Video
-
Digital Government in the time of COVID-19: Flattening the Curve Through Tech Solutions
Live webinar on 22 July – Join our speakers, Dr Leong Hoe Nam, Infectious Disease Specialist (Rophi Clinic, Mount Elizabeth…
Read More » -
Beyond Compliance: Tips to Deliver Engaging Application Security Training
Overview Do your development teams treat application security training as a check the box exercise? Do you wish they would…
Read More » -
Smart Nation Opportunities & Challenges (Cybersecurity)
Singapore Tech Forum 2020 held a deep-dive session on 18 Nov to introduce Singapore Government’s core technology areas and the…
Read More » -
How Effective is the Legislative Role in Promoting Cyber Security?
A virtual panel hosted by the Shura Council of the State of Qatar, the Parliamentary Intelligence-Security Forum and Doha Forum…
Read More » -
Cloud Complexities: Navigating the Headwinds
From lambda functions and microservices to Kubernetes and machine learning: We have heard of devops and shifting left, S3 buckets,…
Read More » -
Training: Three Keys for Cloud Security Success
WhiteCome learn about three key items that determine cloud security success: identity, monitoring, and automation. Walk away with tips and…
Read More » -
-
Training: More Servers, More Problems: How Serverless Changes and Reduces Risk
Security professionals face the daunting challenge of keeping up with constantly changing technology trends. By the time security has a…
Read More » -
Training: Most Used AWS Services & How to Use Them Securely
Review of the top used AWS services and which security features you don’t want to forget about. Highlighting applicable CIS…
Read More » -
Online Safety and Security during COVID19
ITU and the office of the UN Under Secretary-General Fabrizio Hochschild co-organized a series of webinars on digital cooperation in…
Read More » -
Training: Cloud Security Monitoring and Threat Detection in AWS
In this talk, Shaun McCullough SANS Certified Instructor and author of the brand new class SEC541: Cloud Monitoring and Threat…
Read More » -
Training: Maturing your Threat Detection and Incident Response in AWS Cloud
To continuously mature your Threat Detection and Incident Response in AWS you need a well thought out strategy that aligns…
Read More » -
Training: Moving Operations to the Cloud
When an organization moves an application or service from one environment to another without stopping to redesign the application, this…
Read More » -
Training: Multicloud Security Assessment and Defense
Overview SEC510 provides cloud security practitioners, analysts, and researchers an in-depth understanding of the inner workings of cloud Platform-as-a-Service (PaaS)…
Read More » -
ហានិភ័យអនឡាញសម្រាប់កូនរបស់អ្នក
អ្នកណាមិនស្រឡាញ់កូន ឃើញកូនធ្វើអីក៏ចេះតែចង់ថត ហើយមិនត្រឹមថតទេ បង្ហោះលើអនឡាញទៀត។ តែតើអ្នកដឹងទេ ថានៅពីក្រោយក្តីស្រឡាញ់នោះជាហានិភ័យមួយសម្រាប់កូនអ្នក? នៅពេលដែលអ្នកបង្ហោះរូបភាព ឬធ្វើសកម្មភាពមិនត្រឹមត្រូវនៅលើបណ្ដាញសង្គមដែលមានមនុស្សជាច្រើនប្រភេទរស់នៅ ហើយកូនរបស់អាចនឹងក្លាយជាជនរងគ្រោះមួយនៃអំពើបៀតបៀនតាមប្រព័ន្ធអនឡាញដែរ។ ចូលរួមជាមួយ ជំរំឌីជីថល ក្នុងយុទ្ធនាការ «Be Nice On the Internet» ដើម្បីបញ្ឈប់ការបៀតបៀនតាមប្រព័ន្ធអនឡាញទាំងអស់គ្នា។ នៅលើពិភពអនឡាញ មានមនុស្សគ្រប់ប្រភេទ…
Read More »