Events

 





Blog Posts

eBook : Deception 2.0 for Dummies

Posted by CISO Platform on August 18, 2017 at 12:00pm 0 Comments

Deception is a very useful and effective tactic to detect and evade threats in…

Continue

Complete Guide To Log & Event Management (by Anton Chuvakin Gartner)

Posted by CISO Platform on August 18, 2017 at 12:30pm 0 Comments

Everybody has logs and that means that everybody ultimately will have to deal with them—if only because many regulatory mandates prescribe that. In this guide, Dr. Anton Chuvakin will…

Continue

Application Threat Modeling : Types Of Threats

Posted by pritha on June 20, 2017 at 12:30pm 0 Comments

Here's a small classification of Types Of Threats In Application Threat Modeling. This was earlier presented in SACON (International Security Architecture Conference) by Nilanjan De [Multiple patents,…

Continue

Infrastructure and Cyber Security Trends and Challenges

Posted by Sayyad Salim on August 2, 2017 at 10:30am 0 Comments

It is important to understand the new trends that are occurring…

Continue

Playbook for DDOS Security Response

Posted by Amit, CISO Platform on May 6, 2017 at 7:30pm 0 Comments

(Author : Chandra Prakash Suryawanshi,  SVP- India & APAC at Aujas Networks Pvt. Ltd. )…

Continue

Advanced Security Operations Centre (SOC) - Features & Technical Capabilities

Posted by pritha on July 2, 2017 at 4:00am 0 Comments

This gives a glimpse of Advanced Security Operations Centre (SOC) Features & Technical Capabilities. This document is not explicit, it assumes you have prior knowledge of the subject, therefore only pointers have been mentioned.

This…

Continue

Top 7 Things to do: Legal Aspects in Cyber Crisis Management (for Banks)

Posted by CISO Platform on April 29, 2017 at 10:40pm 0 Comments

Root cause analysis/investigation/forensic analysis of crisis, acquisition and retention of evidence and logs are necessary from legal point of view. Collection of evidence needs to be efficient so that the bank should not face any legal…

Continue

Top 5 Enterprise Security Architecture Measurement Categories

Posted by CISO Platform on April 29, 2017 at 9:30pm 0 Comments

Here is brief Summary of Top 5 Enterprise Security Architecture Measurement Categories. This was earlier presented in SACON (India's only Security Architecture Conference in India)by Arnab…

Continue

Executive Summary to Build Enterprise Security Architecture Governance Program

Posted by CISO Platform on April 29, 2017 at 9:00pm 0 Comments

This article examined the field of security architecture from the point of view of security governance. It explains how security architecture governance can be created as a…

Continue

 
 
 

 

Contact Us

Email: contact@cisoplatform.com

InfoSec Media Private Limited, First Floor, # 48, Dr DV Gundappa Road, Basavanagudi, Bangalore, Karnataka - 560004

© 2017   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts