CISO Platform is the world's first online community solely dedicated to Senior Information Security Executives(CIO/CISO/CSO/Directors etc)

Most Popular


Building a Security Organization Structure


Building a Security Organization Structure

Presented by Vishal Salvi at CISO Platform Annual Summit, 2013. Vishal is the head of information s…

 


Top learning while dealing with organization changes


Top learning while dealing with organization changes

Presented by Amit Pradhan, CISO, Cipla, at CISO Platform Annual Summit, 2013. He heads the corporat…



Attacks on Smart TV and Connected Smart Devices


Attacks on Smart TV and Connected Smart Devices

Presented by Martin Herfurt at CISO Platform Annual Summit, 2013.Martin did a lot of work in the fi…


South Asia's Cyber Security Landscape after the Snowden Revelations


South Asia's Cyber Security Landscape after the Snowden Revelations

Presented by Mohammad Hluchan at CISO Platform Annual Summit, 2013. Hluchan is a IT security consul…



Mitigating the security risks of cloud service adoption


Mitigating the security risks of cloud service adoption

Presented by Wayne Tufek at CISO Platform Annual Summit, 2013. Wayne Tufek is currently the IT Secu…



Top learnings from evaluating and implementing a DLP Solution


Top learnings from evaluating and implementing a DLP Solution

Presented by Vipin Kumar, Group CIO, Escorts Ltd, at CISO Platform Annual Summit, 2013.

 

How we defended against Man in the Browser Attacks


How we defended against Man in the Browser Attacks

Presented by Veena Srinivasan, Business Information Security Officer, Citi Bank at CISO Platform An…

 


Why should you worry about IPV6 Security even if your network runs on IPV4?


Why should you worry about IPV6 Security even if your network runs on IPV4?

Presented by Fernando Gont who specializes in the field of communications protocols security, worki…


Remote access server architecture for multi vendors access using Multi-Tenant Cloud


Remote access server architecture for multi vendors access using Multi-Tenant Cloud

Presented by Pradeep K Yadav, CISO, Haryana IT, Telecom & Enabled Industries Ltd.

 


Latest Attacks Vectors and Threats on Aircrafts and Unmanned Arial Vehicles


Latest Attacks Vectors and Threats on Aircrafts and Unmanned Arial Vehicles

Presented by Sachin Deodhar, cyber security analyst at CISO Platform Annual Summit, 2013.

 

Social Network of Senior Information Security Executives!

CISO, CSO, CIO, VP, Director and more ...


Express your Thought Leadership!


Become a Guest Author or Speaker


Learn from your peers!


Articles, Webinars, Videos


Blog Posts

Security Technology Implementation Report: Annual CISO Survey

Posted by pritha on January 31, 2014 at 1:00am 3 Comments

We are happy to announce the results of the annual survey of Security Implementation Status, in which 331 companies have participated. The data has been collected through the survey conducted online as well as during Top 100 CISO Awards. We have…

Continue

How Should a CISO choose the right Anti-Malware Technology?

Posted by CISO Platform on August 27, 2013 at 4:30pm 0 Comments

Sagar Karan, CISO, Fullerton India Credit Company Ltd. tells us How Should a CISO choose the right Anti-Malware Technology…

Continue

An Overview on Cloud Security

Posted by CISO Platform on November 3, 2013 at 2:30pm 0 Comments

-By Saurabh Kaushik, Head IT Security, Lupin Ltd.

      Overview on Cloud Security

Cloud adoption is an…

Continue

Action List Before Adopting a Cloud Technology

Posted by CISO Platform on August 28, 2013 at 4:00pm 1 Comment

-By  Rajesh R Nair, Vice President, Credit Suisse

Requirement for solutions…

Continue

Database Security Vendor Evaluation Guide

Posted by CISO Platform on August 28, 2013 at 2:00pm 0 Comments

- By A.Raja Vijay Kumar, VP & Global Information Security Leader, Genpact…

Continue

BYOD Security: From Defining the Requirements to Choosing a Vendor

Posted by CISO Platform on August 27, 2013 at 5:30pm 1 Comment

Nitin Chauhan, Head IT Security - CISO, Ratnakar Bank Ltd. tells us How should a CISO define the requirement for solutions for BYOD Security.…

Continue

CISO Viewpoint: Choosing the Right Anti-Spam Security Solution

Posted by CISO Platform on August 28, 2013 at 12:00am 0 Comments

- By Vipin Kumar, Group CIO, Escorts Ltd.

There are many technologies…

Continue

DDoS Security Checklist

Posted by Nilanjan De on August 20, 2013 at 7:30pm 0 Comments

Introduction

Since the early days of the internet, DDoS had been a favorite weapon of cyber-criminals. Recently there was news about the biggest DDoS attack in history targeted towards Spamhaus, an anti-spam group. The attacks…

Continue

Concept Note: CISO Recommendation Index- A community based product rating framework

Posted by CISO Platform on July 11, 2013 at 1:30pm 0 Comments

We heavily rely on references while taking a decision on adoption of a new technology or a product. However, there is no dedicated analysis of product leadership purely based on customer recommendation. From CISO Platform technology Analyst team,…

Continue

How would you describe the CISO role on Twitter?

Posted by Colin Robbins on May 29, 2013 at 3:00pm 2 Comments

At a recent industry event discussing security, a question was rasised as to who needs to take ownership of security issues, the comment was made that it needs to be "someone senior enough to care, but junior enough to know what they are…

Continue

Events

 
 
 

© 2014   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts Plugin for WordPress, Blogger...