Hi [[ session.user.profile.firstName ]]

원격/재택 근무 환경의 비즈니스 연속성 구현, 보안의 현 주소는?

최근 전 세계적인 사회적 이슈로 인해 원격 근무를 장려하고, 비즈니스 연속성에 대한 중요성이 부각되었습니다.
이런 상황에서 기업의 원격근무에 대한 수요는 급속히 증가하고 있지만, 기존의 원격 접속 기술로는 하이브리드 클라우드 환경하에서의 보안/성능/시간과 비용의 비효율성 문제를 해결하기 어렵습니다.
직접 인터넷 접속 시 악성코드에 감염될 위험과 정보 유출 위험이 있기에 보안 규정을 적용하기는 하나 충분하지는 않습니다.
제로 트러스트 보안 모델(ZTNA)에서 제시하는 기술은 표적 공격과 같은 보안 위험이 있을 경우 안전한 원격 액세스를 제공하는 데 매우 효과적입니다.

다음 두 가지 보안 접근 방법을 소개하고자 합니다.
첫째, 사용자별로 강화된 인증과 권한 관리를 통해 애플리케이션 단위의 통제가 가능한 ID 인식 프록시(IAP) 보안 방식
둘째, 원격 액세스 환경에서 액세스 제어, 피싱, 멀웨어, 랜섬웨어, DNS 데이터 유출, 명령 및 제어(C&C)등의 다양한 위협을 선제적으로 탐지·차단하여 악성 인터넷 접속으로부터 원격 근무자를 보호하는 보안 웹 게이트웨이(SIG/SWG) 방식

이 두 가지 방식을 이용하여 강화된 보안 방식으로 안전하고 편리한 원격 액세스 환경을 실현하는 방법과 모범 사례를 알아보도록 하겠습니다.


발표자: 백 용 기, Senior Enterprise Security Executive, Akamai Technologies
진행자: 박 선 영, Senior Business Development Manager, APAC, (ISC)²
Recorded Apr 22 2020 63 mins
Your place is confirmed,
we'll send you email reminders
Presented by
백 용 기, Senior Enterprise Security Executive, Akamai Technologies
Presentation preview: 원격/재택 근무 환경의 비즈니스 연속성 구현, 보안의 현 주소는?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Critical Cybersecurity Misconceptions That Are Harming Your Business (以粵語進行) Dec 16 2020 3:00 am UTC 60 mins
    Ryan Lo, Manager of Solutions Engineering, Shape Security (Part of F5)
    Today’s applications have become the focal point for cybercriminals, on which financial fraud and abuse are constantly happening. A misunderstanding of what does and does not protect your digital footprint can lead to devastating breaches, while some companies are still believe in and even base real business decisions and security outcomes on misconceptions. It's critical to bust the myths and get back to better protection.

    Join F5 and (ISC)² on Dec 16, 2020 (Wed) at 11am (Hong Kong Time) as Ryan Lo, Manager of Solutions Engineering from Shape Security (part of F5), separates fact from fiction when it comes to defending your apps from sophisticated attacks, including:

    • Understanding how MFA just adds more information to the dossier of a targeted account.
    • CAPTCHA is a fabled response to a sophisticated problem, like bots.
    • Password schemes won’t protect user accounts from being taken over.

    Presenter: Ryan Lo, Manager of Solutions Engineering, Shape Security (Part of F5)
    Moderator: Otto Lee, CISSP, CCSP, CSSLP, Membership Chair, (ISC)² Hong Kong Chapter

    *This webinar will be conducted in Cantonese. (本次網上研討會將以粵語進行。)
  • Maximizing the Value of Threat Intelligence Dec 9 2020 2:00 am UTC 60 mins
    Bob Hansmann, Sr. Product Marketing Manager – Security, Infoblox
    ‘Threat intelligence’ has become a general term that may refer to many different types of data sets used to meet very different security needs. Threat prevention and detection solutions (i.e. NGFW, SWG, EDR) are only as good as the threat intelligence driving their analytics. Threat investigation and incident response activities are limited and slow without timely access to sufficient event, network, and threat intelligence. This requires defenders to better understand their intelligence needs, how to identify and map appropriate threat feeds to each need, and the tools available to drive maximum value from threat intelligence.

    Join Infoblox and (ISC)² on Dec 9, 2020 (Wed) at 10am (GMT +8), we will review the state of the threat intelligence industry, using public and private research from the last year on the quality and applicability of public, private, and proprietary feeds. We will demonstrate the current state of the market for applying threat intelligence to real-world problems, including:

    - Automating multi-feed normalization into a ‘super-feed’ for a more effective defensive security stack
    - Speeding investigation and response through event, metadata, and threat intelligence correlation
    - Leveraging threat intelligence of threat actor objectives, methods, and tactics to drive quick incident resolution

    Presenter: Bob Hansmann, Sr. Product Marketing Manager – Security, Infoblox
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • 边缘之上的客户身份管理蓝图 Dec 2 2020 6:00 am UTC 60 mins
    李国庆, 亚太区高级云安全架构师, Akamai Technologies
    互联网边缘计算方兴未艾,如何使企业客户的数字身份与企业的实际业务应用解耦,使之成为边缘网络的一项基础组件,以保证客户访问的易用性、可靠性、安全性和合规性?欢迎参与本主题,来了解未来在客户身份认证和授权领域的边缘革命。

    参加Akamai Technologies和 (ISC)² 在12月2日下午2:00至3:00的在线研讨会,聆听专家分析客户身份管理安全,还等什么?赶紧加入我们吧。

    *本次在线研讨会将以普通话进行

    演讲人: 李国庆, 亚太区高级云安全架构师, Akamai Technologies
    主持人: 李杺恬, CISSP, (ISC)²北京分会理事
  • SSCPオンラインチャレンジセミナー Nov 30 2020 7:00 am UTC 120 mins
    安田良明, CISSP, SSCP, (ISC)² 認定講師; 小熊慶一郎, CISSP, (ISC)² Director of Business Development, Japan
    経営陣が情報セキュリティやリスクマネジメントの取り組みを推進してはいるものの、期待するほど情報セキュリティが向上していない声をよく耳にします。その理由の1つとして経営陣は情報セキュリティの課題を解決するために必要となる現場を把握する仕組みづくりにうまくいっていないことが挙げられます。

    経営陣が情報セキュリティの活動を宣言したとしても現場の実務者が経営陣が期待する活動を行わない限り情報セキュリティは向上していきません。しかし、現場の実務を支える実務者の育成は耳ざわりがよい知識と技術を身に着ければよいというわけではなく、「組織」という観点を理解し、情報セキュリティ専門家や経営陣とコミュニケーションを図れる人材でなければなりません。そのため、IT全体にわたる知識とスキルがあり、ネットワークやシステムの開発・運用などに従事する人に必要な知識に加え、確実なセキュリティ対策を実装・維持できる技術的な観点だけではなく「組織」という観点から情報セキュリティを理解している必要があります。

    SSCPの7ドメインは、情報セキュリティの運用から基本的な情報セキュリティの実務に必要な知識を取り扱い、情報セキュリティを専業としていない実務経験年数が少ない方にとっても、より実践に近い内容をグローバルの標準に則って理解することが期待できます。今回のオンラインセミナーでは、「現場の情報セキュリティ担当者に必要な情報セキュリティの知識と考え方」として、IT全般のエンジニアやサポート技術者、アナリスト担当者が知っておくべき情報セキュリティの知識をわかりやすくお教えします。

    SSCPを受験させてみたいけど、どのような内容になっているのかわからないというユーザー企業の管理職の皆さんにも理解しやすい内容で提供させていただきます。

    システム開発や情報システム担当者の皆さんにも効果的な内容となっています。
  • Cybersecurity Frameworks - How Helpful Are They Really? Nov 25 2020 5:00 am UTC 60 mins
    Sid Deshpande, Akamai Technologies; Amol Dabholkar, Deloitte & Touche Enterprise Risk Services
    Gartner's Secure Access Service Edge (SASE) is the newest addition to a collection of cybersecurity frameworks security practitioners rely on to plan their security architecture strategy. Other popular ones are the NIST Zero Trust Architecture, MITRE Attack among others. These frameworks are certainly useful in 'normal' times, but can security practitioners benefit from them in uncertain times like these, when long term planning is proving to be tough?

    Join Akamai Technologies and (ISC)² on Nov 25, 2020 (Wed) at 1pm (GMT +8), this session will explore trends and best practices around how these frameworks can be most useful to security practitioners today.

    Presenter: Sid Deshpande, Director of Security Strategy, Akamai Technologies
    Presenter: Amol Dabholkar, Director, SEAsia, Cloud Security & DevSecOps, Deloitte & Touche Enterprise Risk Services
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • 급부상하는 SASE와 Zero Trust의 시대 Recorded: Nov 18 2020 63 mins
    전 창 우, Senior Enterprise Security Engineer, Akamai Technologies
    예상치 못한 글로벌 팬데믹 사태로 인하여 장기화된 경제 위기, 갑자기 촉진화된 재택 및 원격 근무 시행, 멀티 클라우드, SaaS 애플리케이션의 전격 업무 도입, 이에 따른 개인정보보호법 및 각종 IT 규제사항들의 변경 등으로 기업 및 사용자들은 그저 혼란스럽기만 합니다.

    2019년 가트너에서 발표한 SASE(Secure Access Service Edge, 새시)라는 클라우드 환경기반의 미래지향적 보안 모델이자 개념이 2020년 Covid-19 가 촉발한 업무환경의 변화에 따라 더욱 주목받고 있습니다.

    앞으로 SASE가 바꿔 갈 엔터프라이즈 보안시장은 어떠할지, 기업들은 왜 SASE라는 개념을 이해하고 실행해야 하는지, 도입하려면 무엇부터 어디서 시작해야 하는지, 궁극적으로 이뤄내야 하는 가치들은 어떠한 것들이 있는지 엔터프라이즈 보안의 시선에서 말씀드리고자 합니다.

    발표자: 전 창 우, Senior Enterprise Security Engineer, Akamai Technologies
    진행자: 박 선 영, Senior Business Development Manager, APAC, (ISC)²
  • UEBAを活用したThreat Huntingの現在と実例のご紹介 Recorded: Nov 11 2020 59 mins
    日原 茂, シニアセールスエンジニア, Exabeam
    情報漏洩の兆候を検知するために、迅速に答えるべき重要な質問が沢山あります。皆様はすぐにお答えできますか?
     誰がサーバーへアクセスしたのか?
     ハッカーによるダメージは何か?
     システムがマルウェア感染していないか?
     ハッカーはVPN経由でネットワークへアクセスしたか、そしてどこからか?

    多くの企業にとってこれらの質問に答えることは容易ではなく、スキルある人材と多くの時間を必要とします。

    企業のセキュリティアナリスト達は、最新の脅威検知技術を活用することで、インフラストラクチャーを脅威にさらす可能性のある特定の脅威を簡単、かつ効果的に検知し、全ての関連アクティビティを可視化できます。

    本セッションでは、最新の脅威検知技術を活用することで、どのようにして先を見越し、常にサイバーセキュリティ対応において先を行き、既に起きてしまった脅威への迅速な対応し、常にチームへ異常なネットワークアクティビティに関する様々な情報を知らせ、必要であれば更なる調査を可能にするかを紹介いたします。

    Presenter: 日原 茂, シニアセールスエンジニア, Exabeam
    Moderator: 小熊 慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • Emotetの台頭–日本のフィッシング脅威の進化 Recorded: Nov 4 2020 61 mins
    藤田 平, CISSP, Principal Engineer, Japan, Cofense
    あなたの従業員は防衛戦略を成功させる鍵です

    Emotetは、日本の多くの組織にとって深刻なフィッシングの脅威になっています。ボットネットはセキュアEメールゲートウェイ(SEG)を回避するように進化し、これらの高度に巧妙に細工された標的型攻撃は従業員をだまして悪意のあるメールを操ります。ネットワークは危険にさらされており、会社のセキュリティ侵害に対する露出とリスクが高まっています。

    悪意のある脅威がテクノロジー(セキュリティ製品)によってブロックされていない場合、どのようにして組織を防御すれば良いでしょうか?

    メールボックス内のフィッシングメールを検出して対応する方法をトレーニングすることにより、従業員を防御チームの最前線に活用しましょう。 Cofenseのセキュリティ専門家である藤田平氏がCofenseのインテリジェンスチームと研究チームによって観測された、攻撃者と長年にわたる脅威の進化についての詳細なレビューをご紹介します。

    ウェビナーに参加して以下の点を習得しましょう:
    • EmotetがセキュアEメールゲートウェイ(SEG)を回避するために使用するさまざまなス. タイルとテクニックを理解する
    • 今日の組織を標的としたフィッシング脅威の状況に関する洞察を得る
    • 増大する脅威からよりよく防御するための戦略とベストプラクティスを学ぶ

    Presenter: 藤田 平, CISSP, Principal Engineer, Japan, Cofense
    Moderator: 小熊 慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • Don't Miss the BIGGEST (ISC)2 Security Congress Yet! Recorded: Nov 3 2020 1 min
    (ISC)2
    Join thousands of cybersecurity professionals at all levels for three days of industry discussion, continuing education and networking, November 16 – 18. Get your passes at: https://securitycongress.brighttalk.live/passes/
  • Trusted Identities for a Digital World Recorded: Oct 21 2020 63 mins
    Rajan Barara, Director Product Management, Identity, Entrust
    Fueled by mobile and cloud adoption, the traditional security perimeter is gone, replaced by distributed decentralized identities and requirements to support Zero Trust environments. Protecting the identities of workers, consumers, and citizens is key to preventing uncontrolled access, data breaches, and fraudulent transactions. Join Entrust and (ISC)² on Oct 21, 2020 (Wed) at 10am (GMT +8), session participants will learn best practices to be able to build the strong foundation needed to realize a Zero Trust Framework. This includes:

    - High assurance credential-based passwordless access for workforces
    - Passwordless access for consumers using phone biometrics or FIDO tokens
    - Best-in-class multi-factor authentication (MFA)
    - Single sign-on (SSO)
    - Adaptive risk-based authentication

    Presenter: Rajan Barara, Director Product Management, Identity, Entrust
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • NDRが実現する侵害を前提としたサイバー攻撃対策 Recorded: Oct 14 2020 63 mins
    藤田 達也, シニア・セールスエンジニア, ExtraHop
    今日の脅威の状況下において、多くの組織は、境界を保護するために複数のソリューションを導入していますが、侵害後の攻撃者の活動についての可視性は非常に限られたものとなっています。攻撃者は、そのようなブラインドスポットを利用して偵察を行い、内部ネットワークを巧みに移動しながら、長期間潜伏し、最終的には目的を達成します。
    本セッションでは、NDRが機械学習を利用し攻撃者の活動をリアルタイムに可視化し、調査・対応プロセスを支援することによってどのようにセキュリティ運用に役立つのかをデモを交えながらご紹介します。またハイブリッド環境、マルチクラウド環境、テレワーク環境、IoT環境におけるNDRの有効性をユースケース含めご説明します。

    Presenter: 藤田 達也, シニア・セールスエンジニア, ExtraHop
    Moderator: 小熊 慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • Modern Threat Hunting Using MITRE ATT&CK Recorded: Oct 14 2020 63 mins
    Harjith Prabhakar, Product Director, Exabeam; Eric Ng, Regional Security Engineer, Exabeam
    Lead your team’s search to uncover modern attacks by detecting and responding to common tactics, techniques, and procedures (TTPs) used by attackers. Join Exabeam and (ISC)² on Oct 14, 2020 (Wed) at 11am (GMT +8), we’ll explore the evolution of threat hunting from focusing on Indicators of Compromise to TTPs; an overview of the MITRE ATT&CK framework and how to use it; and a live threat hunting exercise. You will leave this webinar more knowledgeable about how to uncover the entirety of attacks by focusing on TTPs, rather than simply stringing together the artifacts and IoCs, and how the MITRE ATT&CK framework can be leveraged in the process.

    Presenter: Harjith Prabhakar, Product Director, Exabeam
    Presenter: Eric Ng, Regional Security Engineer, Exabeam
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • CISSPチャレンジセミナー Recorded: Oct 8 2020 181 mins
    長谷川 長一氏, (ISC)² 認定講師; 小熊 慶一郎, CISSP, (ISC)² Director of Business Development, Japan
    「Withコロナ時代のセキュリティの考え方 ~そして、将来も通用する考え方~」

    新型肺炎コロナウイルスの感染拡大で、企業活動も普段の生活も大きな変化と急な対応を余儀なくされました。
    事業継続計画に基づいた活動やテレワークの導入や従業員の管理とそのセキュリティ、など、企業でも多様な対応に追われました。
    皆様の会社では、十分に対応できたでしょうか。できなかったとすれば、どのような対応や考え方、セキュリティ対策をすべきだったのでしょうか。

    CISSPの8ドメインは情報セキュリティ活動のあり方について基盤づくりから学び、実践的な対策を行うための考えかたを構築するために必要な情報が集約されています。今回のセミナーでは「CISSPならこう考える」ということで、経営陣やCISO、CSIRTのメンバーが知っておくべき情報セキュリティの知識をわかりやすくお話します。通常は5日間で行っているオフィシャルセミナーの中から、現在、そしてこれからのセキュリティ対策に大きく関係するセキュリティとリスクマネジメント、アイデンティティとアクセスの管理、セキュリティの運用を中心に8ドメインのトピックをご理解いただくためのオンラインショートセミナーを行います。

    CISSPを受験させてみたいけど、どのような内容になっているのかわからないという経営層の皆さんにも理解しやすい内容で提供させていただきます。情報セキュリティベンダーで製品・サービス企画を行っている皆さんにも効果的な内容となっています。
  • Ransomware Steps Up: New Variants & Better Tactics to Defend and Defeat Threats Recorded: Oct 7 2020 62 mins
    Mike Zuckerman, Consulting Senior Product Marketing Manager, Infoblox
    Learn more from our updated 2020 threat actor activity.

    We'll share recent research on the emergence of Qakbot InfoStealer, the Return of Emotet, Vidar InfoStealer, and much more. Ransomware as a service continues to grow. The successful monetization of ransomware continue to drive an increase in overall ransomware attacks.

    What tactics are threat actors using to be successful, and what can you do differently and better to defend against them?

    Join Infoblox and (ISC)² on Oct 7, 2020 (Wed) at 10am (GMT +8), we will review the latest threats and research and share more on the global ransomware assault.

    Key takeaways:
    • New and recently emerged malware variants and trends
    • How these differ from other variants we have seen in the past
    • What defensive tactics work, and what has failed in the past
    • What the state of ransomware looks like

    Presenter: Mike Zuckerman, Consulting Senior Product Marketing Manager, Infoblox
    Moderator: Clayton Jones, Managing Director, APAC, (ISC)²
  • CCSPチャレンジセミナー Recorded: Oct 5 2020 120 mins
    諸角 昌宏氏, CCSP, (ISC)² 認定講師
    (ISC)² が認定する、クラウドセキュリティに関する情報セキュリティ国際認定資格、「CCSP」のチャレンジセミナーを開催します。サイバー・情報・クラウドコンピューティングセキュリティの実務経験に基づく専門的能力と、クラウドセキュリティの専門知識を認証することで、企業は、重要な機能に対して適切な専門家が対応していることを確認することができます。「クラウドファースト」や「働き方改革/テレワーク」を推進する組織において、クラウドサービスやその利用における情報セキュリティを確実にするため、 CCSP有資格者に管理を任せるケースが増加しています。

    CCSPの6ドメインは、クラウドセキュリティの基礎知識から実践的な対策を行うための考えかたを系統立てて理解するために必要な情報が集約されています。また、CCSPを受験させてみたいけど、どのような内容になっているのかわからないという経営層の皆さんにも理解しやすい内容で提供させていただきますし、情報セキュリティベンダーで製品・サービス企画を行っている皆さんにも効果的な内容となっています。

    今回のセミナーでは 、通常は5日間で行っているオフィシャルセミナーの各ドメインのオーバービューを紹介するとともに、各ドメインにおいて重要となるポイントをピックアップして解説します。今回は、CCSP CBKから「働き方改革/テレワーク環境で必要とされるクラウドセキュリティとは」をテーマに、新たな内容を加えたセミナーとします。
  • Tycoon Ransomware and Zero Trust Threat Prevention Recorded: Sep 30 2020 64 mins
    Steve Struthers, BlackBerry; Konrads Klints, KPMG Singapore
    The BlackBerry Research and Intelligence team in partnership with KPMG’s Cyber Response Services team recently unearthed and named a new ransomware strain written in Java. The researchers have dubbed the ransomware “Tycoon.”

    Tycoon is a multi-platform Java ransomware targeting Windows® and Linux® that has been observed in-the-wild since at least December 2019. It is deployed in the form of a Trojanized Java Runtime Environment (JRE) and leverages an obscure Java image format to fly under the radar.

    The threat actors behind Tycoon were observed using highly targeted delivery mechanisms to infiltrate small to medium sized companies and institutions in education and software industries, where they would proceed to encrypt file servers and demand a ransom. However, due to the reuse of a common RSA private key it may be possible to recover data without the need for payment in earlier variants.

    Join BlackBerry, KPMG and (ISC)² on Sept 30, 2020 (Wed) at 12p.m. (GMT +8) to learn the latest Ransomware trends and threat prevention, with case studies on what should be the main defence in the modern ransomware attacks.

    Presenter: Steve Struthers, VP, Global Solutions & Alliance, BlackBerry
    Presenter: Konrads Klints, Director of Cyber Security and Incident Response, KPMG Singapore
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • (ISC)² Info Session: SSCP - The Premier Security Administrator Certification Recorded: Sep 24 2020 62 mins
    Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
    Earning a globally recognized advanced security administration and operations certification like the SSCP is a great way to grow your career and better secure your organization’s critical assets.

    The SSCP is ideal for IT administrators, managers, directors and network security professionals responsible for the hands-on operational security of their organization’s critical assets.

    In this info-session, we will cover:
    - How large the cybersecurity workforce gap is today
    - The value of (ISC)² certification
    - What you will learn in training for the SSCP exam
    - What to expect from the SSCP exam
    - How to become endorsed and earn the SSCP certification

    And, get to ask any question that will support your certification journey.

    =====================================================================

    The SSCP certification demonstrates you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures.

    More details >> www.isc2.org/sscp

    Are you ready to prove yourself? Register and begin your certification journey today!
  • (ISC)² Info Session: CSSLP-The Premier Secure Software Development Certification Recorded: Sep 17 2020 63 mins
    Tony Vizza, CISSP, CCSP, Director of Cyber Security Advocacy - APAC, (ISC)²
    Earning the globally recognized CSSLP secure software development certification is a proven way to build your career and better incorporate security practices into each phase of the software development lifecycle (SDLC).

    The CSSLP is ideal for software development and security professionals responsible for applying best practices to each phase of the SDLC – from software design and implementation to testing and deployment.

    In this info-session, we will cover:
    - How large the cybersecurity workforce gap is today
    - The value of (ISC)² certification
    - What you will learn in training for the CSSLP exam
    - What to expect from the CSSLP exam
    - How to become endorsed and earn the CSSLP certification

    And, get to ask any question that will support your certification journey.

    =====================================================================

    The CSSLP certification recognizes leading application security skills. It shows employers and peers you have the advanced technical skills and knowledge necessary for authentication, authorization and auditing throughout the SDLC using best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Effective September 15, 2020, the CSSLP exam will be based on a new exam outline. The domains and their weights have changed.

    More details >> www.isc2.org/csslp

    Are you ready to prove yourself? Register and begin your certification journey today!
  • 不正ログイン、買い占めにおけるボットの進化と変化 Recorded: Sep 16 2020 62 mins
    アジェイ・ミスラ, セキュリティストラテジー ディレクター, Akamai Technologies
    攻撃や業務の妨げになる悪性ボットの活動実態を示します。ダークウェブなどの闇市場を介して繋がる攻撃側のエコシステムや、実際利用されているツールや最新の手口の傾向を明らかにし、攻撃観測データからみた攻撃傾向の変化について考察します。また最近、アカマイ観測史上の記録を更新した2件の大規模なDDoSについても解説します。

    Presenter: アジェイ・ミスラ, セキュリティストラテジー ディレクター, Akamai Technologies
    Moderator: 小熊 慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • (ISC)² Info Session: CCSP - The Industry’s Premier Cloud Security Certification Recorded: Sep 10 2020 63 mins
    Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
    Earning the globally recognized CCSP cloud security certification is a proven way to build your career and better secure critical assets in the cloud.

    The CCSP is ideal for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration.

    In this info-session, we will cover:

    - How large the cybersecurity workforce gap is today
    - The value of (ISC)² certification
    - What you will learn in training for the CCSP exam
    - What to expect from the CCSP exam
    - How to become endorsed and earn the CCSP certification

    And, get to ask any question that will support your certification journey.

    ===================================================================

    The CCSP shows you have the advanced technical skills and knowledge to design, manage and secure data, applications and infrastructure in the cloud using best practices, policies and procedures.

    More details >> www.isc2.org/ccsp

    Are you ready to prove yourself? Register and begin your certification journey today!
Live Webinars for InfoSec Professionals in Asia Pacific Time Zone
Looking for expertise and information to advance your career and tackle your challenges? Subscribe and join us for the educational webinars in APAC time zone. Earn CPEs quickly and at no cost by attending webinars: 1 hour of webinar equals 1 CPE. We welcome members and non members alike.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 원격/재택 근무 환경의 비즈니스 연속성 구현, 보안의 현 주소는?
  • Live at: Apr 22 2020 6:00 am
  • Presented by: 백 용 기, Senior Enterprise Security Executive, Akamai Technologies
  • From:
Your email has been sent.
or close