Data Loss Prevention (DLP)

  • DLP Drivers
  • Types of DLP: Network, Endoint, Data Identification, Data leakage detection, Data at rest
    • Types of data-structured & unstructured
    • Data detection techniques
      • Pattern Macthing
      • Tagging & fingerprinting
    • When to choose which technology?
    • Pros and cons
  • Under the hood of AST Technologies
    • Monitoring, analyzing, log monitoring
    • Compliance
    • DLP tools
    • Security Architecture
    • Best Practices
  • CISO Platform Taxonomy of Vendors
  • Complete listing of DLP product vendors
  • Top Vendors as per CISO Platform Index
    • Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
  • Feature Comparison Matrix
  • TCO Analysis
  • Technology evaluation checklist
  • Key Learning
  • Case studies from CISOs and their key learning
  • Q&A

Application Security Testing

  • AST Drivers
  • Types of AST: DAST, SAST, IAST, RASP
    When to choose which technology?
    Pros and cons
  • Under the hood of AST Technologies
  • CISO Platform Taxonomy of Vendors
    Complete listing of AST product vendors
  • Top Vendors as per CISO Platform Index
    Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
  • Feature Comparison Matrix
  • TCO Analysis
  • Technology evaluation checklist
  • Key Learning
  • Case studies from CISOs and their key learning
  • Q&A

Identity & Access Management(IAM)

  • IAM Drivers
  • IAM  Authorization & Authentication
    • Security Assertion markup language (SAML) and WS-security
  • IAM Requirements
    • Compliance and regulatory issues
    • IAM governance and organizational issues
  • Implementation and Under the hood of IAM Technologies
    • Best practices for Implementation
    • Implementing  Enterprise IAM
    • Identity Management, Enterprise Access Management
    • Identity as a service architectures
    • Managing Users  in Cloud
  • CISO Platform Taxonomy of Vendors
    • Complete listing of IAM product vendors
  • Top Vendors as per CISO Platform Index
    • Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
  • Feature Comparison Matrix
  • TCO Analysis
  • Technology evaluation checklist  for IAM
  • IAM ROI
    • Making compelling business case for IAM
  • Key Learning
  • Case studies from CISOs and their key learning
  • Q&A

Governance Risk Management & Compliance (IT GRC)

  • GRC Drivers
  • GRC Components
    -Policy, Risk, Compliance, Audit, Vendor Risk, Threat & Vulnerability, Incident
    -GRC Content
    –Questionnaires, Controls, Policies, Procedures
  • CISO Platform Taxonomy of Vendors
    –Complete listing of GRC product vendors
  • Top Vendors as per CISO Platform Index
    –Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
  • Feature Comparison Matrix
  • TCO Analysis
  • Technology evaluation checklist
  • Key Learning
  • Case studies from CISOs and their key learning
  • Q&A

Security Information & Event management (SIEM)

  • SIEM Drivers
  • SIEM Coverage
    • Threat coverage/landscape
    • Evolving threats
    • Manage log monitoring
  • SIEM Requirements
    • Compliance Requirements
    • Balance Threat and Compliance
  • Under the hood of SIEM Technologies
    • NTP Setup
    • Security Architecture
    • Alerting Real-Time
    • Log Management
  • CISO Platform Taxonomy of Vendors
    • Complete listing of SIEM product vendors
  • Top Vendors as per CISO Platform Index
    • Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
  • Feature Comparison Matrix
  • TCO Analysis
  • Technology evaluation checklist
  • Key Learning
  • Case studies from CISOs and their key learning
  • Q&A

Malware Protection System /APT

  • MPS Drivers
  • Types of MPS Detection Techniques
    • Anomaly Based Technique
    • Specification Based Technique
    • Signature Based Technique
  • Under the hood of MPS Technologies
    • Sensor & Sandbox Deployment
  • Proof of concept (POC)
    • End to end analysis
    • Tools required
    • Rendering network harmless 
  • CISO Platform Taxonomy of Vendors
    • Complete listing of MPS product vendors
  • Top Vendors as per CISO Platform Index
    • Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
  • Feature Comparison Matrix
  • TCO Analysis
  • Technology evaluation checklist
  • Key Learning
  • Case studies from CISOs and their key learning
  • Q&A

Cloud Security

  • Cloud security Drivers
  • Types of Cloud security  Platoforms:
    • Cloud Management Platforms
    • When to choose which? Pros & Cons
  • Cloud security  techniques
    • Oauth
    • OpenID
    • Virtualization
  • Under the hood of Cloud Security Technologies
    • Cloud Security Standards
    • Cloud Data Protection Gateways
    • SaaS Platform Security Management
    • Data Center Storage Encryption
  • CISO Platform Taxonomy of Vendors
    • Complete listing of Cloud Security product vendors
  • Top Vendors as per CISO Platform Index
    • Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
  • Feature Comparison Matrix
  • TCO Analysis
  • Technology evaluation checklist
  • Key Learning
  • Case studies from CISOs and their key learning
  • Q&A

Web Application Firewall (WAF)

  • WAF Drivers
  • WAF addons:
    • Caching & Compression
    • Speed Up the SSL
    • Load Balance
    • Connection Pooling
  • Types Of WAF & When to choose what?
    • Reverse Proxy, Transparent proxy, inline transparent Or Layer 2 Bridge, Network based, Host/server based
    • When to choose which technology?
    • Pros and cons
  • Under the hood of WAF Technologies
    • Securing Apps with WAF
    • Best practices
  • CISO Platform Taxonomy of Vendors
    • Complete listing of WAF product vendors
  • Top Vendors as per CISO Platform Index
    • Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
  • Feature Comparison Matrix
  • TCO Analysis
  • Technology evaluation checklist
  • Key Learning
  • Case studies from CISOs and their key learning
  • Q&A

Next Gen Firewall

  • Next Gen Firewall Drivers (Vs Standard Firewall)
    • IDS/IPS
    • SSH & SSL interception
    • QoS/bandwidth management
    • Anti Virus inspection
    • 3rd party protection
  • Types of Next Gen Firewall Solutions
    • When to choose which technology?
    • Pros and cons
  • More than the conventional:
    • Overview: Webapp attacks
    • SQLi and Blind SQLi
    • Cross site scripting (XSS)
  • Under the hood of Next Gen Firewall Technologies
  • CISO Platform Taxonomy of Vendors
    • Complete listing of Next Gen Firewall product vendors
  • Top Vendors as per CISO Platform Index
    • Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
  • Feature Comparison Matrix
  • TCO Analysis
  • Technology evaluation checklist
  • Key Learning
  • Case studies from CISOs and their key learning
  • Q&A

Endpoint

  • Endpoint Drivers
  • Types of Isolations
    • Isolating the Host
      • Major splits: Split DNS;Split-Brain DNS,Split-horizon DNS…
    • Isolating  the  Web application
      • Cross site attacks –CSRF
      • Logical & Session flaws
      • Injection attacks
  • More than the conventional Endpoint
    • Dig Deep
      • HIPS
      • Whitelisting
      • USB protection
      • Zero-day attacks
    • Pros and cons
  • Under the hood of Endpoint Technologies
    • Testing tools for DNS and SMTP frameworks
    • Recursion & Spam Relay challenges
  • CISO Platform Taxonomy of Vendors
    • Complete listing of endpoint product vendors
  • Top Vendors as per CISO Platform Index
    • Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
  • Feature Comparison Matrix
  • TCO Analysis
  • Technology evaluation checklist
  • Key Learning
  • Case studies from CISOs and their key learning
  • Q&A

Content Security(web/email)

  • Content Security Drivers
  • Types of  data security solutions
    • Ways: Network security,Content filtering, Digital Rights Management (DRM)
    • Common Techniques: Disk Encryption(DE),Data Masking,Data Erasure
    • Major Laws and standards (National,International)
    • When to choose which technology?
    • Pros and cons
  • Under the hood of Content Security Technologies
  • CISO Platform Taxonomy of Vendors
    • Complete listing of content security product vendors
  • Top Vendors as per CISO Platform Index
    • Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
  • Feature Comparison Matrix
  • TCO Analysis
  • Technology evaluation checklist
  • Key Learning
  • Case studies from CISOs and their key learning
  • Q&A

Security Intelligence/Analytics, Forensics & Incident Response

  • Forensics & Incidence Response Drivers
  • Major How-To:
    • Basic Forensic techniques
    • Moderate level IR techniques: 
      • Preparation: Tools, techniques and procedures
      • Identification & Containment: Finding out what is compromised and securing other assets
      • Eradication:  Planning the main steps to fixing the vulnerabilities
      • Recovery:  Primary steps an organization needs to take for proper recovery
      • Remote system handling
    • Basic Network Forensics:
      • Proxy Solutions, proxy server examinations, analysis & logging
      • Common protocols and session rebuilding techniques
      • Tools, filters and file formats
      • Architectural challenges
  • Under the hood of Forensics & IR Technologies
  • CISO Platform Taxonomy of Vendors
    • Complete listing of of Forensics & IR product vendors
  • Top Vendors as per CISO Platform Index
    • Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
  • Feature Comparison Matrix
  • TCO Analysis
  • Technology evaluation checklist
  • Key Learning
  • Case studies from CISOs and their key learning
  • Q&A

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform