Hi [[ session.user.profile.firstName ]]

Prove Your Cyber Strategy Works with Security Ratings!

Measuring cybersecurity program performance is critical, but often times is clouded in ambiguity and low confidence results. Yet, it has never been more important for executives and board members to understand the performance of their organization’s cybersecurity programs, and treat cybersecurity like any other business risks. Reports with quantitative metrics and comparisons, as well as developing a more strategic approach to cyber risk are no longer nice to have — these are required.

This session Is ideal for infosec personnel with minimal exposure to security ratings. It will cover how cybersecurity and risk professionals can take a more quantitative approach to measuring their security program performance, and how others have benefitted from this approach to reduce cyber risk.

HR, marketing, legal, procurement and senior management will also find this session informative as it shows you how you can easily understand the effectiveness of your cybersecurity posture without being a geek.

Join BitSight Technologies and (ISC)² on Mar 18, 2020 (Wed) at 11:00 (GMT +8) to learn about security ratings.

Presenter: Terence Cheong, Senior Consulting Engineer, BitSight Technologies
Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
Recorded Mar 18 2020 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Terence Cheong, Senior Consulting Engineer, BitSight Technologies
Presentation preview: Prove Your Cyber Strategy Works with Security Ratings!

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Dissecting Client-Side Attack Techniques and Protections Aug 25 2021 5:00 am UTC 60 mins
    Ajay Mishra, Director, Security Technology & Strategy, APJ; Tim Wong, Sr Solutions Engineer, Akamai Technologies
    Hackers are leveraging client-side attack techniques, also known as man-in-the-browser (MITB) attacks, to intercept and control client browsers, exfiltrate data, and disrupt the end-user experience.

    In this talk, featuring a live hacking demo, we will analyse several sophisticated client-side attack techniques that hackers are using to achieve maximum return on investment.

    Protecting these attacks can be difficult; we will discuss several best practices that organisations can use to protect their end-users and data against these attacks.


    Presenter: Ajay Mishra, Director, Security Technology and Strategy, APJ, Akamai Technologies
    Presenter: Tim Wong, Senior Solutions Engineer, Akamai Technologies
    Moderator: Garion Kong, CISSP, CCSP, Vice President, (ISC)2 Singapore Chapter
  • SIEMを本当に使える武器へ!SecOpsの課題解決へ Aug 18 2021 7:00 am UTC 60 mins
    日原 茂, シニアセールスエンジニア, Exabeam
    リモートワーク、ゼロトラストの登場で境界が消滅し、攻撃者は喜んでいます。データ、ユーザー、ビジネスとあらゆる分野で分散化が進みました。オフィスやデータセンターに縛られた従来の働き方へのイノベーションにとってこれは朗報ですが、セキュリティの観点では攻撃可能な領域の拡大、内部の脅威、膨大な数のアラート、誤検知といった新たな課題を抱えることになります。
    このようにサイバーセキュリティへの監視すべき場所や手法は絶え間なく変化しています。ところが戦略は従来のままで、旧式のツールや手法が正とした考えが根強く残っています。守る側は変化しきれず不利な形勢にあるのです。

    サイバー攻撃による企業への侵害は連日ニュースで報道され、攻撃手法はWindowsの標準機能・ツールの悪用、クラウドサービスの悪用、認証情報の侵害など単体のアクティビティでは攻撃と判断が難しい手法を使って、正当な活動を装いセキュリティ製品の守りを迂回しながら攻撃を仕掛けます。

    SecOps(セキュリティチーム)は、こうした攻撃から保護をするために、正常行動と異常行動を正確に区別し、注意を要するユーザー、アセットとイベントを早急に特定し、セキュリティインシデントに至る出来事の時系列と相関関係をすばやく作成しなければなりません。

    Exabeamがその解決策を解説します。SecOpsのメンバーが疲弊しない、企業の中にいる属人的なL3エンジニアのxxxさんに依存せずとも一定レベルの分析・運用が可能な連続性・再現可能な自動化ワークフローを作り出し、セキュリティアナリストは現在頻発している先進的な脅威からユーザーを保護する事ができるのです。

    Presenter: 日原 茂, シニアセールスエンジニア, Exabeam
    Moderator: 小熊 慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • Ransomware Attacks on the Rise - What You Need to Know Aug 11 2021 3:00 am UTC 60 mins
    Adrian Covich, Snr Director Technical Sales, APJ, Proofpoint
    Ransomware is one of today’s most disruptive forms of cyber attacks, putting victims out of business, forcing hospitals to turn away patients, and bringing entire city governments and municipalities to a standstill. Last year alone, the US experienced more than 65,000 ransomware attacks. Not only is it a top concern for CISOs, it has become a national security issue.

    Join us as we discuss:
    • Why ransomware remains a top cybersecurity threat
    • What ransomware trends Proofpoint Threat Research is observing across the globe
    • The three key ways ransomware threat actors get into your organisation, and how to stop them


    Presenter: Adrian Covich, Snr Director Technical Sales, APJ, Proofpoint
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • Simplify kill chain analysis with Autonomous Detection & Response Jul 28 2021 6:00 am UTC 60 mins
    Serge Woon, CISSP, Technical Director, APJ, Co-Founder, ReaQta
    Cyber threats are evolving daily. Attack techniques are advancing rapidly. Threat actors today are more skilled than ever. How can organizations keep up? Against the backdrop of heightened cyber crime today, many organizations are still using traditional legacy solutions. Even if they have the latest tools to detect advanced threats, such tools may be complex to use. Compounded by the fact that cyber talent is scarce and are often overloaded with tasks, adding a complex tool into the arsenal often makes things worse. What organizations need is a better way to help analysts detect, respond to and eradicate threats with ease – by seeing more, understanding better and responding even faster. Join us to experience ReaQta’s threat resolution experience.

    Presenter: Serge Woon, CISSP, Technical Director, APJ, Co-Founder, ReaQta
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • Robbery by Ransomware: Stick’em Up and Hand Over The Bitcoin! Recorded: Jul 21 2021 61 mins
    Dave Lewis, Global Advisory CISO, Duo Security
    High-profile ransomware news stories grabbed headlines a few years ago, but faded in popularity through 2018 as other attacks like cryptojacking grew more profitable. Since the first months of 2020, ransomware attacks are on the rise and in the news again! Join this session with Global Advisory CISO Dave Lewis from Duo Security to catch up on the historical rise and fall (and rise…) of ransomware from floppy disks to RaaS (ransomware as a service), why it’s seen a resurgence in popularity along with recent data on the state of ransomware currently, and how you can improve your defenses against ransomware attacks.

    Presenter: Dave Lewis, Global Advisory CISO, Duo Security
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • CCSPオンラインチャレンジセミナー Recorded: Jul 19 2021 111 mins
    諸角 昌宏氏, CCSP, (ISC)² 認定講師; 小熊 慶一郎, CISSP, (ISC)² Director of Business Development, Japan
    (ISC)² が認定する、クラウドセキュリティに関する情報セキュリティ国際認定資格、「CCSP」のチャレンジセミナーを開催します。サイバー・情報・クラウドコンピューティングセキュリティの実務経験に基づく専門的能力と、クラウドセキュリティの専門知識を認証することで、企業は、重要な機能に対して適切な専門家が対応していることを確認することができます。「クラウドファースト」を推進する組織において、クラウドサービスやその利用における情報セキュリティを確実にするため、 CCSP有資格者に管理を任せるケースが増加しています。

    CCSPの6ドメインは、クラウドセキュリティの基礎知識から実践的な対策を行うための考えかたを系統立てて理解するために必要な情報が集約されています。また、CCSPを受験させてみたいけど、どのような内容になっているのかわからないという経営層の皆さんにも理解しやすい内容で提供させていただきますし、情報セキュリティベンダーで製品・サービス企画を行っている皆さんにも効果的な内容となっています。

    今回のセミナーでは 「クラウドにおける最近のセキュリティ事故」をテーマに、AWSの障害、セールスフォース環境からの情報漏洩などの事例に基づいて、クラウド利用者、クラウドプロバイダとして考慮が必要となる点について解説するとともにCCSP CBKから関連する内容をピックアップしたセミナーとします。また、通常は5日間で行っているオフィシャルセミナーの各ドメインのオーバービューを紹介します。
  • Live Attack Simulation Recorded: Jul 14 2021 64 mins
    Mischa Deden, CISSP, Sr. Sales Engineer, Cybereason ; Eric Tan, Sales Director, Asia Pacific, Cybereason
    Today’s attackers are able to translate a successful phish into persistent, stealthy network compromise. How does this happen, and what can we do to stop it?
    In this special attack simulation, you will get an inside look at how multi-stage attack campaigns operate today. You will witness the attacker’s infiltration and watch the malicious operation as it moves across the entire environment.
    See the many opportunities an attacker has to advance the operation, and the ways a defender can break the kill chain and end the attack before crown jewels are compromised.
    In this webinar you will learn why a behavioral approach to detection is essential to stopping SUNBURST, ransomware and broader malicious operations.

    Presenter: Mischa Deden, CISSP, Sr. Sales Engineer, Cybereason
    Presenter: Eric Tan, Sales Director, Asia Pacific, Cybereason
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • Validate cyber security posture and combatting RaaS with BAS! Recorded: Jul 7 2021 61 mins
    Bharath Sathyanarayan, Sr. Solutions Engineer(SAP), Networks & Security, Keysight Technologies
    When you hear the words "Threat Intelligence", what's the first thing that comes to mind? Back-end research? Threat Hunting? It's easy to categorize threat intelligence as a reactive tool - best suited for things like root-cause analysis - but it's so much more than that. In this webinar you will learn how organizations from all industry verticals use Breach and Attack Simulation (BAS) to accurately assess their security risk, identify misconfigurations, and reveal the gaps that need fixing to optimize the security and robustness of its networks:

    • Operationalize MITRE ATT&CK as part of your security program.
    • Join us to discover how applying threat intelligence can help you
    • Answer the question "Am I more secure today than I was yesterday?"
    • Reduce your attack surface by blocking the latest threats
    • Maximize your threat hunting capability with real-time insights into botnets, phishing, etc.
    • Stay ahead of attackers by researching the latest attack signatures

    Presenter: Bharath Sathyanarayan, Sr. Solutions Engineer(SAP), Networks & Security, Keysight Technologies
    Moderator: Victor Yeo, CISSP, President (ISC)² Singapore Chapter
  • Inside (ISC)2: Updates on Member Services, Benefits and Experience Recorded: Jul 1 2021 59 mins
    Clar Rosso, CEO, (ISC)2; Beth Paredes, Director of Member Services, (ISC)2
    Clar Rosso, CEO of (ISC)2 shares the latest insights on what’s happening at our association. Join us for this quarterly update where we cover the latest developments at (ISC)2, ranging from certification to member benefits, continuing education and events, to major milestones and achievements. On July 1, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific as Beth Paredes, Director of Member Services at (ISC)2 join Clar to provide an overview of the wealth of benefits and services available to members and associates.
  • Countering Threat Evasion: You Cannot Stop What You Cannot See! Recorded: Jun 30 2021 67 mins
    Bob Hansmann, Senior Product Marketing Manager, Infoblox
    Cybercriminals must master evasion if they are to be successful. Many threats, such as APT’s, are designed to remain hidden for months or years as they slowly monitor their victim, compromising select information in a way that is also intended to go unnoticed. Others, like ransomware, may only need to hide their malicious intentions long enough to infect and begin encryption processes. And even when these attacks trip some defensive sensor, it can take analysts days to investigate and launch an effective incident response, often too late to prevent significant damage.
    Join us as we assess evasion methodologies and the value of DNS, with some unique Asia-Pacific callouts, to counter them across the kill chain including:
    - Why does DNS visibility expose threat activity other solutions miss?
    - How can DNS visibility be used to make other solutions more effective?
    - What role does DNS play in investigation and response?

    Presenter: Bob Hansmann, Senior Product Marketing Manager, Infoblox
    Moderator: Hoo Chuan-Wei, CISSP, Technical Advisor, Asia-Pacific, (ISC)²
  • 获取金牌认证CISSP, 为您职业发展加速 Recorded: Jun 29 2021 93 mins
    施勇, CISSP, (ISC)²授权讲师, (ISC)²上海分会会长; 方乐, CISSP, 谷安天下资深专家
    网络安全的世界充满挑战,新冠肺炎疫情的爆发对全球的网络安全提出了更高的挑战!获取 “金牌认证” CISSP,为您的职业发展加速!

    (ISC)² CISSP是当今世界上最有价值的网络安全认证之一。凭借超过25年的成熟记录,CISSP真正证明了持证者在知识、技能和经验等方面处于网络安全领域的顶端。

    本次CISSP中文在线宣讲会将为您带来:
    • 网络安全专业人才的市场需求;
    • (ISC)² 认证的价值;
    • CISSP认证的全面介绍,包括CISSP概况、持证者福利、考试及备考,知识域更新等;
    • CISSP官方培训;
    • 在线答疑:欢迎提问与CISSP认证相关的任何问题。
    还有针对单个知识域的详细讲解,欢迎参会!
  • CISSPオンラインチャレンジセミナー Recorded: Jun 25 2021 124 mins
    小熊慶一郎, CISSP, (ISC)² Director of Business Development, Japan; 安田良明, CISSP, SSCP, (ISC)² 認定講師
    「組織と実務者を繋ぐCISOを育成するために必要な考え方」

    社会経済活動がデジタル化していく社会においてCISOにはどのような知識が必要なのか、CSIRTのメンバーの教育はどうしようか、情報セキュリティに関する製品やサービス開発はどのように行えばよいのかなど、ユーザ企業もベンダー企業も人材育成の悩みは尽きません。セキュリティ事故をベースにした過去事例への教育はわかりやすい一方で、将来に発生するリスクに動的に対応する力が付きにくいのが現状です。

    CISSPの8ドメインは情報セキュリティ活動のあり方について基盤づくりから学び、実践的な対策を行うための考えかたを構築するために必要な情報が集約されています。セミナーでは「CISSPならこう考える」ということで、経営陣やCISO、CSIRTのメンバーが知っておくべき情報セキュリティの知識をわかりやすくお教えします。通常は5日間で行っているオフィシャルセミナーの中から、CISOに大きく関係するセキュリティとリスクマネジメント、アイデンティティとアクセスの管理、資産のセキュリティを中心に8ドメインのトピックをご理解いただくためのショートセミナーを行います。CISSPを受験させてみたいけど、どのような内容になっているのかわからないという経営層の皆さんにも理解しやすい内容で提供させていただきます。情報セキュリティベンダーで製品・サービス企画を行っている皆さんにも効果的な内容となっています。※講師の講義は前回の録画を使用します。
  • Igniting Passion for Diversity, Equity and Inclusion (DEI) Recorded: Jun 23 2021 59 mins
    Clar Rosso, CEO, (ISC)2; Dr. Kevin Charest and Samara Moore, (ISC)2 Board Members
    With the onset of social justice movements and awareness of racial and gender inequality around the globe, many organizations and leaders are recognizing the need to dig deeper and lead the charge for their stakeholders and communities for lasting transformation. Yet, what makes diversity and inclusion—seemingly so simple—so complicated and difficult to achieve? What are some of the key challenges and tensions that often arise throughout the inclusion journey? And, how can leaders ignite the passion needed to face these challenges? Join (ISC)2 on June 23, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific as Clar Rosso, (ISC)2 CEO joins with cyber industry leaders to explore these paradoxes, challenges and high-impact solutions and what it takes to achieve a truly diverse and inclusive cyber profession; one that weaves inclusion into everything it does.
  • 解码API安全 – 威胁、挑战和最佳实践 Recorded: Jun 23 2021 62 mins
    刘炅, 大中华区产品市场经理, Akamai Technologies
    随着API在移动应用、Web核心功能、智能设备和微服务架构中越来越广泛的使用,基于API的安全威胁也越来越突出,已经成为Web应用安全中最主要的安全问题之一。本次在线研讨会将会讨论如下的话题:
    • API安全威胁现状和发展趋势
    • API的攻击界面和类型
    • API攻击的典型场景
    • API防御最佳实践和推荐架构

    演讲人: 刘炅, 大中华区产品市场经理, Akamai Technologies
    主持人: 李杺恬, CISSP, (ISC)² 北京分会理事
  • Moving beyond SIEM to solve the industry’s biggest SecOps challenges Recorded: Jun 23 2021 65 mins
    Harjith Prabhakaran, Technical Alliance Director, Exabeam; Eric Ng, Regional Security Engineer, Exabeam
    Breach scenarios are still too frequent, with common attack techniques like lateral movement, data exfiltration, and privilege escalation appearing legitimate or spanning across siloed security products.

    To help defend against such techniques, security teams need to be able to accurately differentiate normal behaviour from abnormal activity, rapidly identify notable users and events, and quickly reconstruct the timeline leading up to a security incident.

    Exabeam will outline how prescriptive automated workflows guided by pre-packaged, use case specific content enable security analysts to defend against today’s common and evolving threats without the need for large-scale rip and replacements of their entire security stack.

    Presenter: Harjith Prabhakaran, Technical Alliance Director, Exabeam
    Presenter: Eric Ng, Regional Security Engineer, Exabeam
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • Master the Art of Secure Software Coding and App Development with the CSSLP Recorded: Jun 22 2021 66 mins
    John Ng, Mox Bank; Pishu Mahtani, (ISC)² Authorised Instructor; Tony Vizza, (ISC)²
    The modern software developer faces an enormous amount of challenges. From continuously creating innovative apps to ensuring high quality and meeting tight deadlines, developers need to cope with many responsibilities. As a result, security remains one of the last priorities on many developers’ minds during the software development lifecycle, despite software security continuing to be a major contributing factor behind devastating cyber breaches such as Starburst.

    In this webinar, you will learn:
    • Why do we need developers with a security mindset?
    • What personnel certifications for software security will do for individuals and the organisations they work for;
    • How a security certification qualification will help software professionals develop more secure software;
    • The merits and benefits of the (ISC)² CSSLP software security certification as well as the steps involved to attain accreditation.

    Presenters:
    • John Ng, CSSLP, CISSP/ISSAP/ISSEP/ISSMP, CCSP, Security Architect, Mox Bank
    • Pishu Mahtani, CSSLP, (ISC)² Authorised Instructor
    • Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • ニューノーマルにおけるSaaSへの新たな脅威とデータ保護における機密性、完全性、可用性の実現について Recorded: Jun 16 2021 74 mins
    加藤 路陽, セールスエンジニア, バラクーダネットワークスジャパン株式会社
    働き方の変化が強制的に進んだことで、在宅勤務のリスク、社会と行動の変化に潜む新しい脅威を生み出しています。先日弊社が公開しました、日本を含むアジア・オセアニア地区で集計したレポートを元にIT管理者が感じているSaaSへの懸念事項、その中でもデータ保護にフォーカスして紹介します。データを保護する理由、問題点や課題を考えます。データ保護における機密性、完全性、可用性を実現するための最新事例もご紹介します。

    Presenter: 加藤 路陽, セールスエンジニア, バラクーダネットワークスジャパン株式会社
    Moderator: 小熊 慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • Kick Start an Exciting Cybersecurity Career with (ISC)² Recorded: Jun 15 2021 63 mins
    Chuan-Wei Hoo, CISSP, Group CISO, ST Engineering & Jeremy Daly​, SSCP, Cybersecurity Product Manager, DDLS
    Cybersecurity is a booming industry that suffers from a lack of skilled personnel. Organizations from technology and manufacturing to retailers, airlines, and shipping, to financial services and healthcare, government and federal sectors are all seeking skilled and experienced security staff. In fact, it is predicted that there will be 3.5 million unfilled cybersecurity jobs globally by 2021.
    IT and Risk Management professionals have many of the underlying knowledge, skills and experience needed to enter the field of cybersecurity. So, do you have what it takes to be a cybersecurity professional?

    In this webinar, you will learn:
    • Why cybersecurity is a great choice for a exciting and fulfilling career;
    • How you can use your current knowledge, skills and experience and hone it towards a cybersecurity career;
    • Attaining broad security knowledge with the (ISC)² SSCP certification;
    • How a security certification will help you become a better cyber professional;
    • Which areas of knowledge the SSCP security certification covers

    Presenters:
    • Chuan-Wei Hoo, CISSP, Group Chief Information Security Officer, Group Information Security Office, ST Engineering IHQ Pte. Ltd; Technical Advisor, Asia Pacific, (ISC)²
    • Jeremy Daly​, SSCP, Cybersecurity Product Manager, DDLS
    • Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • Dissecting the 2020 ATT&CK Eval Results - What They Mean to Enterprises in APJ Recorded: Jun 9 2021 64 mins
    Kelvin Wee, Director of Security Engineering - Asia Pacific and Japan, SentinelOne
    The ATT&CK® Evaluations are an unbiased assessment of detection and protection capabilities from all key cybersecurity vendors. Conducted annually by Mitre Att&ck, the evaluations emulate known adversary behavior and attack techniques, in this year’s case – the Carbanak+FIN7 attacks.
    In this same spirit, SentinelOne will host a special webinar on June 9 to dissect the 2020 MITRE Engenuity ATT&CK “Carbanak+FIN7” Enterprise Evaluation, which put 29 global endpoint security solutions, and elucidate why this evaluation is becoming a key reference for CISOs when choosing cybersecurity vendors.
    Join Kelvin Wee, Director of Security Engineering at SentinelOne - APJ, to understand:
    • What Mitre Att&ck is and why it matters to every enterprise CISO in APJ
    • How the evaluation is done and key results from the 29 endpoint security vendors evaluated
    • Why some EPP & EDR solutions produced the lowest results
    • Technology Validation: How SentinelOne was the only vendor to achieve complete visibility with zero missed detections across both Windows and Linux environments

    Presenter: Kelvin Wee, Director of Security Engineering - Asia Pacific and Japan, SentinelOne
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • Increase Your Hiring Appeal as a Cloud Security Professional with the CCSP Recorded: Jun 8 2021 71 mins
    Neha Malhotra, Credit Suisse; Robert Laurie, David Lynas Consulting & Tony Vizza, (ISC)²
    According to Gartner, worldwide security spending on cloud security increased by over 30% in 2019-20, while overall IT spending dedicated to cloud will increase significantly in 2021. Coupled with the rapid adoption of cloud due to the COVID-19 pandemic, the need for cloud security professionals has become acute and opportunities abound for those in cybersecurity who want to maximise their personal development with cloud security skills.

    In this webinar, you will learn:
    • What security in the cloud looks like;
    • What the ‘shared responsibility model’ for cloud security entails;
    • What personnel certifications for cloud security will do for individuals and the organisations they work for;
    • Why a vendor-agnostic accreditation is critical for organisations which increasingly are using a multi-cloud strategy;
    • The merits of the (ISC)² CCSP cloud security certification for a cloud security professional as well as the steps involved to attain accreditation.

    Presenters:
    • Robert Laurie, CISSP, CCSP, CSSLP, (ISC)² Authorized Instructor; Enterprise Security Architect, David Lynas Consulting
    • Neha Malhotra, CISSP, CCSP, Director Communications, (ISC)² Singapore Chapter; Vice President, Cybersecurity Program Manager, Credit Suisse
    • Tony Vizza, CISSP, CCSP, Director of Cyber Security Advocacy, Asia-Pacific, (ISC)²
(ISC)² Live Webinars for InfoSec Professionals in APAC Region
Looking for expertise and information to advance your career and tackle your challenges? Subscribe and join us for the educational webinars in APAC time zone. Earn CPEs quickly and at no cost by attending webinars: 1 hour of webinar equals 1 CPE. We welcome members and non members alike.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Prove Your Cyber Strategy Works with Security Ratings!
  • Live at: Mar 18 2020 3:00 am
  • Presented by: Terence Cheong, Senior Consulting Engineer, BitSight Technologies
  • From:
Your email has been sent.
or close