Hi [[ session.user.profile.firstName ]]

Beyond Shadow IT: How Leading Organisations Protect Sensitive Cloud Data

As more organisations deploy cloud apps like Office 365, AWS, and Slack securing corporate data becomes a challenge. While Cloud Access Security Brokers (CASBs) were originally used solely for shadow IT discovery, they have since emerged as the go-to solution for organisations that need end-to-end data security, from cloud to device. In fact, Gartner believes that by 2022, 60% of large enterprises will use a CASB to govern some cloud services.

In this webinar, we'll explore:
• Critical gaps in cloud applications that must be filled
• Four sets of capabilities required for cybersecurity in the cloud
• How CASBs provide specialized security that goes beyond native cloud app functionality like that of Office 365
• Case studies on how leading enterprises leverage CASB to secure their cloud footprint.

Join Bitglass and (ISC)² on Apr 17, 2019 (Wed) at 11:00 (GMT +8) to learn how a CASB can help you meet your security and compliance requirements.

Presenter: Richard Campagna, CMO & VP of Products, Bitglass
Presenter: Brendon Thwaites, Director, Channels & Alliances APJ, Bitglass
Moderator: Chuan-Wei Hoo, CISSP, Technical Advisor, Asia-Pacific, (ISC)²
Recorded Apr 17 2019 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Richard Campagna, CMO & VP of Products, Bitglass; Brendon Thwaites, Director, Channels & Alliances APJ, Bitglass
Presentation preview: Beyond Shadow IT:  How Leading Organisations Protect Sensitive Cloud Data

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Let's Fix the Internet Routing Security Problem Aug 7 2019 6:00 am UTC 60 mins
    Aftab Siddiqui, Internet Technology Manager in Asia Pacific Regional Bureau, Internet Society
    Internet routing failures happen every day. The most recent high-profile incident involved Verizon, causing outages at Cloudflare, Facebook, Amazon, among others, for nearly three hours in June. A few weeks prior, another routing failure, this time by China Telecom, lasted two hours and caused massive disruption in Europe. There is a clear need for network operators and the wider security community to improve routing security - the backbone of the Internet.

    In this webinar, we will explain why network operators should consider the Mutually Agreed Norms for Routing Security (MANRS), a community-driven global initiative that prevents such glitches by taking on security as a shared responsibility among networks. This webinar will give a technical overview of the related challenges and risks, and show the impact of recent incidents, followed by the four actions operators can adopt.

    Join Internet Society and (ISC)² on Aug 7, 2019 (Wed) at 14:00 (GMT +8) to learn about internet routing security.

    Presenter: Aftab Siddiqui, Internet Technology Manager in Asia Pacific Regional Bureau, Internet Society
    Moderator: S.C. Leung, Member, (ISC)² Board of Directors
  • SSLO - 重塑数据中心安全架构 Recorded: Jul 17 2019 62 mins
    朱超, F5 方案顾问, F5 Networks
    面对全站SSL的发展趋势,如何重塑数据中心的安全架构,去轻松应对愈演愈烈的网络攻击?如何降低传统安全架构所带来的运维复杂性?如何设计灵捷方便,适合未来发展趋势的安全架构?

    参加F5 Networks和 (ISC)² 在7月17日下午2:00至3:00的在线研讨会,此次演讲将为您带来对这些问题的解答,敬请期待!

    演讲人: 朱超, F5 方案顾问, F5 Networks
    主持人: 平静, CISSP, (ISC)² 西南分会会员主席

    *本次在线研讨会将以普通话进行
  • Don’t Call Me AI Recorded: Jul 3 2019 62 mins
    Justin Peters, Senior Director for Sales Engineering and Professional Services, APAC, Deep Instinct
    Machine learning, deep learning and neural networks are all huge buzzwords dominating any conversation about artificial intelligence, causing confusion in the AI domain. For this reason, there is a growing need to understand the key differentiators between deep learning and machine learning.

    As cyber-attacks become more and more sophisticated, and the problem of unknown malware keep increasing, there is a growing need for real-time prevention and this can be achieved by applying AI to cybersecurity.

    Our session will cover:
    • The different defense technologies used over time
    • How different attacks vectors influenced this evolution
    • How the industry adopted different approaches over time
    • Why the prevention approach has returned and why it matters

    Join Deep Instinct and (ISC)² on Jul 3, 2019 (Wed) at 13:00 (GMT +8) to learn about cybersecurity in the AI domain.

    Presenter: Justin Peters, Senior Director for Sales Engineering and Professional Services, APAC, Deep Instinct
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • 2019互联网安全状况报告 Recorded: Jun 26 2019 61 mins
    周德振, 技术顾问, Akamai Technologies; 郑伟, 大中华区产品市场部经理, Akamai Technologies
    每隔一段时间,Akamai 都会根据 Akamai 智能边缘平台收集的数据进行分析并发布《互联网现状》报告,借此提供有关云安全和 Web 性能形势的专家见解,帮助用户识别风险,发现原本被忽略的问题。

    • 《互联网现状/安全性》报告的最新版,第5卷第2期新鲜出炉,本次报告重点关注了针对零售行业和 API 流量所进行的攻击与最新趋势。

    • 根据《互联网安全状况报告:撞库:攻击与经济--特别媒体报告》的发现,2018年出现的三次最大规模的撞库攻击均针对流媒体服务,规模介于1.33亿次到2亿次攻击尝试。这表明黑客对在线流媒体服务的高知名度和价值非常感兴趣。

    参加Akamai Technologies和 (ISC)² 在6月26日下午2:00至3:00的在线研讨会,聆听专家分析互联网的安全状况,还等什么?赶紧加入我们吧。

    演讲人: 周德振, 技术顾问, Akamai Technologies
    演讲人: 郑伟, 大中华区产品市场部经理, Akamai Technologies
    主持人: 阎光, CISSP, (ISC)² 上海分会会员主席

    *本次在线研讨会将以普通话进行
  • 悪質なボットへの適切な対策とは Recorded: Jun 19 2019 55 mins
    Yukio Ito, CISSP, Solution Architect, F5 Networks
    悪意のあるボットを識別し、それらから防御することは、持続可能なセキュリティ戦略を策定する組織にとって最優先事項です。

    このウェビナーでは以下のことを学ぶことができます:
    • ボットはどのようにしてアプリケーションに感染、伝播、攻撃するのか
    • ボットによって実行されるアプリケーション攻撃の種類
    • 有益なボットを破壊することなく、悪意のあるボットを防御する手法

    Presenter: Yukio Ito, CISSP, Solution Architect, F5 Networks
    Moderator: 小熊慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • How Big of a Concern are Exploit Kits, Really? Recorded: Jun 19 2019 63 mins
    Christopher Covert, Principal Research Strategist, Tenable
    In 2019 Tenable Research took a look at available data on the vulnerabilities in use by Exploit Kits and the data Tenable possesses on the actual prevalence and viability of those exploits in the typical deployment. The resulting data yielded some interesting and surprising results that we will share and discuss in this webinar.

    Here are some key takeaways from the webinar:
    • Learn the role that exploit kits play in today's cybercrime attacks and where you are likely exposed
    • Discover how focusing on closing out a small number of vulnerabilities across machines to close the most commonly attacked surfaces
    • Learn about analytical tools that are available to help you with reducing vulnerability overloads.

    Join Tenable and (ISC)² on Jun 19, 2019 (Wed) at 14:00 (GMT +8) to learn about the concerns of Exploit Kits.

    Presenter: Christopher Covert, Principal Research Strategist, Tenable
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • ID 인지 프록시 (Identity Aware Proxies) – 액세스 거부에 대한 정확한 이해 Recorded: Jun 12 2019 58 mins
    이 계 경, Senior Technical Account Manager, Akamai Technologies; 김 채 하, Solutions Engineer, Akamai Technologies
    이전 웨비나에서는 기업을 내부 및 외부로 보호하는 데에 사용자 ID가 얼마나 핵심적인 역할을 하는 지에대해 언급했습니다. 이번 웨비나에서는 다양한 고객 피드백을 바탕으로 다음과 같은 기술 내용을 심도 있게 다룰 예정입니다.

    • 퍼블릭 애플리케이션을 메이지카트(Magecart) 신용카드 탈취 등 악성 자바 스크립트 스키머 코드로부터 보호하는 방법에 대해 설명합니다. 공격자들이 사용하는 일반적인 공격 기법과 기업이 공격자들로부터 웹사이트와 자사의 고객을 보호할 수 있는 방법을 소개합니다.

    • 기업 보안의 경계를 개선하고, 외부의 공격면을 최소화하여 공격 가능성을 줄일 수 있는 방법을 다룹니다. 이전 웨비나에 이어 ID 인지 프록시(Identity Aware Proxies)에 대해 심도 있게 다루고, 아키텍처 개선을 통해 기업 보안 체계를 더욱 체계화하는 방법을 살펴봅니다.

    발표자: 이 계 경, Senior Technical Account Manager, Akamai Technologies
    발표자: 김 채 하, Solutions Engineer, Akamai Technologies
    진행자: 박 선 영, Senior Business Development Manager, APAC, (ISC)²
  • 2019 CISSP 认证宣讲会 Recorded: Jun 11 2019 63 mins
    袁晓峰, CISSP, (ISC)²授权讲师; 方乐, CISSP, 谷安天下资深专家
    追求卓越,持续发展,是每个有志之士不懈的坚持。进入2019,行业对网络安全技能和人才的重视和需求愈加凸显。抓住机遇,自我升值,让网络安全“金牌认证”为您和您的职业发展加速!

    CISSP认证是信息安全专业人士证明网络安全策略、认知和实践经验的理想之选。它表明您拥有设计、开发和管理一个组织整体安全态势的高级知识和技能。

    通过这次会议,您将了解到:
    • 行业对网络安全专业人才的需求CISSP认证的,考试,知识域,以及持证者的职业优势;
    • CISSP认证的全面介绍,包括工作经验要求、考试介绍、持证者福利、知识域、培训等各个方面;
    • 资深专家对CISSP知识域的讲解及分析;
    • CISSP培训的详细介绍;
    • 与CISSP认证相关的问题答疑

    参会人员还将有机会获得独家福利!
  • Real Phish Remain the Real Problem Recorded: Jun 5 2019 64 mins
    Ryan Jones, Principal Sales Engineer, APAC, Cofense; David Mount – Senior Director, Product Marketing, Cofense
    Despite investment in next-gen technologies and employee awareness training, phishing threats continue to become more sophisticated and more effective. It’s time for organisations to accept that REAL phish are the REAL problem. Join the Cofense Phishing Threat Landscape review to discover the trends defining phishing in 2019 and priorities for defending your organisation going forward.

    Attend this webinar to learn how attackers are:
    • Using major malware types and their innovative tactics, techniques, and procedures
    • Intensifying credential theft as organizations move infrastructure and applications to the cloud
    • Evolving Emotet and the threat actors behind the botnet
    • Increasing proliferation of sextortion phishing emails

    Join Cofense and (ISC)² on Jun 5, 2019 (Wed) at 14:00 (GMT +8) to examine the obvious changes in the phishing threat landscape, plus look ahead at trends shaping 2019. Register now!

    Presenter: Ryan Jones, Principal Sales Engineer, APAC, Cofense
    Presenter: David Mount – Senior Director, Product Marketing, Cofense
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • 사이버 보안의 최근 동향에 대한 집중 분석과 이에 대한 대응 전략 및 사례 Recorded: Jun 3 2019 62 mins
    황 민 주, Cyber Security Solution Specialist, Microsoft Korea
    최근 기업의 Infrastructure가 Cloud 영역으로 확장이 되고 있습니다. 따라서 Legacy 보안을 포함한 클라우드 보안 영역까지 어떻게 관리할 것인가가 기업들의 고민입니다. 이에 대한 방안으로 RSA Conference에서는 Zero Trust와 SOAR (security Operation Automation and Response) 를 이야기 했습니다. SOAR는 결국 차세대 SOC(Security Operation Center)에 대한 이야기입니다. 이번 웨비나를 통해서 사이버 보안의 최근 동향과 함께 이에 대한 대응 전략 및 사례를 소개해 드리고자 합니다.

    발표자: 황 민 주, Cyber Security Solution Specialist, Microsoft Korea
    진행자: 박 선 영, Senior Business Development Manager, APAC, (ISC)²
  • アプリのアクセスを制御!クラウドベースの「ID認識型プロキシ」の仕組み Recorded: May 22 2019 60 mins
    中西 一博, プロダクト・マーケティング・マネージャー, Akamai Technologies; 金子 春信, シニア・プロダクト・マーケティング・マネージャー, Akamai Technologies
    前回は、組織内外を防御するセキュリティプランを策定する際の、アイデンティティの重要性について取り上げました。いただいたリクエストをもとに、今回のウェビナーでは、次のトピックについて技術面からさらに詳しく解説します。

    • クレジットカード情報を盗む Magecart などの悪意のある JavaScript スキマーコードから、公開されているアプリケーションを保護する方法。攻撃者が使用する一般的なベクトルと、組織がウェブサイトや顧客を保護する方法について解説します。

    • 企業のクラウドセキュリティを強化し、アタックサーフェス(攻撃の対象となり得る領域)を減らして、被害の可能性を最小限にする方法。以前のウェビナーでも扱ったID認識型プロキシについてさらに深く掘り下げて、その仕組みをセキュリティ対策強化に役立てる方法を解説します。

    Presenter: 中西 一博, プロダクト・マーケティング・マネージャー, Akamai Technologies
    Presenter: 金子 春信, CISSP, シニア・プロダクト・マーケティング・マネージャー, Akamai Technologies
    Moderator: 小熊慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • Defining Security Posture in a Zero Trust World Recorded: May 22 2019 63 mins
    Nick Hawkins, Senior Director, Product Management, Enterprise; Johnny Yeo, Senior Enterprise Security Architect, Akamai
    It is generally agreed that there are three key pillars of a zero trust approach - Access, Identity and Posture. In previous webinars we have explored how an identity driven approach can be used with a cloud proxy to better secure access to internal applications. In the first part of this webinar we will dive deeper into the third pillar – posture- understand what it means to a user and their devices and see how it can be integrated into a zero trust architecture. The second part will look at the mitigation aspect of posture. We’ll cover the API attack trends – how attacks are moving from web into API with the explosive growth of apps – and the lifecycle of credential fraud.

    Join Akamai Technologies and (ISC)² on May 22 to learn how to define security posture in a zero trust world.

    Presenter: Nick Hawkins, Senior Director, Product Management, Enterprise, Akamai Technologies
    Presenter: Johnny Yeo, Senior Enterprise Security Architect, Akamai Technologies
    Moderator: Kawin Boonyapredee, CISSP, Executive Security Advisor, IBM Security
  • A Day in the Life - Tips and Best Practices from 3 CISSPs Recorded: May 21 2019 60 mins
    James Packer, CISSP, London; Chuan-Wei Hoo, CISSP, Singapore; James R. McQuiggan, CISSP, United States; B. Dunlap (Moderator)
    More than 130,000 information security professionals have invested time, determination and resources to attain the CISSP certification. Join (ISC)² members from different regions on May 21, 2019 at 10:00AM Eastern as we discuss what pain points, issues and challenges they encounter in their day-to-day work life, as well as solutions, tips and best practices they have developed along the way. We’ll also examine how the CISSP certification has helped them with their job and career.
  • Beyond Shadow IT: How Leading Organisations Protect Sensitive Cloud Data Recorded: Apr 17 2019 62 mins
    Richard Campagna, CMO & VP of Products, Bitglass; Brendon Thwaites, Director, Channels & Alliances APJ, Bitglass
    As more organisations deploy cloud apps like Office 365, AWS, and Slack securing corporate data becomes a challenge. While Cloud Access Security Brokers (CASBs) were originally used solely for shadow IT discovery, they have since emerged as the go-to solution for organisations that need end-to-end data security, from cloud to device. In fact, Gartner believes that by 2022, 60% of large enterprises will use a CASB to govern some cloud services.

    In this webinar, we'll explore:
    • Critical gaps in cloud applications that must be filled
    • Four sets of capabilities required for cybersecurity in the cloud
    • How CASBs provide specialized security that goes beyond native cloud app functionality like that of Office 365
    • Case studies on how leading enterprises leverage CASB to secure their cloud footprint.

    Join Bitglass and (ISC)² on Apr 17, 2019 (Wed) at 11:00 (GMT +8) to learn how a CASB can help you meet your security and compliance requirements.

    Presenter: Richard Campagna, CMO & VP of Products, Bitglass
    Presenter: Brendon Thwaites, Director, Channels & Alliances APJ, Bitglass
    Moderator: Chuan-Wei Hoo, CISSP, Technical Advisor, Asia-Pacific, (ISC)²
  • DevSecOps – Web Application Firewall in a CI/CD Workflow (以粵語進行) Recorded: Apr 10 2019 61 mins
    Clive Chan, Senior Consultant, F5 Networks
    IT automation and orchestration, the key enabler of digitization is the number one IT initiate globally according to our state of application services report 2019. In addition, Zero Trust and Security-By-Design are key imperatives of organizations pursuing digital transformation as these organizations accelerate adoption of cloud technologies to gain speed, scale and accessibility to innovative technologies like AI and blockchains.

    In this webinar, we will look at the changing landscape of DevOps. We will explore the practice of scaling application security, controlling vulnerabilities and controlling advanced threats with the web application firewall in CI/CD environments. We will also take a look at how the technologies enable close collaboration between security teams and development teams on securing APPs without requiring application teams having in-depth knowledge of security.

    Join F5 Networks and (ISC)² on Apr 10, 2019 (Wed) at 15:00 (Hong Kong time) to learn about web application firewall in a CI/CD workflow.

    Presenter: Clive Chan, Senior Consultant, F5 Networks
    Moderator: Otto Lee, CISSP, CSSLP, Membership Chair, (ISC)² Hong Kong Chapter

    *This webinar will be conducted in Cantonese. (本次網上研討會將以粵語進行。)
  • (ISC)² Info Session: Get to know the CISSP Concentrations (ISSAP/ISSEP/ISSMP) Recorded: Apr 9 2019 62 mins
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)²
    Go beyond the CISSP and challenge yourself with a CISSP Concentration! Challenge yourself with a CISSP Concentration! These specialized credentials build upon the CISSP. Whether you’re interested in career growth, deeper knowledge or achieving elite status, CISSP Concentrations prove your subject matter mastery.

    Got questions on the certifications? We have the answers.

    In this info-session, you will learn:

    - How large is the cybersecurity workforce gap today
    - Why you should pursue CISSP concentrations – ISSAP/ISSEP/ISSMP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Are you ready to prove yourself? Register and begin your journey today!

    NOTE: This info-session is meant for CISSP credential holders only. Join this info-session and earn 1 CPE.
    ________________________________________________________________________

    CISSP Concentrations:

    • Information Systems Security Architecture Professional (ISSAP)
    This certification proves your expertise developing, designing and analyzing security solutions. It also shows you excel at giving risk-based guidance to senior management in order to meet organizational goals.

    • Information Systems Security Engineering Professional (ISSEP)
    This certification recognizes your keen ability to practically apply systems engineering principles and processes to develop secure systems. You have the knowledge and skills to incorporate security into projects, applications, business processes and all information systems.

    • Information Systems Security Management Professional (ISSMP)
    This certification shows you excel at establishing, presenting and governing information security programs. You also demonstrate deep management and leadership skills whether you’re leading incident handling and/or a breach mitigation team.
  • Fight the Good Fight Against the Bad Bots Recorded: Apr 3 2019 61 mins
    Shahnawaz Backer, Security Specialist, APAC, F5 Networks
    Identifying malicious bots and safeguarding against them is a top priority for organisations developing a sustainable security strategy.

    Attend this webinar to learn:
    • How bots infect, propagate, and attack applications
    • What types of application attacks are commonly performed by bots
    • How you can defend against bad bots without disrupting the good ones

    Join F5 Networks and (ISC)² on Apr 3, 2019 (Wed) at 14:00 (GMT +8) to learn how to fight against the malicious bots.

    Presenter: Shahnawaz Backer, Security Specialist, APAC, F5 Networks
    Moderator: Chuan-Wei Hoo, CISSP, Technical Advisor, Asia-Pacific, (ISC)²
  • 사용자 ID 기반의 보안 방식 Recorded: Mar 27 2019 63 mins
    한 준 형, Technical Account Manager, TSG-KR Media, Akamai Technologies; 김 현 도, Senior Solution Engineer, Akamai Technologies
    사용자 ID는 보안 및 생산성과 관련되어 있는 기업 보안의 핵심 요소입니다. 이 웨비나에서는 기업을 내부 및 외부적으로 보호하려면 ID를 어떻게 관리해야 하는지에 대해 중점적으로 다룰 예정입니다.

    • 이전에는 제로 트러스트 아키텍처의 개념에 대해 살펴봤습니다. 제로 트러스트 네트워크를 구축하는 많은 방법 중의 하나는 바로 IAP(Identity Aware Proxy)입니다. 웨비나의 전반부에는 네트워크가 아닌 애플리케이션 레이어에서 ID와 접속 룰을 적용하고 최소 접속 권한을 제공하는 IAP의 모범 사례에 대해 중점적으로 알아봅니다.

    • 후반부에는 아시아∙태평양∙일본 지역에서 증가하고 있는 크리덴셜 스터핑 활동에 대해 설명합니다. 크리덴셜 스터핑의 근본 원인, 경제적 손실, 공격자들이 사용하는 방법, 봇넷을 통한 자동화에 대해 중점적으로 살펴봅니다. 또한 봇넷 리스크를 성공적으로 차단하기 위해 여러 분야의 기업들이 도입한 솔루션에 대해 소개하는 사례 연구도 언급할 예정입니다.

    발표자: 한 준 형, Technical Account Manager, TSG-KR Media, Akamai Technologies
    발표자: 김 현 도, Senior Solution Engineer, Akamai Technologies
    진행자: 박 선 영, Senior Business Development Manager, APAC, (ISC)²
  • IDを使用して組織の内と外を防御する Recorded: Mar 20 2019 62 mins
    中西 一博, プロダクト・マーケティング・マネージャー, Akamai Technologies; 金子 春信, CISSP, シニア・プロダクト・マーケティング・マネージャー; Akamai Technologies
    ID は、セキュリティと生産性を両立するようなセキュリティプランを立てるための重要な要素です。このウェビナーでは、ID 管理による組織内外の防御について考察します。

    • ゼロトラスト・アーキテクチャの考え方についてはすでに取り上げてきましたが、ゼロトラスト・ネットワークを設計する際に利用できるオプションはたくさんあります。その 1 つが Identity Aware Proxy(IAP)です。 このウェビナーの前半では、IAP を実装する際のベストプラクティスを説明します。IAP を使用することで、ネットワークレイヤーではなくアプリケーションレイヤーで ID とアクセスルールを適用し、必要最小限のアクセス権の原則に基づいて確実にアクセスを制御します。

    • 後半では、アジア太平洋および日本における Credential Stuffing (ボットによる不正ログイン)犯罪の増加について取り上げます。このセッションでは、Credential Stuffing が生じる原因、攻撃による経済的損失、攻撃者が利用する手法、ボットによる自動化などについて解説します。また、ボットがもたらすリスクの緩和について、さまざまな業界での成功事例も紹介します。

    Presenter: 中西 一博, プロダクト・マーケティング・マネージャー, Akamai Technologies
    Presenter: 金子 春信, CISSP, シニア・プロダクト・マーケティング・マネージャー, Akamai Technologies
    Moderator:小熊慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • Best Practices in Securing DNS Recorded: Mar 20 2019 63 mins
    Rio Sibuea, Sr. Pre-Sales Systems Engineer, Infoblox
    NGFWs, IDS, sandboxes, DLP, etc are important - but increasingly, DNS is a major security weakness, allowing hackers to exfiltrate & infiltrate confidential data. This is a known issue because DNS was initially designed very simple and this attracts hackers to abuse the protocol. How do we protect our internal data and prevent hacker attacking the service?

    Join Infoblox and (ISC)² on Mar 20, 2019 (Wed) at 14:00 (GMT +8) to learn the best practices in securing DNS.

    Presenter: Rio Sibuea, Sr. Pre-Sales Systems Engineer, Infoblox
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
Live Webinars for InfoSec Professionals in Asia Pacific Time Zone
Looking for expertise and information to advance your career and tackle your challenges? Subscribe and join us for the educational webinars in APAC time zone. Earn CPEs quickly and at no cost by attending webinars: 1 hour of webinar equals 1 CPE. We welcome members and non members alike.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Beyond Shadow IT: How Leading Organisations Protect Sensitive Cloud Data
  • Live at: Apr 17 2019 3:00 am
  • Presented by: Richard Campagna, CMO & VP of Products, Bitglass; Brendon Thwaites, Director, Channels & Alliances APJ, Bitglass
  • From:
Your email has been sent.
or close