Hi [[ session.user.profile.firstName ]]

(ISC)² Info Session: SSCP - The Premier Security Administrator Certification

Earning a globally recognized advanced security administration and operations certification like the SSCP is a great way to grow your career and better secure your organization’s critical assets.

The SSCP is ideal for IT administrators, managers, directors and network security professionals responsible for the hands-on operational security of their organization’s critical assets.

In this info-session, we will cover:
- How large the cybersecurity workforce gap is today
- The value of (ISC)² certification
- What you will learn in training for the SSCP exam
- What to expect from the SSCP exam
- How to become endorsed and earn the SSCP certification

And, get to ask any question that will support your certification journey.


The SSCP certification demonstrates you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures.

More details >> www.isc2.org/sscp

Are you ready to prove yourself? Register and begin your certification journey today!
Recorded Sep 24 2020 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
Presentation preview: (ISC)² Info Session: SSCP - The Premier Security Administrator Certification

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Protect your keys – or don’t waste your time encrypting your data Mar 3 2021 3:00 am UTC 60 mins
    Ian Christofis, CISSP, Principal Managing Consultant, Entrust; Jiro Shindo, Director, Digital Security Solutions, Entrust
    In these unprecedented times, we need to focus on protecting the health, security and productivity of customers, partners and colleagues. We also know that now more than ever, when dealing with new working environments, vulnerability risks and other issues, data protection is essential. We have to support and protect our business critical data in these challenging times.

    Did you know that….
    • Cryptographic keys stored in software are not hard to find?
    • On average, a hacker has 160 days before they are detected in your network?
    • Modern encryption solutions cannot be decrypted through deciphering techniques?

    We’ll discuss how to solve real-world issues by using hardware security modules (HSMs); regardless of company size or vertical market.

    Join Entrust and (ISC)² on Mar 3, 2021 (Wed) at 11am (GMT +8), you’ll also discover why it’s important to protect the crypto keys associated with Database Encryption, File Encryption, Digital Signatures & Certificates, IoT Device Certification, Blockchain, Digital Payments, SSL, PKI and more.

    Presenter: Ian Christofis, CISSP, Principal Managing Consultant, Entrust
    Presenter: Jiro Shindo, Director, Digital Security Solutions, Entrust
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • CISSPオンラインチャレンジセミナー Feb 5 2021 6:00 am UTC 120 mins
    小熊慶一郎, CISSP, (ISC)² Director of Business Development, Japan; 安田良明, CISSP, SSCP, (ISC)² 認定講師


  • 设备标识符在不同场景中的应用前景 Recorded: Jan 20 2021 61 mins
    陈玉奇, F5亚太区安全架构师, F5 Networks

    参加F5 Networks和 (ISC)² 在1月20日下午2:00至3:00的在线研讨会,聆听专家分析探讨本地、云端不同设备标识符产生的优劣势,以及在不同业务场景中的应用前景,分析设备标识符在防欺诈场景中与其他维度数据结合的益处,还等什么?赶紧加入我们吧。


    演讲人: 陈玉奇, F5亚太区安全架构师, F5 Networks
    主持人: 阎光, CISSP, (ISC)² 上海分会会员主席
  • Adopting Zero Trust for Remote Access Recorded: Jan 20 2021 61 mins
    Ajay Kumar, Director for Security Engineering - APJ, BeyondTrust
    By definition, a Zero Trust security model advocates the creation of zones and segmentation to control sensitive IT resources. This also entails the deployment of technology to monitor and manage data between zones, and more importantly, user interactions within a zone(s). A Zero Trust security model redefines the architecture of a trusted network inside a defined corporate perimeter. This is relevant today since technologies and processes like the cloud, DevOps, and IoT have either blurred, or dissolved altogether, the idea of a traditional perimeter.

    While the Zero Trust model has become a trendy catchword in IT, it is complex and difficult to implement for many organizations in Asia Pacific, because it requires the establishment of a model of trust, verification, and continuous evaluation of trust for further access and lateral movement.

    Join BeyondTrust and (ISC)² on Jan 20, 2021 (Wed) at 11am (GMT +8), Ajay Kumar, Director for Security Engineering at BeyondTrust, review the practical shortcomings and limitations of a Zero Trust model, and explain how to achieve Zero Trust using the Privileged Remote Access model.

    Presenter: Ajay Kumar, Director for Security Engineering - APJ, BeyondTrust
    Moderator: Hoo Chuan-Wei, CISSP, Technical Advisor - Asia-Pacific, (ISC)²
  • CCSPチャレンジセミナー Recorded: Jan 15 2021 121 mins
    諸角 昌宏氏, CCSP, (ISC)² 認定講師; 小熊 慶一郎, CISSP, (ISC)² Director of Business Development, Japan
    (ISC)² が認定する、クラウドセキュリティに関する情報セキュリティ国際認定資格、「CCSP」のチャレンジセミナーを開催します。サイバー・情報・クラウドコンピューティングセキュリティの実務経験に基づく専門的能力と、クラウドセキュリティの専門知識を認証することで、企業は、重要な機能に対して適切な専門家が対応していることを確認することができます。「クラウドファースト」を推進する組織において、クラウドサービスやその利用における情報セキュリティを確実にするため、 CCSP有資格者に管理を任せるケースが増加しています。


    今回のセミナーでは 、通常は5日間で行っているオフィシャルセミナーの各ドメインのオーバービューを紹介するとともに、各ドメインにおいて重要となるポイントをピックアップして解説します。今回は、CCSP CBKから「DX化を推進するクラウドセキュリティとは」をテーマに、新たな内容を加えたセミナーとします。
  • Critical Cybersecurity Misconceptions That Are Harming Your Business (以粵語進行) Recorded: Dec 16 2020 62 mins
    Ryan Lo, Manager of Solutions Engineering, Shape Security (Part of F5)
    Today’s applications have become the focal point for cybercriminals, on which financial fraud and abuse are constantly happening. A misunderstanding of what does and does not protect your digital footprint can lead to devastating breaches, while some companies are still believe in and even base real business decisions and security outcomes on misconceptions. It's critical to bust the myths and get back to better protection.

    Join F5 and (ISC)² on Dec 16, 2020 (Wed) at 11am (Hong Kong Time) as Ryan Lo, Manager of Solutions Engineering from Shape Security (part of F5), separates fact from fiction when it comes to defending your apps from sophisticated attacks, including:

    • Understanding how MFA just adds more information to the dossier of a targeted account.
    • CAPTCHA is a fabled response to a sophisticated problem, like bots.
    • Password schemes won’t protect user accounts from being taken over.

    Presenter: Ryan Lo, Manager of Solutions Engineering, Shape Security (Part of F5)
    Moderator: Otto Lee, CISSP, CCSP, CSSLP, Membership Chair, (ISC)² Hong Kong Chapter

    *This webinar will be conducted in Cantonese. (本次網上研討會將以粵語進行。)
  • Maximizing the Value of Threat Intelligence Recorded: Dec 9 2020 63 mins
    Bob Hansmann, Sr. Product Marketing Manager – Security, Infoblox
    ‘Threat intelligence’ has become a general term that may refer to many different types of data sets used to meet very different security needs. Threat prevention and detection solutions (i.e. NGFW, SWG, EDR) are only as good as the threat intelligence driving their analytics. Threat investigation and incident response activities are limited and slow without timely access to sufficient event, network, and threat intelligence. This requires defenders to better understand their intelligence needs, how to identify and map appropriate threat feeds to each need, and the tools available to drive maximum value from threat intelligence.

    Join Infoblox and (ISC)² on Dec 9, 2020 (Wed) at 10am (GMT +8), we will review the state of the threat intelligence industry, using public and private research from the last year on the quality and applicability of public, private, and proprietary feeds. We will demonstrate the current state of the market for applying threat intelligence to real-world problems, including:

    - Automating multi-feed normalization into a ‘super-feed’ for a more effective defensive security stack
    - Speeding investigation and response through event, metadata, and threat intelligence correlation
    - Leveraging threat intelligence of threat actor objectives, methods, and tactics to drive quick incident resolution

    Presenter: Bob Hansmann, Sr. Product Marketing Manager – Security, Infoblox
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • 边缘之上的客户身份管理蓝图 Recorded: Dec 2 2020 56 mins
    李国庆, 亚太区高级云安全架构师, Akamai Technologies

    参加Akamai Technologies和 (ISC)² 在12月2日下午2:00至3:00的在线研讨会,聆听专家分析客户身份管理安全,还等什么?赶紧加入我们吧。


    演讲人: 李国庆, 亚太区高级云安全架构师, Akamai Technologies
    主持人: 李杺恬, CISSP, (ISC)²北京分会理事
  • SSCPオンラインチャレンジセミナー Recorded: Nov 30 2020 121 mins
    安田良明, CISSP, SSCP, (ISC)² 認定講師; 小熊慶一郎, CISSP, (ISC)² Director of Business Development, Japan




  • Cybersecurity Frameworks - How Helpful Are They Really? Recorded: Nov 25 2020 63 mins
    Sid Deshpande, Akamai Technologies; Amol Dabholkar, Deloitte & Touche Enterprise Risk Services
    Gartner's Secure Access Service Edge (SASE) is the newest addition to a collection of cybersecurity frameworks security practitioners rely on to plan their security architecture strategy. Other popular ones are the NIST Zero Trust Architecture, MITRE Attack among others. These frameworks are certainly useful in 'normal' times, but can security practitioners benefit from them in uncertain times like these, when long term planning is proving to be tough?

    Join Akamai Technologies and (ISC)² on Nov 25, 2020 (Wed) at 1pm (GMT +8), this session will explore trends and best practices around how these frameworks can be most useful to security practitioners today.

    Presenter: Sid Deshpande, Director of Security Strategy, Akamai Technologies
    Presenter: Amol Dabholkar, Director, SEAsia, Cloud Security & DevSecOps, Deloitte & Touche Enterprise Risk Services
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • 급부상하는 SASE와 Zero Trust의 시대 Recorded: Nov 18 2020 63 mins
    전 창 우, Senior Enterprise Security Engineer, Akamai Technologies
    예상치 못한 글로벌 팬데믹 사태로 인하여 장기화된 경제 위기, 갑자기 촉진화된 재택 및 원격 근무 시행, 멀티 클라우드, SaaS 애플리케이션의 전격 업무 도입, 이에 따른 개인정보보호법 및 각종 IT 규제사항들의 변경 등으로 기업 및 사용자들은 그저 혼란스럽기만 합니다.

    2019년 가트너에서 발표한 SASE(Secure Access Service Edge, 새시)라는 클라우드 환경기반의 미래지향적 보안 모델이자 개념이 2020년 Covid-19 가 촉발한 업무환경의 변화에 따라 더욱 주목받고 있습니다.

    앞으로 SASE가 바꿔 갈 엔터프라이즈 보안시장은 어떠할지, 기업들은 왜 SASE라는 개념을 이해하고 실행해야 하는지, 도입하려면 무엇부터 어디서 시작해야 하는지, 궁극적으로 이뤄내야 하는 가치들은 어떠한 것들이 있는지 엔터프라이즈 보안의 시선에서 말씀드리고자 합니다.

    발표자: 전 창 우, Senior Enterprise Security Engineer, Akamai Technologies
    진행자: 박 선 영, Senior Business Development Manager, APAC, (ISC)²
  • UEBAを活用したThreat Huntingの現在と実例のご紹介 Recorded: Nov 11 2020 59 mins
    日原 茂, シニアセールスエンジニア, Exabeam




    Presenter: 日原 茂, シニアセールスエンジニア, Exabeam
    Moderator: 小熊 慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • Emotetの台頭–日本のフィッシング脅威の進化 Recorded: Nov 4 2020 61 mins
    藤田 平, CISSP, Principal Engineer, Japan, Cofense



    メールボックス内のフィッシングメールを検出して対応する方法をトレーニングすることにより、従業員を防御チームの最前線に活用しましょう。 Cofenseのセキュリティ専門家である藤田平氏がCofenseのインテリジェンスチームと研究チームによって観測された、攻撃者と長年にわたる脅威の進化についての詳細なレビューをご紹介します。

    • EmotetがセキュアEメールゲートウェイ(SEG)を回避するために使用するさまざまなス. タイルとテクニックを理解する
    • 今日の組織を標的としたフィッシング脅威の状況に関する洞察を得る
    • 増大する脅威からよりよく防御するための戦略とベストプラクティスを学ぶ

    Presenter: 藤田 平, CISSP, Principal Engineer, Japan, Cofense
    Moderator: 小熊 慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • Don't Miss the BIGGEST (ISC)2 Security Congress Yet! Recorded: Nov 3 2020 1 min
    Join thousands of cybersecurity professionals at all levels for three days of industry discussion, continuing education and networking, November 16 – 18. Get your passes at: https://securitycongress.brighttalk.live/passes/
  • Trusted Identities for a Digital World Recorded: Oct 21 2020 63 mins
    Rajan Barara, Director Product Management, Identity, Entrust
    Fueled by mobile and cloud adoption, the traditional security perimeter is gone, replaced by distributed decentralized identities and requirements to support Zero Trust environments. Protecting the identities of workers, consumers, and citizens is key to preventing uncontrolled access, data breaches, and fraudulent transactions. Join Entrust and (ISC)² on Oct 21, 2020 (Wed) at 10am (GMT +8), session participants will learn best practices to be able to build the strong foundation needed to realize a Zero Trust Framework. This includes:

    - High assurance credential-based passwordless access for workforces
    - Passwordless access for consumers using phone biometrics or FIDO tokens
    - Best-in-class multi-factor authentication (MFA)
    - Single sign-on (SSO)
    - Adaptive risk-based authentication

    Presenter: Rajan Barara, Director Product Management, Identity, Entrust
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • NDRが実現する侵害を前提としたサイバー攻撃対策 Recorded: Oct 14 2020 63 mins
    藤田 達也, シニア・セールスエンジニア, ExtraHop

    Presenter: 藤田 達也, シニア・セールスエンジニア, ExtraHop
    Moderator: 小熊 慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • Modern Threat Hunting Using MITRE ATT&CK Recorded: Oct 14 2020 63 mins
    Harjith Prabhakar, Product Director, Exabeam; Eric Ng, Regional Security Engineer, Exabeam
    Lead your team’s search to uncover modern attacks by detecting and responding to common tactics, techniques, and procedures (TTPs) used by attackers. Join Exabeam and (ISC)² on Oct 14, 2020 (Wed) at 11am (GMT +8), we’ll explore the evolution of threat hunting from focusing on Indicators of Compromise to TTPs; an overview of the MITRE ATT&CK framework and how to use it; and a live threat hunting exercise. You will leave this webinar more knowledgeable about how to uncover the entirety of attacks by focusing on TTPs, rather than simply stringing together the artifacts and IoCs, and how the MITRE ATT&CK framework can be leveraged in the process.

    Presenter: Harjith Prabhakar, Product Director, Exabeam
    Presenter: Eric Ng, Regional Security Engineer, Exabeam
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • CISSPチャレンジセミナー Recorded: Oct 8 2020 181 mins
    長谷川 長一氏, (ISC)² 認定講師; 小熊 慶一郎, CISSP, (ISC)² Director of Business Development, Japan
    「Withコロナ時代のセキュリティの考え方 ~そして、将来も通用する考え方~」



  • Ransomware Steps Up: New Variants & Better Tactics to Defend and Defeat Threats Recorded: Oct 7 2020 62 mins
    Mike Zuckerman, Consulting Senior Product Marketing Manager, Infoblox
    Learn more from our updated 2020 threat actor activity.

    We'll share recent research on the emergence of Qakbot InfoStealer, the Return of Emotet, Vidar InfoStealer, and much more. Ransomware as a service continues to grow. The successful monetization of ransomware continue to drive an increase in overall ransomware attacks.

    What tactics are threat actors using to be successful, and what can you do differently and better to defend against them?

    Join Infoblox and (ISC)² on Oct 7, 2020 (Wed) at 10am (GMT +8), we will review the latest threats and research and share more on the global ransomware assault.

    Key takeaways:
    • New and recently emerged malware variants and trends
    • How these differ from other variants we have seen in the past
    • What defensive tactics work, and what has failed in the past
    • What the state of ransomware looks like

    Presenter: Mike Zuckerman, Consulting Senior Product Marketing Manager, Infoblox
    Moderator: Clayton Jones, Managing Director, APAC, (ISC)²
  • CCSPチャレンジセミナー Recorded: Oct 5 2020 120 mins
    諸角 昌宏氏, CCSP, (ISC)² 認定講師
    (ISC)² が認定する、クラウドセキュリティに関する情報セキュリティ国際認定資格、「CCSP」のチャレンジセミナーを開催します。サイバー・情報・クラウドコンピューティングセキュリティの実務経験に基づく専門的能力と、クラウドセキュリティの専門知識を認証することで、企業は、重要な機能に対して適切な専門家が対応していることを確認することができます。「クラウドファースト」や「働き方改革/テレワーク」を推進する組織において、クラウドサービスやその利用における情報セキュリティを確実にするため、 CCSP有資格者に管理を任せるケースが増加しています。


    今回のセミナーでは 、通常は5日間で行っているオフィシャルセミナーの各ドメインのオーバービューを紹介するとともに、各ドメインにおいて重要となるポイントをピックアップして解説します。今回は、CCSP CBKから「働き方改革/テレワーク環境で必要とされるクラウドセキュリティとは」をテーマに、新たな内容を加えたセミナーとします。
(ISC)² Live Webinars for InfoSec Professionals in APAC Region
Looking for expertise and information to advance your career and tackle your challenges? Subscribe and join us for the educational webinars in APAC time zone. Earn CPEs quickly and at no cost by attending webinars: 1 hour of webinar equals 1 CPE. We welcome members and non members alike.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: (ISC)² Info Session: SSCP - The Premier Security Administrator Certification
  • Live at: Sep 24 2020 6:00 am
  • Presented by: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • From:
Your email has been sent.
or close