Shreya Shree
  • Bangalore, Karnataka
  • India
  • CISO Platform
 

Shreya Shree's Page

Profile Information

Company
CISO Platform

Shreya Shree's Blog

Top 8 talks on 'Emerging Technologies' from RSA Conference 2017 (USA)

Posted on April 14, 2017 at 4:30pm 0 Comments

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.

RSA Conference held its event at the Moscone Center in San Francisco and…

Continue

Applied Cognitive Security: Complementing the Security Analyst

Posted on April 14, 2017 at 12:36pm 0 Comments

Applied Cognitive Security: Complementing the Security Analyst (RSA Conference 2017)

Security incidents are increasing dramatically and becoming more sophisticated, making it almost impossible for security analysts to keep up. A cognitive solution that can learn about security from structured and unstructured information sources is essential. It can be applied to empower security analysts with insights…

Continue

Automated Prevention of Ransomware with Machine Learning and GPOs

Posted on April 14, 2017 at 12:33pm 0 Comments

Automated Prevention of Ransomware with Machine Learning and GPOs (RSA Conference 2017)

This talk will highlight a signature-less method to detect malicious behavior before the delivery of the ransomware payload can infect the machine. The ML-driven detection method is coupled with the automated generation of a Group Policy Object and in this way we demonstrate an automated way to take action and create…

Continue

Confusion and Deception: New Tools for Data Protection

Posted on April 14, 2017 at 12:29pm 0 Comments

Confusion and Deception:  New Tools for Data Protection (RSA Conference 2017)

Cyberthreats are assymetric risks: corporate defenders must secure and detect everything, but the attacker needs to exploit only once. As petabytes of data traverse the ecosystem, legacy data protection methods leave many gaps. By looking through the adversary’s eyes, you can create subterfuges, delay attack progress or reduce…

Continue

Comment Wall

You need to be a member of CISO Platform to add comments!

Join CISO Platform

  • No comments yet!
 
 
 

 

© 2017   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts