Updates & Activities

Sailpoint: Empowering Online in the Time of Covid-19

When teaching and learning turns digital, whether it is new student enrolments, staff moving faculties, or changing roles between students and staffs – does your institution know who has access to what, should they have access, and how are they using their access?
Join SailPoint for a webinar and hear from Tommy Hor, Chief IT Officer of National University of Singapore of how NUS is teaching remotely and securely.
Register at: https://sailpoint.zoom.us/…/regis…/WN_TGKEoAMQTGOVFZQZVQHFSw

Bluedog: Cybersecurity Monitoring for All

Studies show that hackers attack every 39 seconds on average of 2,244 times a day and 68% of business leaders feel their cybersecurity risks are increasing (IBM and University of Maryland), which makes cybersecurity important. However, these solutions come at a lofty price.
Bluedog Security Monitoring offers an enterprise grade network monitoring solution that is simple and affordable. They bring high quality technology, support and service to the small to medium business, helping protect their business from cyber threats.
For Bluedog, security is about people, not technology. They are dedicated to keep attackers away with their exceptional machine learning to stop attacks at the early age and with their fully staffed Security Operation Center (SOC) that monitors, detects, alerts and take action 24/7/365.
Let Bluedog take control of your cybersecurity at an affordable price.


StorageCraft File Backup and Recovery with Backup Analyzer makes it easy and efficient to back up critical organizational data that is stored on laptops, workstations, and home computers. This solution also makes it easy for remote users to find and recover individual files and folders from the web-based interface.
REQUEST YOUR 30-DAY FREE TRIAL NOW AT: https://goto.storagecraft.com/Global-EMEA-Ongoing-FBREvalua…

Sophos Webinar: Save up to 70% with SD-WAN

SD-WAN offers a whole host of benefits for distributed organizations, but the main pull is that it is a MUCH lower cost solution than MPLS (the traditional solution). And guess what? XG Firewall now comes with integrated SD-WAN!
If you would like to find out more about the benefits of SD-WAN, how it works and how XG Firewall can enable your SD-WAN goals, join us for a webinar on September 22, 2020, 2:30PM SGT.
• Distributed organizations & MPLS
• Introduction to SDWAN
• SDWAN architectures
• Sophos SDWAN advantages
• Use cases
• Q & A
Register athttps://bit.ly/2DFZ0z6

Sophos Webinar: The ABC’s of New Normal

Most if not all of the companies have crossed the ‘working from home’ or ‘remote working’ bridge. Accelerated by COVID-19, we have quickly adapted to this new setup. In light of this new norm, companies are also studying the possibility of having this as a permanent solution.
Join us as Sophos shares in this webinar the significance of incorporating cybersecurity to align with your business strategy and how we can help you prepare for this new change.
  • The new normal
  • Cybersecurity challenges
  • Security measures when working remotely
  • Security in a box
  • Q&A
Register now at https://bit.ly/355XSQF

Fortanix: A New Vendor of ITSDI

Encryption and authentication are some of the ways to adhere to the Data Privacy Act of 2012 in protecting Personal Identifiable Information (PII). To ensure data is protected throughout the lifecycle, data must be encrypted. Traditional encryption solution only secures data at rest and in motion, leaving it vulnerable in use.
The Fortanix Runtime Encryption® can protect data in use, delivering full security protection all through the life cycle of the data. It creates a portable security envelope that runs signed applications in completely protected states and protects applications even if the infrastructure is compromised.
Partnering with Fortanix, we have strengthened our commitment in order to meet the demands of the ever-changing cybersecurity threat landscape by providing a holistic approach to cyber security. This enables organizations to stay ahead of cyber threats and threat actors.
With ITSDI, cybersecurity is made easy.

Broadcom-ITSDI Partnership

Symantec has been a part of ITSDI for 5 years and we will always be grateful to our partners & principal for the fruitful journey together. ITSDI’s distributor agreement with Broadcom has ended last June 8, 2020, but our goal of keeping cyberspace safe and free still remains the same.  If you wish to continue with Symantec, our technical team can still support you. Our account managers can also discuss our other solutions in case you want to check other alternatives.
Rest assured that all of our products have their own strength and positioning in the market which gives us the chance to serve more clients and be on top of cybersecurity issues. We have updated our portfolio which includes world class solutions for endpoint protection, EDR, DLP, email security, web security, encryption, multi-factor authentication, managed security, threat intelligence, incident response, identity access, privilege access, threat analytics, and much more. Therefore, we remain strong and committed in making cybersecurity easy. Please take a look at our product portfolio for the updated solutions that we are currently carrying.


To stop modern threats, you need endpoint protection that makes use of the very latest defenses such as machine learning and anti-ransomware protection. Join us this August 12, 2020 and learn how Sophos Intercept X can help your business be protected against all treats.
Register at: https://sophos.zoom.us/webinar/register/WN_kHH-_uwERDmoTX29o7ghQQ


Arctic Security is offering a complimentary service whereby they will give interested organizations a report showing their security posture. Their objective is help organizations to improve their overall cyber hygiene through Arctic Security Victim Notification Service.

Here is the link on how to register and get a report for this service – https://arcticsecurity.com/check

McAfee: MVISION Your Cybersecurity

As more businesses are shifting to cloud, threats and vulnerabilities are increasing as well.
Join us this August 20, 2020 from 2pm to 4PM and learn how Mcafee can help you evolve your business confidently by leveraging security solutions purpose-built with transformation in mind.
Mr. Raphael Anton Orpilla, Security Architect of McAfee will discuss Cloud Workload Security.
Awesome raffle prizes await!
To register: https://bit.ly/3eOORwy

Skybox Webinar: Leveraging Skybox to Demonstrate ISO 27000 Compliance

Depending on industry governance requirements, organizations must adhere to specific security compliance frameworks such as NIST, ISO, PCI and others. One way that organizations of different types and sizes are shielding themselves is by adhering to the Security Information Standard (ISO) 27000 which is focused on Information Security Management System (ISMS). The ISO27000 cyber security standard helps you manage the confidentiality, integrity and availability of your assets.

In this session, we will look into the high-level understanding of these two ISO domains and how Skybox can provide the context and help track your adherence to your ISMS. Attend this workshop delivered by their Technical Director, Rahim Malek to:

•             Understand ISO 27001/2 and ISO 27005

•             Use Skybox to develop the process to comply and maintain adherence to the standard

•             Demonstrate Skybox ISO dashboards and reporting

Register here: https://bit.ly/3jHhyzd

Skybox Webinar: Integrating Microsoft Endpoint Security

Today’s enterprises are challenged with managing the security of complex networks that are distributed across physical and virtual environments. These environments are evolving at a rapid rate, potentially leaving them exposed and prone to attack. Organizations need the ability to intelligently merge asset and vulnerability data from multiple sources to create a single source of truth to manage all vulnerabilities.

Skybox has partnered with Microsoft to provide its enterprise console for Microsoft Defender. With Skybox and MDATP, customers can develop an enterprise vulnerability management program and utilize the exposure metric to prioritize vulnerabilities.

Join us on 22nd July at 1 pm SGT / 10 am BST for this 30-minute technical workshop “Integrating Microsoft Endpoint Security” delivered by Skybox Security’s Senior Technical Director, David Schyschow as he demonstrates:

•             The use of WMI mechanisms to deliver an offline assessment of air-gapped environments

•             How to gain full visibility of vulnerabilities using OS-based components

•             Build easy-to-read yet comprehensive data acquisition dashboards

•             Leverage the untapped data within your patch management systems such as SCCM and WSUS

This session is aimed at users who have experience in vulnerability management and a basic understanding of PowerShell.  Register Now.

Cyberbit Webinar: Using MITRE ATT&CK As Your Cybersecurity Training Framework

In the last decade, MITRE ATT&CK framework has become the de-facto taxonomy for categorizing attacker techniques, often used by organizations for evaluating the effectiveness and coverage of threat detection platforms.
Cybersecurity leaders have recently begun to map their training programs to MITRE to make sure Blue Teams are best prepared to respond to most attacks they encounter in real-life.
Can MITRE be used both as an attack mapping and a training asset?
In this webinar, we will present practical ways to use MITRE as a training framework, from the eyes of a cybersecurity instructor. This webinar is intended for cybersecurity leaders and practitioners, rethinking their training programs.
Join our webinar on Thursday, July 30th at 10:30 AM CET | 2 PM India | 4:30 PM HK, to learn:
•             The fundamentals of MITRE ATT&CK
•             How you can start using MITRE ATT&CK Enterprise, to develop playbooks and refine your cybersecurity training program
•             Where in your training planning is it better NOT to use MITRE ATT&CK but alternative standards
Click here to sign up for the webinar.

Digicert Webinar: Secure Your Remote Workforce

COVID-19 has changed the security landscape as we know it.  As more employees have been working from home, this has created a need to secure your remote workforce more than ever, and to rethink current security practices within the organisation.  I would like to invite you to DigiCert Secure your remote workforce webinar on July 15th July at 2:30pm (SGT) where DigiCert CTO, Jason Sabin and Brian Trzupek, SVP of Emerging Markets Products, will discuss:
– Authenticating employees to corporate services ​
– Sending signed and encrypted emails ​
– Securely signing important business documents ​
 You can register for the webinar here.​

Fortanix Data Security Expert Webinar Series

You are invited to attend the Fortanix Data Security Expert Webinar series, where Fortanix subject matter experts will conduct a demonstration of how to implement multi-cloud data security capabilities such as key management, encryption, tokenization and secrets management for AWS, Azure, and GCP. According to Gartner, 70% of enterprise businesses are adopting either a hybrid cloud or a multi-cloud strategy to drive business agility.  Based on the Cloud Threat Report 2019 released by Oracle and KPMG, 71% of data now in the public cloud is “sensitive”.  As workloads and sensitive data move to the cloud, customers need a way to control and centrally manage their cryptographic keys, secrets, and tokens in order to secure the public cloud deployments that are driving their digital transformation.    This webinar will include discussion of the following security considerations associated with the implementation of public cloud within your enterprise infrastructure:
  • Managing data security for hybrid cloud deployment models.
  • Multi-Cloud Key management in AWS, Azure and GCP.
  • Hardware Security Module (HSM) architectures for public cloud.
  • Database encryption options for public cloud.
  • Steps in migrating the data security of on-premises applications to public cloud services.
The webinar will take place live on Wednesday, July 8th, 2020 at4 :00pm AEST / 2 :00pm SGT / 11:30am IST and 8:30 AM PDT / 4:30 PM BST /5:30 PM CET and will be recorded for on-demand viewing. If you would like to attend live or received a link to the recording after the event, please register now: https://hubs.ly/H0rPkrS0.

Webinar: Transitioning to Remote SOC Team Training

Training distributed SOC teams is now a necessity. With more cybersecurity teams working from home and increasing rates of sophisticated cyberattacks, we are required to evolve the way we prepare SOCs to face threat actors.
Cyberbit empowers cybersecurity teams by training with the world’s leading cyberattack simulator. Get your SOC Team ready with CYBERBIT. Join us on July 8 to experience the unique value of hands-on simulation for training and upskilling SOC teams.
To register: https://bit.ly/37UGWvG

Skybox at ISOG Event (October 2019)

FireEye EDR Workshop (October 2019)

Ride High With FireEye (October 2019)

NSFocus End User Workshop (October 2019)

NSFocus Product Launch (October 2019)