Featured Blog Posts (125)

Top Talks From SACON (Security Architecture Conference), 2016 - Key Highlights

SACON is India's 1st & Only Security Architecture Conference. With over 60 participants, this was the first year of SACON and here are a few highlights we wanted to share with you. It was held on 12th July, Ritz Carlton, Bangalore, India.

We had with us Top Security Industry Leaders who helped SACON with great content. For more details visit: sacon.io…

Continue

Added by pritha on July 22, 2016 at 7:30pm — No Comments

6 Free Log Management Tools

Log management is one of the primary requirements for building an enterprise class SOC. In security, Log analysis is often the first step in incident forensics. Operating systems such as windows, Unix, Linux and other network devices such as routers, firewalls etc. offer native log management capabilities but are not sufficient for organizations because of a variety of reasons. First, due to storage constraint older logs are overwritten by the most recent logs. Second, log collection for…

Continue

Added by pritha on August 1, 2016 at 6:00pm — No Comments

"ATP( Advanced Threat Protection) Technology Stack"

We believe, isn't a single technology/solution but is a complex program which consists of people, process and technology. Sandboxing or any single technology can only provide partial protection against “real” advanced attacks. We suggest organizations to look at the…

Continue

Added by pritha on July 14, 2016 at 5:30pm — No Comments

Top 8 'Mobile Security' talks from RSA Conference 2016 (USA)

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Mobile Security at RSA Conference 2016.

RSA Conference held its 25th annual event at the Moscone Center in San Francisco and brought together a record number of more than 40,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top…

Continue

Added by pritha on April 14, 2016 at 7:30pm — No Comments

Top 10 'Incident Response & SIEM' talks from RSA Conference 2016 (USA)

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Incident Response & SIEM at RSA Conference 2016.

RSA Conference held its 25th annual event at the Moscone Center in San Francisco and brought together a record number of more than 40,000 attendees. Attendees experienced keynotes, peer-to-peer…

Continue

Added by pritha on April 15, 2016 at 3:30pm — No Comments

Top 6 'Cloud Security' talks from RSA Conference 2016 (USA)

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Cloud Security at RSA Conference 2016.

RSA Conference held its 25th annual event at the Moscone Center in San Francisco and brought together a record number of more than 40,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top…

Continue

Added by pritha on April 14, 2016 at 7:30pm — No Comments

16 Application Security Trends That You Can't Ignore In 2016

CISO Platform-Top Application Security Trends 2016

Application Security has emerged over years both as a market as well as a technology. Some of the key drivers had been the explosion in the number of applications (web and mobile), attacks moving to the application layer and the compliance needs. Following are the key Application Security Trends which we believe the industry will observe during the year…

Continue

Added by bikash on February 20, 2016 at 1:30pm — No Comments

11 Ways To Measure The Effectiveness Of Your Identity & Access Management (IAM) Solution

Identity Access Management (IAM) is a set of business policies, framework and processes which ensures the right person has access to the right asset/resources. Identity Access Management solutions can deliver intangible benefits that are revenue increasing and other tangible benefits that are cost reducing.

Here…

Continue

Added by pritha on February 12, 2016 at 5:00pm — No Comments

9 Top Features To Look For In Next Generation Firewall (NGFW)



Firewall in simple terms acts as a barrier to prevent unauthorized access or malicious traffic within a system or in a network. The rapid growth of new innovative technology and alongside with the massive growth of new security threat, the traditional firewall is not enough to compete. To deal with these changes, vendors in the enterprise firewall market have created a new generation of firewall devices dubbed the Next Generation Firewall or NGFW.

A…

Continue

Added by pritha on February 12, 2016 at 5:00pm — No Comments

Top 6 Reasons Why Data Loss Prevention(DLP) Implementation Fails

Below are Top 6 Reasons Why Data Loss Prevention/ Data Leakage Prvention (DLP) Fails:

  • Lack of business/key-stakeholders involvement: Failure to include key stakeholders (Including Business and C-level executives) while defining requirements and formulating DLP policy make implementation…
Continue

Added by pritha on February 10, 2016 at 11:30pm — No Comments

Session on Practical Demo of Collecting Threat Intel Using OSINT Tools.

Session on Practical Demo of Collecting Threat Intel Using OSINT Tools Video by Sachin Deodhar.

( Read More: How To Benchmark A Web Application Security Scanner? )…

Continue

Added by Gireesh Kumar on January 19, 2016 at 3:30pm — No Comments

CISO Platform Top IT Security Influencers (Part 1)



CISO Platform recognizes World's Top 100 IT Security Influencers who have/are impacting the information security industry's in various ways. This list includes top researchers, industry experts, leading entrepreneurs, a must follow for infosec industry. The list will be declared in 4 parts each with 25 Top Influencers, this is the first…

Continue

Added by pritha on January 8, 2016 at 2:30am — No Comments

Wargame Strategy Simulation : Creating Action Items For Responding To A Breach In First 24 Hours.

Wargame Strategy Simulation : Creating Action Items For Responding To A Breach In First 24 Hours Video by Paul Raines, Pravesh Sharma, Shirish Dandekar, Sunil Mehta.

Added by Gireesh Kumar on December 28, 2015 at 3:30pm — No Comments

Security Metrics and Dashboard for CEO

Information Security Metrics For The Board

It is very important to properly define the right Information Security Metrics for an organization to estimate the security structure and to communicate it efficiently to the Board level executives.There is a growing interest from the Board and the CEO to understand the information security posture of the company. Many…

Continue

Added by bikash on December 2, 2015 at 9:00pm — 2 Comments

Workshop: CASB - Part 2

CASB Workshop Part 2 by Gaurav Bhatia:

  • Technology Taxonomy For Cloud Security
  • Key Components of Cloud Security Architecture
  • Blue Print To Build Your Cloud Security Program
  • Basics of Cloud Security Access Brokers 

CASB Workshop Part 2 Video by Gaurav Bhatia:…

Continue

Added by Gireesh Kumar on November 2, 2015 at 6:30pm — No Comments

Threat Intelligence Workshop

Threat Intelligence Workshop by Bikash Barai:

  • Key Components (People,Process and Technology)
  • Threat Intelligence Maturity Model
  • Threat Collection & Analysis
  • Integrating Actionable Intelligence
  • Technology & Vendor Landscape 

( Read More:…

Continue

Added by Gireesh Kumar on October 5, 2015 at 6:00pm — No Comments

Webinar on "Defusing Cyber Threats Using Malware Intelligence"

Webinar on "Defusing Cyber Threats Using Malware Intelligence" Video by Arun Lakhotia.

  • How a Malware can be source of intelligence about the attacker
  • How Large scale, automated malware analysis to extract intelligence is feasible
  • How Malware intelligence can aid defuse targeted attacks

( Read more:  …

Continue

Added by Gireesh Kumar on September 29, 2015 at 2:30pm — No Comments

Workshop: CASB - Part 1

CASB Workshop Part 1 by Bikash Barai:

  • Technology Taxonomy For Cloud Security
  • Key Components of Cloud Security Architecture
  • Blue Print To Build Your Cloud Security Program
  • Basics of Cloud Security Access Brokers…

Continue

Added by Gireesh Kumar on September 28, 2015 at 5:30pm — No Comments

Workshop: Network Forensic Tools & Techniques

Network Forensic Tools & Techniques Workshop by Tamaghna Basu:  

  • Introduction,Basic Protocol Analysis,
  • Forensic Analysis Network/Web/Malware,
  • Basic Packet Analysis Challenges…

Continue

Added by Gireesh Kumar on September 9, 2015 at 7:00pm — No Comments

Workshop: Application Security-Part 1

Application Security Workshop Part 1 by Jitendra Chauhan:

  • Web Attack Chaining
  • Understanding IAST/RASP
  • Realtime Polymorphism

Application Security Workshop Part 1 Video by Jitendra Chauhan:…

Continue

Added by Gireesh Kumar on September 9, 2015 at 7:30pm — No Comments

Featured Monthly Archives

2018

2017

2016

2015

2014

2013

2012

Follow Us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2019   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts