Featured Blog Posts (114)

Cyber Incident Response - The 5 Important Steps

This article gives us 5 fundamental steps and questions one must ask to understand the crisis of the Incident. This includes understanding the incident, the control points, plan of action, communication, business impacts.



( Read…

Continue

Added by pritha on February 18, 2017 at 12:30pm — No Comments

Ransomware - Practical View, Mitigation & Prevention Tips

Ransomware is a type of malware that encrypts everything on your system with a cryptographic algorithm and holds that encrypted data hostage for ransom. It demands the user to pay for the decryption key. There are two types of ransomware. The first type encrypts all data on the system and renders it nearly impossible to decrypt without the key. The second type simply locks the system and demands to enter the key for data decryption but does not encrypt data itself.…

Continue

Added by pritha on February 16, 2017 at 1:30pm — No Comments

Meet 1-Minute RSAC Expo Navigator Tool!

RSA conference is one of the leading security conferences worldwide with 700+ vendors at the Expo, which creates some unique challenges for security professionals. Some of the challenges @RSAC Expo are as below:

  • Extremely difficult to identify the vendors in your area of interest in the crowd of 700+…
Continue

Added by Amit, CISO Platform on February 15, 2017 at 5:00pm — No Comments

2016: The year of Ransomware - Let's change 2017...

2016 will go in history as the year CyberCriminals made fortune by using vulnerabilities found in technology and moreover exploiting human weaknesses. The infamous CEO Scam brought billions of dollars to CyberCriminals. I had written a separate post to handle this crime, more details can be found here…

Continue

Added by Vikas Arora on February 2, 2017 at 10:30am — No Comments

CISO Guide: Enterprise Mobility Management (The Big Bang Theory)

The mobility explosion is the big bang that keeps expanding. It moved from stages like laptop, blackberry, touch based devices, tablets & more. The boundaries between working “in the office,” “on the road,” or “at home” have been blurred by the untethered power of smartphones, tablets, and other portable devices. Employees expect the flexibility to work on the devices they choose, and employers have come to expect always-on availability. That business requirement often conflicts with…

Continue

Added by pritha on January 16, 2017 at 5:00pm — No Comments

CISO Platform Annual Summit, 2016 Highlights

CISO Platform Annual Summit @ Goa, last week saw over 100+ attendees for over 2 days making the the spirit of knowledge sharing and learning a huge success in the Information Security Executives of India. Here are the highlights of the awesome keynotes, electrocuting Turbo sessions and some great knowledge boost training sessions.

International Experts like CTO of Xerox, Black Hat Review Board Member, Ex-CISO at Israeli…

Continue

Added by Gireesh Kumar on December 6, 2016 at 12:30pm — No Comments

Risk Analysis using Open FAIR and Adoption of right Security Controls (SACON Presentation)

Speaker: Satish K Sreenivasaiah, Lead Architect @ TCS …

Continue

Added by Gireesh Kumar on November 14, 2016 at 4:30pm — No Comments

Enterprise Security Architecture (SACON Presentation)

Speakers : Arnab Chattopadhyay, VP - Engineering @ Infoworks Inc & Bikash Barai, Co-Founder Cigital India ( Earlier iViZ )

*We suggest you use Chrome to view the slides, as the it may be inaccessible on other browsers like safari…

Continue

Added by Gireesh Kumar on November 14, 2016 at 4:30pm — No Comments

Practical Applications of Block Chain Technologies (SACON Presentation)

Speaker: Kanneth Bradberry, CTO @ Xerox Healthcare 



*We…
Continue

Added by Gireesh Kumar on November 14, 2016 at 5:00pm — No Comments

Network Forensics and Practical Packet Analysis (SACON Presentation)

Speaker: Tamaghna Basu, CEO @ neoEYED

*We suggest you use Chrome to view the slides, as the it may be inaccessible on other browsers like safari etc.

Please Note - Speaker presentations represent the views of the individual…

Continue

Added by Gireesh Kumar on November 15, 2016 at 12:30pm — No Comments

SOC Architecture Workshop - Part 2 (SACON Presentation)

Speaker: Shomiron Das Gupta, Founder & CEO @ NETMONASTRY Inc.

Please Note - Speaker…

Continue

Added by Gireesh Kumar on November 15, 2016 at 12:31pm — No Comments

Workshop on Endpoint Memory Forensics (SACON Presentation)

Speaker: Matt Suiche, Co - Founder & Chief Scientist @ Cloud Volumes…



Continue

Added by Gireesh Kumar on November 15, 2016 at 1:01pm — No Comments

Application Security Architecture and Threat Modelling (SACON Presentation)

Speaker: Nilanjan De, Principal Archietect @ Cigital, Inc & Devesh Bhatt, Security Researcher @ Anon…

Continue

Added by Gireesh Kumar on November 15, 2016 at 2:48pm — No Comments

Security Strategy and Tactic with Cyber Threat Intelligence (CTI) (SACON Presentation)

Speaker: Reinhold Wochner @ Raiffeisen Bank International…

Continue

Added by Gireesh Kumar on November 15, 2016 at 3:31pm — No Comments

Intra process memory protection for applications on ARM and x86

Intra process memory protection for applications on ARM and x86



Today's software needs to isolate not only processes but the many components *within* a process from each other. Process-level isolation via jails, sandboxes, VMs, or hypervisors is finally becoming mainstream, but it misses an important point about modern software: its growing number of libraries that are all loaded into the same address space, and may all interact…

Continue

Added by Gireesh Kumar on November 25, 2016 at 12:02pm — No Comments

Kill the Password (Annual Summit Presentation)

Speaker: Tamaghna Basu, CEO @ neoEYED

*We suggest you use Chrome to view the slides, as the it may be inaccessible on other browsers like safari etc.

Please Note - Speaker presentations represent…

Continue

Added by Gireesh Kumar on December 6, 2016 at 12:00pm — No Comments

Sneak Peek into Emerging Health Care Tech & Future Security Impact (Annual Summit Presentation)

Speaker: Kanneth Bradberry, CTO @ Xerox Healthcare

*We suggest you use Chrome to view the slides, as the it may be inaccessible on other browsers like safari etc.

Please Note - Speaker presentations…

Continue

Added by Gireesh Kumar on December 6, 2016 at 12:18pm — No Comments

The (non) - Evolution of Security (Annual Summit Presentation)

Speaker: Matt Suiche, Co - Founder & Chief Scientist @ Cloud Volumes

*We suggest you use Chrome to view the slides, as the it may be inaccessible on other browsers like safari etc.

Please Note -…

Continue

Added by Gireesh Kumar on December 6, 2016 at 12:29pm — No Comments

Using Behavioral Psychology and Science of Habit to Change User Behavior (Annual Summit Presentation)

Speaker: Bikash Barai [ Founder & CEO @ Cigital, Inc]…

Continue

Added by Gireesh Kumar on December 6, 2016 at 12:34pm — No Comments

Security Strategy and Tactic with Cyber Threat Intelligence (CTI) (Annual Summit Presentation)

Speaker: Reinhold Wochner @ Raiffeisen Bank International…

Continue

Added by Gireesh Kumar on December 6, 2016 at 12:42pm — No Comments

 

© 2017   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts