Social Network For CISO (Chief Information Security Officers)
Why Is OSINT So Important ?
OSINT (Open-Source Intelligence) is intelligence collected from publicly available sources.
It is becoming a key resource for collecting threat intelligence even in enterprise space. A factor being that now we live in a very connected world, so the amount of data and analysis is becoming more key and relevant. A good example here would be the Stuxnet attack.
Open Source Movement was also…Continue
Added by pritha on April 9, 2018 at 8:35pm — No Comments
RSA Innovation Sandbox 2018, is one of the platform where information security startups can showcase their research and innovation. For the past 12 years, it is working as interface for cybersecurity companies to promote their new technology and connect with venture capitalists, industry veterans and experts at RSA Conference. This year, out of 10 finalists, RSA Conference awarded BigID as the Most Innovative Startup 2018 with their innovative solution for privacy…Continue
Added by Shital Singh on April 19, 2018 at 2:00pm — No Comments
The Playbook Round Table was set in 3 cities - mumbai, bangalore & delhi where security heads got together to contribute in building a plan to measure an organisation's security program against 2018's application attacks
Added by pritha on March 28, 2018 at 2:30pm — No Comments
The security information and event management (SIEM) market is defined by the customer's need to analyze event data in real time for the early detection of targeted attacks and data breaches, and to collect, store, investigate and report on log data for incident response, forensics and regulatory compliance.
Added by Amit, CISO Platform on September 22, 2017 at 5:34pm — No Comments
Enterprise mobility management suites connect mobile devices to enterprise workflows while supporting the perpetual growth in device numbers and types. Professionals responsible for mobile and endpoint strategies, must maintain focus on near- and long-term goals in this dynamic segment.
Added by CISO Platform on September 5, 2017 at 3:30pm — No Comments
This book explains cybersecurity deception and technologies in six short chapters which includes:…Continue
Added by CISO Platform on August 18, 2017 at 12:00pm — No Comments
Everybody has logs and that means that everybody ultimately will have to deal with them—if only because many regulatory mandates prescribe that. In this guide, Dr. Anton Chuvakin will analyze the relationship between SIEM and log management, focusing not only on the technical differences and different uses for these technologies but also on architecting their joint deployments. In addition, he will provide recommendations for companies…Continue
Added by CISO Platform on August 18, 2017 at 12:30pm — No Comments
Here's a small classification of Types Of Threats In Application Threat Modeling. This was earlier presented in SACON (International Security Architecture Conference) by Nilanjan De [Multiple patents, Zero Day Discovery, Co-Founder at FireCompass]…Continue
Added by pritha on June 20, 2017 at 12:30pm — No Comments
(Author : Chandra Prakash Suryawanshi, SVP- India & APAC at Aujas Networks Pvt. Ltd. )Continue
Added by Amit, CISO Platform on May 6, 2017 at 7:30pm — No Comments
This gives a glimpse of Advanced Security Operations Centre (SOC) Features & Technical Capabilities. This document is not explicit, it assumes you have prior knowledge of the subject, therefore only pointers have been mentioned.
This was presented at SACON and speakers explain subjects in detail during sessions for deeper understanding. Next…Continue
Added by pritha on July 2, 2017 at 4:00am — No Comments
Added by pritha on April 30, 2017 at 12:00pm — No Comments
Here is brief Summary of Top 5 Enterprise Security Architecture Measurement Categories. This was earlier presented in SACON (India's only Security Architecture Conference in India)by Arnab Chattopadhyay, VP - Engineering @ Infoworks Inc & Bikash Barai, Co-Founder FireCompass
Added by CISO Platform on April 29, 2017 at 9:30pm — No Comments
This article examined the field of security architecture from the point of view of security governance. It explains how security architecture governance can be created as a sub-field of security governance and how the principles and structure of the same can be applied to security architecture governance to build an overarching security environment that is easy to understand, change, monitor and maintain. This report was…
Added by CISO Platform on April 29, 2017 at 9:00pm — No Comments
There are four phases in Cyber Crisis Management, namely Detection, Response, Containment & Recovery. Here is a glimpse of the four phases.
Added by CISO Platform on April 29, 2017 at 10:00pm — No Comments
These are top 5 FREE tools you should consider while building your Enterprise Mobility Management:
It is a privately held company recognized as a “pure player” in the enterprise Mobility market and the first software vendor to distribute its cloud based or on premise Mobile Application Development Platform (MADP).
Added by Amit, CISO Platform on April 10, 2017 at 8:00pm — No Comments
This article gives us 5 fundamental steps and questions one must ask to understand the crisis of the Incident. This includes understanding the incident, the control points, plan of action, communication, business impacts.
Added by pritha on February 18, 2017 at 12:30pm — No Comments
Ransomware is a type of malware that encrypts everything on your system with a cryptographic algorithm and holds that encrypted data hostage for ransom. It demands the user to pay for the decryption key. There are two types of ransomware. The first type encrypts all data on the system and renders it nearly impossible to decrypt without the key. The second type simply locks the system and demands to enter the key for data decryption but does not encrypt data itself.…Continue
Added by pritha on February 16, 2017 at 1:30pm — No Comments
RSA conference is one of the leading security conferences worldwide with 700+ vendors at the Expo, which creates some unique challenges for security professionals. Some of the challenges @RSAC Expo are as below:
Added by Amit, CISO Platform on February 15, 2017 at 5:00pm — No Comments
2016 will go in history as the year CyberCriminals made fortune by using vulnerabilities found in technology and moreover exploiting human weaknesses. The infamous CEO Scam brought billions of dollars to CyberCriminals. I had written a separate post to handle this crime, more details can be found here…Continue
Added by Vikas Arora on February 2, 2017 at 10:30am — No Comments
The mobility explosion is the big bang that keeps expanding. It moved from stages like laptop, blackberry, touch based devices, tablets & more. The boundaries between working “in the office,” “on the road,” or “at home” have been blurred by the untethered power of smartphones, tablets, and other portable devices. Employees expect the flexibility to work on the devices they choose, and employers have come to expect always-on availability. That business requirement often conflicts with…Continue
Added by pritha on January 16, 2017 at 5:00pm — No Comments