July 2016 Blog Posts (15)

Sample Cyber Security Policy for Banks|RBI Cyber Security Framework

For the effective Protection of the Banks, RBI asks banks to immediately put in place a cybersecurity policy duly approved by their board, containing an appropriate approach to combat cyber threats.



In its June 2, 2016 notification, RBI has issued new …

Continue

Added by Amit, CISO Platform on July 27, 2016 at 12:00am — No Comments

Top Talks From SACON (Security Architecture Conference), 2016 - Key Highlights

SACON is India's 1st & Only Security Architecture Conference. With over 60 participants, this was the first year of SACON and here are a few highlights we wanted to share with you. It was held on 12th July, Ritz Carlton, Bangalore, India.

We had with us Top Security Industry Leaders who helped SACON with great content. For more details visit: sacon.io…

Continue

Added by pritha on July 22, 2016 at 7:30pm — No Comments

Difference Between Cyber Security and Information Security

In this blog you will understand the main difference between the cyber security and information security.



To understand the differences between terms like cyber security and information security is important because many banking regulatory bodies like Reserve bank of India, Hong Kong Monetary Authority, Monetary Authority of Singapore, etc. have asked banks to have separate cyber security and IS security policies. 

These two words “Cyber Security” and…

Continue

Added by Amit, CISO Platform on July 22, 2016 at 11:30am — No Comments

10 questions to ask your APT security vendor?

Are you planning to Implement the Advanced Persistent Threats (APT) Security?. It's important to know what all questions you need to ask to APT security Vendor and get their views on APTs. Also, be sure whether the solution you are going to buy is capable to detect advanced threats using multiple techniques, and is not just another security solution using a signature based approach branded with fancy terms.

APT Security is not a single technology/solution but…

Continue

Added by Vaibhav Singhal (CISO Platform) on July 22, 2016 at 11:30am — No Comments

Orientation (SACON Presentation)

Speaker: Bikash Barai, Co-Founder Cigital India ( Earlier iViZ )



Please Note - Speaker presentations…

Continue

Added by pritha on July 20, 2016 at 5:30pm — No Comments

Practical Enterprise Security Architecture (SACON Presentation)

Speaker: Dr. Rajesh P. Deo, Senior Manager @Ernst&Young

*We suggest you use Chrome to view the slides, as the it may be inaccessible on other browsers like safari etc.

Please Note - Speaker presentations represent the views of the individual speakers…

Continue

Added by pritha on July 20, 2016 at 5:30pm — No Comments

Enterprise Security Architecture (SACON Presentation)

Speaker:Arnab Chattopadhyay, Senior Technical Director @MetricStream



*We suggest you use Chrome to view the slides, as the it may be inaccessible…

Continue

Added by pritha on July 20, 2016 at 5:30pm — No Comments

ATP Technology Pillars (SACON Presentation)

Speaker: Bikash Barai, Co-Founder Cigital India ( Earlier iViZ )

Continue

Added by pritha on July 20, 2016 at 5:30pm — No Comments

From Business Architecture to Security Architecture (SACON Presentation)

Speaker: Vinayak Godse, Senior Director-Data Protection @DSCI



Please…

Continue

Added by pritha on July 20, 2016 at 5:30pm — No Comments

Security Maturity Models (SACON Presentation)

Speaker: Ravi Mishra, Head Of Advisory @CISO Platform

Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Platform or their employers

Added by pritha on July 20, 2016 at 5:30pm — No Comments

Application Threat Modeling (SACON Presentation)

Speaker: Nilanjan De, Principal Architect @Cigital



Please Note - Speaker presentations represent…
Continue

Added by pritha on July 20, 2016 at 5:30pm — No Comments

Top 11 Ransomware Prevention Resources

Ransomware is a type of malicious software (malware) when infected with encrypts all the important files such as documents, pictures, movie file etc with a virtually unbreakable encryption key. Here we have compiled some of the Good-reads blogs, articles, freely available Decryptors and removal kits to keep you up-to-date on the latest happenings in the Ransomware…

Continue

Added by pritha on July 19, 2016 at 2:30pm — No Comments

Past Speakers & Talks @ CISO Platform Annual Summit

Turbo Talks



How the Heartbleed bug was found?

Antti Karjalainen discoverer of Heartbleed

The Heartbleed bug was a catastrophic vulnerability in widely used OpenSSL TLS implementation. This talk will give background how the Heartbleed bug was found by Codenomicon. The mechanism…

Continue

Added by pritha on July 14, 2016 at 5:30pm — No Comments

ATP( Advanced Threat Protection) Technology Stack in 2019



ATP( Advanced Threat Protection) is not a single Technology which involves a complex program which consists of People, Process as well as Technology. The Advanced Threat Protection has one or more below mentioned Technologies.

We…

Continue

Added by pritha on July 14, 2016 at 5:30pm — No Comments

Encrypted Ransomware a Digital Era weapon [100 Million people affected], a high Revenue business!!!

The world today is full of unlimited business opportunities. We all operate in digital era to perform business operations (by Connecting people, enterprises, Smart Cities, systems, LOT, Utilities, Smart Grids/Meters, Big Data and Analytics and SMAC across the globe). We follow standard operating procedure defined during Stone Age without giving due diligence on the upcoming threat landscape.

 

This post is informative in nature and will help people…

Continue

Added by Mohit Kohli on July 7, 2016 at 3:00pm — No Comments

Monthly Archives

2019

2018

2017

2016

2015

2014

2013

2012

1999

Follow Us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2019   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts