08 July 2013

Event on Information Security Masterclass September 25-26 2013

Live Hacking & Information Security Masterclass by www.maxginez3.com
Clariden Global Executive Education spearheaded an event this coming September 25 - 26,  2013 in Shangri-La Hotel, Singapore about Live Hacking & Information Security Masterclass to be led by Chuck Easttom. He is the President of CEC-Security LLC, he was also named in Whose Who in Science and Technology and Whose Who in Education. Chuck's experienced various High End and Prestigious institutions including US Secret Service Electronic Crimes Task Force, Stanford Medical School, Harvard Computer Society, EC Council, Boeing Aerospace and more. He also authored 15 computer science books, including 2 textbooks used in universities globally.

Chuck Easttom is an internationally renowned computer security expert. He has been in theIT security industry for over 18 years and has been training IT professionals on hacking and security breaches for over 10 years. Prestigious institutions he has trained include the US Secret Service Electronic Crimes Task Force and Stanford Medical School. Author of 15 computer science books and 2 textbooks used in universities globally, Chuck currently holds over 28 industry certifications including CISSP, ISSAP, CEH, MCT and others. He is also aMicrosoft Certified Trainer and an EC Council certified instructor. Chuck has spoken in high-profile events by the Harvard Computer Society, Columbia University ACM Chapter, TakeDownCon and Hacker Halted.

PROGRAM OVERVIEW
As companies move to digitize their business and harness cutting edge technology to maximize returns, the gap between their business needs and the ability to tackle new and complex security threats grows. Even established technology driven companies like Apple, Sony, Facebook and LinkedIn have been compromised in recent months. According to the 2012 State of Security Survey by McAfee, 64% of corporations in Singapore have experienced major security incidents in the past 12 months, with some facing more than 50 attacks in that same period. These expose a lack of preparedness when faced with real world threats. To address this need, this executive program is tailor-made to activate practical knowledge through live simulations of hacking because certifications and theory alone are not enough to fully fortify against attacks.
In this highly interactive and hands-on executive education program Live Hacking and Information Security Masterclass, you will learn how to ensure the business continuity and resiliency of your company. You will run through live hacking simulations and learn how to safeguard against the latest threats. Through this intensive two-day course, you will learn from best practices and global case studies on how to detect intrusions, do a comprehensive penetration test, conduct a vulnerability assessment, streamline an incident response plan, deal with the most recent threats and protect against external attacks like SQL injections, IP spoofing, DNS spoofing and more.

WHO WILL BENEFIT MOST
This highly interactive program is designed for all Executives and Managers who are responsible for, or associated with IT/Cyber/Network Security, IT Audit, IT Disaster Recovery, Computer Emergency Response, Incident Response, Risk Management, Information Privacy, Security Architecture, Business Resiliency/Continuity, Systems/Network Administration as well as Chief Information Officers, Chief Security Officers, Chief Information Security Officers and Chief Technology Officers.


LEARNING OBJECTIVES
  • Live simulations, hands-on exercises and case studies of cyber security attacks and how to safeguard against them
  • Update on latest real world threats and motivations of hackers
  • Key considerations when doing penetration tests and vulnerability assessments
  • Preventing SQL injections, IP spoofing and DNS spoofing
  • Detecting intrusions with security infrastructure like IDS/IPS and honey pots
  • Employing the security ‘triad’ of technical, procedural and personnel protective measures
  • Understanding common pitfalls and mistakes in incident response plans

Key Program Highlights:
  1. Live simulations, hands-on exercises and case studies of cyber security attacks and how to safeguard against them
  2. Key considerations when doing penetration tests and vulnerability assessments
  3. Preventing SQL injections, IP spoofing and DNS spoofing
  4. Detecting intrusions with security infrastructure like IDS/IPS and honey pots
  5. Employing  the security ‘triad’ of technical, procedural and personnel protective measures
  6. Understanding common pitfalls and mistakes in incident response plans

Program Fees:

  • Register online now to enjoy our Special Early Bird rates!
  • Save SGD300 if you register and pay before 29 July 2013!


Group Discount: 

  1. For 2 registrations from the same company and billing source, the 2nd participant enjoys 10% discount.
  2. For limited period only, for registrations before 29 July 2013:
  3. With registrations of 3 or more, the 4th participant will receive a complimentary seat.
  4. Only one discount scheme will apply

Advertisement


Featured Offers:
Advertisement