Hi [[ session.user.profile.firstName ]]

The Nuix Black Report: Find Out What Hackers are Really Thinking

The Nuix Black Report takes a unique perspective on cybersecurity. Most security industry reports compile data about incidents that have already taken place or trends in data breaches—but these are clearly the symptoms of a deeper problem. Instead, Nuix has focused on the source of the threat landscape: the attackers themselves.

Join this webinar with report author and Nuix Chief Information Security Officer Chris Pogue to discover the true nexus between attacker methodology and defensive posture:

• Which countermeasures will actually improve your security posture (they’re not the ones you think)?
• What is the best spend for your security dollar and why?
• If hackers could speak to your CEO or board of directors, what would they say?

Join Nuix and (ISC)² on Mar 1 (Wed) at 13:00 (Singapore time) and find out what hackers are really thinking.
Recorded Mar 1 2017 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Christopher Pogue, Chief Information Security Officer, Nuix
Presentation preview: The Nuix Black Report: Find Out What Hackers are Really Thinking

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • OpenSource Security Tools for Cloud Native Environments Jul 29 2020 6:00 am UTC 60 mins
    Steve Giguere, Senior Solution Architect, Aqua Security
    Securing production workloads used to be the responsibility of information security specialists. In a DevOps culture, security becomes part of everyone's responsibility as security shifts left.

    Join Aqua Security and (ISC)² on Jul 29, 2020 (Wed) at 2pm (GMT +8), we will look at the cloud native threat landscape and some recent high profile attacks. We will review how security can be embedded at every stage of the CI/CD pipeline, and demonstrate opensource tools that can be used to assess the security posture of your kubernetes cluster and container images.

    Presenter: Steve Giguere, Senior Solution Architect, Aqua Security
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • Network Detection & Response: Defending Critical Assets Beyond the Perimeter Jul 22 2020 2:00 am UTC 60 mins
    Daniel Chu, Director of Systems Engineering, APJ, ExtraHop
    In today’s threat landscape, it is evident that data breaches are becoming a question of when, and not if. Most organisations have multiple investments and tools for securing the perimeter, but have limited visibility into the post-breach activities that occur within the trusted perimeter. Attackers take advantage of these blindspots to perform reconnaissance, move laterally, establish persistence, and ultimately exfiltrate data.

    Join ExtraHop and (ISC)² on Jul 22, 2020 (Wed) at 10am (GMT +8), you’ll learn how network detection and response (NDR) provides ground truth with context, that can't be turned off or evaded by savvy attackers. We’ll demonstrate why NDR is the most effective approach for detecting, investigating, and responding to threats in hybrid, multicloud, remote workforce, and IoT environments.

    Agenda will include:
    · Gartner's SOC Visibility Triad: NDR, EDR & SIEM
    · Introduction to machine learning-based NDR for the hybrid enterprise
    · Demo: Investigate a live attack
    · Q&A

    Presenter: Daniel Chu, Director of Systems Engineering, APJ, ExtraHop
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • The Evolution of Public Key Infrastructure Jul 15 2020 2:00 am UTC 60 mins
    Paul McBride, Senior PKI Product Manager, Entrust Datacard
    Public Key Infrastructure (PKI) is a strategic part of the core IT / IOT / 5G backbone, and as new use cases and business requirements change, there’s been a dramatic increase of PKI deployments. As pioneers in PKI for over 25 years, Entrust Datacard has seen this evolution first hand.

    Join Entrust Datacard and (ISC)² on Jul 15, 2020 (Wed) at 10am (GMT +8) as Paul McBride discusses:

    - How PKI and its use cases have evolved over the years
    - Common challenges organizations are facing with their security environments
    - The next-generation of PKI and Certificate Management

    Presenter: Paul McBride, Senior PKI Product Manager, Entrust Datacard
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • The Art of Polymorphic Phishing Attacks – Are You Ready to Respond? Jul 8 2020 6:00 am UTC 60 mins
    Ryan Jones, Principal Sales Engineer, APAC, Cofense
    Leveraging Human Sensors to Detect and Remediate Phishing Attacks in Minutes

    As businesses adjusts to having their employees work from home, they are also working hard to support it. However, new working conditions has opened up new security gaps that challenge the status quo and questions the business’s resiliency to defend against polymorphic phishing attacks. The changing face of phishing emails continuing to evade Secure Email Gateways has threat actors adapting their tactics to exploit businesses who are unprepared.

    Are you ready to accelerate your security practice to respond to these types of attacks?

    Join Cofense security expert Ryan Jones and (ISC)² on Jul 8, 2020 (Wed) at 14:00 (GMT +8) for an in-depth review of the current phishing threat landscape, as seen through the eyes of those on the front line – your end users.

    Highlights will include:
    • Insights into the porous nature of SEGs and the latest tactics and techniques delivering credential phish and malware today
    • How to identify and defend against polymorphic phishing emails within a remote environment
    • Strategies and tools to adopt that will strengthen your security practices and reduce the workload of your SOC teams

    Presenter: Ryan Jones, Principal Sales Engineer, APAC, Cofense
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • CCSPチャレンジセミナー Jul 7 2020 6:00 am UTC 120 mins
    諸角 昌宏, CCSP, (ISC)² 認定講師; 小熊 慶一郎, CISSP, (ISC)² Director of Business Development, Japan
    (ISC)² が認定する、クラウドセキュリティに関する情報セキュリティ国際認定資格、「CCSP」のチャレンジセミナーを開催します。サイバー・情報・クラウドコンピューティングセキュリティの実務経験に基づく専門的能力と、クラウドセキュリティの専門知識を認証することで、企業は、重要な機能に対して適切な専門家が対応していることを確認することができます。「クラウドファースト」を推進する組織において、クラウドサービスやその利用における情報セキュリティを確実にするため、 CCSP有資格者に管理を任せるケースが増加しています。

    今回のセミナーでは 、公式セミナーの模擬講義を(ISC)² 認定講師・諸角昌宏氏に実施していただきます。前回はドメイン4から一部をレクチャーいたしましたが、今回は全ドメインの概要を紹介し、今後の学習に役立てていただく内容とします。

  • A New Norm for Cloud Security Recorded: Jun 30 2020 124 mins
    Leong Kai Seng, Director (SIMS) of IHiS; Dr. Kang Meng Chow, (ISC)² APAC Advisory Council; Max Neo, Snr Lecturer, NUS-ISS
    COVID-19 pandemic altered the way we worked and socialised. The importance of cloud security elevated over this delicate time as most employees are working from home accessing the data stored centrally in the cloud. The usage of cloud provides enterprises with a resilient solution but also brings cloud security into the limelight with the risk and threat associated with it.

    This webinar provides an update of the current cybersecurity landscape, and explore the emerging cybersecurity challenges for cloud security that evolve into a new norm under the current situation.

    Join us in this webinar to gain a greater perspective into cloud security in the light of current and post COVID-19 pandemic era.

    - Dr. Kang Meng Chow, CISSP, (ISC)² APAC Advisory Council Member and Head of Security Assurance, Asia Pacific, AWS
    - Max Neo, CISSP, Senior Lecturer & Consultant, Digital Strategy & Leadership Practice, NUS-ISS
    - Leong Kai Seng, CISSP, Director (Security Implementation & Management Services), IHiS

    3:00pm Welcome Address - Max Neo

    3:10pm Evolving Cybersecurity Threats and Response in the Cloud - Dr. Kang Meng Chow

    In this session, we will discuss some of the cybersecurity threats observed recently, and how we can leverage existing cloud services to better prepare and respond to potential security events.

    3:40pm Cloud Security New Norm - Max Neo

    Sensitive and regulated data such as healthcare or financial data used to be prohibited from being hosted on cloud. Today, with the rapid evolution of cloud deployment and security control, we see all government and commercial entities having some form of cloud deployment in their organisations. In this session, we will explore the new norm and the latest development in cloud security, risk and deployment models.

    4:10pm Cloud Security for Leaders - Leong Kai Seng

    4:40pm Q & A

    5:00pm End
  • 従業員をフィッシング防御の最前線に – あなたのチームは戦う準備はできていますか? Recorded: Jun 24 2020 64 mins
    藤田 平, Principal Engineer, Japan, Cofense

    COVID-19のリスクを軽減するため世界中で外出自粛の要請が行われている中、多くの従業員はリモートワークを余儀なくされ、それを受けて新しい働き方に対しITのインフラにおける準備およびサポートの提供で各企業は大変なことと存じます。しかしながら、企業は外部から自社へのネットワーク接続、特に業務遂行に欠かせないEメールに関しては完全にロックダウンすることはできません。例えば、フィッシングメールは引き続きセキュリティEメールゲートウェイ をすり抜け、攻撃者はこの絶好の機会を悪用し様々な戦術を使用してきます。企業はCOVID-19やリモートワークに関するフィッシングメールの急増によって脅威にさらされているのです。


    セキュリティのエキスパートである藤田 平の話を聞きましょう。彼は最新のフィッシング脅威の状況についての詳細なレビューを提供し、フィッシング防御の最前線での新しい形態である”従業員”の受信トレイやその目を通して知り得た情報をお話しします。

    • セキュリティEメールゲートウェイをすり抜け受信トレイに到達し、クレデンシャルフィッシングやマルウェアを送りつける様々なフィッシング攻撃についての洞察を得ることができます。
    • フィッシングの攻撃者がセキュリティEメールゲートウェイをすり抜ける為にオンラインのビジネス調査やドキュメントの共有プラットフォームなどの信頼できるサービスをどのように活用するのかを知ることができます。
    • 2020年のQ2や下半期に弊社が引き続き注視していく専門家としての予測に関する洞察を得ることができます。

    Presenter: 藤田 平, Principal Engineer, Japan, Cofense
    Moderator: 小熊 慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • An Introduction to Zero Trust Recorded: Jun 24 2020 63 mins
    Mauran Tharmachandirar, Solutions Architect, Infoblox
    A Compelling Cybersecurity Strategy for Defending the Enterprise

    In our increasingly cloud-first world, the idea of a trusted internal network zone and an untrusted external one is now outdated. The truth is, todays cyber-threats often get past perimeter defenses undetected, so you can no longer trust data traffic no matter where it originates.

    That’s where zero trust architectures come in. In this webinar, discover why zero trust approaches are becoming an urgent cybersecurity priority for enterprise and government organizations alike.

    Key takeaways:
    • The security trends fueling the adoption of zero trust architectures
    • The critical role that DNS security plays in successful zero trust implementation
    • The key elements you need to have in place and the next steps for moving forward

    Join Infoblox and (ISC)² on Jun 24, 2020 (Wed) at 13:00 (GMT +8) to learn about zero trust architectures and implementation.

    Presenter: Mauran Tharmachandirar, Solutions Architect, Infoblox
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • CISSP 认证宣讲会 2020 Recorded: Jun 18 2020 76 mins
    徐一, CISSP, (ISC)²授权讲师, (ISC)² 北京分会理事; 方乐, CISSP, 谷安天下资深专家
    网络安全的世界充满挑战,获取 “金牌认证”CISSP,为您职业发展加速!享誉全球的CISSP认证含金量高,颇受行业雇主和专家青睐,多次被SC Magazine评为“最佳职业认证项目”,是信息安全专业人士证明网络安全策略、认知和实践经验的理想之选。

    • 网络安全专业人才的巨大需求;
    • (ISC)² 认证的价值;
    • CISSP认证的全面介绍,包括CISSP概况、持证者福利、考试介绍、知识域、官方培训等;
    • 如何获取CISSP认证;
    • 在线答疑:欢迎提问CISSP认证相关的任何问题。

    讲师: 徐一, CISSP,
    (ISC)²授权讲师, (ISC)²北京分会理事

    讲师:方乐, CISSP
  • クラウドネイティブ時代に必要なセキュリティ Recorded: Jun 17 2020 63 mins
    福田 鉄平, Open Source Engineer, Aqua Security
    Aqua Securityでは、早期からクラウドネイティブへの移行を試みた企業の環境をセキュアにするためのお手伝いを数年に渡って行ってきました。現在では、多くの組織がコンテナ、サーバレス、Kubernetesを利用したクラウドネイティブな環境への移行の第一歩を踏み出そうとしています。本Webinarでは我々の経験に基づき、セキュアなクラウドネイティブ環境を構築するための知見や指針を共有させていただきます。


    • クラウドネイティブ環境に対する脅威概略
    • クラウドネイティブセキュリティについて考える上で重要な観点
    • どのように環境を構築し運用フローを整備すると良いか
    • クラウドネイティブセキュリティの整備に成功するケースと失敗するケースについて

    Presenter: 福田 鉄平, Open Source Engineer, Aqua Security
    Moderator: 小熊 慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • 3rd Party Risk Management: A Practical View of Your Vendor's Cybersecurity Risk Recorded: Jun 17 2020 64 mins
    Kerwin Lu, Consulting Engineer; Terence Cheong, Senior Consulting Engineer, APAC, BitSight Technologies
    As security teams around the world scramble to adjust to a new reality and new challenges, two goals remain at the top of the priority list for third party risk management teams: reduce risk and operate more efficiently.

    Security ratings is a powerful tool in any third-party risk management (TPRM) program’s arsenal, but are you leveraging them the right way?

    Today, a higher standard of security ratings integrates value across your program, helping you reduce risk and find those ever-elusive efficiencies.

    By integrating security ratings into the vendor life cycle and existing operational workflows, it provides the guidance and context needed to support informed decision-making, fuelled by best practices and network intelligence from the industry’s largest community.

    Join BitSight Technologies and (ISC)² on Jun 17, 2020 (Wed) at 10:00 (GMT +8) to understand how you can benefit from using security ratings for TPRM.

    Presenter: Kerwin Lu, Consulting Engineer, BitSight Technologies
    Presenter: Terence Cheong, Senior Consulting Engineer, APAC, BitSight Technologies
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • 解码数字化进程中的Magecart/web盗用攻击 Recorded: Jun 10 2020 58 mins
    刘炅, 大中华区产品市场经理, Akamai Technologies

    • 新冠疫情背景下的互联网数字化生态
    • 网络威胁在新冠时期的转变
    • 增长的web盗用/Magecart攻击威胁和目标行业
    • Magecart攻击方法
    • 防护措施及方案

    参加Akamai Technologies和 (ISC)² 在6月10日下午2:00至3:00的在线研讨会,聆听专家分析Magecart/web盗用攻击,还等什么?赶紧加入我们吧。


    演讲人: 刘炅, 大中华区产品市场经理, Akamai Technologies
    主持人: 吴潇, CISSP, (ISC)²官方授权讲师
  • Introduction to Proactive Prevention Recorded: Jun 10 2020 64 mins
    Eyal Rozen, Director of Sales EMEA & APAC, Morphisec
    Despite continued infosec investments, data breaches continue while companies contend with complicated security architectures composed of disconnected technologies that produce mountains of non-actionable data. A renewed focus on prevention may hold the answer.

    Security architecture can be broken down into three main elements: Prevention, Detection and Remediation. Prevention should be considered the most strategically important defense element, as by default good true time zero prevention dramatically reduces latency, risks and operational costs of the security structure as a whole. As advanced threats evolve and data center transformation forces enterprise teams to consolidate security, the need for faster, easier and more deterministic threat prevention is essential, thus corporations need to consider a purpose-built stack of true prevention capabilities, that isn't available in a singular off-the-shelf solution, and add Detection based tools, which by definition have a huge latency, false alerts and are cost prohibitive, where and when appropriate, but not as a prevention tool.

    Join Morphisec and (ISC)² on Jun 10, 2020 (Wed) at 12pm (GMT +8) to learn about the strategic element in your security stack.

    Presenter: Eyal Rozen, Director of Sales EMEA & APAC, Morphisec
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • これからのPKIマーケット~証明書ライフサイクル管理という考え方~ Recorded: Jun 3 2020 62 mins
    佐藤 公理, CISSP, シニアテクニカルセールスコンサルタント, エントラストジャパン株式会社


    Presenter: 佐藤 公理, CISSP, シニアテクニカルセールスコンサルタント, エントラストジャパン株式会社
    Moderator: 小熊 慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • Don’t Get Stung by #OWASP Top 10! Recorded: Jun 3 2020 64 mins
    Shain Singh, Security Solution Architect, APCJ, F5 Networks; Shahnawaz Backer, Principal Security Advisor, F5 Labs
    F5 Labs reports detail that web-based attacks have grown from 2,323 in 2017 to over 20,600 in 2019. The exponential growth of applications has led to a significant increase in the rate of public disclosure of breaches. Traditional methods for security controls are lagging behind the need to deploy production-ready apps for continuous deployment.

    Join F5 Networks and (ISC)² on Jun 3, 2020 (Wed) at 14:00 (GMT +8), we will dive into real-live attacks where common vulnerabilities have been exploited and discuss how we can learn from these to provide countermeasures at the speed of DevOps.

    Presenter: Shain Singh, Security Solution Architect, APCJ, F5 Networks
    Presenter: Shahnawaz Backer, Principal Security Advisor, F5 Labs, F5 Networks
    Moderator: Tony Vizza, CISSP, CCSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • SSCPオンラインチャレンジセミナー Recorded: May 28 2020 123 mins
    小熊慶一郎, CISSP, (ISC)² Director of Business Development, Japan & 安田良明, CISSP, SSCP, (ISC)² 認定講師
    CISO や CSIRT の設置により、情報セキュリティ体制を強化している組織が増えてきている中、情報セキュリティやリスクマネジメントを実践しているが情報セキュリティが一向に向上しないのはなぜだろうか、現場の情報システム・情報セキュリティ実務者を育成しているが、情報セキュリティの運用がうまくいかないのはなぜだろうかなど課題を抱えている組織が多いのが現状です。





    Speaker: 小熊慶一郎, CISSP, (ISC)² Director of Business Development, Japan
    Instructor: 安田良明, CISSP, SSCP, (ISC)² 認定講師
  • 无惧前行-新数字经济场景下的特权访问管理 Recorded: May 27 2020 61 mins
    路军龙 (Sam), CISSP, CCSP, 解决方案架构师, CyberArk
    随着客户需求不断变化,企业数字化转型正当时: 云优先策略,持续集成、持续交付的DevOps理念逐渐被采用:

    - 拥抱新技术的同时企业面临的技术风险是什么?
    - 为什么特权访问管理变得越来越重要 ?
    - 如何使用特权账号安全方案避免风险?
    - 如何消除传统应用和容器化应用内嵌特权账号,避免滥用特权账号带来的重大安全隐患,保障业务不停顿运行?
    - 与时俱进的解决方案、解除第三方软件开发商远程特权会话安全接入风险的长久之道

    参加 CyberArk 和 (ISC)² 在5月27日上午11:00的在线研讨会《无惧前行-新数字经济场景下的特权访问管理》,通过“像攻击者一样思考”,您将了解到如何快速化解企业的特权账号安全和风险管理挑战,从而积极主动地防御外部恶意攻击并增强合规性。

    演讲人: 路军龙 (Sam), CISSP, CCSP, 解决方案架构师, CyberArk
    主持人: 阎光, CISSP, (ISC)² 上海分会会员主席

  • 코로나 19 시기에 원격 접속과 비즈니스 보안 Recorded: May 27 2020 53 mins
    강 민 석, 기술 이사, 네스랩 (비욘드트러스트(BeyondTrust) 공식 배급사)
    코로나 19의 전 세계적 유행이 사이버 범죄를 급증시키고 있는 것은 그리 놀라운 일은 아닐 것입니다. 공격자들은 사람들의 공포를 이용하여 비즈니스 정보와 개인 정보를 노립니다.

    이러한 위기의 시기에 제일 먼저 선행해야 할 과제는 올바른 보안의 강화일 것입니다. 아시아 태평양 지역의 많은 직원들이 재택 근무를 해야 하는 상황이 되면서 회사, 대학 그리고 정부 기관들은 새로운 원격 근무 정책을 수립해야 합니다.

    하지만 원격근무를 확대함에 따라 보안 위협도 증가하며, 특별히 IT와 지원 인력들이 임시적으로 보안 상 안전하지 않은 원격 접속 툴들을 사용하고 있습니다.

    BeyondTrust와 (ISC)²가 2020년 5월 27일 오전 10시 (한국 시각)에 준비한 특별한 웨비나에 참석하십시오.
    - 원격 근무 확장에 따른 위협들과 고려해야 할 보안 요소들
    - 원격 접속 툴들의 취약점 및 위협 요소들 (개인 디바이스 및 관리 되지 않은 솔루션들)
    - 장기적으로 원격 근무를 지원하기 위해 강력한 보안 정책을 확장하기 위한, 그리고 빠르게 구축하기 위한 올바른 정책 가이드
    - 기술 시연: 성공적인 보안이 전제된 원격 접속 정책을 위한 실 사용 예

    발표자: 강 민 석, 기술 이사, 네스랩 (비욘드트러스트(BeyondTrust) 공식 배급사)
    진행자: 박 선 영, Senior Business Development Manager, APAC, (ISC)²
  • 情報セキュリティプロフェッショナル認定資格「CISSP」のご紹介 Recorded: May 22 2020 47 mins
    小熊慶一郎, CISSP, (ISC)² Director of Business Development, Japan
    CISSPは(ISC)²が認定を行っている国際的に認められた情報セキュリティ・プロフェッショナル認定資格です。情報セキュリティの共通言語とも言える『(ISC)² CISSP CBK』を理解している情報セキュリティ・プロフェッショナルのみに与えられる資格で、CISSPの取得は、国内外において、個人および所属組織の信用・信頼の獲得につながります。Webinarでは、このCISSPについてわかりやすく説明します。
  • Securing Your Business in the COVID-19 Era of Remote Working Recorded: May 20 2020 63 mins
    Perry Chu, Regional Senior Solutions Consultant, BeyondTrust
    So, your workforce has gone remote. Now what?

    The COVID-19 pandemic has led to a surge in cybercrime, but this is no surprise. Attackers use people’s fears to prey on businesses and individuals.

    In times of crisis, good security practices are often the first thing to go. As employees across Asia Pacific and ANZ are being asked to work from home, companies, universities and government organisations are being forced to implement new remote working policies. However, an expanding remote workforce can increase your security risk, especially if IT and Support employees use non-secure remote access tools as temporary measures.

    Join this special webinar with BeyondTrust and (ISC)² on May 20, 2020 (Wed) at 10:00 (GMT +8) to learn:
    - Risks and security considerations related to an extended remote workforce
    - The vulnerability risks posed by remote working tools, like BYOD and free Shadow IT solutions
    - Practical guide on how to quickly implement and scale strong security protocols to enable long-term remote work
    - Technology Demonstration: Key Use Cases for a successful Secure Remote Access strategy

    Presenter: Perry Chu, Regional Senior Solutions Consultant, BeyondTrust
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
Live Webinars for InfoSec Professionals in Asia Pacific Time Zone
Looking for expertise and information to advance your career and tackle your challenges? Subscribe and join us for the educational webinars in APAC time zone. Earn CPEs quickly and at no cost by attending webinars: 1 hour of webinar equals 1 CPE. We welcome members and non members alike.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Nuix Black Report: Find Out What Hackers are Really Thinking
  • Live at: Mar 1 2017 5:00 am
  • Presented by: Christopher Pogue, Chief Information Security Officer, Nuix
  • From:
Your email has been sent.
or close