Understanding What is New in China Cybersecurity Law and What We Cannot Do (26 Apr 2018)

Understanding What is New in China Cybersecurity Law and What We Cannot Do (26 Apr 2018)

Understanding What is New in China Cybersecurity Law and What We Cannot Do Date: 26-April 2018...

Supporting Event: "Stay Smart, Keep Cyber Scam Away" Seminar (25 May 2018)

"Stay Smart, Keep Cyber Scam Away" SeminarBuild a Secure Cyberspace 2018 Date: 2018-05-25Time:...

(ISC)2 APAC Secure Webinar - Stronger Security Posture through Zero Trust and API Management (9 May 2018)

(ISC)2 APAC Secure Webinar - Stronger Security Posture through Zero Trust and API Management (9 May 2018)

(ISC)2 APAC Secure Webinar - Stronger Security Posture through Zero Trust and API...

  • Understanding What is New in China Cybersecurity Law and What We Cannot Do (26 Apr 2018)

    Understanding What is New in China Cybersecurity Law and What We Cannot Do (26 Apr 2018)

  • Supporting Event: "Stay Smart, Keep Cyber Scam Away" Seminar (25 May 2018)

  • (ISC)2 APAC Secure Webinar - Stronger Security Posture through Zero Trust and API Management (9 May 2018)

    (ISC)2 APAC Secure Webinar - Stronger Security Posture through Zero Trust and API Management (9...

(ISC)2 APAC Secure Webinar - Stronger Security Posture through Zero Trust and API Management

Date: 09 May 2018 (Wednesday)
Time: 13:00 Hong Kong Time (Duration: 1 hour)
Register: https://www.isc2.org/News-and-Events/Webinars/APAC-Webinars?commid=314771

Highlight:

Organizations today are facing multiple challenges on providing an enhanced digital experience to their customers, whilst ensuring confidential data remains secure in accordance to evolving regulatory and compliance regimes. While APIs are the core of digital experiences, including single-page apps and mobile applications, traditional perimeter security architecture is no longer enough to protect your business and you must concurrently evolve your security approach.

In this webinar, Akamai will be sharing findings on how adopting a zero trust model will increase the security posture of organisation through a "Never Trust, Always Verify" paradigm. We will also look at how the API threat landscape have evolved and share best practises in API security.

NOTE: 1 CPE will be submitted automatically to the (ISC)² members' accounts (Member ID required)