Horangi Webinar Series 2020

We introduced live webinars in 2020 to stay connected with everyone while life was completely uprooted from what it used to look like. Thankful to have been given the privilege of carrying on with life at home, we hope it has also been a fruitful time for everyone who have spoken and interacted with us as we discussed through the different topics virtually. If you've missed any of our live sessions, here's your chance to relive them.

Get full access by filling out the form at the bottom of the page.

Explore The Topics Discussed

Build Secure Cloud Infrastructure With Horangi Warden

Learn how to optimize security and compliance in the cloud using Warden to help you with:

  • Detecting cloud security threats and automatically fixing them
  • Automating secure cloud configurations for Amazon Web Services (AWS) and Google Cloud Platform (GCP) as you scale your infrastructure
  • Generating one-click, audit-ready compliance reports for 11 compliance standards including ISO 27001 and CIS

Tackling the Biggest Blind Spots in Public Cloud Security

When tracing the causes of cloud breaches, businesses were shocked to find that the majority of the breaches could be attributed back to a simple cloud misconfiguration. Why did such incidents continue to happen, even with some of the most digitally-advanced organizations? Could such cloud security incidents be easily prevented? In this webinar, expect to:

  • Learn the most critical cloud security blind spots
  • Gain insights into tackling cloud misconfigurations
  • Cloud security questions answered in a Q&A session

Demystifying Your AWS Cloud Security For Faster Innovation

Join Horangi CEO & Co-founder Paul Hadjy and Director of Cloud Security Engineering Steve Teo as they talk about how Horangi’s customers apply our unique security methodology to innovate faster in their AWS environments.

An Introduction to the MITRE ATT&CK Matrix

Learn how to optimize security and compliance in the cloud using Warden to help you with:

  • Detecting cloud security threats and automatically fixing them
  • Automating secure cloud configurations for Amazon Web Services (AWS) and Google Cloud Platform (GCP) as you scale your infrastructure
  • Generating one-click, audit-ready compliance reports for 11 compliance standards including ISO 27001 and CIS

The Science Behind Peacetime Cybersecurity Operations

Today, is there a distinction between peacetime and wartime? If so, who are we at war with? Like how a car is regularly serviced, cybersecurity requires that same level of proactive attention so your organization does not need to worry about painful cleanup costs. Services that you can leverage include Penetration Testing, Phishing, Red Teaming, and Cybersecurity Assessment. Takeaway from the chat on topics like:

  • The benefits of hacking your own organizations
  • Steps that businesses can take now to improve their security posture
  • This philosophy practiced by our customer tiket.com, a leading Indonesian travel agent

Work-From-Home Cybersecurity Explained: Best Practices For Telecommuting

How can hackers exploit work-from-home vulnerabilities? What impact do the new Work-From-Home arrangements have on vulnerability to cyber threats on an organizational and individual level? Learn how to protect yourself and your company's critical assets.

Top 3 WFH Cybersecurity Risks discussed:

  • Vulnerable Human Behaviour
  • Unsecured Personal Technologies
  • Unsecured Personal Practices

The Enemy Within: Navigating A CISO's Biggest Challenges

Consider the world a CISO lives in — unappreciated without a security incident, vilified at the slightest hint of one; the CISO is labeled a cost driver and afforded a measly budget for the job. It is a harsh world and a phenomenon that pervades organizations large and small. 

Hear from former Mandiant VP Steve Surdu and Horangi Director Mark Fuentes as they share key strategies to help CISOs navigate their top challenges:

  • Understand your organization’s new focus areas to improve your security capabilities in 2021
  • Learn how to calculate and prove security ROI, establishing metrics and limitations to make leadership understand the true value of your team
  • Get your priorities right with education, people, and process effectiveness

Playing To Win: The Cybersecurity Strategy Used By Top Businesses

What makes a cybersecurity strategy more than just strategy? Even with security teams hamstrung by a limited budget in 2020, how do the CISOs from leading organizations in Asia consistently drive results for their businesses?

Security leaders from Circles.Life, WeLab Bank, and SPTel in an online fireside chat to share their insights on:

  • Keeping up with new cyber threats
  • The recipe for creating high-performing security teams
  • Priorities for 2020 and beyond

Security and Privacy Compliance: Better Together

Horangi Deputy Director of Cyber Operations Mark Fuentes talks about how Horangi’s customers all over Asia use our tailored cybersecurity solutions to achieve their Data Privacy compliance goals.

[BAHASA] Know Your Enemy: Phishing From A Hacker's Perspective

Dalam webinar kali ini, Cyber Operations Consultant dari Horangi, Natasha dan Ardiansyah, akan membahas dan mendemonstrasikan cara kerja serangan Phishing Email, serta tips untuk mencegah dan mendeteksi serangan tersebut secara efektif.

Jangan lewatkan penawaran layanan Simulasi Serangan Phishing dengan harga spesial akhir tahun untuk perusahaan Anda!

[BAHASA] Web App Security: What Your WAF Can & Can’t Do

Apakah WAF saja cukup untuk melindungi aplikasi web anda dari serangan siber?

Dalam webinar ini, Cyber Operations Consultant dari Horangi, Annisa dan Azam, akan membahas mengenai taktik dan teknik eksploitasi salah satu kerentanan keamanan yang seringkali ditemukan pada aplikasi web dengan proteksi WAF (Web Application Firewall) serta keunggulan dari penerapan keamanan siber yang menyeluruh.

Upcoming Webinar

Taking it in Stride - The Role of Cloud Compliance in Digital Transformation

Your organization's adoption of cloud-native technologies put its infrastructure at risk of non-compliance but cloud compliance doesn’t need to be an obstacle to digital transformation. Find out how in this live webinar on 10 March.