Shop

  • Surfing the Global Waves of Phishing

    October 10, 2018

    Free

    Organisations spend great energy (and budget) preventing users from falling prey, but threat actors continue to find ways to get past automated controls, staying one step ahead of artificial intelligence tools. Solving the phishing problem is more than just awareness: it's about empowering humans to become instinctual nodes on the cyber defence network and feeding their real-time intelligence to security teams for immediate action.
  • 3-Part Blockchain and Cryptocurrency Series

    December 5, 2018

    Free

    Hear from Andy Brown, CEO of Sand Hill East and former CTO of UBS, and Jason Maynard, SVP of Marketing and Strategy at Oracle NetSuite, to learn what blockchain and cryptocurrency will mean for the future of transactions.
  • Protecting Your Organization Inside Out Using Identity

    December 5, 2018

    Free

    Identity is a key factor in an organization’s security plan, as it covers both security and productivity. In this webinar, we will look at using identity management to protect your organization internally and externally
  • Get to know the (ISC)² CISSP Concentrations (ISSAP/ISSEP/ISSMP)

    Free

    Go beyond the CISSP and challenge yourself with a CISSP Concentration! Got questions on the certifications? We have the answers.
  • Reducing Vulnerability Overload Is Key To Protecting Your Business

    January 30, 2019

  • (ISC)² Info Session: SSCP -The Premier Security Administrator Certification

    19/02/2019 To 19/02/2019

    Free

    Earning a globally recognized advanced security administration and operations certification like the SSCP is a great way to grow your career and better secure your organization’s critical assets.
  • Remediating Threats by Bridging Islands of Security

    20/02/2019 To 20/02/2019

    Free

    Most organisations have multiple products and services, from multiple vendors and suppliers to address their cybersecurity needs. The lack of integration and inability to share critical information results in silos of technology that cause inefficiency, lack of agility, limited visibility and a poor security posture. How can an organization solve and streamline this improve their cybersecurity operations? Join Infoblox and (ISC)² on Feb 20, 2019 (Wed) at 14:00 (Singapore time) to learn how to assist organisations in improving their security operations and reducing time to containment. Presenter: Terence Grey, Senior Systems Engineer, ANZ, Infoblox Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • (ISC)² Info Session: CSSLP-The Premier Secure Software Development Certification

    22/02/2019 To 22/02/2019

    Free

    Earning the globally recognized CSSLP secure software development certification is a proven way to build your career and better incorporate security practices into each phase of the software development lifecycle (SDLC).
  • (ISC)² Info Session: CISSP – The World’s Premier Cybersecurity Certification

    26/02/2019 To 26/02/2019

    Free

    Accelerate your cybersecurity career with the CISSP certification.
  • Access Denied! Decoding Identity Aware Proxies

    06/03/2019 To 06/03/2019

    Free

    Access Denied! Decoding Identity Aware Proxies: Nick Hawkins, Senior Director, Product Management, Enterprise; Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai
  • (ISC)² Info Session: CCSP – The Industry’s Premier Cloud Security Certification

    12/03/2019 To 12/03/2019

    Free

    Earning the globally recognized CCSP cloud security certification is a proven way to build your career and better secure critical assets in the cloud.
  • Protect, Detect & Respond: Transform your business to an MSSP

    March 21, 2019

    Free

    Are you frustrated with your prospects lack of urgency toward obvious data security issues…? Join on Thursday 21st of March for this exclusive Red Piranha webinar where key speakers in the Cybersecurity space will outline how to attract high-quality customers and master your sales conversions that will reignite your managed IT services businesses by showing your clients EXACTLY how bad their current security strategy really is!