Pritha's Blog – August 2014 Archive (6)

14 Things to Consider While Defining a GRC Framework

Information Security function had to be aligned to Risk Management function to provide independence by separating Infosec Governance and Infosec operations responsibilities. Enhancement in the policy was focused on the wider and strategic modifications, faster adoption of emerging technologies and empowering all stakeholders.

(Read more:  Top 5 Big Data Vulnerability…

Continue

Added by pritha on August 29, 2014 at 1:30pm — No Comments

Top Talks from Defcon - The Largest Hacker Conference ( Part 2 )



This is the second compilation of Best Of Defcon 22 at a glance. The following Links will link you to the respective complete PPT. 

Important Note:

  • All presentations are courtesy Defcon and is presented as-is without any modification
  • Some of the descriptions below are taken from Defcon website (www.defcon.org)
  • You need…
Continue

Added by pritha on August 29, 2014 at 1:30pm — No Comments

Top Talks from Defcon - The Largest Hacker Conference ( Part 1 )

Defcon 22, the largest conference for hackers with 15,000 attendees saw some of the most interesting researches in the field of security and hacking. From hundreds of talks, we have handpicked the top presentations which are relevant for security managers and leaders.

Important Note:

  • All presentations are courtesy Defcon and is presented as-is without any modification
  • Some of the…
Continue

Added by pritha on August 16, 2014 at 4:30pm — No Comments

Best Practices: Blazing Fast Web Site Infrastructure-Forrester's Guide

With most enterprises now conducting business on the Web, it has become more crucial than ever that the experience is rich and responsive. Often these two goals conflict. How do you ensure a robust, interactive experience without sacrificing page-loading speed? How is it that some of your competitors are able to deliver dynamic content and rich Internet applications (RIAs) and still have sub-second load times? The answer comes in two parts: best practices for you (addressed in this report),…

Continue

Added by pritha on August 7, 2014 at 7:30pm — No Comments

Checklist to Evaluate Privilege Identity and Access Management Solutions

The project was named 'Privilege Identity and Access Management'. Almost all the information exists or is processed in electronic form on various IT infrastructure devices. Subsequently managing the related infrastructure requires provisioning of privileged user/administrator accounts with super user privileges for carrying out necessary administrative tasks. However,…

Continue

Added by pritha on August 7, 2014 at 7:30pm — No Comments

Governance & Compliance: Checklist for Vendor Evaluation and Key Learning Do's and Dont's

'Development of enterprise level Information Security Policies, Procedures and Standards' was an initiative to ensure we have an enterprise wide policy, procedures and standards for ensuring smooth Governance & Compliance of Information Security practices. The standards based on industry benchmark such as CIS, NSA, NIST helps an enterprise…

Continue

Added by pritha on August 7, 2014 at 7:30pm — No Comments

Monthly Archives

2018

2017

2016

2015

2014

2013

2012

1999

Follow Us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2018   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts