CISO Platform
  • Female
  • bangalore
  • India
  • CISOPlatform

CISO Platform's Friends

  • Prasanta Bhattacharjee
  • SUSHIL KUMAR SHARMA
  • Sanket Daptardar
  • Tushar Kanchan
  • Anand Anwekar
  • Rajesh R Nair
  • Dhananjay Rokde
  • Yatendra Kumar
  • Priyanka Aash
  • Amit Pradhan
  • Satish Papnoi
  • Rajit Kartha
  • Vishal Jaitak
  • Bikram Seth
  • Prashant Deo
 

Welcome, Priyanka Aash!

Latest Activity

CISO Platform updated an event
Thumbnail

International Conference on Security Architecture at International Conference on Security Architecture

November 10, 2017 at 8am to November 11, 2017 at 6pm
Security Architecture Conference started as a simple idea to grow the Information Security builder community. The 4th edition of SACON is organized by CISO Platform, the largest social collaboration platform exclusively for CISOs and senior information security executives with 60,000+ subscribersDate: 10-11 November Venue: Lalit Ashok, Bengaluru, IndiaClick here to Pre- Register nowSee More
Jun 19
CISO Platform's blog post was featured

Top 7 Things to do: Legal Aspects in Cyber Crisis Management (for Banks)

Root cause analysis/investigation/forensic analysis of crisis, acquisition and retention of evidence and logs are necessary from legal point of view. Collection of evidence needs to be efficient so that the bank should not face any legal complexity during further investigation. The below guidelines need to be followed to avoid legal complexity.Top 7 Things to do:Affected every electronic evidence will be preserved on an as is basis, to ensure its integrity.Any actions that may suggest tampering…See More
May 30
Karthik K P liked CISO Platform's event SACON - Bangalore (12th July)
May 23
CISO Platform posted a blog post

Gartner Magic Quadrant for Security Information and Event Management

This report gives you a broad view on the present technology providers and their relative position. The Magic Quadrant report positions technology players within a specific market. It brings together the major competing technology providers along with emerging, established and niche technology providers. The evaluation criteria along with graphical representation help ones rapidly ascertain the technology providers and their performance in the technology.>>…See More
May 2
CISO Platform's 3 blog posts were featured
Apr 29
CISO Platform posted blog posts
Apr 29
CISO Platform updated an event
Thumbnail

Government & PSU Meetup at Government & PSU Meetup

February 7, 2017 from 1pm to 5:30pm
Government & PSU Meetup Dr. Kamlesh Bajaj (Founder CEO- DSCI) and Bikash Barai shall moderate the private round table.AttendeesVery focused closed door event with about 15+ key govt & PSU decision makers (NIC, CERT, Army, Navy, Airforce etc...)Date: 7-February-2017Place: DelhiTime: 11.00AM to 01.30PM See More
Jan 11
CISO Platform's event was featured

Breakfast Playbook Round Table Series: Security Priority Planning for 2017 (Mum,Pune,Del, Blr) at Security Priority Planning for 2017

January 11, 2017 from 8am to 10:30am
Breakfast Playbook Round Table Series: Security Priority Planning for 20171. Preparing for 2017 Security Strategy2. Moving beyond detection/prevention to response and prediction3. How to build your security based on Security Architecture4. IT Security capability maturity of Indian IndustryAttendeesCISO Platform Analyst driven, closed door event with about 10-15 key decision makers/influencers from the Top Enterprise.Date: February 3, 7, 8 & 9Place: Bangalore, Delhi, Pune, Mumbai…See More
Jan 11
CISO Platform posted an event

Breakfast Playbook Round Table Series: Security Priority Planning for 2017 (Mum,Pune,Del, Blr) at Security Priority Planning for 2017

January 11, 2017 from 8am to 10:30am
Breakfast Playbook Round Table Series: Security Priority Planning for 20171. Preparing for 2017 Security Strategy2. Moving beyond detection/prevention to response and prediction3. How to build your security based on Security Architecture4. IT Security capability maturity of Indian IndustryAttendeesCISO Platform Analyst driven, closed door event with about 10-15 key decision makers/influencers from the Top Enterprise.Date: February 3, 7, 8 & 9Place: Bangalore, Delhi, Pune, Mumbai…See More
Jan 11
Karthik K P liked CISO Platform's page Call for Authors - CISO Handbook
Oct 27, 2016
Aditya Raghu Vamsi Pochiraju liked CISO Platform's page Call for Authors - CISO Handbook
Oct 25, 2016
Kishore liked CISO Platform's event SACON - Bangalore (12th July)
Jun 16, 2016
CISO Platform posted an event

SACON - Bangalore (12th July) at SACON - Bangalore (12th July)

May 31, 2016 all day
SACON  - BengaluruDate- 12th JulyTime- 9:00 AM to 6:00 PMLocation- Ritz Carlton Address: 99, Residency Rd, Srinivas Nagar, Shanthala Nagar, Ashok Nagar, Bengaluru, Karnataka 560025 Maps: Click hereDescriptionIndia’s first and only conference exclusively focused on Information Security Architecture, bringing together 60+ Senior Security executives (CISO, Security Architects etc.) to share…See More
May 31, 2016
Deepak Tiwari liked CISO Platform's page Call for Authors - CISO Handbook
Mar 19, 2016
CISO Platform posted a blog post

IDC Report: CISOs' Guide to Enabling a Cloud Security Strategy

For years, enterprises and the security community have debated whether the cloud is more secure or less secure than the datacenter. Always a strawman argument, now that debate becomes moot. The cloud is here to stay. And the job now is to operationalize security across the datacenter and into the cloud architecture, fully covering evolving use cases and hybrid…See More
Jan 27, 2016
Abhinav Biswas liked CISO Platform's blog post Technology/Solution Guide for Single Sign-On
Dec 21, 2015

Profile Information

Company
CISOPlatform

Comment Wall (24 comments)

You need to be a member of CISO Platform to add comments!

Join CISO Platform

At 10:55am on April 15, 2013, Jayaramachandran Rajendran said…

Per the email address it was a She :)

So, looks like maintaining genuine identity on many areas still is a huge security and privacy concern.And how many are you are trying to address it withing technology?

And how many of you think that Spam can be used positively too?

At 2:16pm on April 13, 2013, Jayaramachandran Rajendran said…

Thank you! Surprised to recieve spams from this portal...Otherwise hope to get the best out of this networking portal..

 

At 12:06pm on March 19, 2013, Parasuram M R said…

Thank you very much !

At 7:51pm on March 18, 2013, Jaideep Khanduja said…

Thanks...

At 6:51pm on March 15, 2013, Sachin Kharade said…

Thanks....

At 5:49pm on March 14, 2013, Heramba Naik said…

Thanks to all.

"Information without Information Security is just like sending letter without an envelope".

At 2:53pm on February 11, 2013, Vaman Amarjeet G Kini said…

Thanks Priyanka 

At 2:17am on January 26, 2013, ashish bansal said…

Thank you Priyanka

At 3:48pm on January 23, 2013, G Aswathanarayana Rao said…

Thanks for inviting me

At 3:18pm on January 23, 2013, Pradeep K. Yadav said…

Thanks to All he earlier members and to you Priyanka.
Pradeep Yadav

CISO Platform's Blog

Ransomware Response Guide

Posted on May 16, 2017 at 6:30pm 0 Comments

The document is intended to be a guide for organizations faced with a ransomware infection. This guide is split into several sections, with the most critical and time-sensitive being in the initial response section. 

If you are currently experiencing a ransomware incident, it is highly recommended you immediately review the containment section below, and return to this section at a later time for an overall background of ransomware.…

Continue

Gartner Magic Quadrant for Security Information and Event Management

Posted on May 2, 2017 at 11:00pm 0 Comments

This report gives you a broad view on the present technology providers and their relative position. The Magic Quadrant report positions technology players within a specific market. It brings together the major competing technology providers along with emerging, established and niche technology providers. 

The evaluation criteria along with graphical representation help ones rapidly ascertain the technology providers and their performance in the…

Continue

Top 7 Things to do: Legal Aspects in Cyber Crisis Management (for Banks)

Posted on April 29, 2017 at 10:40pm 0 Comments

Root cause analysis/investigation/forensic analysis of crisis, acquisition and retention of evidence and logs are necessary from legal point of view. Collection of evidence needs to be efficient so that the bank should not face any legal complexity during further investigation. The below guidelines need to be followed to avoid legal complexity.

Top 7 Things to do:

  • Affected every electronic evidence will be…
Continue

4 Phases of Cyber Crisis Management

Posted on April 29, 2017 at 10:00pm 0 Comments

There are four phases in Cyber Crisis Management, namely Detection, Response, Containment & Recovery. Here is a glimpse of the four phases. 

 

>>Get the Complete Report on Crisis Management…

Continue
 
 
 

 

© 2017   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts