Blog Posts

Top 10 'Incident Response & SIEM' talks from RSA Conference 2016 (USA)

Posted by pritha on April 15, 2016 at 3:30pm 0 Comments

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Incident Response & SIEM at RSA…

Continue

Top 6 'Cloud Security' talks from RSA Conference 2016 (USA)

Posted by pritha on April 14, 2016 at 7:30pm 0 Comments

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Cloud Security at RSA Conference…

Continue

16 Application Security Trends That You Can't Ignore In 2016

Posted by bikash on February 20, 2016 at 1:30pm 0 Comments

CISO Platform-Top Application Security Trends 2016

Application Security has emerged over years both as a market as well as a technology. Some of the key drivers had…

Continue

11 Ways To Measure The Effectiveness Of Your Identity & Access Management (IAM) Solution

Posted by pritha on February 12, 2016 at 5:00pm 0 Comments

Identity Access Management (IAM) is a set of business policies, framework and processes which ensures the right person has access to the right asset/resources. Identity Access Management solutions can deliver intangible benefits that are revenue…

Continue

9 Top Features To Look For In Next Generation Firewall (NGFW)

Posted by pritha on February 12, 2016 at 5:00pm 0 Comments



Firewall in simple terms acts as a barrier to prevent unauthorized access or malicious traffic within a system or in a network. The rapid growth of new innovative technology and alongside with the massive growth of new security threat, the…

Continue

Top 6 Reasons Why Data Loss Prevention(DLP) Implementation Fails

Posted by pritha on February 10, 2016 at 11:30pm 0 Comments

Below are Top 6 Reasons Why Data Loss Prevention/ Data Leakage Prvention…

Continue

Session on Practical Demo of Collecting Threat Intel Using OSINT Tools.

Posted by Gireesh Kumar on January 19, 2016 at 3:30pm 0 Comments

Session on Practical Demo of Collecting Threat Intel Using OSINT Tools Video by Sachin Deodhar.

( Read More:…

Continue

CISO Platform Top IT Security Influencers (Part 1)

Posted by pritha on January 8, 2016 at 2:30am 0 Comments



CISO Platform recognizes World's Top 100 IT Security Influencers who have/are impacting the information…

Continue

Wargame Strategy Simulation : Creating Action Items For Responding To A Breach In First 24 Hours.

Posted by Gireesh Kumar on December 28, 2015 at 3:30pm 0 Comments

Wargame Strategy Simulation : Creating Action Items For Responding To A Breach In First 24 Hours Video by Paul Raines, Pravesh Sharma, Shirish Dandekar, Sunil Mehta.…

Continue

Information Security Metrics and Dashboard for the CEO / Board

Posted by bikash on December 2, 2015 at 9:00pm 2 Comments

Information Security Metrics For The Board



It is very important to properly define the right Information Security Metrics…

Continue

 
 
 

Subscribe To Our Feed

© 2016   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts