All Blog Posts (753)

Insights from NSA’s Cybersecurity Threat Operations Center

Dave Hogue provided one of the first in-depth perspectives from a “Day in the Life” of NSA’s Cybersecurity Threat Operations Center (NCTOC)—the mission, threat landscape, and offer best principles for CISOs and other network defenders. Mr. Hogue equipped the audience with actionable insights that they can implement into their daily operations.

Speaker: …

Continue

Added by Y R Chandra Sekhar Varma on June 8, 2018 at 11:58am — No Comments

Playing Games in the Sandbox—Dynamic Analysis and Modern Evasion Tactics

With many organizations using a sandbox to detonate suspicious files, many threats are implementing logic to detect sandbox environments, to alter their behavior and evade detection. This talk will highlight many real-world evasion tactics employed by recent malware, discussing challenges in measuring evasive behaviors and offering insights to improving the effectiveness of the sandbox.…

Continue

Added by Y R Chandra Sekhar Varma on June 8, 2018 at 11:56am — No Comments

Pulling Our SOCs Up

Vodafone is one of the world’s largest telecommunications companies, enabling connectivity by providing mobile, fixed and IoT networks to customers around the world. Vodafone is redefining the boundary of the SOC and sees the balance between prevention, detection and response for both Vodafone’s organization and customers as vital. This session will describe the journey from reactive SOC to proactive cyber-defense.…

Continue

Added by Y R Chandra Sekhar Varma on June 8, 2018 at 11:54am — No Comments

SOC 2030—SOCs Are Broken. Let’s Fix Them.

Is your SOC overwhelmed with alerts and threats? Cyber-adversaries are wielding tools and machine power, while organizations are still trying to scale their cybersecurity with OpEx and poorly planned CapEx spending. In this session, you will learn from a SOC expert about mistakes that have been made in the past, what we can do about it right now and what is in store as we move towards SOC 2030.…

Continue

Added by Y R Chandra Sekhar Varma on June 8, 2018 at 11:52am — No Comments

Threat Intel and Content Curation Organizing the Path to Successful Detection

Want to detect threats in your organization? Stop reading every feed and curate your threat intel and content so they actually work for your security architecture. By managing meaningful threat intelligence so the external intel maps to internal threat models and curating your content sensibly, you can create a high-functioning SOC that both detects and defends against cyberattacks.…

Continue

Added by Y R Chandra Sekhar Varma on June 8, 2018 at 11:48am — No Comments

Incident Response in the Cloud

We’ve got more assets in the cloud than ever. Unfortunately, we also have less visibility and control in these environments, as well. Implementing detection and response controls that leverage cloud provider tools and controls, as well as automation strategies and processes, is critical for effective incident detection and response in hybrid cloud environments. 

Speaker: David…

Continue

Added by Y R Chandra Sekhar Varma on June 8, 2018 at 11:43am — No Comments

Predicting Exploitability—Forecasts for Vulnerability Management

Security is overdue for actionable forecasts. Like predicting the weather, similar models should work for vulnerabilities. With some open source data and a clever machine learning model, Kenna Securities can predict which vulnerabilities attackers are likely to write exploits for. Their model has 90 percent accuracy, one the day a vulnerability is released.

Speaker: Michael…

Continue

Added by Y R Chandra Sekhar Varma on June 8, 2018 at 11:41am — No Comments

Building and Adopting a Cloud-Native Security Program

Cloud is a new frontier that requires new architectures, higher velocity processes and crisper business-level metrics—all of which smacks security programs square in the face. This session will leverage the nearly 20 years of the speakers’ combined cloud experience to lay out a complete strategy for building out a cloud-first security program that covers infrastructure and application development.…

Continue

Added by Y R Chandra Sekhar Varma on June 8, 2018 at 11:30am — No Comments

Top 7 talks for "Analytical Intelligence & Response" from RSA Conference USA 2018

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Cloud Security & Virtualization at RSA Conference USA 2018.

RSA Conference held its event in San Francisco, CA at the Moscone Center & Marriott Marquis and brought together a record number of 50,000 attendees.Attendees…

Continue

Added by Y R Chandra Sekhar Varma on June 8, 2018 at 11:30am — No Comments

Top 10 talks on Cloud Security & Virtualization from RSA Conference USA 2018

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Cloud Security & Virtualization at RSA Conference USA 2018.

RSA Conference held its event in San Francisco, CA at the Moscone Center & Marriott Marquis and brought together a record number of 50,000 attendees.Attendees…

Continue

Added by Y R Chandra Sekhar Varma on June 8, 2018 at 11:30am — No Comments

ChaoSlingr: Introducing Security-Based Chaos Testing

ChaoSlingr introduces the discipline of security testing into chaos engineering with the focus on driving failure out of the model and going beyond the reactive processes that currently dominate traditional security testing methodology.

Speakers: Grayson Brewer, Aaron Rinehart

Grayson…

Continue

Added by Y R Chandra Sekhar Varma on June 8, 2018 at 11:27am — No Comments

Corpsec: “What Happened to Corpses A and B?”

Living BeyondCorp comes with its own challenges. This talk will dive into how Duo gets our hands around difficult problems regarding the security and management of cloud services and endpoints internally. This session will cover technical details of our security orchestration and automation approach, cloud service monitoring, and chatops-driven endpoint application whitelisting strategies.…

Continue

Added by Y R Chandra Sekhar Varma on June 8, 2018 at 11:24am — No Comments

Ephemeral DevOps: Adventures in Managing Short-Lived Systems

This talk will explore the concepts and experiences of using configuration management in a highly disposable environment of ephemeral virtual machines. It will cover why an operations team may desire such an environment, the tools the presenter used to build one, and most importantly, the sorts of failures, accomplishments and considerations encountered during the journey.…

Continue

Added by Y R Chandra Sekhar Varma on June 8, 2018 at 11:19am — No Comments

FIM and System Call Auditing at Scale in a Large Container Deployment

This will show how, on a large container deployment, the speaker achieved insight into security events like file events on sensitive files, system call auditing, user level activity trail, network activity, etc., by customizing and plumbing a stack of open source tools that use the underlying Linux’s inotify and kernel audit components and by aggregating these events centrally in Elasticsearch.…

Continue

Added by Y R Chandra Sekhar Varma on June 8, 2018 at 11:16am — No Comments

Humans and Data Don’t Mix: Best Practices to Secure Your Cloud

While the causes of outages are varied, human error far outpaces all hardware failures. The risk of humans touching sensitive data is clear, but the tools, techniques and risk-mitigation strategies lag behind current realities. Stephen Schmidt, AWS CISO, will share hard-earned lessons around potential gaps in your security plan, along with steps to lessen potential angles of attack.…

Continue

Added by Y R Chandra Sekhar Varma on June 8, 2018 at 11:10am — No Comments

Office 365 Security: Top Priorities for 30 Days, 90 Days and Beyond

Based on investigations of real-world attacks, Microsoft Office 365 cybersecurity experts provide a prescriptive approach to identifying and implementing the most critical security controls to protect your Office 365 tenant. You will learn threats and defenses change from on-premises attacks and what Microsoft recommends for quickly protecting against the most likely and impactful risks.…

Continue

Added by Y R Chandra Sekhar Varma on June 8, 2018 at 11:08am — No Comments

Pragmatic Security Automation for Cloud

Everything in cloud computing is automated and API-enabled, giving security teams a big opportunity to build and embed security into infrastructures. From continuous guardrails to automated "afterburners" to speed up complex processes, this advanced session leverages the latest software-defined security techniques and shows how to integrate automation. Be prepared for demos, design patterns and a little code.…

Continue

Added by Y R Chandra Sekhar Varma on June 8, 2018 at 11:03am — No Comments

Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud Defense

Machine learning algorithms are key to modern at-scale cyberdefense. Transfer learning is a state of the art ML paradigm that enables applying knowledge and algorithms developed from one field to another, resulting in innovative solutions. This talk presents transfer learning in action wherein techniques created from other areas are successfully re-purposed and applied to cybersecurity.…

Continue

Added by Y R Chandra Sekhar Varma on June 8, 2018 at 10:30am — No Comments

CISO Platform Decision Summit, 2018 Highlights

CISO Platform Decision Summit @Pune, last week saw over 200+ attendees for over 2 days making the the spirit of knowledge sharing and learning a huge success in the Information Security Executives of India. Here are the highlights of the awesome keynotes, electrocuting Turbo sessions and some great knowledge boost training sessions.

It was held on 18th & 19th May, Hyatt, Pune, India.…

Continue

Added by pritha on May 28, 2018 at 5:00pm — No Comments

Top Talks From SACON (Security Architecture Conference), Pune - 2018 Highlights

SACON is India's 1st & Only Security Architecture Conference. With over 70+ participants, this was the 5th edition of SACON and here are a few highlights we wanted to share with you. It was held on 18-19th May, Hotel Hyatt, Pune, India.

We had with us Top Security Industry Leaders who helped SACON with great content. For more details visit: sacon.io…

Continue

Added by pritha on May 28, 2018 at 5:00pm — No Comments

Monthly Archives

2018

2017

2016

2015

2014

2013

2012

1999

Follow Us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2018   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts