Shop

  • (ISC)² Info Session: Get to know the CISSP Concentrations (ISSAP/ISSEP/ISSMP)

    09/04/2019 To 09/04/2019

    Free

    Go beyond the CISSP and challenge yourself with a CISSP Concentration! Challenge yourself with a CISSP Concentration! These specialized credentials build upon the CISSP. Whether you’re interested in career growth, deeper knowledge or achieving elite status, CISSP Concentrations prove your subject matter mastery.
  • (ISC)² Info Session: CCSP – The Industry’s Premier Cloud Security Certification

    12/03/2019 To 12/03/2019

    Free

    Earning the globally recognized CCSP cloud security certification is a proven way to build your career and better secure critical assets in the cloud.
  • (ISC)² Info Session: CISSP – The World’s Premier Cybersecurity Certification

    26/02/2019 To 26/02/2019

    Free

    Accelerate your cybersecurity career with the CISSP certification.
  • (ISC)² Info Session: CSSLP-The Premier Secure Software Development Certification

    22/02/2019 To 22/02/2019

    Free

    Earning the globally recognized CSSLP secure software development certification is a proven way to build your career and better incorporate security practices into each phase of the software development lifecycle (SDLC).
  • (ISC)² Info Session: SSCP -The Premier Security Administrator Certification

    19/02/2019 To 19/02/2019

    Free

    Earning a globally recognized advanced security administration and operations certification like the SSCP is a great way to grow your career and better secure your organization’s critical assets.
  • Access Denied! Decoding Identity Aware Proxies

    06/03/2019 To 06/03/2019

    Free

    Access Denied! Decoding Identity Aware Proxies: Nick Hawkins, Senior Director, Product Management, Enterprise; Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai
  • Remediating Threats by Bridging Islands of Security

    20/02/2019 To 20/02/2019

    Free

    Most organisations have multiple products and services, from multiple vendors and suppliers to address their cybersecurity needs. The lack of integration and inability to share critical information results in silos of technology that cause inefficiency, lack of agility, limited visibility and a poor security posture. How can an organization solve and streamline this improve their cybersecurity operations? Join Infoblox and (ISC)² on Feb 20, 2019 (Wed) at 14:00 (Singapore time) to learn how to assist organisations in improving their security operations and reducing time to containment. Presenter: Terence Grey, Senior Systems Engineer, ANZ, Infoblox Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • Reducing Vulnerability Overload Is Key To Protecting Your Business

    January 30, 2019

  • Get to know the (ISC)² CISSP Concentrations (ISSAP/ISSEP/ISSMP)

    Free

    Go beyond the CISSP and challenge yourself with a CISSP Concentration! Got questions on the certifications? We have the answers.
  • Protecting Your Organization Inside Out Using Identity

    December 5, 2018

    Free

    Identity is a key factor in an organization’s security plan, as it covers both security and productivity. In this webinar, we will look at using identity management to protect your organization internally and externally
  • 3-Part Blockchain and Cryptocurrency Series

    December 5, 2018

    Free

    Hear from Andy Brown, CEO of Sand Hill East and former CTO of UBS, and Jason Maynard, SVP of Marketing and Strategy at Oracle NetSuite, to learn what blockchain and cryptocurrency will mean for the future of transactions.
  • Surfing the Global Waves of Phishing

    October 10, 2018

    Free

    Organisations spend great energy (and budget) preventing users from falling prey, but threat actors continue to find ways to get past automated controls, staying one step ahead of artificial intelligence tools. Solving the phishing problem is more than just awareness: it's about empowering humans to become instinctual nodes on the cyber defence network and feeding their real-time intelligence to security teams for immediate action.