pritha
  • bangalore,karnataka
  • India
  • CISO Platform

Pritha's Friends

  • Rahil Karedia
 

pritha's Page

Latest Activity

pritha posted a blog post

Report : State of Security Operations (2017 Report Of Capabilities & Maturity Of Cyber Defense Organisations)

Organizations around the globe are investing heavily in cyber defense capabilities to protect their critical assets. Whether protecting brand, intellectual capital, and customer information or providing controls for critical infrastructure, the means for incident detection and response to protect organizational interests have common elements: people, processes, and technology. The maturity of these elements varies greatly across organizations and industries. In this fourth annual State of…See More
41 minutes ago
pritha's blog post was featured

Forrester Report : Vision 2020 - The Impact Of Mobility, IOT & AI On The Future Of Business Transformation

As mobile gains more capabilities and access to company data, mobile devices continue to play an important role in how workers do their jobs. Information workers are no longer tied to their PCs — smartphones, tablets, and laptops give them the flexibility to choose the device that best suits the context of each task performed. The internet of things (IoT)…See More
7 hours ago
pritha posted blog posts
Friday
pritha posted a blog post

WannaCry : Some Quick Precautions To Take

Author - Tushar Vartak, Director Information Security, Rak Bank Since 12th Apr 2017, a Ransomware exploiting MS17-010 has been wreaking havoc worldwide. Precautions to be taken: 1 - Patch ManagementEnsure all Workstations and Servers have the latest Microsoft patches, especially the ones related to MS17-010. 2 - AntivirusEnsure AV signatures are updated on all assets. Identify…See More
Thursday
pritha posted blog posts
May 22
pritha posted a blog post

Does Audited PCI Compliance Mean You Are Protected?

This Article was shared by Nachiket Sathaye, Information Security Consultant, Ultradefence Solutions“We are PCI Compliant, now we are secured”- While assisting customers with their PCI DSS Compliance, I always come across teams making this statement. This is a very common myth amongst PCI DSS customers. Do you really think that you will not face any security threats once you are PCI compliant - Absolutely not!…See More
May 10
pritha's blog post was featured

3 Free "Security Architecture" Related Resources !!

Here's some exciting content on security architecture. It includes tools for Data Protection, Incident Response Tool Qualification & more. There's a great conference for security builders too - SACON (Security Architecture Conference), Pune.  Guide To Building Enterprise Security Architecture Governance Program Here's an in-depth guide to building an enterprise security…See More
Apr 30
pritha posted a blog post

3 Free "Security Architecture" Related Resources !!

Here's some exciting content on security architecture. It includes tools for Data Protection, Incident Response Tool Qualification & more. There's a great conference for security builders too - SACON (Security Architecture Conference), Pune.  Guide To Building Enterprise Security Architecture Governance Program Here's an in-depth guide to building an enterprise security…See More
Apr 30
pritha posted a blog post

Study : Security Breaches In India

This is a study done by Ponemon Institute on 2016 Cost of Data Breach Study in India. This report includes 150 Indian Organisations who have participated in the benchmarking process.This study examines the costs incurred by 37Indian companies in 12industry sectors after those companies experienced the loss or theft of protected personal data and then had to notify breach victims and/or regulators as required by lawsand business contracts. It is important to note the costs presented in this…See More
Apr 24
Mrinal Kanti Pauli liked pritha's blog post Checklist to Evaluate a DLP Provider
Apr 14
pritha posted a blog post

2016 Community Achievements & 2017 Goals

2016 has been a great year for the CISO Platform Community and our vision to create tangible community goods. We wanted to thank all those who made valuable contributions to make this happen. We have created more than 200+ checklist. Here are some of them listed:Partial List of Past community projects-Cyber Crisis Management Plan (CCMP) for Banks in India- Click here to download Top N Threats &…See More
Mar 30
Nilesh Roy liked pritha's blog post CISO Guide: Enterprise Mobility Management (The Big Bang Theory)
Mar 24
Nilesh Roy liked pritha's page Invitation To Pre-register For "SACON 2017 (Security Architecture Conference)"
Mar 16
pritha liked Gireesh Kumar's event 7th,Top 100 CISO Awards & Conference @ Pune (12-13 May)
Mar 8
pritha posted a blog post

Top 4 Resources on IoT Security from 'Task Force Blogathon'

A big thank you to our  CISO Platform IoT Security Task Force. They did a 6 hour blogathon and came up with very interesting articles for our community.If you love it, don't forget to share it !Security Vulnerabilities In Connected CarsConnected vehicle technology potentially increases driving safety and efficiency through its…See More
Mar 3

Profile Information

Company
CISO Platform

Pritha's Blog

Report : State of Security Operations (2017 Report Of Capabilities & Maturity Of Cyber Defense Organisations)

Posted on May 30, 2017 at 5:30pm 0 Comments

Organizations around the globe are investing heavily in cyber defense capabilities to protect their critical assets. Whether protecting brand, intellectual capital, and customer information or providing controls for critical infrastructure, the means for incident detection and response to protect organizational interests have common elements: people, processes, and technology.



The maturity of these elements varies greatly across organizations and industries. In this fourth…

Continue

Forrester Report : Vision 2020 - The Impact Of Mobility, IOT & AI On The Future Of Business Transformation

Posted on May 26, 2017 at 9:30pm 0 Comments

As mobile gains more capabilities and access to company data, mobile devices continue to play an important role in how workers do their jobs. Information workers are no longer tied to their PCs — smartphones, tablets, and laptops give them the flexibility to choose the device that best suits the context of each task performed. The internet of things (IoT)…

Continue

Security Incident & Event Management (SIEM) Framework For Product Evaluation

Posted on May 26, 2017 at 1:00pm 0 Comments

Author - Anil Upadhyay, DM - ITGS, ITSD, Gujarat Gas Limited

We have listed the major parameters below. The framework is attached in the end.

Major Parameters To Consider :



  1. Ability to identify non-compliant machines and network…

Continue

WannaCry : Some Quick Precautions To Take

Posted on May 25, 2017 at 5:00pm 0 Comments

Author - Tushar Vartak, Director Information Security, Rak Bank



Since 12th Apr 2017, a Ransomware exploiting MS17-010 has been wreaking havoc worldwide.



Precautions to be taken:



1 - Patch Management

  • Ensure all…
Continue

Comment Wall

You need to be a member of CISO Platform to add comments!

Join CISO Platform

  • No comments yet!
 
 
 

 

© 2017   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts