Featured Blog Posts (125)

Practical Applications of Block Chain Technologies (SACON Presentation)

Speaker: Kanneth Bradberry, CTO @ Xerox Healthcare 



*We…
Continue

Added by Gireesh Kumar on November 14, 2016 at 5:00pm — No Comments

Network Forensics and Practical Packet Analysis (SACON Presentation)

Speaker: Tamaghna Basu, CEO @ neoEYED

*We suggest you use Chrome to view the slides, as the it may be inaccessible on other browsers like safari etc.

Please Note - Speaker presentations represent the views of the individual…

Continue

Added by Gireesh Kumar on November 15, 2016 at 12:30pm — No Comments

SOC Architecture Workshop - Part 2 (SACON Presentation)

Speaker: Shomiron Das Gupta, Founder & CEO @ NETMONASTRY Inc.

Please Note - Speaker…

Continue

Added by Gireesh Kumar on November 15, 2016 at 12:31pm — No Comments

Workshop on Endpoint Memory Forensics (SACON Presentation)

Speaker: Matt Suiche, Co - Founder & Chief Scientist @ Cloud Volumes…



Continue

Added by Gireesh Kumar on November 15, 2016 at 1:01pm — No Comments

Application Security Architecture and Threat Modelling (SACON Presentation)

Speaker: Nilanjan De, Principal Archietect @ Cigital, Inc & Devesh Bhatt, Security Researcher @ Anon…

Continue

Added by Gireesh Kumar on November 15, 2016 at 2:48pm — No Comments

Security Strategy and Tactic with Cyber Threat Intelligence (CTI) (SACON Presentation)

Speaker: Reinhold Wochner @ Raiffeisen Bank International…

Continue

Added by Gireesh Kumar on November 15, 2016 at 3:31pm — No Comments

Intra process memory protection for applications on ARM and x86

Intra process memory protection for applications on ARM and x86



Today's software needs to isolate not only processes but the many components *within* a process from each other. Process-level isolation via jails, sandboxes, VMs, or hypervisors is finally becoming mainstream, but it misses an important point about modern software: its growing number of libraries that are all loaded into the same address space, and may all interact…

Continue

Added by Gireesh Kumar on November 25, 2016 at 12:02pm — No Comments

Kill the Password (Annual Summit Presentation)

Speaker: Tamaghna Basu, CEO @ neoEYED

*We suggest you use Chrome to view the slides, as the it may be inaccessible on other browsers like safari etc.

Please Note - Speaker presentations represent…

Continue

Added by Gireesh Kumar on December 6, 2016 at 12:00pm — No Comments

Sneak Peek into Emerging Health Care Tech & Future Security Impact (Annual Summit Presentation)

Speaker: Kenneth Bradberry, CTO @ Xerox Healthcare

*We suggest you use Chrome to view the slides, as the it may be inaccessible on other browsers like safari etc.

Please Note - Speaker presentations…

Continue

Added by Gireesh Kumar on December 6, 2016 at 12:00pm — No Comments

The (non) - Evolution of Security (Annual Summit Presentation)

Speaker: Matt Suiche, Co - Founder & Chief Scientist @ Cloud Volumes

*We suggest you use Chrome to view the slides, as the it may be inaccessible on other browsers like safari etc.

Please Note -…

Continue

Added by Gireesh Kumar on December 6, 2016 at 12:29pm — No Comments

Using Behavioral Psychology and Science of Habit to Change User Behavior (Annual Summit Presentation)

Speaker: Bikash Barai [ Founder & CEO @ Cigital, Inc]…

Continue

Added by Gireesh Kumar on December 6, 2016 at 12:34pm — No Comments

Security Strategy and Tactic with Cyber Threat Intelligence (CTI) (Annual Summit Presentation)

Speaker: Reinhold Wochner @ Raiffeisen Bank International…

Continue

Added by Gireesh Kumar on December 6, 2016 at 12:42pm — No Comments

IoT Security Taskforce (Annual Summit Presentation)

Speaker : Arvind @ TiE



*We suggest you use…
Continue

Added by Gireesh Kumar on December 6, 2016 at 12:45pm — No Comments

NIST Critical Security Framework (CSF) (Annual Summit Presentation)

Speaker : Richard Bussiere, Principal Architect @ Tenable Network Security

*We suggest you use Chrome to view the slides, as the it may be inaccessible on other browsers like safari etc.

Please Note - Speaker presentations represent the…

Continue

Added by Gireesh Kumar on December 6, 2016 at 12:52pm — No Comments

Top 4 'Application Security' talks from Black Hat Conference 2016 (USA)

Our editorial team has handpicked some great talks from Black Hat Conference - one of the largest IT Security Conference in the world. 

Black Hat - built by and for the global InfoSec community - returns to Las Vegas for its 19th year. This six day event begins with four days of intense Trainings for security practitioners of all levels (July 30 - August 2) followed by the two-day main event including over 100…

Continue

Added by pritha on December 5, 2016 at 5:00pm — No Comments

Top 5 'Mobile Security' talks from Black Hat Conference 2016 (USA)

Our editorial team has handpicked some great talks from Black Hat Conference - one of the largest IT Security Conference in the world. 

Black Hat - built by and for the global InfoSec community - returns to Las Vegas for its 19th year. This six day event begins with four days of intense Trainings for security practitioners of all levels (July 30 - August 2) followed by the two-day main event including over 100…

Continue

Added by pritha on December 5, 2016 at 6:00pm — No Comments

Guide To Building Enterprise Security Architecture Governance Program

This Guide examined the field of security architecture from the point of view of security governance. It explains how security architecture governance can be created as a sub-field of security governance and how the principles and structure of the same can be applied to security architecture governance to build an overarching security environment that is easy to understand, change, monitor and maintain. It has examined the security architecture governance from the point of view…

Continue

Added by Arnab Chattopadhayay on November 21, 2016 at 11:15am — No Comments

Top 14 talks on 'Emerging Areas In Security Technology' from RSA Conference 2016 (USA)

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2016.

RSA Conference held its 25th annual event at the Moscone Center in San Francisco and brought together a record number of more than 40,000 attendees. Attendees experienced keynotes,…

Continue

Added by pritha on April 14, 2016 at 7:30pm — No Comments

Top 10 Talks From Black Hat Conference USA, 2016

Our editorial team has handpicked the best of the best talks at Black Hat Conference USA, 2016 - one of the largest IT Security Conferences in the world.

Black Hat conference is a security conference which brings together variety of security professionals and hackers to discuss on the current information security challenges and security landscape. The event is composed of two major sections, the Black Hat briefings and Black Hat trainings. Black Hat 2016 USA was held on July 30 -…

Continue

Added by Atul kumar Singh (CISO Platform) on September 13, 2016 at 10:00pm — No Comments

Cybersecurity Policy for the Banks|RBI Cyber Security Framework – Key Takeaways

In its June 2, 2016 notification, RBI has issued new cybersecurity guidelines, which says that scheduled commercial banks (private, foreign and nationalized banks listed in the schedule of RBI Act, 1934) must proactively create or modify their policies, procedures and technologies based on new security…

Continue

Added by Amit, CISO Platform on July 27, 2016 at 12:00am — No Comments

Featured Monthly Archives

2018

2017

2016

2015

2014

2013

2012

Follow Us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2019   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts