Top of Page
 

SECURE Webinars

North America | Asia-Pacific | UK & Europe

About

(ISC)² SECURE Webinars bring you together with leading cybersecurity experts to explore solutions that answer the most critical challenges facing your regional market. Take back actionable ideas and strategies that help strengthen the security of your organization’s cyber operations, assets and critical data. During these collaborative virtual learning events, you’ll have the opportunity to ask the speakers questions and chat with attendees in real time. If you’re unable to attend the live webinar or need to revisit the content, you can access the recording at your convenience on-demand.

(ISC)² SECURE Webinars are open to members and non-members, and cybersecurity professionals in every stage of their career are encouraged to attend. Earn 1.5 CPE credits for each webinar you attend.

Upcoming Webinars

Monday, May 16, 2022 | Enabling Cybersecurity Resilience with Zero Trust Solutions

1:00 p.m. SGT (GMT+8) I Earn 1.5 CPE Credits

Register Now

As organizations transform into becoming Cloud-First, they have the opportunity to re-engineer their cybersecurity defenses. Firewall technology and web application defenses have proved defenseless against attackers and the onset of ransomware. Cloud-native applications and their supporting architectures (e.g., microservices, containers, and orchestration) require more security. Both Machine and human user identities must protect at an even higher level of assurance.

Making Zero Trust a practical reality for organizations today requires strategic governance and oversight and security engineering knowledge and implementation skill. In this presentation, we examine the principles of Zero Trust and how they can be applied to defend identities and data, infrastructure, network components, web-service endpoints, and applications. Building on core principles, we show how to effectively implement Zero Trust in the Cloud for comprehensive security coverage, strengthen the coverage using machine learning, and simplify identity and access management. We provide a workbook where participants can evaluate their own organization's readiness for Zero Trust and conduct a mock vendor selection for Zero-Trust solutions and services.

Learning Objectives

  1. Demonstrate a practical understanding of Zero Trust principles and design patterns.
  2. Have the ability to create an organizational Zero Trust strategy.
  3. How-to conduct a Zero Trust readiness assessment.
  4. Have the ability to understand Zero Trust vendor solutions and make selections.

Richard Tychansky, Senior Architect

Mr. Tychansky is an industry-recognized expert in applying Threat Modeling to the development of Zero Trust Architectures, Cloud-Native Applications, API Security, Mobile Applications development, Legacy Systems, and complex embedded system-of-systems designs. He has been instrumental in leading global organizations into the brave new world of Zero Trust. He is a leader, accomplished Cloud Architect, conference speaker, and author of the popular (ISC)² course "Preparing for a Zero Trust Initiative."

He has a wealth of experience in embedded aerospace systems engineering, technical program management for secure software development, quantum cryptography, and machine learning. He excels at building high-performing global incident response teams and partnerships across cross-functional engineering teams. He has also worked with Google's Security & Privacy division to protect the data of over a billion mobile device and cloud services users.

Monday, August 29, 2022

1:00 p.m. SGT I Earn 1.5 CPE Credits

Register Now

Speaker and session description coming soon!

December 5, 2022

1:00 p.m. SGT I Earn 1.5 CPE Credits

Register Now

Speaker and session description coming soon!

Virtual Experience

Take advantage of the flexibility offered with virtual learning, and join your peers and our expert speaker for this interactive online experience. Our virtual platform will allow you to feel like you are sitting front row:

  • Ask the presenter your questions in real-time
  • Take notes from the session right on your screen, and have them emailed to you post event
  • Engage in a live chat with your peers around the topic
  • Download resources and handouts
  • Request live support at any time
  • Closed captioning and live transcript available
  • Recording available 24 hours after the event
  • For (ISC)² members, CPE will automatically be added to your account within 10 business days of the live event

System Requirements

  • Supported Browsers: Latest builds of Firefox, Chrome, Edge and Safari. Internet Explorer is not supported.
  • Computer with headset/speakers
  • High-speed internet connection

Sponsors

Don't miss this opportunity to feature your brand, gain premium leads, and demonstrate your products and services. Speaking opportunities available.

Download Our Prospectus


Pricing

PricingMemberNon-Member

Individual Webinar Purchase

Single Webinar Live + Recording$99$129

Bundle Webinar Purchase Options

(3) Asia Pacific Webinars Live + Recording – Save 15%!$250$330
(10) SECURE Webinars Live + Recording – Save 40%!$595$775
All (11) SECURE Webinars Live + Recording – Save 40%!$635$835
Ok