Gireesh Kumar's Page

Latest Activity

Girish liked Gireesh Kumar's event 7th,Top 100 CISO Awards & Conference @ Pune (12-13 May)
May 15
Sunil Pandey liked Gireesh Kumar's event 7th,Top 100 CISO Awards & Conference @ Pune (12-13 May)
May 14
Anand Kumar Sinha liked Gireesh Kumar's event 5th Annual Summit & Security Architecture Conference @ Bangalore (17th & 18th November)
May 14
rajesh kumar liked Gireesh Kumar's event 7th,Top 100 CISO Awards & Conference @ Pune (12-13 May)
Apr 25
Amit, CISO Platform liked Gireesh Kumar's event Enterprise Playbook Round Table Series: Cloud, APT, Mobile…@ Bangalore on 17th August
Apr 11
Amit, CISO Platform liked Gireesh Kumar's event 7th,Top 100 CISO Awards & Conference @ Pune (12-13 May)
Apr 11
Gireesh Kumar posted a blog post

How To Build Your Mobile Security Strategy

The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop…See More
Apr 10
ABDUR RAFI liked Gireesh Kumar's event 7th,Top 100 CISO Awards & Conference @ Pune (12-13 May)
Apr 5
Sanil Anand Nadkarni liked Gireesh Kumar's event 7th,Top 100 CISO Awards & Conference @ Pune (12-13 May)
Mar 21
Abhinav Biswas liked Gireesh Kumar's event 7th,Top 100 CISO Awards & Conference @ Pune (12-13 May)
Mar 9
Abhinav Biswas liked Gireesh Kumar's event 7th,Top 100 CISO Awards & Conference @ Pune (12-13 May)
Mar 9
pritha liked Gireesh Kumar's event 7th,Top 100 CISO Awards & Conference @ Pune (12-13 May)
Mar 8
Nilesh Bhelkar liked Gireesh Kumar's event Enterprise Playbook Round Table Series: Cloud, APT, Mobile…@ Bangalore on 17th August
Feb 8
Arindam Singha Roy liked Gireesh Kumar's event Security Priority Planning for 2017 @ Delhi on 7th Feb
Jan 28
Gireesh Kumar updated an event
Thumbnail

7th,Top 100 CISO Awards & Conference @ Pune (12-13 May) at Community Playbooks - Buying Priorities, Evaluation and Implementation best practices

May 12, 2017 to May 13, 2017
India's 1st security awards where Top 100 CISOs of India along with prominent other security professionals meet :  Community Playbooks - Buying Priorities, Evaluation and Implementation best practices  1-1 Analysts meetings with CISOs Wargaming on various topics like Incident Response, RFP Building etcAttendees:100+ Decision makers & influencers in securityDate: 12 & 13 May 2017Place: Hyatt PuneSee More
Jan 24
Gireesh Kumar updated an event
Thumbnail

Security Priority Planning for 2017 @ Mumbai on 9th Feb at Security Priority Planning for 2017

February 9, 2017 from 8am to 10:30am
Breakfast Playbook Round Table Series: Security Priority Planning for 2017 1. Preparing for 2017 Security Strategy 2. Moving beyond detection/prevention to response and prediction 3. How to build your security based on Security Architecture 4. IT Security capability maturity of Indian IndustryAttendeesCISO Platform Analyst driven, closed door event with about 10-15 key decision makers/influencers from the Top Enterprise.Date: 9-February-2017Place: MumbaiTime: 8.00AM to 10.30AM …See More
Jan 23

Profile Information

Company
CISO Platform

Gireesh Kumar's Blog

The Forrester Wave : Security Analytics Platforms, Q1, 2017

Posted on May 2, 2017 at 7:30pm 0 Comments

This report identifies11 most significant Security Analytics (SA) providers — BAE Systems, E8 Security, Fortinet, Hewlett Packard Enterprise (HPE), Huntsman Security, IBM, Intel Security, LogRhythm, RSA, Securonix, and Splunk.



This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.

>>…

Continue

Building a Successful Security Operations Center (SOC)

Posted on April 24, 2017 at 12:30pm 0 Comments

This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC, this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as the technology involved.

In depth understanding including graphical representation and process flow diagrams.…

Continue

How To Build Your Mobile Security Strategy

Posted on April 10, 2017 at 8:00pm 0 Comments

The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own.

While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in…

Continue

CISO Guide: Enterprise Mobility Management (EMM) Productivity Transformation Report

Posted on April 6, 2017 at 12:00pm 0 Comments

As more people use mobile devices to work, what are the key elements of an Enterprise Mobility Management (EMM) solution that successfully allow content creation, editing, sharing, syncing and pushing to mobile devices? …



Continue

Comment Wall

You need to be a member of CISO Platform to add comments!

Join CISO Platform

  • No comments yet!
 
 
 

 

© 2017   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts