Events

 





Blog Posts

Gartner Magic Quadrant for Enterprise Mobility Management 2017

Posted by CISO Platform on September 5, 2017 at 3:30pm 0 Comments

Enterprise mobility management suites connect mobile devices to enterprise workflows while supporting the perpetual growth in device numbers and types. Professionals responsible for mobile and endpoint…

Continue

eBook : Deception 2.0 for Dummies

Posted by CISO Platform on August 18, 2017 at 12:00pm 0 Comments

Deception is a very useful and effective tactic to detect and evade threats in…

Continue

Complete Guide To Log & Event Management (by Anton Chuvakin Gartner)

Posted by CISO Platform on August 18, 2017 at 12:30pm 0 Comments

Everybody has logs and that means that everybody ultimately will have to deal with them—if only because many regulatory mandates prescribe that. In this guide, Dr. Anton Chuvakin will…

Continue

Application Threat Modeling : Types Of Threats

Posted by pritha on June 20, 2017 at 12:30pm 0 Comments

Here's a small classification of Types Of Threats In Application Threat Modeling. This was earlier presented in SACON (International Security Architecture Conference) by Nilanjan De [Multiple patents,…

Continue

Playbook for DDOS Security Response

Posted by Amit, CISO Platform on May 6, 2017 at 7:30pm 0 Comments

(Author : Chandra Prakash Suryawanshi,  SVP- India & APAC at Aujas Networks Pvt. Ltd. )…

Continue

Advanced Security Operations Centre (SOC) - Features & Technical Capabilities

Posted by pritha on July 2, 2017 at 4:00am 0 Comments

This gives a glimpse of Advanced Security Operations Centre (SOC) Features & Technical Capabilities. This document is not explicit, it assumes you have prior knowledge of the subject, therefore only pointers have been mentioned.

This…

Continue

Top 5 Enterprise Security Architecture Measurement Categories

Posted by CISO Platform on April 29, 2017 at 9:30pm 0 Comments

Here is brief Summary of Top 5 Enterprise Security Architecture Measurement Categories. This was earlier presented in SACON (India's only Security Architecture Conference in India)by Arnab…

Continue

Executive Summary to Build Enterprise Security Architecture Governance Program

Posted by CISO Platform on April 29, 2017 at 9:00pm 0 Comments

This article examined the field of security architecture from the point of view of security governance. It explains how security architecture governance can be created as a…

Continue

4 Phases of Cyber Crisis Management

Posted by CISO Platform on April 29, 2017 at 10:00pm 0 Comments

There are four phases in Cyber Crisis Management, namely Detection, Response, Containment & Recovery. Here is a glimpse of the four phases. 

 …

Continue

 
 
 

 

Contact Us

Email: contact@cisoplatform.com

InfoSec Media Private Limited, First Floor, # 48, Dr DV Gundappa Road, Basavanagudi, Bangalore, Karnataka - 560004

© 2017   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts