Latest Activity

 




Blog Posts

Bad USB Defense Strategies

Posted by pritha on August 18, 2015 at 4:39pm 0 Comments

What Is Bad USB?

The phenomenon of using the USB for malicious intent can be termed as Bad USB. USB Thumb Drives are the last considerations of malicious intent. However, if manipulated, they can takeover…

Continue

Major components of IT GRC solutions

Posted by pritha on August 18, 2015 at 4:39pm 0 Comments

Governance, Risk and Compliance is sometimes a managerial step or a mandatory step to adhere with regulations & maintain compliant systems. It widely helps in Risk Management.

Some of the major components of IT GRC are:…

Continue

Free Resources For Kickstarting Your IT-GRC Program

Posted by pritha on August 18, 2015 at 1:00pm 0 Comments

Free/Opensource Tools -

  • IT GRC Asset Management

    Some functions can be used for technical controls to policy enforcement

    OTRS …
Continue

Checklist To Evaluate SIEM Vendors

Posted by pritha on June 29, 2015 at 12:00pm 0 Comments

Here is a comprehensive checklist to Evaluate SIEM Vendors. We highly appreciate this community contribution.

by…

Continue

Top IT Security Conferences In The World

Posted by pritha on June 30, 2015 at 10:00pm 0 Comments

Here's a list of World's Best and Most Popular IT Security Conferences. Details such as Tentative Time, Pass Price and Locations are mentioned so you can plan your Calendar.

Top IT Security…

Continue

Incident Response: How To Respond To A Security Breach During First 24 Hours (Checklist)

Posted by pritha on July 2, 2015 at 12:30am 0 Comments

Incident Response is pretty much the same, however the first few hours can be vital and only high priority actions can save the situation. Since this is a Security Breach, it is of highest priority and must be treated at highest escalation…

Continue

Checklist: Skillset required for an Incident Management Person

Posted by pritha on June 26, 2015 at 5:00pm 0 Comments

Technical Skills:

Major Areas Of Focus:

  • Incident Response
  • Computer Forensics
  • Network…
Continue

Leap Second-Are You Ready For It?

Posted by pritha on June 23, 2015 at 8:30pm 0 Comments

The next Leap(26th leap) Second will be on 30 June,2015. The last one was on 30 June,2012.

What Is It?

Earth's rotation is slowing down around it's own axis, so we need to…

Continue

#cisoplatform

Posted by Cisoplatform.com on Wednesday, August 19, 2015

CISO Platform Decision Summit '15

Posted by Cisoplatform.com on Monday, June 8, 2015

Award Ceremony Honoring Top 100 CISOs - by CISO Platform

Posted by Cisoplatform.com on Wednesday, June 10, 2015
 
 
 

© 2015   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts