About
(ISC)² SECURE Webinars bring you together with leading cybersecurity experts to explore solutions that answer the most critical challenges facing your regional market. Take back actionable ideas and strategies that help strengthen the security of your organization’s cyber operations, assets and critical data. During these collaborative virtual learning events, you’ll have the opportunity to ask the speakers questions and chat with attendees in real time. If you’re unable to attend the live webinar or need to revisit the content, you can access the recording at your convenience on-demand.
(ISC)² SECURE Webinars are open to members and non-members, and cybersecurity professionals in every stage of their career are encouraged to attend. Earn 1.5 CPE credits for each webinar you attend.
Upcoming Webinars
Monday, May 16, 2022 | Enabling Cybersecurity Resilience with Zero Trust Solutions
1:00 p.m. SGT (GMT+8) I Earn 1.5 CPE Credits
Register NowAs organizations transform into becoming Cloud-First, they have the opportunity to re-engineer their cybersecurity defenses. Firewall technology and web application defenses have proved defenseless against attackers and the onset of ransomware. Cloud-native applications and their supporting architectures (e.g., microservices, containers, and orchestration) require more security. Both Machine and human user identities must protect at an even higher level of assurance.
Making Zero Trust a practical reality for organizations today requires strategic governance and oversight and security engineering knowledge and implementation skill. In this presentation, we examine the principles of Zero Trust and how they can be applied to defend identities and data, infrastructure, network components, web-service endpoints, and applications. Building on core principles, we show how to effectively implement Zero Trust in the Cloud for comprehensive security coverage, strengthen the coverage using machine learning, and simplify identity and access management. We provide a workbook where participants can evaluate their own organization's readiness for Zero Trust and conduct a mock vendor selection for Zero-Trust solutions and services.
Learning Objectives
- Demonstrate a practical understanding of Zero Trust principles and design patterns.
- Have the ability to create an organizational Zero Trust strategy.
- How-to conduct a Zero Trust readiness assessment.
- Have the ability to understand Zero Trust vendor solutions and make selections.
Richard Tychansky, Senior Architect
Mr. Tychansky is an industry-recognized expert in applying Threat Modeling to the development of Zero Trust Architectures, Cloud-Native Applications, API Security, Mobile Applications development, Legacy Systems, and complex embedded system-of-systems designs. He has been instrumental in leading global organizations into the brave new world of Zero Trust. He is a leader, accomplished Cloud Architect, conference speaker, and author of the popular (ISC)² course "Preparing for a Zero Trust Initiative."
He has a wealth of experience in embedded aerospace systems engineering, technical program management for secure software development, quantum cryptography, and machine learning. He excels at building high-performing global incident response teams and partnerships across cross-functional engineering teams. He has also worked with Google's Security & Privacy division to protect the data of over a billion mobile device and cloud services users.
Monday, August 29, 2022
1:00 p.m. SGT I Earn 1.5 CPE Credits
Register NowSpeaker and session description coming soon!
December 5, 2022
1:00 p.m. SGT I Earn 1.5 CPE Credits
Register NowSpeaker and session description coming soon!
Virtual Experience
Take advantage of the flexibility offered with virtual learning, and join your peers and our expert speaker for this interactive online experience. Our virtual platform will allow you to feel like you are sitting front row:
- Ask the presenter your questions in real-time
- Take notes from the session right on your screen, and have them emailed to you post event
- Engage in a live chat with your peers around the topic
- Download resources and handouts
- Request live support at any time
- Closed captioning and live transcript available
- Recording available 24 hours after the event
- For (ISC)² members, CPE will automatically be added to your account within 10 business days of the live event
System Requirements
- Supported Browsers: Latest builds of Firefox, Chrome, Edge and Safari. Internet Explorer is not supported.
- Computer with headset/speakers
- High-speed internet connection
Sponsors
Don't miss this opportunity to feature your brand, gain premium leads, and demonstrate your products and services. Speaking opportunities available.
Pricing
Pricing | Member | Non-Member |
Individual Webinar Purchase | ||
Single Webinar Live + Recording | $99 | $129 |
Bundle Webinar Purchase Options | ||
(3) Asia Pacific Webinars Live + Recording – Save 15%! | $250 | $330 |
(10) SECURE Webinars Live + Recording – Save 40%! | $595 | $775 |
All (11) SECURE Webinars Live + Recording – Save 40%! | $635 | $835 |