Hi [[ session.user.profile.firstName ]]

利用大数据实现积极且具有高度关联性的安全防御Using Big Data For Active And Contextual Security

*This webinar will be conducted in Mandarin
Organizations are turning to leverage big data and analytics to ‘look’ for indicators of intent or indicators of compromise, thus helping organizations focus their security resources on the threats at hand. The challenge though is how to process the vast amount of data, and furthermore, keep it relevant, timely, actionable – contextual. The challenge becomes harder when threat actors utilize a variety of techniques to maintain anonymity, reduce their ‘fingerprint’ and mask their intent.

In this webinar, Adam will share how Akamai leverages the vast amount of data that it sees daily to help its customers improve their security decisions, when the threat would otherwise be unclear. John will showcase how Akamai’s big data and analytics platform, Cloud Security Intelligence, powers its Client Reputation service. A service that provides the ability to forecast intent and protect applications against Distributed Denial of Service (DDoS) and application layer attacks, and how active defence can be applied to a variety of response mechanisms, delivering an intelligent contextually aware defence.


在本次的网络研讨会中,Akamai 高级解决方案顾问-周德振先生(Adam),将会向您展示Akamai是如何在威胁尙不明确的情况下,使用每日承载的海量数据来帮助客户做出更加明智的网络安全决策的。Adam将会展示Akamai的大数据及分析平台、云安全智能是如何强化其客户端信誉(Client Reputation)服务。这种服务能够提前预告各种行为的迹象,并保护应用程序不会受到DDoS和应用层攻击。此外,您还将看到这种积极的安全防御是如何帮助各种响应机制,是如何交付智能化、高度关联的防御。

8月24日(周三)| 时长60分钟 | 北京时间 14:00
演讲人: 周德振(Adam), 高级解决方案顾问, Akamai Technologies
主持人: 毛宇, CISSP, AMBCI, CCNP, PRINCE2, (ISC)²官方授权讲师


*This webinar will be conducted in Mandarin
Recorded Aug 24 2016 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
周德振(Adam), 高级解决方案顾问, Akamai Technologies
Presentation preview: 利用大数据实现积极且具有高度关联性的安全防御Using Big Data For Active And Contextual Security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Art of Polymorphic Phishing Attacks – Are You Ready to Respond? Jul 8 2020 6:00 am UTC 60 mins
    Ryan Jones, Principal Sales Engineer, APAC, Cofense
    Leveraging Human Sensors to Detect and Remediate Phishing Attacks in Minutes

    As businesses adjusts to having their employees work from home, they are also working hard to support it. However, new working conditions has opened up new security gaps that challenge the status quo and questions the business’s resiliency to defend against polymorphic phishing attacks. The changing face of phishing emails continuing to evade Secure Email Gateways has threat actors adapting their tactics to exploit businesses who are unprepared.

    Are you ready to accelerate your security practice to respond to these types of attacks?

    Join Cofense security expert Ryan Jones and (ISC)² on Jul 8, 2020 (Wed) at 14:00 (GMT +8) for an in-depth review of the current phishing threat landscape, as seen through the eyes of those on the front line – your end users.

    Highlights will include:
    • Insights into the porous nature of SEGs and the latest tactics and techniques delivering credential phish and malware today
    • How to identify and defend against polymorphic phishing emails within a remote environment
    • Strategies and tools to adopt that will strengthen your security practices and reduce the workload of your SOC teams

    Presenter: Ryan Jones, Principal Sales Engineer, APAC, Cofense
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • CCSPチャレンジセミナー Jul 7 2020 6:00 am UTC 120 mins
    諸角 昌宏, CCSP, (ISC)² 認定講師; 小熊 慶一郎, CISSP, (ISC)² Director of Business Development, Japan
    (ISC)² が認定する、クラウドセキュリティに関する情報セキュリティ国際認定資格、「CCSP」のチャレンジセミナーを開催します。サイバー・情報・クラウドコンピューティングセキュリティの実務経験に基づく専門的能力と、クラウドセキュリティの専門知識を認証することで、企業は、重要な機能に対して適切な専門家が対応していることを確認することができます。「クラウドファースト」を推進する組織において、クラウドサービスやその利用における情報セキュリティを確実にするため、 CCSP有資格者に管理を任せるケースが増加しています。

    今回のセミナーでは 、公式セミナーの模擬講義を(ISC)² 認定講師・諸角昌宏氏に実施していただきます。前回はドメイン4から一部をレクチャーいたしましたが、今回は全ドメインの概要を紹介し、今後の学習に役立てていただく内容とします。

  • 従業員をフィッシング防御の最前線に – あなたのチームは戦う準備はできていますか? Jun 24 2020 7:00 am UTC 60 mins
    藤田 平, Principal Engineer, Japan, Cofense

    COVID-19のリスクを軽減するため世界中で外出自粛の要請が行われている中、多くの従業員はリモートワークを余儀なくされ、それを受けて新しい働き方に対しITのインフラにおける準備およびサポートの提供で各企業は大変なことと存じます。しかしながら、企業は外部から自社へのネットワーク接続、特に業務遂行に欠かせないEメールに関しては完全にロックダウンすることはできません。例えば、フィッシングメールは引き続きセキュリティEメールゲートウェイ をすり抜け、攻撃者はこの絶好の機会を悪用し様々な戦術を使用してきます。企業はCOVID-19やリモートワークに関するフィッシングメールの急増によって脅威にさらされているのです。


    セキュリティのエキスパートである藤田 平の話を聞きましょう。彼は最新のフィッシング脅威の状況についての詳細なレビューを提供し、フィッシング防御の最前線での新しい形態である”従業員”の受信トレイやその目を通して知り得た情報をお話しします。

    • セキュリティEメールゲートウェイをすり抜け受信トレイに到達し、クレデンシャルフィッシングやマルウェアを送りつける様々なフィッシング攻撃についての洞察を得ることができます。
    • フィッシングの攻撃者がセキュリティEメールゲートウェイをすり抜ける為にオンラインのビジネス調査やドキュメントの共有プラットフォームなどの信頼できるサービスをどのように活用するのかを知ることができます。
    • 2020年のQ2や下半期に弊社が引き続き注視していく専門家としての予測に関する洞察を得ることができます。

    Presenter: 藤田 平, Principal Engineer, Japan, Cofense
    Moderator: 小熊 慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • Zero Trust: A Cybersecurity Essential and the Key to Success Jun 24 2020 5:00 am UTC 60 mins
    Mauran Tharmachandirar, Presales Systems Engineer – ANZ, Infoblox
    In our increasingly cloud-first world, the idea of a trusted internal network zone and an untrusted external one is now outdated. The truth is, todays cyber-threats often get past perimeter defenses undetected, so you can no longer trust data traffic no matter where it originates.

    That’s where zero trust architectures come in. In this webinar, discover why zero trust approaches are becoming an urgent cybersecurity priority for enterprise and government organizations alike.

    Key takeaways:
    • The security trends fueling the adoption of zero trust architectures
    • The critical role that DNS security plays in successful zero trust implementation
    • The key elements you need to have in place and the next steps for moving forward

    Join Infoblox and (ISC)² on Jun 24, 2020 (Wed) at 13:00 (GMT +8) to learn about zero trust architectures and implementation.

    Presenter: Mauran Tharmachandirar, Presales Systems Engineer – ANZ, Infoblox
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • CISSP 认证宣讲会 2020 Jun 18 2020 6:00 am UTC 90 mins
    徐一, CISSP, (ISC)²授权讲师, (ISC)² 北京分会理事; 方乐, CISSP, 谷安天下资深专家
    网络安全的世界充满挑战,获取 “金牌认证”CISSP,为您职业发展加速!享誉全球的CISSP认证含金量高,颇受行业雇主和专家青睐,多次被SC Magazine评为“最佳职业认证项目”,是信息安全专业人士证明网络安全策略、认知和实践经验的理想之选。

    • 网络安全专业人才的巨大需求;
    • (ISC)² 认证的价值;
    • CISSP认证的全面介绍,包括CISSP概况、持证者福利、考试介绍、知识域、官方培训等;
    • 如何获取CISSP认证;
    • 在线答疑:欢迎提问CISSP认证相关的任何问题。

    讲师: 徐一, CISSP,
    (ISC)²授权讲师, (ISC)²北京分会理事

    讲师:方乐, CISSP
  • クラウドネイティブ時代に必要なセキュリティ Jun 17 2020 7:00 am UTC 60 mins
    福田 鉄平, Open Source Engineer, Aqua Security
    Aqua Securityでは、早期からクラウドネイティブへの移行を試みた企業の環境をセキュアにするためのお手伝いを数年に渡って行ってきました。現在では、多くの組織がコンテナ、サーバレス、Kubernetesを利用したクラウドネイティブな環境への移行の第一歩を踏み出そうとしています。本Webinarでは我々の経験に基づき、セキュアなクラウドネイティブ環境を構築するための知見や指針を共有させていただきます。


    • クラウドネイティブ環境に対する脅威概略
    • クラウドネイティブセキュリティについて考える上で重要な観点
    • どのように環境を構築し運用フローを整備すると良いか
    • クラウドネイティブセキュリティの整備に成功するケースと失敗するケースについて

    Presenter: 福田 鉄平, Open Source Engineer, Aqua Security
    Moderator: 小熊 慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • 3rd Party Risk Management: A Practical View of Your Vendor's Cybersecurity Risk Jun 17 2020 2:00 am UTC 60 mins
    Kerwin Lu, Consulting Engineer; Terence Cheong, Senior Consulting Engineer, APAC, BitSight Technologies
    As security teams around the world scramble to adjust to a new reality and new challenges, two goals remain at the top of the priority list for third party risk management teams: reduce risk and operate more efficiently.

    Security ratings is a powerful tool in any third-party risk management (TPRM) program’s arsenal, but are you leveraging them the right way?

    Today, a higher standard of security ratings integrates value across your program, helping you reduce risk and find those ever-elusive efficiencies.

    By integrating security ratings into the vendor life cycle and existing operational workflows, it provides the guidance and context needed to support informed decision-making, fuelled by best practices and network intelligence from the industry’s largest community.

    Join BitSight Technologies and (ISC)² on Jun 17, 2020 (Wed) at 10:00 (GMT +8) to understand how you can benefit from using security ratings for TPRM.

    Presenter: Kerwin Lu, Consulting Engineer, BitSight Technologies
    Presenter: Terence Cheong, Senior Consulting Engineer, APAC, BitSight Technologies
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • 解码数字化进程中的Magecart/web盗用攻击 Jun 10 2020 6:00 am UTC 60 mins
    刘炅, 大中华区产品市场经理, Akamai Technologies

    • 新冠疫情背景下的互联网数字化生态
    • 网络威胁在新冠时期的转变
    • 增长的web盗用/Magecart攻击威胁和目标行业
    • Magecart攻击方法
    • 防护措施及方案

    参加Akamai Technologies和 (ISC)² 在6月10日下午2:00至3:00的在线研讨会,聆听专家分析Magecart/web盗用攻击,还等什么?赶紧加入我们吧。


    演讲人: 刘炅, 大中华区产品市场经理, Akamai Technologies
    主持人: 吴潇, CISSP, (ISC)²官方授权讲师
  • Prevention: The Strategic Element in Your Security Stack Jun 10 2020 4:00 am UTC 60 mins
    Eyal Rozen, Sales Director - APAC & EMEA, Morphisec
    Despite continued infosec investments, data breaches continue while companies contend with complicated security architectures composed of disconnected technologies that produce mountains of non-actionable data. A renewed focus on prevention may hold the answer.

    Security architecture can be broken down into three main elements: Prevention, Detection and Remediation. Prevention should be considered the most strategically important defense element, as by default good true time zero prevention dramatically reduces latency, risks and operational costs of the security structure as a whole. As advanced threats evolve and data center transformation forces enterprise teams to consolidate security, the need for faster, easier and more deterministic threat prevention is essential, thus corporations need to consider a purpose-built stack of true prevention capabilities, that isn't available in a singular off-the-shelf solution, and add Detection based tools, which by definition have a huge latency, false alerts and are cost prohibitive, where and when appropriate, but not as a prevention tool.

    Join Morphisec and (ISC)² on Jun 10, 2020 (Wed) at 12pm (GMT +8) to learn about the strategic element in your security stack.

    Presenter: Eyal Rozen, Sales Director - APAC & EMEA, Morphisec
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • これからのPKIマーケット~証明書ライフサイクル管理という考え方~ Recorded: Jun 3 2020 62 mins
    佐藤 公理, CISSP, シニアテクニカルセールスコンサルタント, エントラストジャパン株式会社


    Presenter: 佐藤 公理, CISSP, シニアテクニカルセールスコンサルタント, エントラストジャパン株式会社
    Moderator: 小熊 慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • Don’t Get Stung by #OWASP Top 10! Recorded: Jun 3 2020 64 mins
    Shain Singh, Security Solution Architect, APCJ, F5 Networks; Shahnawaz Backer, Principal Security Advisor, F5 Labs
    F5 Labs reports detail that web-based attacks have grown from 2,323 in 2017 to over 20,600 in 2019. The exponential growth of applications has led to a significant increase in the rate of public disclosure of breaches. Traditional methods for security controls are lagging behind the need to deploy production-ready apps for continuous deployment.

    Join F5 Networks and (ISC)² on Jun 3, 2020 (Wed) at 14:00 (GMT +8), we will dive into real-live attacks where common vulnerabilities have been exploited and discuss how we can learn from these to provide countermeasures at the speed of DevOps.

    Presenter: Shain Singh, Security Solution Architect, APCJ, F5 Networks
    Presenter: Shahnawaz Backer, Principal Security Advisor, F5 Labs, F5 Networks
    Moderator: Tony Vizza, CISSP, CCSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • SSCPオンラインチャレンジセミナー Recorded: May 28 2020 123 mins
    小熊慶一郎, CISSP, (ISC)² Director of Business Development, Japan & 安田良明, CISSP, SSCP, (ISC)² 認定講師
    CISO や CSIRT の設置により、情報セキュリティ体制を強化している組織が増えてきている中、情報セキュリティやリスクマネジメントを実践しているが情報セキュリティが一向に向上しないのはなぜだろうか、現場の情報システム・情報セキュリティ実務者を育成しているが、情報セキュリティの運用がうまくいかないのはなぜだろうかなど課題を抱えている組織が多いのが現状です。





    Speaker: 小熊慶一郎, CISSP, (ISC)² Director of Business Development, Japan
    Instructor: 安田良明, CISSP, SSCP, (ISC)² 認定講師
  • 无惧前行-新数字经济场景下的特权访问管理 Recorded: May 27 2020 61 mins
    路军龙 (Sam), CISSP, CCSP, 解决方案架构师, CyberArk
    随着客户需求不断变化,企业数字化转型正当时: 云优先策略,持续集成、持续交付的DevOps理念逐渐被采用:

    - 拥抱新技术的同时企业面临的技术风险是什么?
    - 为什么特权访问管理变得越来越重要 ?
    - 如何使用特权账号安全方案避免风险?
    - 如何消除传统应用和容器化应用内嵌特权账号,避免滥用特权账号带来的重大安全隐患,保障业务不停顿运行?
    - 与时俱进的解决方案、解除第三方软件开发商远程特权会话安全接入风险的长久之道

    参加 CyberArk 和 (ISC)² 在5月27日上午11:00的在线研讨会《无惧前行-新数字经济场景下的特权访问管理》,通过“像攻击者一样思考”,您将了解到如何快速化解企业的特权账号安全和风险管理挑战,从而积极主动地防御外部恶意攻击并增强合规性。

    演讲人: 路军龙 (Sam), CISSP, CCSP, 解决方案架构师, CyberArk
    主持人: 阎光, CISSP, (ISC)² 上海分会会员主席

  • 코로나 19 시기에 원격 접속과 비즈니스 보안 Recorded: May 27 2020 53 mins
    강 민 석, 기술 이사, 네스랩 (비욘드트러스트(BeyondTrust) 공식 배급사)
    코로나 19의 전 세계적 유행이 사이버 범죄를 급증시키고 있는 것은 그리 놀라운 일은 아닐 것입니다. 공격자들은 사람들의 공포를 이용하여 비즈니스 정보와 개인 정보를 노립니다.

    이러한 위기의 시기에 제일 먼저 선행해야 할 과제는 올바른 보안의 강화일 것입니다. 아시아 태평양 지역의 많은 직원들이 재택 근무를 해야 하는 상황이 되면서 회사, 대학 그리고 정부 기관들은 새로운 원격 근무 정책을 수립해야 합니다.

    하지만 원격근무를 확대함에 따라 보안 위협도 증가하며, 특별히 IT와 지원 인력들이 임시적으로 보안 상 안전하지 않은 원격 접속 툴들을 사용하고 있습니다.

    BeyondTrust와 (ISC)²가 2020년 5월 27일 오전 10시 (한국 시각)에 준비한 특별한 웨비나에 참석하십시오.
    - 원격 근무 확장에 따른 위협들과 고려해야 할 보안 요소들
    - 원격 접속 툴들의 취약점 및 위협 요소들 (개인 디바이스 및 관리 되지 않은 솔루션들)
    - 장기적으로 원격 근무를 지원하기 위해 강력한 보안 정책을 확장하기 위한, 그리고 빠르게 구축하기 위한 올바른 정책 가이드
    - 기술 시연: 성공적인 보안이 전제된 원격 접속 정책을 위한 실 사용 예

    발표자: 강 민 석, 기술 이사, 네스랩 (비욘드트러스트(BeyondTrust) 공식 배급사)
    진행자: 박 선 영, Senior Business Development Manager, APAC, (ISC)²
  • 情報セキュリティプロフェッショナル認定資格「CISSP」のご紹介 Recorded: May 22 2020 47 mins
    小熊慶一郎, CISSP, (ISC)² Director of Business Development, Japan
    CISSPは(ISC)²が認定を行っている国際的に認められた情報セキュリティ・プロフェッショナル認定資格です。情報セキュリティの共通言語とも言える『(ISC)² CISSP CBK』を理解している情報セキュリティ・プロフェッショナルのみに与えられる資格で、CISSPの取得は、国内外において、個人および所属組織の信用・信頼の獲得につながります。Webinarでは、このCISSPについてわかりやすく説明します。
  • Securing Your Business in the COVID-19 Era of Remote Working Recorded: May 20 2020 63 mins
    Perry Chu, Regional Senior Solutions Consultant, BeyondTrust
    So, your workforce has gone remote. Now what?

    The COVID-19 pandemic has led to a surge in cybercrime, but this is no surprise. Attackers use people’s fears to prey on businesses and individuals.

    In times of crisis, good security practices are often the first thing to go. As employees across Asia Pacific and ANZ are being asked to work from home, companies, universities and government organisations are being forced to implement new remote working policies. However, an expanding remote workforce can increase your security risk, especially if IT and Support employees use non-secure remote access tools as temporary measures.

    Join this special webinar with BeyondTrust and (ISC)² on May 20, 2020 (Wed) at 10:00 (GMT +8) to learn:
    - Risks and security considerations related to an extended remote workforce
    - The vulnerability risks posed by remote working tools, like BYOD and free Shadow IT solutions
    - Practical guide on how to quickly implement and scale strong security protocols to enable long-term remote work
    - Technology Demonstration: Key Use Cases for a successful Secure Remote Access strategy

    Presenter: Perry Chu, Regional Senior Solutions Consultant, BeyondTrust
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • Continuing the Conversation: What We’ve Learned From the COVID-19 Outbreak Recorded: May 19 2020 62 mins
    John Carnes, Erik von Geldern, Kris Rosson, Brandon Dunlap, Moderator
    On April 28, 2020, (ISC)2 hosted a diverse panel of cybersecurity professionals who discussed the impact the COVID-19 pandemic has had on their IT operations and cybersecurity teams. The first webcast, in this series, generated a great deal of interest, discussion and questions from the audience. We will continue the conversation on May 19, 2020 to tackle the questions and discussions that continue to be raised during this ongoing crisis. This second webcast will be devoted to the economic impact (budgets slashed with no revenue coming in) due to the shutdown caused by COVID-19. In addition, we’ll discuss what re-opening an office may look like and how the current situation affects individuals both physically and emotionally. Join the conversation to share your thoughts and gain insight into how your team can continue to handle this changing situation.
  • Members Get More! Getting the Most Out of Your (ISC)² Membership Recorded: May 19 2020 58 mins
    Tony Vizza, CISSP, CCSP, Director of Cyber Security Advocacy, APAC & Hun Keat Wong, Customer Service Manager, APAC, (ISC)²
    As an (ISC)² Member, you now have access to a wide range of global resources, educational tools, peer networking opportunities, as well as exclusive discounts to industry events. There is so much more to discover to what your (ISC)² membership brings!

    In this webinar, you will learn about:
    - The latest news and developments across APAC and (ISC)² from around the world.
    - Exciting and upcoming CPE opportunities to help you stay sharp
    - Member benefits and perks including fantastic discounts on a range day to day items
    - New, upcoming and FREE professionally developed education courses just for members.
    - An update on (ISC)² certifications to help you take your career to the next level.
    - Networking opportunity with like-minded professionals locally and globally via (ISC)² chapters
    - An opportunity to ask questions in our Q&A session

    Join us on May 19, 2020 (Tue) at 12:00 (GMT+8) to get the most of your (ISC)² membership globally and locally.
  • 特権アクセス管理の基本- セキュリティ環境を変革せよ Recorded: May 13 2020 63 mins
    蓑輪 尚毅, ソリューションズ・エンジニア, CyberArk Software株式会社

    • 特権アクセス管理に優先的に取り組むべき重要な理由
    • CyberArkの考える特権アクセス管理
    • 国内事例
    • 特権アクセス管理の最初の一歩
    • ライブデモ
    • まとめ

    • 組織全体に存在する特権アカウントを見つけるためのプロセス全体を説明します。
    • 最小特権の強制、特権アクセスのある認証情報をローテーション、分離、管理、および監視する利点を実感できるように、テクノロジのライブデモを実施します。


    Presenter: 蓑輪 尚毅, ソリューションズ・エンジニア, CyberArk Software株式会社
    Moderator: 小熊 慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • Decoding Magecart/Web Skimming Attacks During the Rise in Digital Recorded: May 13 2020 62 mins
    Aseem Ahmed, Senior Product Manager, Web Security (APAC), Akamai Technologies
    With most of countries in a lockdown mode from COVID-19, our reliance on the internet is more than ever before. Unfortunately, the cyber threat actors are eyeing this sharp growth in online transactions.

    The exposure to compromised websites including e-commerce is greater than ever with the uptick in web skimming cases reported in March. Web skimming attacks may worsen as more online services are consumed in the coming months. Through this webinar we will discuss:

    • Internet and digital ecosystem in the backdrop of COVID-19
    • Cyber threats – what have changed during COVID-19
    • Growing threats of web skimming/magecart attacks and targeted industries
    • Magecart attack vectors
    • Attack examples
    • Measures taken in the industry – strengths and weaknesses

    Join Akamai Technologies and (ISC)² on May 13, 2020 (Wed) at 13:00 (GMT +8) to learn about decoding magecart and web skimming attacks.

    Presenter: Aseem Ahmed, Senior Product Manager, Web Security (APAC), Akamai Technologies
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
Live Webinars for InfoSec Professionals in Asia Pacific Time Zone
Looking for expertise and information to advance your career and tackle your challenges? Subscribe and join us for the educational webinars in APAC time zone. Earn CPEs quickly and at no cost by attending webinars: 1 hour of webinar equals 1 CPE. We welcome members and non members alike.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 利用大数据实现积极且具有高度关联性的安全防御Using Big Data For Active And Contextual Security
  • Live at: Aug 24 2016 6:00 am
  • Presented by: 周德振(Adam), 高级解决方案顾问, Akamai Technologies
  • From:
Your email has been sent.
or close