Discussions

Loading… Loading feed

Latest Reads

Loading… Loading feed

 



Blog Posts

RIoT : Raiding Internet of Things

Posted by pritha on February 23, 2015 at 2:17pm 0 Comments

Watch Video: (Webinar) RIOT( Raiding Internet Of Things)…

Continue

Top Information Security Checklists, Guides and Articles that our members loved the most !

Posted by pritha on January 31, 2015 at 6:00pm 0 Comments





2014 has been a great year at CISO Platform. We had around 1500 new senior executives joining the platform and published 120 new articles on security. Here are some of the best ones from 2014.…

Continue

Man in the Browser Attacks on Online Transactions & Prevention Strategies

Posted by pritha on February 2, 2015 at 5:30pm 0 Comments

This is a great Man In the Browser Attack webinar(15 min), hosted by CISO Platform and briefly points out the Risks and also Recommends Some Fixes. It is presented by the CTO at Iviz. MiTB being particularly important for banking and…

Continue

Microsoft vs Apple: Which OS is more secure?

Posted by pritha on January 31, 2015 at 5:30pm 0 Comments

Contrary to the common man belief that 'Windows is very insecure', Microsoft has been very proactive in security. Apple iOS has a great deal of security too, it is described in its building from scratch in the iOS security document. Here are the…

Continue

BadUSB — On accessories that turn evil by Karsten Nohl

Posted by pritha on January 31, 2015 at 5:30pm 0 Comments

Watch Video:

(Read more:  …

Continue

Ants and Elephants in the CISO's Office

Posted by pritha on January 31, 2015 at 5:30pm 0 Comments

Watch Video:

(Read more:  …

Continue

5 Major Types Of Hardware Attacks You Need To Know

Posted by pritha on January 13, 2015 at 6:00pm 0 Comments

From a recent webinar, I gathered the very notably important parts into organized sub-parts. This is the first part wherein the major hardware threats and my insights on them are described. Below is the exact portion of the webinar…

Continue

Learning Practical Forensics-Tools & Techniques

Posted by pritha on January 13, 2015 at 5:00pm 0 Comments

A concise primer to Forensics for a beginner or a security expert- an insight into actual solution achieved through Forensics. The problem states a PGP message intercepted by an RAT and needs to be decrypted without the actual key? The…

Continue

Cyber Safety in Cars and Medical Devices

Posted by CISO Platform on December 19, 2014 at 2:30am 0 Comments

Cyber Safety in Cars and Medical Devices by Beau Woods, creator of IOT Security Framework. We are adopting connecting, computerized technology faster than we are able to secure it. When this technology is integrated into life…

Continue

Events

June 4

Thursday

November 19

Thursday

 
 
 


CISO Platform Decision Summit, 2015

4 -5 June, 2015, 

Shangri-La, Delhi

Decision Summit is aimed at practical discussions, specific implementations, checklists and metrics used to help a CISO take better decisions. The areas of focus shall be:

  • Vendor Evaluation and Bench marking Tools
  • Security Management Tools and Frameworks
  • Metrics and Dashboard for Security Management and Decisions
  • Professional Development Checklists and Frameworks

Latest Activity

Profile IconRavi Upadhyayula, Arvind kumar, Dr. Suresh Suralkar and 1 more joined CISO Platform
yesterday
Profile IconBiju Varghese, Mukesh Kumar Jain, Ram Kumar G and 2 more joined CISO Platform
Thursday
Profile IconPrashant Bankar, Anuj Sharma, Nilesh Gade and 1 more joined CISO Platform
Wednesday
Venkaesh Subramaniam updated their profile photo
Wednesday
VINAY KUMAR SINGH is now a member of CISO Platform
Apr 13
Profile IconAmandeep Singh Bawa, Vincent Israel, Chandar Natarajan and 4 more joined CISO Platform
Apr 9
pawan dwivedi updated their profile
Apr 8
Mohit Jain liked Pravesh Sharma's profile
Apr 6

© 2015   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts