Hi [[ session.user.profile.firstName ]]

Top 3 Critical Factors to Consider for Network Protection

Next Generation Firewalls are Next Generation Firewalls…or maybe NOT.

In the light of new advanced attacks and the demands to lower security infrastructure costs, just how can one get the most out of the Next Generation Firewall (NGFW) solutions? Are all NGFW solutions the same?

What criteria should one consider for a NGFW solution that is best for your distributed enterprise environment? Join Forcepoint™’s Michael Ferguson and find out key value points when selecting a network security solution catered to your environment:

• Latest trends in NGFW
• Addressing total cost of ownership
• Security effectiveness in increasingly complex threat landscape
• Challenges in policy management

Also, find out why Forcepoint Stonesoft NGFW has won NSS Labs' coveted highest rating of “Recommended” for the 4th year in a row. Learn how it can provide the scalability, protection and visibility needed to effectively manage your distributed networks. Plus, rapidly and easily deploy, monitor and manage thousands of firewalls from a single pane of glass.
Recorded Sep 28 2016 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Michael Ferguson, Strategic Security Solutions Consultant, Forcepoint
Presentation preview: Top 3 Critical Factors to Consider for Network Protection

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Defining an XDR strategy: What does it mean for your organisation Sep 29 2021 3:00 am UTC 60 mins
    Daniel Chu, Director of Sales Engineer, APJ, ExtraHop
    XDR (extended detection and response) is the hot new buzzword in the security industry but so far there isn't a lot of agreement on what defines XDR. The goal makes sense. Extend your detection capabilities across your hybrid network to catch advanced threats like zero days, supply chain attacks, and insider threats, and respond quickly before damage can be done.

    Join us as we explore the pros and cons of XDR such as, is it realistic that one vendor can offer you all the tools you need for detection and response or will you need to create a strategy to achieve your own extended detection and response ecosystem.

    Attendees will walk away with a better understanding of:
    • How to define what XDR means for your organisation
    • How to create your own XDR strategy
    • Why network data is an essential building block for any XDR ecosystem

    Presenter: Daniel Chu, Director of Sales Engineer, APJ, ExtraHop
    Moderator: Hoo Chuan-Wei, CISSP, Technical Advisor, Asia-Pacific (ISC)²
  • ハイブリッド・セキュリティ:サプライチェーン攻撃への対応 Aug 25 2021 7:00 am UTC 60 mins
    藤田 達也, シニア・セールスエンジニア, ExtraHop


    - 攻撃経路を監視・制御するための手法とサプライヤーとの連携方法
    - ネットワーク・テレメトリーの価値
    - サプライチェーン 攻撃の特徴を分析しセキュリティ体制を改善する施策


    Presenter: 藤田 達也, シニア・セールスエンジニア, ExtraHop
    Moderator: 小熊 慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • Dissecting Client-Side Attack Techniques and Protections Aug 25 2021 5:00 am UTC 60 mins
    Ajay Mishra, Director, Security Technology & Strategy, APJ; Tim Wong, Sr Solutions Engineer, Akamai Technologies
    Hackers are leveraging client-side attack techniques, also known as man-in-the-browser (MITB) attacks, to intercept and control client browsers, exfiltrate data, and disrupt the end-user experience.

    In this talk, featuring a live hacking demo, we will analyse several sophisticated client-side attack techniques that hackers are using to achieve maximum return on investment.

    Protecting these attacks can be difficult; we will discuss several best practices that organisations can use to protect their end-users and data against these attacks.

    Presenter: Ajay Mishra, Director, Security Technology and Strategy, APJ, Akamai Technologies
    Presenter: Tim Wong, Senior Solutions Engineer, Akamai Technologies
    Moderator: Garion Kong, CISSP, CCSP, Vice President, (ISC)2 Singapore Chapter
  • SIEMを本当に使える武器へ!SecOpsの課題解決へ Aug 18 2021 7:00 am UTC 60 mins
    日原 茂, シニアセールスエンジニア, Exabeam




    Presenter: 日原 茂, シニアセールスエンジニア, Exabeam
    Moderator: 小熊 慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • Ransomware Attacks on the Rise - What You Need to Know Aug 11 2021 3:00 am UTC 60 mins
    Adrian Covich, Snr Director Technical Sales, APJ, Proofpoint
    Ransomware is one of today’s most disruptive forms of cyber attacks, putting victims out of business, forcing hospitals to turn away patients, and bringing entire city governments and municipalities to a standstill. Last year alone, the US experienced more than 65,000 ransomware attacks. Not only is it a top concern for CISOs, it has become a national security issue.

    Join us as we discuss:
    • Why ransomware remains a top cybersecurity threat
    • What ransomware trends Proofpoint Threat Research is observing across the globe
    • The three key ways ransomware threat actors get into your organisation, and how to stop them

    Presenter: Adrian Covich, Snr Director Technical Sales, APJ, Proofpoint
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • Simplify kill chain analysis with Autonomous Detection & Response Recorded: Jul 28 2021 62 mins
    Serge Woon, CISSP, Technical Director, APJ, Co-Founder, ReaQta
    Cyber threats are evolving daily. Attack techniques are advancing rapidly. Threat actors today are more skilled than ever. How can organizations keep up? Against the backdrop of heightened cyber crime today, many organizations are still using traditional legacy solutions. Even if they have the latest tools to detect advanced threats, such tools may be complex to use. Compounded by the fact that cyber talent is scarce and are often overloaded with tasks, adding a complex tool into the arsenal often makes things worse. What organizations need is a better way to help analysts detect, respond to and eradicate threats with ease – by seeing more, understanding better and responding even faster. Join us to experience ReaQta’s threat resolution experience.

    Presenter: Serge Woon, CISSP, Technical Director, APJ, Co-Founder, ReaQta
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • Robbery by Ransomware: Stick’em Up and Hand Over The Bitcoin! Recorded: Jul 21 2021 61 mins
    Dave Lewis, Global Advisory CISO, Duo Security
    High-profile ransomware news stories grabbed headlines a few years ago, but faded in popularity through 2018 as other attacks like cryptojacking grew more profitable. Since the first months of 2020, ransomware attacks are on the rise and in the news again! Join this session with Global Advisory CISO Dave Lewis from Duo Security to catch up on the historical rise and fall (and rise…) of ransomware from floppy disks to RaaS (ransomware as a service), why it’s seen a resurgence in popularity along with recent data on the state of ransomware currently, and how you can improve your defenses against ransomware attacks.

    Presenter: Dave Lewis, Global Advisory CISO, Duo Security
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • CCSPオンラインチャレンジセミナー Recorded: Jul 19 2021 111 mins
    諸角 昌宏氏, CCSP, (ISC)² 認定講師; 小熊 慶一郎, CISSP, (ISC)² Director of Business Development, Japan
    (ISC)² が認定する、クラウドセキュリティに関する情報セキュリティ国際認定資格、「CCSP」のチャレンジセミナーを開催します。サイバー・情報・クラウドコンピューティングセキュリティの実務経験に基づく専門的能力と、クラウドセキュリティの専門知識を認証することで、企業は、重要な機能に対して適切な専門家が対応していることを確認することができます。「クラウドファースト」を推進する組織において、クラウドサービスやその利用における情報セキュリティを確実にするため、 CCSP有資格者に管理を任せるケースが増加しています。


    今回のセミナーでは 「クラウドにおける最近のセキュリティ事故」をテーマに、AWSの障害、セールスフォース環境からの情報漏洩などの事例に基づいて、クラウド利用者、クラウドプロバイダとして考慮が必要となる点について解説するとともにCCSP CBKから関連する内容をピックアップしたセミナーとします。また、通常は5日間で行っているオフィシャルセミナーの各ドメインのオーバービューを紹介します。
  • Live Attack Simulation Recorded: Jul 14 2021 64 mins
    Mischa Deden, CISSP, Sr. Sales Engineer, Cybereason ; Eric Tan, Sales Director, Asia Pacific, Cybereason
    Today’s attackers are able to translate a successful phish into persistent, stealthy network compromise. How does this happen, and what can we do to stop it?
    In this special attack simulation, you will get an inside look at how multi-stage attack campaigns operate today. You will witness the attacker’s infiltration and watch the malicious operation as it moves across the entire environment.
    See the many opportunities an attacker has to advance the operation, and the ways a defender can break the kill chain and end the attack before crown jewels are compromised.
    In this webinar you will learn why a behavioral approach to detection is essential to stopping SUNBURST, ransomware and broader malicious operations.

    Presenter: Mischa Deden, CISSP, Sr. Sales Engineer, Cybereason
    Presenter: Eric Tan, Sales Director, Asia Pacific, Cybereason
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • Validate cyber security posture and combatting RaaS with BAS! Recorded: Jul 7 2021 61 mins
    Bharath Sathyanarayan, Sr. Solutions Engineer(SAP), Networks & Security, Keysight Technologies
    When you hear the words "Threat Intelligence", what's the first thing that comes to mind? Back-end research? Threat Hunting? It's easy to categorize threat intelligence as a reactive tool - best suited for things like root-cause analysis - but it's so much more than that. In this webinar you will learn how organizations from all industry verticals use Breach and Attack Simulation (BAS) to accurately assess their security risk, identify misconfigurations, and reveal the gaps that need fixing to optimize the security and robustness of its networks:

    • Operationalize MITRE ATT&CK as part of your security program.
    • Join us to discover how applying threat intelligence can help you
    • Answer the question "Am I more secure today than I was yesterday?"
    • Reduce your attack surface by blocking the latest threats
    • Maximize your threat hunting capability with real-time insights into botnets, phishing, etc.
    • Stay ahead of attackers by researching the latest attack signatures

    Presenter: Bharath Sathyanarayan, Sr. Solutions Engineer(SAP), Networks & Security, Keysight Technologies
    Moderator: Victor Yeo, CISSP, President (ISC)² Singapore Chapter
  • Inside (ISC)2: Updates on Member Services, Benefits and Experience Recorded: Jul 1 2021 59 mins
    Clar Rosso, CEO, (ISC)2; Beth Paredes, Director of Member Services, (ISC)2
    Clar Rosso, CEO of (ISC)2 shares the latest insights on what’s happening at our association. Join us for this quarterly update where we cover the latest developments at (ISC)2, ranging from certification to member benefits, continuing education and events, to major milestones and achievements. On July 1, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific as Beth Paredes, Director of Member Services at (ISC)2 join Clar to provide an overview of the wealth of benefits and services available to members and associates.
  • Countering Threat Evasion: You Cannot Stop What You Cannot See! Recorded: Jun 30 2021 67 mins
    Bob Hansmann, Senior Product Marketing Manager, Infoblox
    Cybercriminals must master evasion if they are to be successful. Many threats, such as APT’s, are designed to remain hidden for months or years as they slowly monitor their victim, compromising select information in a way that is also intended to go unnoticed. Others, like ransomware, may only need to hide their malicious intentions long enough to infect and begin encryption processes. And even when these attacks trip some defensive sensor, it can take analysts days to investigate and launch an effective incident response, often too late to prevent significant damage.
    Join us as we assess evasion methodologies and the value of DNS, with some unique Asia-Pacific callouts, to counter them across the kill chain including:
    - Why does DNS visibility expose threat activity other solutions miss?
    - How can DNS visibility be used to make other solutions more effective?
    - What role does DNS play in investigation and response?

    Presenter: Bob Hansmann, Senior Product Marketing Manager, Infoblox
    Moderator: Hoo Chuan-Wei, CISSP, Technical Advisor, Asia-Pacific, (ISC)²
  • 获取金牌认证CISSP, 为您职业发展加速 Recorded: Jun 29 2021 93 mins
    施勇, CISSP, (ISC)²授权讲师, (ISC)²上海分会会长; 方乐, CISSP, 谷安天下资深专家
    网络安全的世界充满挑战,新冠肺炎疫情的爆发对全球的网络安全提出了更高的挑战!获取 “金牌认证” CISSP,为您的职业发展加速!

    (ISC)² CISSP是当今世界上最有价值的网络安全认证之一。凭借超过25年的成熟记录,CISSP真正证明了持证者在知识、技能和经验等方面处于网络安全领域的顶端。

    • 网络安全专业人才的市场需求;
    • (ISC)² 认证的价值;
    • CISSP认证的全面介绍,包括CISSP概况、持证者福利、考试及备考,知识域更新等;
    • CISSP官方培训;
    • 在线答疑:欢迎提问与CISSP认证相关的任何问题。
  • CISSPオンラインチャレンジセミナー Recorded: Jun 25 2021 124 mins
    小熊慶一郎, CISSP, (ISC)² Director of Business Development, Japan; 安田良明, CISSP, SSCP, (ISC)² 認定講師


  • Igniting Passion for Diversity, Equity and Inclusion (DEI) Recorded: Jun 23 2021 59 mins
    Clar Rosso, CEO, (ISC)2; Dr. Kevin Charest and Samara Moore, (ISC)2 Board Members
    With the onset of social justice movements and awareness of racial and gender inequality around the globe, many organizations and leaders are recognizing the need to dig deeper and lead the charge for their stakeholders and communities for lasting transformation. Yet, what makes diversity and inclusion—seemingly so simple—so complicated and difficult to achieve? What are some of the key challenges and tensions that often arise throughout the inclusion journey? And, how can leaders ignite the passion needed to face these challenges? Join (ISC)2 on June 23, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific as Clar Rosso, (ISC)2 CEO joins with cyber industry leaders to explore these paradoxes, challenges and high-impact solutions and what it takes to achieve a truly diverse and inclusive cyber profession; one that weaves inclusion into everything it does.
  • 解码API安全 – 威胁、挑战和最佳实践 Recorded: Jun 23 2021 62 mins
    刘炅, 大中华区产品市场经理, Akamai Technologies
    • API安全威胁现状和发展趋势
    • API的攻击界面和类型
    • API攻击的典型场景
    • API防御最佳实践和推荐架构

    演讲人: 刘炅, 大中华区产品市场经理, Akamai Technologies
    主持人: 李杺恬, CISSP, (ISC)² 北京分会理事
  • Moving beyond SIEM to solve the industry’s biggest SecOps challenges Recorded: Jun 23 2021 65 mins
    Harjith Prabhakaran, Technical Alliance Director, Exabeam; Eric Ng, Regional Security Engineer, Exabeam
    Breach scenarios are still too frequent, with common attack techniques like lateral movement, data exfiltration, and privilege escalation appearing legitimate or spanning across siloed security products.

    To help defend against such techniques, security teams need to be able to accurately differentiate normal behaviour from abnormal activity, rapidly identify notable users and events, and quickly reconstruct the timeline leading up to a security incident.

    Exabeam will outline how prescriptive automated workflows guided by pre-packaged, use case specific content enable security analysts to defend against today’s common and evolving threats without the need for large-scale rip and replacements of their entire security stack.

    Presenter: Harjith Prabhakaran, Technical Alliance Director, Exabeam
    Presenter: Eric Ng, Regional Security Engineer, Exabeam
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • Master the Art of Secure Software Coding and App Development with the CSSLP Recorded: Jun 22 2021 66 mins
    John Ng, Mox Bank; Pishu Mahtani, (ISC)² Authorised Instructor; Tony Vizza, (ISC)²
    The modern software developer faces an enormous amount of challenges. From continuously creating innovative apps to ensuring high quality and meeting tight deadlines, developers need to cope with many responsibilities. As a result, security remains one of the last priorities on many developers’ minds during the software development lifecycle, despite software security continuing to be a major contributing factor behind devastating cyber breaches such as Starburst.

    In this webinar, you will learn:
    • Why do we need developers with a security mindset?
    • What personnel certifications for software security will do for individuals and the organisations they work for;
    • How a security certification qualification will help software professionals develop more secure software;
    • The merits and benefits of the (ISC)² CSSLP software security certification as well as the steps involved to attain accreditation.

    • John Ng, CSSLP, CISSP/ISSAP/ISSEP/ISSMP, CCSP, Security Architect, Mox Bank
    • Pishu Mahtani, CSSLP, (ISC)² Authorised Instructor
    • Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • ニューノーマルにおけるSaaSへの新たな脅威とデータ保護における機密性、完全性、可用性の実現について Recorded: Jun 16 2021 74 mins
    加藤 路陽, セールスエンジニア, バラクーダネットワークスジャパン株式会社

    Presenter: 加藤 路陽, セールスエンジニア, バラクーダネットワークスジャパン株式会社
    Moderator: 小熊 慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • Kick Start an Exciting Cybersecurity Career with (ISC)² Recorded: Jun 15 2021 63 mins
    Chuan-Wei Hoo, CISSP, Group CISO, ST Engineering & Jeremy Daly​, SSCP, Cybersecurity Product Manager, DDLS
    Cybersecurity is a booming industry that suffers from a lack of skilled personnel. Organizations from technology and manufacturing to retailers, airlines, and shipping, to financial services and healthcare, government and federal sectors are all seeking skilled and experienced security staff. In fact, it is predicted that there will be 3.5 million unfilled cybersecurity jobs globally by 2021.
    IT and Risk Management professionals have many of the underlying knowledge, skills and experience needed to enter the field of cybersecurity. So, do you have what it takes to be a cybersecurity professional?

    In this webinar, you will learn:
    • Why cybersecurity is a great choice for a exciting and fulfilling career;
    • How you can use your current knowledge, skills and experience and hone it towards a cybersecurity career;
    • Attaining broad security knowledge with the (ISC)² SSCP certification;
    • How a security certification will help you become a better cyber professional;
    • Which areas of knowledge the SSCP security certification covers

    • Chuan-Wei Hoo, CISSP, Group Chief Information Security Officer, Group Information Security Office, ST Engineering IHQ Pte. Ltd; Technical Advisor, Asia Pacific, (ISC)²
    • Jeremy Daly​, SSCP, Cybersecurity Product Manager, DDLS
    • Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
(ISC)² Live Webinars for InfoSec Professionals in APAC Region
Looking for expertise and information to advance your career and tackle your challenges? Subscribe and join us for the educational webinars in APAC time zone. Earn CPEs quickly and at no cost by attending webinars: 1 hour of webinar equals 1 CPE. We welcome members and non members alike.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Top 3 Critical Factors to Consider for Network Protection
  • Live at: Sep 28 2016 5:00 am
  • Presented by: Michael Ferguson, Strategic Security Solutions Consultant, Forcepoint
  • From:
Your email has been sent.
or close