Information Security Management - Guidelines for Cyber Insurance (16 Apr 2019)

Information Security Management - Guidelines for Cyber Insurance (16 Apr 2019)

Information Security Management - Guidelines for Cyber Insurance Date: 16-Apr (Tue)Time: 7:00pm...

"Phishing scams? No more!" Seminar (03 May 2019)

Build a Secure Cyberspace 2019"Phishing scams? No more!" Seminar Date: 2019-05-03Time: 14:30 –...

DevSecOps - Web Application Firewall in a CI/CD Workflow (10 Apr 2019)

DevSecOps - Web Application Firewall in a CI/CD Workflow (10 Apr 2019)

DevSecOps - Web Application Firewall in a CI/CD Workflow Date: 10 April 2019 (Wed)Time:...

  • Information Security Management - Guidelines for Cyber Insurance (16 Apr 2019)

    Information Security Management - Guidelines for Cyber Insurance (16 Apr 2019)

  • "Phishing scams? No more!" Seminar (03 May 2019)

  • DevSecOps - Web Application Firewall in a CI/CD Workflow (10 Apr 2019)

    DevSecOps - Web Application Firewall in a CI/CD Workflow (10 Apr 2019)

(ISC)2 APAC Secure Webinar - Security at Network Speeds

Date: 18 Apr 2018 (Wednesday)
Time: 14:00 Hong Kong  (Duration: 1 Hour)
Registration: https://www.isc2.org/News-and-Events/Webinars/APAC-Webinars?commid=312817
Fee: Free of charge to members and non-members

Highlight:

Exponentially increasing network traffic volumes and security tool sprawl are overwhelming security operations and network operations teams. A network packet broker is supposed to eliminate complexity and save costs, not add to them!
 
Organizations need to:
•    Deliver just the right data to the right tools.
•    Drive consolidation across their security stack.
•    Manage a common platform across physical, virtual and public cloud environments.
 
Hence, a next-generation network packet broker is required to deliver visibility to security tools focused on threat prevention, detection, analytics and forensics. The right tools get the right traffic at the right time, every time.
 
Attend this webinar to learn how to:
•    Maximize tool performance and ROI by applying advanced traffic intelligence.
•    Rapidly detect and respond to new threats while eliminating security tool sprawl.
•  Have pervasive and consistent visibility across their physical, virtual and cloud infrastructure.

NOTE: 1 CPE will be submitted automatically to the (ISC)² members' accounts (Member ID required)