April 2017 Blog Posts (24)

3 Free "Security Architecture" Related Resources !!

Here's some exciting content on security architecture. It includes tools for Data Protection, Incident Response Tool Qualification & more. There's a great conference for security builders too - SACON…
Continue

Added by pritha on April 30, 2017 at 12:00pm — No Comments

Top 7 Things to do: Legal Aspects in Cyber Crisis Management (for Banks)

Root cause analysis/investigation/forensic analysis of crisis, acquisition and retention of evidence and logs are necessary from legal point of view. Collection of evidence needs to be efficient so that the bank should not face any legal complexity during further investigation. The below guidelines need to be followed to avoid legal complexity.

Top 7 Things to do:

  • Affected every electronic evidence will be…
Continue

Added by CISO Platform on April 29, 2017 at 10:40pm — No Comments

4 Phases of Cyber Crisis Management

There are four phases in Cyber Crisis Management, namely Detection, Response, Containment & Recovery. Here is a glimpse of the four phases.

 …

Continue

Added by CISO Platform on April 29, 2017 at 10:00pm — No Comments

Top 5 Enterprise Security Architecture Measurement Categories

Here is brief Summary of Top 5 Enterprise Security Architecture Measurement Categories. This was earlier presented in SACON (India's only Security Architecture Conference in India)by Arnab Chattopadhyay, VP - Engineering @ Infoworks Inc & Bikash Barai, Co-Founder FireCompass

Architecture Measurement…

Continue

Added by CISO Platform on April 29, 2017 at 9:30pm — No Comments

Executive Summary to Build Enterprise Security Architecture Governance Program

This article examined the field of security architecture from the point of view of security governance. It explains how security architecture governance can be created as a sub-field of security governance and how the principles and structure of the same can be applied to security architecture governance to build an overarching security environment that is easy to understand, change, monitor and maintain. This report was…

Continue

Added by CISO Platform on April 29, 2017 at 9:00pm — No Comments

Top 8 talks for 'Network Security, Cryptography, Encryption & Blockchain' from RSA Conference 2017 (USA)

 

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.

RSA Conference held its event at the Moscone Center in San Francisco and brought together a record number of more…

Continue

Added by Meghana P on April 28, 2017 at 11:30pm — No Comments

Top 7 talks for 'Threat Intelligence' from RSA Conference 2017 (USA)

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.

RSA Conference held its event at the Moscone Center in San Francisco and brought together a record number of more…

Continue

Added by Meghana P on April 26, 2017 at 4:00pm — No Comments

Top 7 talks for 'SOC, Incident Response, Forensics' from RSA Conference 2017 (USA)

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.

RSA Conference held its event at the Moscone Center in San Francisco and brought together a record number of more…

Continue

Added by Meghana P on April 26, 2017 at 4:00pm — No Comments

Study : Security Breaches In India

This is a study done by Ponemon Institute on 2016 Cost of Data Breach Study in India. This report includes 150 Indian Organisations who have participated in the benchmarking process.

This study examines the costs incurred by 37Indian companies in 12industry sectors after those companies experienced the loss or theft of protected personal data and then had to notify breach victims and/or regulators as required by lawsand business contracts. It is important to note the costs presented…

Continue

Added by pritha on April 24, 2017 at 10:30pm — No Comments

Building a Successful Security Operations Center (SOC) - CISO Platform

This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC, this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as the technology involved.

In depth understanding including graphical representation and process flow diagrams.…

Continue

Added by Gireesh Kumar on April 24, 2017 at 12:30pm — No Comments

Top 8 talks on 'Emerging Technologies' from RSA Conference 2017 (USA)

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.

RSA Conference held its event at the Moscone Center in San Francisco and…

Continue

Added by pritha on April 14, 2017 at 5:00pm — No Comments

Top 8 talks on 'Emerging Technologies' from RSA Conference 2017 (USA)

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.

RSA Conference held its event at the Moscone Center in San Francisco and…

Continue

Added by Shreya Shree on April 14, 2017 at 4:30pm — No Comments

Applied Cognitive Security: Complementing the Security Analyst

Applied Cognitive Security: Complementing the Security Analyst (RSA Conference 2017)

Security incidents are increasing dramatically and becoming more sophisticated, making it almost impossible for security analysts to keep up. A cognitive solution that can learn about security from structured and unstructured information sources is essential. It can be applied to empower security analysts with insights…

Continue

Added by Shreya Shree on April 14, 2017 at 12:30pm — No Comments

Automated Prevention of Ransomware with Machine Learning and GPOs

Automated Prevention of Ransomware with Machine Learning and GPOs (RSA Conference 2017)

This talk will highlight a signature-less method to detect malicious behavior before the delivery of the ransomware payload can infect the machine. The ML-driven detection method is coupled with the automated generation of a Group Policy Object and in this way we demonstrate an automated way to take action and create…

Continue

Added by Shreya Shree on April 14, 2017 at 12:30pm — No Comments

Advances in Cloud-Scale Machine Learning for Cyber-Defense

Advances in Cloud-Scale Machine Learning for Cyber-Defense (RSA Conference 2017)

Picking an attacker’s signals out of billions of log events in near real time from petabyte scale storage is a daunting task, but Microsoft has been using security data science at cloud scale to successfully disrupt attackers. This session will present the latest frameworks, techniques and the unconventional machine-learning…

Continue

Added by Shreya Shree on April 14, 2017 at 12:00pm — No Comments

Hello false flags! The art of deception in targeted attack distribution

Hello false flags! The art of deception in targeted attack distribution (RSA Conference 2017)

When it comes to targeted attacks, everyone is obsessed with attribution. It’s a near impossible question to answer. Attackers often try to muddy the waters through deception tactics like false flags. This talk will draw on unpublished research to provide real-world examples of false flag operations and explain…

Continue

Added by Shreya Shree on April 14, 2017 at 12:00pm — No Comments

Applied Machine Learning: Defeating Modern Malicious Documents

Applied Machine Learning: Defeating Modern Malicious Documents (RSA Conference 2017)

A common tactic adopted by attackers for initial exploitation is the use of malicious code embedded in Microsoft Office documents. This attack vector is not new, but attackers are still having success. This session will dive into the details of these techniques, introduce some machine learning approaches to analyze and…

Continue

Added by Shreya Shree on April 14, 2017 at 12:00pm — No Comments

Confusion and Deception: New Tools for Data Protection

Confusion and Deception:  New Tools for Data Protection (RSA Conference 2017)

Cyberthreats are assymetric risks: corporate defenders must secure and detect everything, but the attacker needs to exploit only once. As petabytes of data traverse the ecosystem, legacy data protection methods leave many gaps. By looking through the adversary’s eyes, you can create subterfuges, delay attack progress or reduce…

Continue

Added by Shreya Shree on April 14, 2017 at 12:00pm — No Comments

Ridge-based Profiled Differential Power Analysis

Ridge-based Profiled Differential Power Analysis (RSA  Conference 2017)

Ridge-based differential power analysis techniques and side-channel attacks on intermediate states with no partial key guessing are discussed. Topic 1: Ridge-Based Profiled Differential Power Analysis Authors: Weijia Wang, Yu Yu, François-Xavier Standaert, Dawu Gu, Sen Xu and Chi Zhang Topic 2: My Traces Learn What You Did in the…

Continue

Added by Shreya Shree on April 14, 2017 at 11:30am — No Comments

Machine Learning: Cybersecurity Boon or Boondoggle?

Machine Learning: Cybersecurity Boon or Boondoggle? (RSA Conference 2017)

Machine learning (ML) and artificial intelligence (AI) are the latest “shiny new things” in cybersecurity technology but while ML and AI hold great promise for automating routine processes and tasks and accelerating threat detection, they are not a panacea. This session will demonstrate what they can and can’t do in a cybersecurity…

Continue

Added by Shreya Shree on April 14, 2017 at 11:00am — No Comments

Monthly Archives

2019

2018

2017

2016

2015

2014

2013

2012

1999

Follow Us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2019   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts