Latest Activity

Profile IconRamesh Subbayya, Meetali Sharma and Abbas Kudrati joined CISO Platform
yesterday
Abbas Kudrati updated their profile
yesterday
Abbas Kudrati liked Abbas Kudrati's profile
yesterday
A Shiju Rawther liked pritha's blog post A CISO Guide to Privilege Identity & Access Management(PIM) Implementation
Jul 24
A Shiju Rawther liked bikash's blog post APT Secrets that Vendors Don't Tell
Jul 23
A Shiju Rawther liked bikash's blog post APT Secrets that Vendors Don't Tell
Jul 23
Rafael Marques is now a member of CISO Platform
Jul 23
mauro baraldi is now a member of CISO Platform
Jul 22
Profile IconKajjal Mustafi, Raghavendra Nayaka HK and Sushma joined CISO Platform
Jul 20
Profile IconRavi R and Sudhiranjan Mandal joined CISO Platform
Jul 19
Manjunath updated their profile photo
Jul 19
Manjunath updated their profile
Jul 19
CISO Platform's event was featured
Thumbnail

CISO Platform Community Meetup - Singapore, 21 July at CISO Platform Community Meetup - Singapore, 21 July

July 21, 2015 all day
Jul 16
Britto Sidhan updated their profile
Jul 15
Profile Iconrenu bedi, Britto Sidhan and Manjunath joined CISO Platform
Jul 15
guntuku sridhar updated an event
Thumbnail

ISACA-18th Annual Karnataka Conf. SMAC & IOT- New Cyber Security Frontiers at SMAC & IOT- New Cybersecurity frontiers

July 17, 2015 to July 18, 2015
Jul 14

 




Blog Posts

Checklist To Evaluate SIEM Vendors

Posted by pritha on June 29, 2015 at 12:00pm 0 Comments

Here is a comprehensive checklist to Evaluate SIEM Vendors. We highly appreciate this community contribution.

by…

Continue

Top IT Security Conferences In The World

Posted by pritha on June 30, 2015 at 10:00pm 0 Comments

Here's a list of World's Best and Most Popular IT Security Conferences. Details such as Tentative Time, Pass Price and Locations are mentioned so you can plan your Calendar.

Top IT Security…

Continue

Incident Response: How To Respond To A Security Breach During First 24 Hours (Checklist)

Posted by pritha on July 2, 2015 at 12:30am 0 Comments

Incident Response is pretty much the same, however the first few hours can be vital and only high priority actions can save the situation. Since this is a Security Breach, it is of highest priority and must be treated at highest escalation…

Continue

Checklist: Skillset required for an Incident Management Person

Posted by pritha on June 26, 2015 at 5:00pm 0 Comments

Technical Skills:

Major Areas Of Focus:

  • Incident Response
  • Computer Forensics
  • Network…
Continue

Leap Second-Are You Ready For It?

Posted by pritha on June 23, 2015 at 8:30pm 0 Comments

The next Leap(26th leap) Second will be on 30 June,2015. The last one was on 30 June,2012.

What Is It?

Earth's rotation is slowing down around it's own axis, so we need to…

Continue

Comprehensive Salary Guide For Cyber Security Professionals: First Time Ever In India

Posted by CISO Platform on June 6, 2015 at 11:30am 0 Comments

CISO Platform Launches India’s First Ever Study Of The Salary Of Cyber…

Continue

Gaana.com hacked. 10 Million users affected. What should you do?

Posted by CISO Platform on May 29, 2015 at 2:30pm 0 Comments

Gaana.com, one of the  popular music streaming service got hacked. It is reported that 10…

Continue

Top Talks from RSA Conference 2015 - San Francisco

Posted by pritha on April 29, 2015 at 11:30am 0 Comments

We had a long and nice week at RSA Conference 2015 in San Franciso. Some of you might have missed the event or missed some of the good talks even though you were there. so we have handpicked the best of RSA  just for…

Continue

CISO Platform Decision Summit '15

Posted by Cisoplatform.com on Monday, June 8, 2015

Award Ceremony Honoring Top 100 CISOs - by CISO Platform

Posted by Cisoplatform.com on Wednesday, June 10, 2015
 
 
 

© 2015   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts