Root cause analysis/investigation/forensic analysis of crisis, acquisition and retention of evidence and logs are necessary from legal point of view. Collection of evidence needs to be efficient so that the bank should not face any legal complexity during further investigation. The below guidelines need to be followed to avoid legal complexity.
Top 7 Things to do:
Added by CISO Platform on April 29, 2017 at 10:40pm — No Comments
As mobile gains more capabilities and access to company data, mobile devices continue to play an important role in how workers do their jobs. Information workers are no longer tied to their PCs — smartphones, tablets, and laptops give them the flexibility to choose the device that best suits the context of each task performed. The internet of things (IoT)…Continue
Added by pritha on May 26, 2017 at 9:30pm — No Comments
On 12th May, 2017 a Ransomware attack named as “WannaCry” Ransomeware, one of the largest ever cyber attacks - was reported, infecting the 19 trusts of NHS (National Health Services) in UK and infecting computers in many other countries including Spain, Russia, US, India, Ukrain etc.), at 19 different location. It was reported that day-1 itself it infected about 1,26,000 to 2,00,000 machines (mentioned in different research reports from different countries) which reached to 104…Continue
Added by Sunil Pandey on May 23, 2017 at 5:07pm — No Comments
A new ransomware attack, very recently has caught many organizations and users off guard. The ransomware Wannacry has infected systems across the globe and has been the topic of discussion among security professionals for quite some days now.
The new infections for the moment has been stopped by an accidental hero "MalwareTech" by activating the kill switch found after reverse engineering the malware but security experts believe that a new variant could be launched very soon with no…Continue
Added by Atul kumar Singh (CISO Platform) on May 22, 2017 at 5:30pm — No Comments
Added by pritha on April 30, 2017 at 12:00pm — No Comments
Here is brief Summary of Top 5 Enterprise Security Architecture Measurement Categories. This was earlier presented in SACON (India's only Security Architecture Conference in India)by Arnab Chattopadhyay, VP - Engineering @ Infoworks Inc & Bikash Barai, Co-Founder FireCompass
Added by CISO Platform on April 29, 2017 at 9:30pm — No Comments
This article examined the field of security architecture from the point of view of security governance. It explains how security architecture governance can be created as a sub-field of security governance and how the principles and structure of the same can be applied to security architecture governance to build an overarching security environment that is easy to understand, change, monitor and maintain. This report was…
Added by CISO Platform on April 29, 2017 at 9:00pm — No Comments
There are four phases in Cyber Crisis Management, namely Detection, Response, Containment & Recovery. Here is a glimpse of the four phases.
Added by CISO Platform on April 29, 2017 at 10:00pm — No Comments
These are top 5 FREE tools you should consider while building your Enterprise Mobility Management:
It is a privately held company recognized as a “pure player” in the enterprise Mobility market and the first software vendor to distribute its cloud based or on premise Mobile Application Development Platform (MADP).
Added by Amit, CISO Platform on April 10, 2017 at 8:00pm — No Comments
This article gives us 5 fundamental steps and questions one must ask to understand the crisis of the Incident. This includes understanding the incident, the control points, plan of action, communication, business impacts.
Added by pritha on February 18, 2017 at 12:30pm — No Comments
Ransomware is a type of malware that encrypts everything on your system with a cryptographic algorithm and holds that encrypted data hostage for ransom. It demands the user to pay for the decryption key. There are two types of ransomware. The first type encrypts all data on the system and renders it nearly impossible to decrypt without the key. The second type simply locks the system and demands to enter the key for data decryption but does not encrypt data itself.…Continue
Added by pritha on February 16, 2017 at 1:30pm — No Comments
RSA conference is one of the leading security conferences worldwide with 700+ vendors at the Expo, which creates some unique challenges for security professionals. Some of the challenges @RSAC Expo are as below:
Added by Amit, CISO Platform on February 15, 2017 at 5:00pm — No Comments
2016 will go in history as the year CyberCriminals made fortune by using vulnerabilities found in technology and moreover exploiting human weaknesses. The infamous CEO Scam brought billions of dollars to CyberCriminals. I had written a separate post to handle this crime, more details can be found here…Continue
Added by Vikas Arora on February 2, 2017 at 10:30am — No Comments
The mobility explosion is the big bang that keeps expanding. It moved from stages like laptop, blackberry, touch based devices, tablets & more. The boundaries between working “in the office,” “on the road,” or “at home” have been blurred by the untethered power of smartphones, tablets, and other portable devices. Employees expect the flexibility to work on the devices they choose, and employers have come to expect always-on availability. That business requirement often conflicts with…Continue
Added by pritha on January 16, 2017 at 5:00pm — No Comments
CISO Platform Annual Summit @ Goa, last week saw over 100+ attendees for over 2 days making the the spirit of knowledge sharing and learning a huge success in the Information Security Executives of India. Here are the highlights of the awesome keynotes, electrocuting Turbo sessions and some great knowledge boost training sessions.
International Experts like CTO of Xerox, Black Hat Review Board Member, Ex-CISO at Israeli…Continue
Added by Gireesh Kumar on December 6, 2016 at 12:30pm — No Comments
Speaker: Satish K Sreenivasaiah, Lead Architect @ TCS …
Added by Gireesh Kumar on November 14, 2016 at 4:30pm — No Comments
Speakers : Arnab Chattopadhyay, VP - Engineering @ Infoworks Inc & Bikash Barai, Co-Founder Cigital India ( Earlier iViZ )
*We suggest you use Chrome to view the slides, as the it may be inaccessible on other browsers like safari…Continue
Added by Gireesh Kumar on November 14, 2016 at 4:30pm — No Comments
Speaker: Kanneth Bradberry, CTO @ Xerox Healthcare
Added by Gireesh Kumar on November 14, 2016 at 5:00pm — No Comments
Speaker: Tamaghna Basu, CEO @ neoEYED
Please Note - Speaker presentations represent the views of the individual…Continue
Added by Gireesh Kumar on November 15, 2016 at 12:30pm — No Comments
Speaker: Shomiron Das Gupta, Founder & CEO @ NETMONASTRY Inc.
Please Note - Speaker…Continue
Added by Gireesh Kumar on November 15, 2016 at 12:31pm — No Comments