Hi [[ session.user.profile.firstName ]]

Prove Your Cyber Strategy Works with Security Ratings!

Measuring cybersecurity program performance is critical, but often times is clouded in ambiguity and low confidence results. Yet, it has never been more important for executives and board members to understand the performance of their organization’s cybersecurity programs, and treat cybersecurity like any other business risks. Reports with quantitative metrics and comparisons, as well as developing a more strategic approach to cyber risk are no longer nice to have — these are required.

This session Is ideal for infosec personnel with minimal exposure to security ratings. It will cover how cybersecurity and risk professionals can take a more quantitative approach to measuring their security program performance, and how others have benefitted from this approach to reduce cyber risk.

HR, marketing, legal, procurement and senior management will also find this session informative as it shows you how you can easily understand the effectiveness of your cybersecurity posture without being a geek.

Join BitSight Technologies and (ISC)² on Mar 18, 2020 (Wed) at 11:00 (GMT +8) to learn about security ratings.

Presenter: Terence Cheong, Senior Consulting Engineer, BitSight Technologies
Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
Recorded Mar 18 2020 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Terence Cheong, Senior Consulting Engineer, BitSight Technologies
Presentation preview: Prove Your Cyber Strategy Works with Security Ratings!

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • 无惧前行-新数字经济场景下的特权访问管理 May 27 2020 3:00 am UTC 60 mins
    路军龙 (Sam), CISSP, CCSP, 解决方案架构师, CyberArk
    随着客户需求不断变化,企业数字化转型正当时: 云优先策略,持续集成、持续交付的DevOps理念逐渐被采用:

    - 拥抱新技术的同时企业面临的技术风险是什么?
    - 为什么特权访问管理变得越来越重要 ?
    - 如何使用特权账号安全方案避免风险?
    - 如何消除传统应用和容器化应用内嵌特权账号,避免滥用特权账号带来的重大安全隐患,保障业务不停顿运行?
    - 与时俱进的解决方案、解除第三方软件开发商远程特权会话安全接入风险的长久之道

    参加 CyberArk 和 (ISC)² 在5月27日上午11:00的在线研讨会《无惧前行-新数字经济场景下的特权访问管理》,通过“像攻击者一样思考”,您将了解到如何快速化解企业的特权账号安全和风险管理挑战,从而积极主动地防御外部恶意攻击并增强合规性。

    演讲人: 路军龙 (Sam), CISSP, CCSP, 解决方案架构师, CyberArk
    主持人: 阎光, CISSP, (ISC)² 上海分会会员主席

    *本次在线研讨会将以普通话进行
  • Securing Your Business in the COVID-19 Era of Remote Working May 20 2020 2:00 am UTC 60 mins
    Perry Chu, Regional Senior Solutions Consultant, BeyondTrust
    So, your workforce has gone remote. Now what?

    The COVID-19 pandemic has led to a surge in cybercrime, but this is no surprise. Attackers use people’s fears to prey on businesses and individuals.

    In times of crisis, good security practices are often the first thing to go. As employees across Asia Pacific and ANZ are being asked to work from home, companies, universities and government organisations are being forced to implement new remote working policies. However, an expanding remote workforce can increase your security risk, especially if IT and Support employees use non-secure remote access tools as temporary measures.

    Join this special webinar with BeyondTrust and (ISC)² on May 20, 2020 (Wed) at 10:00 (GMT +8) to learn:
    - Risks and security considerations related to an extended remote workforce
    - The vulnerability risks posed by remote working tools, like BYOD and free Shadow IT solutions
    - Practical guide on how to quickly implement and scale strong security protocols to enable long-term remote work
    - Technology Demonstration: Key Use Cases for a successful Secure Remote Access strategy

    Presenter: Perry Chu, Regional Senior Solutions Consultant, BeyondTrust
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • 特権アクセス管理の基本- セキュリティ環境を変革せよ May 13 2020 7:00 am UTC 60 mins
    蓑輪 尚毅, ソリューションズ・エンジニア, CyberArk Software株式会社
    本ウェビナーでは、特権アクセスがなぜ極めて重要なのか?企業の内部および外部の攻撃者が特権アカウントを標的としている理由は何か?組織を保護するために何ができるのかについてお伝えします。

    ウェビナーの内容:
    • 特権アクセス管理に優先的に取り組むべき重要な理由
    • CyberArkの考える特権アクセス管理
    • 国内事例
    • 特権アクセス管理の最初の一歩
    • ライブデモ
    • まとめ

    本セッションでは、次のトピックについても説明します。
    • 組織全体に存在する特権アカウントを見つけるためのプロセス全体を説明します。
    • 最小特権の強制、特権アクセスのある認証情報をローテーション、分離、管理、および監視する利点を実感できるように、テクノロジのライブデモを実施します。

    本ウェビナーにぜひ参加いただき、サイバー攻撃者との戦いにおいて、特権アクセスの保護に最優先に取り組むべき理由をご確認ください。

    Presenter: 蓑輪 尚毅, ソリューションズ・エンジニア, CyberArk Software株式会社
    Moderator: 小熊 慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • Securing Open Banking Initiatives Apr 29 2020 6:00 am UTC 60 mins
    Shahnawaz Backer, Security Solutions Architect APAC, F5 Networks
    With the emergence of open banking, digital technology is redefining the experience of financial services for a new generation of connected consumers. FinTech companies and their disruptive digital services are challenging financial institutions’ conventions and practices, as the business landscape continues to accelerate. Customers are increasingly access their account data across multiple channels, devices and touchpoints, exposing digital banking systems to become targets for cyber-attacks while consumer expectations around data security are growing. How well you protect web applications and APIs can determine whether you’re a proven, reputable online presence or an unreliable, untrusted one. Learn how your organization can stand up to a range of ever-evolving attack types to support your governance, risk, and compliance (GRC) platforms.

    Join F5 Networks and (ISC)² on Apr 29, 2020 (Wed) at 14:00 (GMT +8) to gain more insights:
    • Growing adoption of Open Banking
    • Understand how to meet security and governance requirements
    • Use of Authentication & Consent Management in Building Trust

    Presenter: Shahnawaz Backer, Security Solutions Architect APAC, F5 Networks
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • 원격/재택 근무 환경의 비즈니스 연속성 구현, 보안의 현 주소는? Apr 22 2020 6:00 am UTC 60 mins
    백 용 기, Senior Enterprise Security Executive, Akamai Technologies
    최근 전 세계적인 사회적 이슈로 인해 원격 근무를 장려하고, 비즈니스 연속성에 대한 중요성이 부각되었습니다.
    이런 상황에서 기업의 원격근무에 대한 수요는 급속히 증가하고 있지만, 기존의 원격 접속 기술로는 하이브리드 클라우드 환경하에서의 보안/성능/시간과 비용의 비효율성 문제를 해결하기 어렵습니다.
    직접 인터넷 접속 시 악성코드에 감염될 위험과 정보 유출 위험이 있기에 보안 규정을 적용하기는 하나 충분하지는 않습니다.
    제로 트러스트 보안 모델(ZTNA)에서 제시하는 기술은 표적 공격과 같은 보안 위험이 있을 경우 안전한 원격 액세스를 제공하는 데 매우 효과적입니다.

    다음 두 가지 보안 접근 방법을 소개하고자 합니다.
    첫째, 사용자별로 강화된 인증과 권한 관리를 통해 애플리케이션 단위의 통제가 가능한 ID 인식 프록시(IAP) 보안 방식
    둘째, 원격 액세스 환경에서 액세스 제어, 피싱, 멀웨어, 랜섬웨어, DNS 데이터 유출, 명령 및 제어(C&C)등의 다양한 위협을 선제적으로 탐지·차단하여 악성 인터넷 접속으로부터 원격 근무자를 보호하는 보안 웹 게이트웨이(SIG/SWG) 방식

    이 두 가지 방식을 이용하여 강화된 보안 방식으로 안전하고 편리한 원격 액세스 환경을 실현하는 방법과 모범 사례를 알아보도록 하겠습니다.


    발표자: 백 용 기, Senior Enterprise Security Executive, Akamai Technologies
    진행자: 박 선 영, Senior Business Development Manager, APAC, (ISC)²
  • Passive-External: An Outside-In Take on Security Performance Monitoring Apr 22 2020 3:00 am UTC 60 mins
    Terence Cheong, Senior Consulting Engineer, BitSight Technologies
    This webinar discusses how gaining a continuous and objective outside-in perspective offers fresh new insights into how well you think your cybersecurity strategy is working out. With this insight, you get a better understanding on what critical cybersecurity metrics you are able to monitor externally. These metrics come from a variety of sources and indicate risks caused by ineffective controls, technical gaps, human behaviour, and more.

    Outcome - You can better your cybersecurity strategy to be outcome driven, leading by measurable improvements to your company’s overall risk posture. All this while working with objective, verifiable and actionable data.

    So join Terence and (ISC)² on Apr 22, 2020 (Wed) at 11:00 (GMT +8) as he shows how you can identify gaps that you didn't know existed!

    Presenter: Terence Cheong, Senior Consulting Engineer, BitSight Technologies
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • CISSPチャレンジセミナー Apr 17 2020 4:30 am UTC 180 mins
    (ISC)² 認定講師 長谷川 長一氏
    「CISSPならこう考える!CISOに必要な情報セキュリティの知識と考え方」

    CISOにはどのような知識が必要なのか、CSIRTのメンバーの教育はどうしようか、情報セキュリティに関する製品やサービス開発はどのように行えばよいのかなど、ユーザ企業もベンダー企業も人材育成の悩みは尽きません。セキュリティ事故をベースにした教育はわかりやすい一方で、応用が効かないためにその他の脅威や攻撃に対応する力が付きにくいのが現状です。

    CISSPの8ドメインは情報セキュリティ活動のあり方について基盤づくりから学び、実践的な対策を行うための考えかたを構築するために必要な情報が集約されています。今回のセミナーでは「CISSPならこう考える」ということで、経営陣やCISO、CSIRTのメンバーが知っておくべき情報セキュリティの知識をわかりやすくお教えします。通常は5日間で行っているオフィシャルセミナーの中から、CISOに大きく関係するセキュリティとリスクマネジメント、アイデンティティとアクセスの管理、資産のセキュリティを中心に8ドメインのトピックをご理解いただくためのオンラインショートセミナーを行います。

    CISSPを受験させてみたいけど、どのような内容になっているのかわからないという経営層の皆さんにも理解しやすい内容で提供させていただきます。情報セキュリティベンダーで製品・サービス企画を行っている皆さんにも効果的な内容となっています。
  • 急増するテレワークと情報セキュリティの両立、IDを境界とするクラウド型対策 Apr 15 2020 7:00 am UTC 60 mins
    金子 春信, CISSP, シニア・プロダクト・マーケティング・マネージャー, Akamai Technologies
    本セッションでは、「通信とネットワークのセキュリティ」「アイデンティティとアクセスの管理」に関連した内容を取り扱います。

    昨今、感染症は世界中で大きな問題となっています。また、本年は東京を中心とした大型のスポーツイベントも数多く予定されています。この様な情勢において、企業のテレワーク需要は急激に高まっていますが、従来のリモートアクセス技術では、時間、コスト共に急増する利用者に対応する事は困難です。また、ダイレクトインターネットアクセスを行う上での、マルウェア感染や情報流出リスクの課題が発生します。

    この様な状況下でも、標的型攻撃に備えて安全なリモートアクセスを提供するためには、クラウド提供型のセキュリティが極めて有効に機能します。ID認識型プロキシと、セキュアWebゲートウェイを利用した安全で便利なリモートアクセス環境の実現方法を考察します。テレワークにおけるアクセス制御、フィッシング対策、マルウェア感染対策等に関してご紹介します。

    Presenter: 金子 春信, CISSP, シニア・プロダクト・マーケティング・マネージャー, Akamai Technologies
    Moderator: 小熊 慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • Universal Privilege Management – How to Protect Every Privilege, Every Time Recorded: Apr 8 2020 63 mins
    Ajay Kumar, Director, Solutions Engineering – APJ, BeyondTrust
    Virtually every cybersecurity breach today involves the exploitation of privileged access. Privileges are initially exploited to infiltrate an IT environment; once compromised by cyber hackers, privileges are further leveraged to move laterally, access assets, install malware, and inflict damage. Many organizations assume that password management will solve the “privilege problem”—but password vaulting is only a partial solution.

    Join BeyondTrust and (ISC)² on Apr 8, 2020 (Wed) at 10:00 (GMT +8) to learn how a new approach to Privileged Access Management – the Universal Privilege Management model – can help you to secure every user, session, and asset across your entire IT environment.

    Covered topics will include:

    • Why relying on password management alone leaves dangerous gaps in protection
    • Disrupting the cyberattack chain with privileged access security controls
    • Steps to achieving rapid leaps in risk reduction
    • Technology Demonstration - Keys to a frictionless PAM solution that is invisible to end users

    Presenter: Ajay Kumar, Director, Solutions Engineering – APJ, BeyondTrust
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • CCSPチャレンジセミナー Recorded: Apr 6 2020 84 mins
    (ISC)² 認定講師 諸角昌宏氏
    (ISC)² が認定する、クラウドセキュリティに関する情報セキュリティ国際認定資格、「CCSP」のチャレンジセミナーを開催します。サイバー・情報・クラウドコンピューティングセキュリティの実務経験に基づく専門的能力と、クラウドセキュリティの専門知識を認証することで、企業は、重要な機能に対して適切な専門家が対応していることを確認することができます。「クラウドファースト」を推進する組織において、クラウドサービスやその利用における情報セキュリティを確実にするため、 CCSP有資格者に管理を任せるケースが増加しています。

    今回のセミナーでは 、公式セミナーの模擬講義を(ISC)² 認定講師・諸角昌宏氏に実施していただきます。

    (ISC)²メンバーの方には、本セミナー参加1時間につきCPEクレジット1ポイントが付与されます。
  • State of the Internet / Security: Financial Services — Hostile Takeover Attempts Recorded: Mar 25 2020 64 mins
    Sid Deshpande, Director of Security Strategy, Akamai Technologies
    Attacks against financial services institutions are growing in both quantity and sophistication. In this webinar, we will explore distinctive attack trends on financial services organizations that may spread to other industries, including:

    • A special focus on APAC statistics
    • The targeting of APIs in credential stuffing
    • How error response messages help criminals improve their targeting
    • Where criminals are finding new LFI vulnerabilities, and new ways to exploit them
    • High-density, multi-vector DDoS attacks
    • The elements of the Zero Trust toolkit that can help limit the effectiveness of known and unknown attack types

    Join Akamai Technologies and (ISC)² on Mar 25, 2020 (Wed) at 13:00 (GMT +8) to learn about cybersecurity for financial services.

    Presenter: Sid Deshpande, Director of Security Strategy, Akamai Technologies
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • (ISC)² Info Session: SSCP -The Premier Security Administrator Certification Recorded: Mar 19 2020 62 mins
    Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
    Earning a globally recognized advanced security administration and operations certification like the SSCP is a great way to grow your career and better secure your organization’s critical assets.

    The SSCP is ideal for IT administrators, managers, directors and network security professionals responsible for the hands-on operational security of their organization’s critical assets.

    In this info-session, you will learn:
    - How large is the cybersecurity workforce gap today
    - The value of (ISC)² certification
    - What you will learn in training for the SSCP exam
    - What to expect from the SSCP exam
    - How to become endorsed and earn the SSCP certification
    - And, ask any question that will support your certification journey

    =====================================================================
    SSCP certification demonstrates you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures.

    Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to help you throughout your career.

    www.isc2.org/sscp

    Are you ready to prove yourself? Register and begin your SSCP journey today!
  • Prove Your Cyber Strategy Works with Security Ratings! Recorded: Mar 18 2020 61 mins
    Terence Cheong, Senior Consulting Engineer, BitSight Technologies
    Measuring cybersecurity program performance is critical, but often times is clouded in ambiguity and low confidence results. Yet, it has never been more important for executives and board members to understand the performance of their organization’s cybersecurity programs, and treat cybersecurity like any other business risks. Reports with quantitative metrics and comparisons, as well as developing a more strategic approach to cyber risk are no longer nice to have — these are required.

    This session Is ideal for infosec personnel with minimal exposure to security ratings. It will cover how cybersecurity and risk professionals can take a more quantitative approach to measuring their security program performance, and how others have benefitted from this approach to reduce cyber risk.

    HR, marketing, legal, procurement and senior management will also find this session informative as it shows you how you can easily understand the effectiveness of your cybersecurity posture without being a geek.

    Join BitSight Technologies and (ISC)² on Mar 18, 2020 (Wed) at 11:00 (GMT +8) to learn about security ratings.

    Presenter: Terence Cheong, Senior Consulting Engineer, BitSight Technologies
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • Using DNS for Foundational Enterprise Security Recorded: Mar 11 2020 61 mins
    James Ellerman, Senior Solution Engineer, Infoblox
    DNS plays an enormous role in enterprise security. It is the attack vector for more than 90% of malware and a key avenue for data theft. Against this backdrop, networks are becoming harder to defend as the focus shifts from the traditional data center to the WAN perimeter in what Gartner calls the secure access service edge (SASE).

    Attend this live webinar and discover how DNS and other core network services (aka DDI) can provide foundational enterprise security for today’s edge-centric networks. Join Infoblox and (ISC)² on Mar 11, 2020 (Wed) at 14:00 (GMT +8) and learn:

    • Why DNS has become the leading threat vector for damaging attacks
    • How to turn DNS and related services into your most effective network defenders
    • Cloud and on-premises solution options that close the door to DNS-based threats

    Presenter: James Ellerman, Senior Solution Engineer, Infoblox
    Moderator: Chuan-Wei Hoo, CISSP, Technical Advisor, Asia-Pacific, (ISC)²
  • CISSP 认证宣讲会 2020 Recorded: Mar 5 2020 68 mins
    顾伟, CISSP, CCSP, (ISC)²授权讲师,(ISC)²上海分会理事
    抓住机遇,自我升值,2020年让网络安全“金牌认证”CISSP为您和您的职业发展加速!

    享誉全球的CISSP认证含金量高,颇受行业雇主和专家青睐,多次被SC Magazine评为“最佳职业认证项目”,是信息安全专业人士证明网络安全策略、认知和实践经验的理想之选。

    通过2020首次中文宣讲会,您将了解到:
    • 行业对网络安全专业人才的需求;
    • (ISC)² 认证价值;
    • CISSP认证的全面介绍,包括CISSP概况、持证者福利、考试介绍、知识域、官方培训等;
    • CISSP认证的备考路径;
    • 与CISSP认证相关的问题答疑。

    2020年3月5日周四15:00-16:00,敬请期待!
  • (ISC)² Info Session: CCSP - The Industry’s Premier Cloud Security Certification Recorded: Feb 20 2020 64 mins
    Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
    Earning the globally recognized CCSP cloud security certification is a proven way to build your career and better secure critical assets in the cloud.

    The CCSP is ideal for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration.

    In this info-session, you will learn:

    - How large is the cybersecurity workforce gap today
    - The value of (ISC)² certification
    - What you will learn in training for the CCSP exam
    - What to expect from the CCSP exam
    - How to become endorsed and earn the CCSP certification
    - And, ask any question that will support your certification journey

    ===================================================================

    The CCSP shows you have the advanced technical skills and knowledge to design, manage and secure data, applications and infrastructure in the cloud using best practices, policies and procedures.

    Prove your skills, advance your career, and gain support from a community of cybersecurity leaders here to help you throughout your professional journey. More details>> www.isc2.org/ccsp

    Are you ready to prove yourself? Register and begin your certification journey today!
  • (ISC)² Info Session: CISSP - The World's Premier Cybersecurity Certification Recorded: Feb 13 2020 87 mins
    Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
    Accelerate your cybersecurity career with the CISSP certification in 2020!

    The CISSP is the global gold standard in cyber security certification for professionals and has received countless accolades and awards, the most recent being awarded the top cyber security certification program by SC Media magazine in 2019.

    Becoming CISSP certified demonstrates your deep skills, experience and knowledge in cybersecurity and opens the doors for career and salary advancement.

    Join this online info-session hosted by (ISC)² and learn everything you need to know about the globally recognized credential CISSP!

    During the online info-session, you will learn:
    - How large is the cybersecurity workforce gap today
    - The value of (ISC)² certification
    - What you will learn in training for the CISSP exam
    - What to expect from the CISSP exam
    - How to become endorsed and earn the CISSP certification
    - And, ask any question that will support your certification journey

    ==================================================================
    Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise and become an (ISC)² member, unlocking a broad array of exclusive resources, educational tools, and peer-to-peer networking opportunities.

    Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to support you throughout your career.

    More details >> www.isc2.org/cissp
  • How to Manage Risk in the Cloud (以粵語進行) Recorded: Feb 12 2020 61 mins
    Clive Chan, Manager, Systems Engineering, F5 Networks Hong Kong & Macau
    Businesses are racing to deploy or move their applications to the cloud—often without considering whether it will make their security posture better, or worse.

    Cloud allows organizations to offload many responsibilities to third-party providers, but mitigating the risk to your applications isn’t one of them. In fact, the use of cloud and other third-party resources is rapidly expanding your attack surface, while reducing visibility and control over applications and data.

    We aim to document the most common form of information supply chain breaches as well as suggest some frameworks and methodologies for reducing the risk in the use of cloud and third parties.

    Join F5 Networks and (ISC)² on Feb 12, 2020 (Wed) at 14:00 (Hong Kong time) to learn:
    • Which common risks can affect your security in the cloud
    • Which solutions can help reduce those risks
    • How to increase control of your applications in the cloud

    Presenter: Clive Chan, Manager, Systems Engineering, F5 Networks Hong Kong & Macau
    Moderator: Otto Lee, CISSP, CCSP, CSSLP, Membership Chair, (ISC)² Hong Kong Chapter

    *This webinar will be conducted in Cantonese. (本次網上研討會將以粵語進行。)
  • APIに求められるセキュリティ基盤とその実装方法 Recorded: Feb 5 2020 53 mins
    伊藤 悠紀夫, CISSP, ソリューションアーキテクト, F5 ネットワークスジャパン合同会社
    モダンなアプリケーションを支えるAPI基盤をどのようにセキュアに構築すれば良いのか?
    本セミナーでは以下トピックに関してご案内致します。

    ・アプリケーションを支えるAPI基盤概要
    ・API Managementと必要なセキュリティ機能
    ・API Gateway実装パターン

    Presenter: 伊藤 悠紀夫, CISSP, ソリューションアーキテクト, F5 ネットワークスジャパン合同会社
    Moderator: 小熊 慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • クラウドセキュリティ資格「CCSP」のご紹介 Recorded: Feb 3 2020 45 mins
    小熊 慶一郎, CISSP, (ISC)² Director of Business Development, Japan
    CCSP(Certified Cloud Security Professional)は、CISSPで知られる(ISC)²が提供する最新の資格制度で、クラウドサービスを安全に利用・運用するために必要な知識やスキルを世界で初めて体系化し、人材を認定します。Webinarでは、このCCSPについてわかりやすく説明します。

    Presenter: 小熊 慶一郎, CISSP, (ISC)² Director of Business Development, Japan
Live Webinars for InfoSec Professionals in Asia Pacific Time Zone
Looking for expertise and information to advance your career and tackle your challenges? Subscribe and join us for the educational webinars in APAC time zone. Earn CPEs quickly and at no cost by attending webinars: 1 hour of webinar equals 1 CPE. We welcome members and non members alike.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Prove Your Cyber Strategy Works with Security Ratings!
  • Live at: Mar 18 2020 3:00 am
  • Presented by: Terence Cheong, Senior Consulting Engineer, BitSight Technologies
  • From:
Your email has been sent.
or close