Skip to content
Latest

Supporting Event: Time to Containment – Supercharge SOC With a New Approach to Incident Response (24 Feb 2021)

Date: 24 Feb 2021 (Wednesday)
Time: 14:00 – 15:00 (GMT +8)
Venue:  Live Webinar
Language: English
Fee: Free
Register: http://www.isc2.org/News-and-Events/Webinars/APAC-Webinars?commid=466402&utm_source=chapter

Highlight:
How do you shoot down a missile before it hits its target? That’s the problem facing today’s incident response teams. As cyberattacks increase in volume and velocity, the security operations center (SOC) handling incident response is the nexus for this challenge.

A well-honed incident response operation, that combined EPP+EDR, can deliver an impressive return on investment. In many data breach incidents, the cost is more than financial, and it is well known that the time cyber security teams take from the breach to containment is critical.

With the stakes so high, how can your cyber security team shrink the time between detecting and handling cyber threats?

In this special webinar, Kelvin Wee, Director of Security Engineering at SentinelOne – APJ, will cover these key questions and more:

  • Why traditional protective approaches are no longer enough
  • The importance of automation in the response process
  • How to identify and establish key metrics in incident response
  • Technical live demonstration of SentinelOne’s single agent, static AI platform that helps cyber security teams to prevent, detect, respond and hunt threats in real time

Join us to learn how to supercharge your SOC with a new approach to incident response.

Presenter: Kelvin Wee

Director of Security Engineering – Asia Pacific and Japan, SentinelOne

Moderator: Tony Vizza, CISSP, CCSP

Director of Cybersecurity Advocacy, APAC, (ISC)²

For Details: http://www.isc2.org/News-and-Events/Webinars/APAC-Webinars?commid=466402&utm_source=chapter

Supporting Event: Certified Information Systems Security Professional (CISSP®) Official Training (25-29 Jan 2021)

Date: 25-29 Jan 2021
Time: 09:00 – 18:00
Venue: 1/F, HKPC Building, 78 Tat Chee Avenue, Kowloon
Language: Cantonese with training materials in English
Fee: Early Bird $17,500 / Normal $18,500 ($1000 discount for Member of PISA)
Register: https://www.hkpcacademy.org/en/2020/09/21/10010726-certified-information-systems-security-professional-cissp-certification/

Highlight:
Prove you have what it takes to protect your organisation from malicious hackers and threats with the Certified Information Systems Security Professional (CISSP®) certification. Demonstrate your knowledge, advance your career and become a member of a 130,000-strong community of cybersecurity leaders setting the bar for professionals across the information security workforce.

For detail: https://www.hkpcacademy.org/en/2020/09/21/10010726-certified-information-systems-security-professional-cissp-certification/

Supporting Event: Adopting Zero Trust for Remote Access

Date: 20 Jan 2021 (Wednesday)
Time: 11:00am
Venue:  Live Webinar
Language: English
Fee: Free
Register: https://www.isc2.org/News-and-Events/Webinars/APAC-Webinars?commid=454673&utm_source=chapter

Highlight:
By definition, a Zero Trust security model advocates the creation of zones and segmentation to control sensitive IT resources. This also entails the deployment of technology to monitor and manage data between zones, and more importantly, user interactions within a zone(s). A Zero Trust security model redefines the architecture of a trusted network inside a defined corporate perimeter. This is relevant today since technologies and processes like the cloud, DevOps, and IoT have either blurred, or dissolved altogether, the idea of a traditional perimeter.

While the Zero Trust model has become a trendy catchword in IT, it is complex and difficult to implement for many organizations in Asia Pacific, because it requires the establishment of a model of trust, verification, and continuous evaluation of trust for further access and lateral movement.

Join BeyondTrust and (ISC)² on Jan 20, 2021 (Wed) at 11am (GMT +8), Ajay Kumar, Director for Security Engineering at BeyondTrust, review the practical shortcomings and limitations of a Zero Trust model, and explain how to achieve Zero Trust using the Privileged Remote Access model.

Presenter: Ajay Kumar, Director for Security Engineering – APJ, BeyondTrust
Moderator: Hoo Chuan-Wei, CISSP, Technical Advisor – Asia-Pacific, (ISC)²

More Info: https://www.isc2.org/News-and-Events/Webinars/APAC-Webinars?commid=461297&utm_source=chapter

Notice: PISAM electronic mailing list service update

Dear PISA members,

PISA uses Yahoo! Groups as our discussion board and electronic mailing service. [PISAM] is the common group for us to distribute our messages to PISA members. Sadly, Yahoo! Groups has announced its End of Service. The Yahoo Groups website is going to shut down on December 15, 2020 and members will no longer be able to send or receive emails from Yahoo Groups. (Thanks Yahoo! Groups for providing the service in the past.)

The PISA Executive Committee has decided to change our mailing list service to Groups.io. Our valid members will receive our invitation from "pisam@groups.io Moderators" in the coming few days. The last batch of invitations will NOT be later than 15-NOV. Please accept the invitation and join our new PISAM group.

The invitation email maybe drops into your JUNK/ SPAM folder. Please take a look, release it and try to whitelist [pisam] emails in the future.

If you still cannot receive any invitation email, please feel free to contact us by email to membership@pisa.org.hk after 15-NOV for checking your email alias forwarding.

Thank you for your attention.

(2020-11-03)

Permanent link to PISAM electronic mailing list service update

Supporting Event: Critical Cybersecurity Misconceptions That Are Harming Your Business

Date: 16 Dec 2020 (Wednesday)
Time: 11:00am
Venue:  Live Webinar
Language: Cantonese
Fee: Free
Register: https://www.isc2.org/News-and-Events/Webinars/APAC-Webinars?commid=454673&utm_source=chapter

Highlight:
Today’s applications have become the focal point for cybercriminals, on which financial fraud and abuse are constantly happening. A misunderstanding of what does and does not protect your digital footprint can lead to devastating breaches, while some companies are still believe in and even base real business decisions and security outcomes on misconceptions. It’s critical to bust the myths and get back to better protection.

Join F5 and (ISC)² on Dec 16, 2020 (Wed) at 11am (Hong Kong Time) as Ryan Lo, Manager of Solutions Engineering from Shape Security (part of F5), separates fact from fiction when it comes to defending your apps from sophisticated attacks, including:

• Understanding how MFA just adds more information to the dossier of a targeted account.
• CAPTCHA is a fabled response to a sophisticated problem, like bots.
• Password schemes won’t protect user accounts from being taken over.

Presenter: Ryan Lo, Manager of Solutions Engineering, Shape Security (Part of F5)
Moderator: Otto Lee, CISSP, CCSP, CSSLP, Membership Chair, (ISC)² Hong Kong Chapter

*This webinar will be conducted in Cantonese. (本次網上研討會將以粵語進行。)