pritha
  • bangalore,karnataka
  • India
  • CISO Platform

Pritha's Friends

  • Aditya Raghu Vamsi Pochiraju
  • Rahil Karedia
 

pritha's Page

Latest Activity

pritha posted blog posts
Jul 14
pritha posted a blog post

Top Learnings From Phising Drill

Article submitted by Suryanarayanan K, ,Central Bank Of IndiaPhishing attacks are one of the most common security challenges that both individuals and organizations face in keeping their information secure. Phishing is the attempt to obtain sensitive information such as usernames, passwords, credit/debit card details etc., often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. Phishing is typically carried out by email spoofing and it often directs…See More
Jul 9
pritha's blog post was featured

Advanced Security Operations Centre (SOC) - Features & Technical Capabilities

This gives a glimpse of Advanced Security Operations Centre (SOC) Features & Technical Capabilities. This document is not explicit, it assumes you have prior knowledge of the subject, therefore only pointers have been mentioned.This was presented at SACON and speakers explain subjects in detail during sessions for deeper understanding. Next sessions are…See More
Jul 7
pritha posted a blog post

Top Learnings From Phising Drill

Article submitted by Suryanarayanan K, ,Central Bank Of IndiaPhishing attacks are one of the most common security challenges that both individuals and organizations face in keeping their information secure. Phishing is the attempt to obtain sensitive information such as usernames, passwords, credit/debit card details etc., often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. Phishing is typically carried out by email spoofing and it often directs…See More
Jul 6
pritha posted blog posts
Jul 2
pritha posted a blog post

Google's BeyondCorp - Components & Architecture (A Quick Summary)

Components of Google BeyondCorpDevice & HostsDevice : Collection of physical & virtual components that act as computer. Eg. PC, Server, VMsHost : Snapshot of a device state at a given point of time. Eg. Device might be a mobile phone, while a host would be specifics of operating system and software running on the device.Device Inventory ServiceContains information on devices, hosts and their trust decisionsContinuously updated pipeline that imports data from a broad range of…See More
Jun 24
pritha posted a blog post

Application Threat Modeling : Types Of Threats

Here's a small classification of Types Of Threats In Application Threat Modeling. This was earlier presented in SACON (International Security Architecture Conference) by Nilanjan De [Multiple patents, Zero Day Discovery, Co-Founder at FireCompass]Types Of Threats : NetworkHostApplicationThreat Against The NetworkInformation Gathering…See More
Jun 20
pritha posted blog posts
Jun 14
pritha posted a blog post

Incident Response : How To Classify Incidents Based On Its Severity ?

Author - Sanjay D. Tiwari, CISO, Suryoday Small Finance BankPrioritizing the handling of the incident is perhaps the most critical decision point in the incident handling process. Incidents should not be handled on a first come, first served basis because of resource limitations. Instead, handling should be prioritized based on severity. Prioritizing incident defines how quickly the addressed incident need to be resolved.Prioritization based on how quickly an incident to be resolved is directly…See More
Jun 6
pritha posted a blog post

The Forrester WaveTM: Information Security Consulting Services

In this Forrester's report they identify and analyze 13 significant firms in the IT security consulting services - Accenture, Atos, BAE Systems, Dell SecureWorks, Deloitte, EY, HPE, IBM Security Services, KPMG, Protiviti, PwC, Verizon & Wipro Why Read This Report ?Capability Mapping for the 13 significant playersInformation Security Consulting Services…See More
Jun 1
pritha posted a blog post

Report : State of Security Operations (2017 Report Of Capabilities & Maturity Of Cyber Defense Organisations)

Organizations around the globe are investing heavily in cyber defense capabilities to protect their critical assets. Whether protecting brand, intellectual capital, and customer information or providing controls for critical infrastructure, the means for incident detection and response to protect organizational interests have common elements: people, processes, and technology. The maturity of these elements varies greatly across organizations and industries. In this fourth annual State of…See More
May 30
pritha's blog post was featured

Forrester Report : Vision 2020 - The Impact Of Mobility, IOT & AI On The Future Of Business Transformation

As mobile gains more capabilities and access to company data, mobile devices continue to play an important role in how workers do their jobs. Information workers are no longer tied to their PCs — smartphones, tablets, and laptops give them the flexibility to choose the device that best suits the context of each task performed. The internet of things (IoT)…See More
May 30
pritha posted blog posts
May 26
pritha posted a blog post

WannaCry : Some Quick Precautions To Take

Author - Tushar Vartak, Director Information Security, Rak Bank Since 12th Apr 2017, a Ransomware exploiting MS17-010 has been wreaking havoc worldwide. Precautions to be taken: 1 - Patch ManagementEnsure all Workstations and Servers have the latest Microsoft patches, especially the ones related to MS17-010. 2 - AntivirusEnsure AV signatures are updated on all assets. Identify…See More
May 25
pritha posted blog posts
May 22
pritha posted a blog post

Does Audited PCI Compliance Mean You Are Protected?

This Article was shared by Nachiket Sathaye, Information Security Consultant, Ultradefence Solutions“We are PCI Compliant, now we are secured”- While assisting customers with their PCI DSS Compliance, I always come across teams making this statement. This is a very common myth amongst PCI DSS customers. Do you really think that you will not face any security threats once you are PCI compliant - Absolutely not!…See More
May 10

Profile Information

Company
CISO Platform

Pritha's Blog

Basics Of Cyber Kill Chain Model

Posted on July 14, 2017 at 10:00am 0 Comments

Cyber Kill Chain Model 

In military strategy, a 'Kill Chain' is a phase model to describe the stages of an attack, which also helps inform ways to prevent attacks

  • Situational Awareness - Ability to identify what is happening in the networks and system landscape
  • Reconnaissance - Identification and selection of the target/s host or network by active scanning
  • Weaponization & delivery -…
Continue

NIST Aligned Process For Threat Management

Posted on July 13, 2017 at 12:30pm 0 Comments

This article highlights the Threat Management Process in Incident Response and brings in the understanding of the Kill chain model. Excerpts have been taken from a session presented at SACON - The Security Architecture Conference. You can view the full slide…

Continue

Top Learnings From Phising Drill

Posted on July 9, 2017 at 2:30pm 0 Comments

Article submitted by Suryanarayanan K, ,Central Bank Of India

Phishing attacks are one of the most common security challenges that both individuals and organizations face in keeping their information secure. Phishing is the attempt to obtain sensitive information such as usernames, passwords, credit/debit card details etc., often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. Phishing is typically carried out by email…

Continue

Advanced Security Operations Centre (SOC) - Features & Technical Capabilities

Posted on July 2, 2017 at 4:00am 0 Comments

This gives a glimpse of Advanced Security Operations Centre (SOC) Features & Technical Capabilities. This document is not explicit, it assumes you have prior knowledge of the subject, therefore only pointers have been mentioned.

This was presented at SACON and speakers explain subjects in detail during sessions for deeper understanding. Next…

Continue

Comment Wall

You need to be a member of CISO Platform to add comments!

Join CISO Platform

  • No comments yet!
 
 
 

 

Contact Us

Email: contact@cisoplatform.com

InfoSec Media Private Limited, First Floor, # 48, Dr DV Gundappa Road, Basavanagudi, Bangalore, Karnataka - 560004

© 2017   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts