Supporting Event: Certified Information Systems Security Professional (CISSP® ) certification (25 Jun 2018)

Supporting Event: Certified Information Systems Security Professional (CISSP® ) certification (25 Jun 2018)

Certified Information Systems Security Professional (CISSP®) certification Date: 25-29 June,...

Supporting Event: GDPR Hands-on workshop 2018 (26 Jun 2018)

GDPR Hands-on workshop 2018 Date: 26th June, 2018 (Tue)Time: 9:00am - 6:00PM (Whole day workshop...

Supporting: (ISC)2 Online Training Options (Especially for APAC based candidates)

Supporting: (ISC)2 Online Training Options (Especially for APAC based candidates)

1. CISSP Online Instructor-Led Training30 Apr - 27 Jun 2018 (19:00-21:30 | GMT+8)Training Only:...

  • Supporting Event: Certified Information Systems Security Professional (CISSP® ) certification (25 Jun 2018)

    Supporting Event: Certified Information Systems Security Professional (CISSP® ) certification (25...

  • Supporting Event: GDPR Hands-on workshop 2018 (26 Jun 2018)

  • Supporting: (ISC)2 Online Training Options (Especially for APAC based candidates)

    Supporting: (ISC)2 Online Training Options (Especially for APAC based candidates)

(ISC)2 APAC Secure Webinar - Stronger Security Posture through Zero Trust and API Management

Date: 09 May 2018 (Wednesday)
Time: 13:00 Hong Kong Time (Duration: 1 hour)
Register: https://www.isc2.org/News-and-Events/Webinars/APAC-Webinars?commid=314771

Highlight:

Organizations today are facing multiple challenges on providing an enhanced digital experience to their customers, whilst ensuring confidential data remains secure in accordance to evolving regulatory and compliance regimes. While APIs are the core of digital experiences, including single-page apps and mobile applications, traditional perimeter security architecture is no longer enough to protect your business and you must concurrently evolve your security approach.

In this webinar, Akamai will be sharing findings on how adopting a zero trust model will increase the security posture of organisation through a "Never Trust, Always Verify" paradigm. We will also look at how the API threat landscape have evolved and share best practises in API security.

NOTE: 1 CPE will be submitted automatically to the (ISC)² members' accounts (Member ID required)