, CSA; Kevin Jackson, GovCloudNetwork ; Rich Mogull, Securosis; B. Dunlap (Mod)
    Certain things go together to make the sum of their parts that much better. Peanut Butter and Jelly. Lennon and McCartney. Batman and Robin. In the ever-changing world of the cloud, cyber security professionals need continuous training and certifications to stay up-to-speed and pairing (ISC)2’s CCSP (Certified Cloud Security Professional) with CSA’s CCSK (Certificate of Cloud Security Knowledge) can put any cyber security practitioner ahead in terms of knowledge, skills and job opportunities. On June 12, 2018 at 1:00PM Eastern, join David Shearer, (ISC)2’s CEO and Jim Reavis, CSA’s CEO, along with other subject matter expects as we explore the differences between each program, the training options available for each, and how these programs are synergistic in nature and together were designed to build on one another.
  • Stronger Security Posture through Zero Trust and API Management Recorded: May 9 2018 64 mins
    Fernando Serto, Head of Security Tech & Strategy, APJ; Dawson Sewo, Senior Enterprise Security Architect, Akamai Technologies
    Organizations today are facing multiple challenges on providing an enhanced digital experience to their customers, whilst ensuring confidential data remains secure in accordance to evolving regulatory and compliance regimes. While APIs are the core of digital experiences, including single-page apps and mobile applications, traditional perimeter security architecture is no longer enough to protect your business and you must concurrently evolve your security approach.

    In this webinar, Akamai will be sharing findings on how adopting a zero trust model will increase the security posture of organisation through a “Never Trust, Always Verify” paradigm. We will also look at how the API threat landscape have evolved and share best practises in API security.

    Join Akamai and (ISC)² on May 9, 2018 (Wed) at 13:00 (Singapore time) to learn stronger security posture through zero trust and API management.
  • Security at Network Speeds Recorded: Apr 18 2018 62 mins
    Ian Farquhar, Principal Sales Engineer, Gigamon
    Exponentially increasing network traffic volumes and security tool sprawl are overwhelming security operations and network operations teams. A network packet broker is supposed to eliminate complexity and save costs, not add to them!

    Organizations need to:
    •Deliver just the right data to the right tools.
    •Drive consolidation across their security stack.
    •Manage a common platform across physical, virtual and public cloud environments.

    Hence, a next-generation network packet broker is required to deliver visibility to security tools focused on threat prevention, detection, analytics and forensics. The right tools get the right traffic at the right time, every time.

    Attend this webinar to learn how to:
    •Maximize tool performance and ROI by applying advanced traffic intelligence.
    •Rapidly detect and respond to new threats while eliminating security tool sprawl.
    •Have pervasive and consistent visibility across their physical, virtual and cloud infrastructure.

    Join Gigamon and (ISC)² on Apr 18, 2018 (Wed) at 14:00 (Singapore time) to learn how to increase efficiency of your security stack.
  • 近期重大数据外泄事件回顾 ─ 分析事件根源、探讨解决方案 Recorded: Mar 28 2018 61 mins
    演讲人: Shawn Xu 许晓晨, Tenable中国区安全顾问
    在绝大多数数据泄露事件中,受害者最终都是因为看上去非常简单的漏洞问题而给自身带来危害。以Equifax 灾难性泄露事件为例,它的发生归根于公司IT未能识别Web Server Apache Struts 的已知漏洞并及时打补丁,而针对此漏洞已有有效的更新和解决方案。直到事件发生之后数月,他们才对外公布此次事件造成的损失或超过 7500 万美元。 类似漏洞所导致的泄漏事件,还相继发生在其它知名企业,如 Merck、Yahoo、Home Depot、Target等,预计导致上亿美元的利润和信誉损失。

    问题的根源在于:资产和漏洞的可视度十分有限,导致未能及时修补漏洞!

    这次将探讨如何通过 Tenable 解决方案,帮助企业准确发现资产并理解攻击面,识别漏洞对机构的威胁,达到自动化确认合规的目标。并以此为基础,让客户更容易调整网络安全策略,加速理解和减少企业安全风险。

    参加Tenable和 (ISC)² 在3月28日下午2:00至3:00的在线研讨会《Equifax:重大数据外泄事件回顾 ─ 分析事件根源、探讨解决方案》,聆听专家分析对数据泄露事件的深入解读,还等什么?赶紧加入我们吧。

    *本次在线研讨会将以普通话进行
  • Minimizing Cyber Exposure – An analysis of Meltdown and Spectre Recorded: Jan 24 2018 61 mins
    Robert Healey, Senior Director Marketing, APAC, Tenable Network Security
    As organizations embrace cloud infrastructure, DevOps methodologies, PAAS, IoT and mobile workforce, there are new risks coming from a broader attack surface. Vulnerability management designed for traditional assets is not enough. To improve security, you need to rethink how you do things. For example, containers have become the de facto standard in cloud architectures today, which means that security needs to move into developers’ build processes while complementing existing solutions.

    Attend this webinar to discover:
    •Where vulnerability management for today’s assets needs to start
    •What the new faces of attacks and remediation look like
    •Why prioritization should not be based on scan results
    •Why reports using Excel are no longer the answer
    •How DevOps can be part of the solution to incorporate security

    Join Tenable and (ISC)² on Jan 24, 2018 (Wed) at 14:00 (Singapore time) to learn how to minimize cyber exposure in a world of cloud, containers and other modern assets.

    Presenter: Robert Healey, Senior Director Marketing, APAC, Tenable Network Security
    Moderator: Clayton Jones, Regional Managing Director, APAC, (ISC)²
  • Security Management in the Cloud Recorded: Jan 17 2018 60 mins
    Presenter: Greg Singh, Technical Director-APAC, Skybox Security | Moderator: Clayton Jones, Managing Director, APAC, (ISC)2
    As organizations migrate workloads to cloud computing, they benefit from flexibility and agility, but network security operations grow increasingly difficult.

    Gaining visibility into cloud environments, extending existing security operations and workflows, ensuring compliance, and managing shared responsibility create new challenges for security professionals. Add to this the complexity of hybrid and multi-cloud environments — and the loss of control within those environments — and it’s no wonder security leaders are scratching their heads over how to best secure their organization’s journey to the cloud.

    This session will look at approaches to addressing the many challenges around cloud security management and best practices for translating on-prem security controls and processes into hybrid and multi-cloud environments.

    Join Skybox Security and (ISC)² on Jan 17, 2018 (Wed) at 14:00 Singapore time to learn more about security management in the cloud.
  • 국내외 보안관제솔루션 시장과 Best Practice Recorded: Jan 10 2018 60 mins
    황원섭, 차장 Security Presales, Micro Focus Korea
    빠르게 진화하는 사이버 위협에 대해 보다 신속·효율적인 보호와 대응을 위해서는 IT 인프라 전반에서 가시성을 확보하고, 보안 사고를 탐지·조사·대응할 수 있어야 합니다. 현재 국내외 다양한 통합로그 분석 및 보안관제 솔루션이 존재하며, 이를 보통 가트너에서 정의한 SIEM(Security Information and Event Management)이라는 명칭으로 불리우고 있습니다. 본 웨비나를 통해서 국내/외 대형 보안관제센터에서 사용 중인 솔루션의 특징 및 고려사항 등을 파악한 후, 향후 관련 솔루션 도입을 검토하신다면 많은 시행착오를 줄일 수 있을 것으로 생각됩니다.
  • 万能なエンドポイントセキュリティを目指して Recorded: Dec 20 2017 52 mins
    Presenter: 株式会社シマンテック エバンジェリスト 髙岡 隆佳 / Moderator: (ISC)2 Director of Business Development, Japan小熊慶一郎
    ~多様なモバイル環境と多角的な脅威に対応するために~

    昨今では高度な脅威は境界線をすり抜け、または公衆にさらされたモバイル環境から直接ユーザのエンドポイントを脅かし続けています。クラウドシフトや働き方改革により今まで以上にエンドポイントの保護が求められる中、多角的で高度な脅威からエンドポイントを包括的に保護するための最新の技術動向(機械分析・EDR・要塞化・詐称など)について解説いたします。
  • Endpoint Security for Cloud Generation & New Integrations Extend Data Protection Recorded: Dec 13 2017 64 mins
    Sam Tong, Senior Principal Systems Engineer, Symantec; Moderator: S.C. Leung, Member, Asia-Pacific Advisory Council, (ISC)²
    First in the Industry to deliver Deception, Mobile Threat Defense, and Endpoint Detection and Response (EDR) in a Single-Agent Architecture. Join us to learn the latest Evolution of Endpoint Security & Data Protection:

    •Defend against ransomware with multi-layered protection
    •Gain enhanced visibility into suspicious files via tunable protection to make better policy decisions
    •Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
    •Extend advanced security to mobile devices
    •Use deception techniques to expose hidden adversaries and determine their intent to improve security posture
    •Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications

    New Integrations Extend Data Protection Beyond Traditional DLP

    Powered by the industry’s leading data loss prevention technology, to give you greater visibility and control over your confidential data.

    •Expanded Information Centric (ICE) Encryption integration
    •Enhanced data classification integration
    •Sensitive Image Recognition
    •Stronger endpoint controls
    •Enhanced data at rest discovery
    •Improved cloud app policy and incident management
    •Flexibility on cloud deployment
    •And More …

    Join Symantec and (ISC)² on Dec 13 at 14:00 (Hong Kong time) and learn about the latest Evolution of Endpoint Security & Data Protection.

    This webinar will be conducted in Cantonese.
  • 深入分析FastFlux僵尸网络 Recorded: Nov 29 2017 59 mins
    演講人: 欧志鹏, Akamai 亚太和日本地区高级企业安全架构师; 主持人:卢佐华, (ISC)² 北京分会理事长
    近年来,我们看到大规模的僵尸网络被用于发动过去极为罕见的攻击——这些僵尸网络采用全新功能特性和比以往任何时候都要强大的攻击能力。此类僵尸网络如何以及为何能保持弹性,这是一个需要回答的问题,而原因之一是FastFlux。

    FastFlux 是一种 DNS 技术,僵尸网络利用其将各种类型的恶意活动(例如网络钓鱼、网络代理、恶意软件交付和恶意软件通信)隐藏于不断变化的受感染主机(充当代理)网络背后。一般来说,FastFlux网络主要用于使恶意软件与其命令和控制服务器 (C&C) 之间的通信更不易于发现。Akamai 对网络和企业流量进行了深入了解,并提供了有关此类FastFlux网络行为的全新独特见解。

    欢迎您加入本次在线研讨会,与 Akamai 亚太及日本地区的企业架构师 Sunny Au (欧展鹏)一起进行深入分析,了解以下内容的更多信息:

    •Flux网络如何利用域名、IP 地址甚至是名称服务器来避开检测
    •FastFlux网络如何提供各种服务,比如恶意软件通信和恶意内容托管
    •僵尸网络如何用于进行FastFlux通信和发动各种网络攻击,例如网络数据抓取和凭据滥用(撞库)
    •检测和防御此类僵尸网络的最佳实践

    参加Akamai 和 (ISC)² 在11月29日下午3:00至4:00的在线论坛《深入分析FastFlux 僵尸网络》,聆听专家对僵尸网络的深入解读,还等什么?赶紧加入我们吧。

    *本次在线研讨会将以普通话进行
  • 진화하는 봇(Bot)의 공격을 방어하라 Recorded: Nov 29 2017 64 mins
    정덕진, Technical Project Manager II, Akamai Korea
    Bot은 자동화된 프로그램으로, 웹사이트의 정보를 수집하거나, credential abuse와 같은 악성행위를 수행합니다. Bot으로 인한 피해는 IT 측면의 퍼포먼스 저하 뿐만 아니라, 매출 감소, 경쟁력 저하, 비즈니스 기회 상실과 같이 비즈니스에 심각한 영향을 끼치는 경우까지 퍼져 있습니다. Bot을 운영하는 쪽은 심지어 차단을 회피하기 위한 여러 가지 기술까지 활용하여 지속적으로 대응하기 때문에, 차단만이 모든 문제를 해결해 주는 방법은 아닙니다. 점점 다양해지고 지속적으로 변화하고 발전하는 Bot의 공격 방법 등을 알아보고, 이를 효과적으로 관리하기 위한 접근방법 및 기술에 대해 알아봅니다.
  • In-Depth Analysis of a Fast Flux Botnet Recorded: Nov 22 2017 60 mins
    Or Katz, Principal Lead Security Researcher, Akamai
    In recent years, we have seen large-scale botnets used to execute attacks rarely seen in the past -- botnets that incorporate new features and bigger capabilities than ever before. How and why some of these botnets remain resilient is a question that needs to be answered, and one of the reasons is Fast Flux. Fast Flux is a DNS technique used by botnets to hide various types of malicious activities (such as phishing, web proxying, malware delivery, and malware communication) behind an ever-changing network of compromised hosts acting as proxies. In general, a Fast Flux network is mostly used to make communication between malware and its command and control server (C&C) more resistant to discovery. Akamai’s high visibility to both Web and Enterprise traffic enables new and unique insights on the behavior of such Fast Flux networks.

    In this webinar, you will get an in-depth analysis on:

    - How network fluxing is using domains, IP addresses and even nameservers to become resistant to discovery
    - How Fast Flux networks offer services such as malware communication and hosting of malicious content
    - How botnets are used both for Fast Flux communications and a variety of Web attacks such as Web scraping and credential abuse
    - Best practices for detecting and defending against such botnets

    Join Akamai and (ISC)² on Nov 22 (Wed) at 13:00 (Singapore time) / 16:00 (Sydney time) to learn more about the Fast Flux Botnet.

    Presenter: Or Katz, Principal Lead Security Researcher, Akamai
    Moderator: Ir. Tejinder Singh, Senior Development Expert, T-Systems Malaysia SGA Security Engineering
  • Phishing Incident Response - How to Stop the Chaos! Recorded: Nov 15 2017 61 mins
    Presenter: Duncan Thomas, Director of Sales, PhishMe; Moderator: Clayton Jones, Managing Director, APAC, (ISC)2
    A recent survey conducted among security professionals in Australia, Singapore revealed that up to 95% of respondents said phishing is the #1 threat. Yet many acknowledged they’re unprepared to deal with phishing attacks.

    Attend this webinar to learn why responders are drowning in emails instead of hunting real threats. See why they’re betting on automation whilst we know, tech alone won’t stop threats from getting through and wreaking serious havoc. Learn what rapid changes and investments your peers are planning to turn the tide against phishing and protect their organisations.

    In this webinar, you will learn:

    - How bad is the phishing threat?
    - How confident are companies in their phishing responses?
    - What solutions are companies using—and which ones should they add?
    - How can automation and technology help? Why are humans important, too?
    - How does your organisation compare to organisations in Australia, Singapore and other countries around the globe?

    Join PhishMe and (ISC)² on Nov 15 (Wed) at 14:00 (Singapore time) and learn more about phishing incident response.
  • Equifax: 又一启重大数据外泄事件! 分析事件根源、探讨解决方案 Recorded: Nov 8 2017 59 mins
    演讲人: Disney Cheng 郑学辉, Solution Architect 架构顾问, Tenable 亚太区; 主持人: 吴树鹏, (ISC)² 北京分会会员主席
    Equifax征信数据的外泄将对美国上亿人口产生潜在危害,敏感的个人信息(包括银行账户、信用评分和身份信息)可被犯罪分子利用,导致严重的安全隐患和财务损失。特别令人惊讶的是,犯罪分子利用了已知的网页Apache Struts漏洞发动攻击,而“漏洞补丁”早在数月前就已被公布及可下载使用。

    频繁发生问题的根源是:网路的管控和漏洞的可视度十分有限,导致未能及时修补漏洞!

    这次以Apache Struts漏洞为案例, 给大家演示Nessus 漏洞扫描工具以及持续安全监控平台SCCV所能提供的完整IT 和 IoT资产的报表,安全感知,以及法规状态,让漏洞及时呈现且得到完全修补。

    参加Tenable 和 (ISC)² 在11月8日下午2:00至3:00的在线论坛《Equifax:又一启重大数据外泄事件!分析事件根源、探讨解决方案》,聆听专家对时下安全威胁的解读,还等什么?赶紧加入我们吧。
  • 了解安全威胁态势和凭证盗用(撞库)攻击 Recorded: Sep 27 2017 62 mins
    演講人: 李文涛, 阿卡迈(Akamai)大中华区解决方案部门总经理, 萧锦明, Akamai亚太高级企业安全系统架构师; 主持人: 阎光,(ISC)² 上海分会主席,德勤风险咨询副总监
    安全威胁态势不断变化,并且极为迅速。因此,组织应持续了解最新的攻击信息,以此来确定在当前的威胁态势下应该寻找的应对方式并预计攻击在未来变化的方式,从而免受该类威胁的影响。这一点至关重要。

    在今天的会议当中,Akamai 将基于已发布的《2017 年第二季度互联网安全现状》报告,与大家分享有关安全威胁态势的深度见解。

    近些年来,凭据滥用(撞库)攻击已成为一种普遍的威胁,而且复杂性正日益增加。我们也将对此进行详细介绍。凭据滥用(撞库)攻击活动一旦成功,用户将遭受无法访问、数据泄露或欺诈性交易等损失。Akamai 将揭示这些攻击活动中使用的技术以及难以检测出这些活动的原因。我们还将展示抵御此类攻击的方法和解决方案,从而使您的组织不再遭受此类攻击的影响。

    参加Akamai 和 (ISC)² 在09月27日下午2:00至3:00的在线论坛《了解安全威胁趋势和凭证盗用(撞库)攻击》,聆听专家对时下安全威胁的解读,还等什么?赶紧加入我们吧。
Live Webinars for InfoSec Professionals in Asia Pacific Time Zone
Looking for expertise and information to advance your career and tackle your challenges? Subscribe and join us for the educational webinars in APAC time zone. Earn CPEs quickly and at no cost by attending webinars: 1 hour of webinar equals 1 CPE. We welcome members and non members alike.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Using Big Data For Active And Contextual Security
  • Live at: Aug 17 2016 6:00 am
  • Presented by: John Ellis, Chief Strategist, Cyber Security (APJ), Akamai Technologies; Moderator: Chuan-Wei Hoo, Technical Advisor, (ISC)²
  • From:
Your email has been sent.
or close