How to choose your Application Security Vendor?
- May 2, 2013 from 8:30pm to 8:45pm UTC+5.5
- Location: Online
- Description:
Title: How to Choose your Application Security Testing Vendor?
Date: Thursday, 2nd May, 2013
Time: 3 PM ISTView Recorded Webinar:
( Read More: How to choose your Security / Penetration Testing Vendor? )
What you will Learn:
·What are the o - Created by: CISO Platform
Past Events (227)
BCP & IT Disaster And Data Recovery Conference
- Apr 18, 2013 to Apr 19, 2013
- Location: 6th anuual- BCP & IT Disaster And Data Recovery Conference
- Description:
BCP & IT Disaster And Data Recovery Conference
Registration Timings: 8.30 AM onwards
Conference Timings: 09.00 AM - 6.00 PM
Date: 18th April 2013
Venue: Vivanta by Taj
Address: 41/3 Mahatma Gandhi Road, Bangalore 560 001
Attendance – Complimentary /
- Created by: CISO Platform
CISO Round Table on ' Effective implementation of DLP and Data Security '
- Apr 17, 2013 from 8:30pm to 9:30pm UTC+5.5
- Location: CISO Round Table on Effective implementation of DLP and Data Security
- Description:
CISO Round Table on Effective implementation of DLP and Data Security:
Panelists:
- R. Venkatasubramanian, Global Information Security, Cognizant
- Kalyanaraman Seshadri, Deputy general manager- global IT, HCL
- Maheswaran Shanugasunearam ,Manager - sales
- Created by: Priyanka Aash
Nullcon’s 5th International Security Conference
- Feb 27, 2013 at 3:30pm to Mar 2, 2013 at 8:30pm UTC+5.5
- Location: Bogmallo Beach Resort, Goa
- Description: This year CISO Platform has partnered with Nullcon and we invite your participation for “Nullcon’s 5th International Security Conference” , well known for its speakers and talks where new vulnerabilities, risks and attacks on systems are responsibly
- Created by: Priyanka Aash
CISO Round Table on Planning 2013: Key Trends, Priorities and Strategic Plan
- Feb 20, 2013 from 8:30pm to 9:30pm UTC+5.5
- Location: Online
- Description:
CISO Round Table on Planning 2013: Key Trends, Priorities and Strategic Plan
Webinar Date: Wednesday, 20th February 2013
Webinar Time: 3PM to 4PM, IST
What will you learn?- What are the key Information Security Trends in 2013?Which are t
- Created by: CISO Platform
Business Logic Vulnerabilities-The Biggest Challenge in Application Security Management!
- Feb 8, 2013 from 3:00am to 3:15am UTC+5.5
- Location: Online
- Description:
Business Logic Vulnerabilities
15min webinar where you learn:
- What are Business Logic Flaws and why scanners cannot find them?
- Examples and Case Studies of Business Logic Flaws discovered across key verticals
- What is the most ideal solution to mitig
- Created by: CISO Platform
Using 80/20 rule in Application Security Management
- Jan 18, 2013 from 3:00am to 3:15am UTC+5.5
- Location: Online
- Description:
Webinar Topic: Using 80/20 rule in Application Security Management
Date: Thursday, 17 January 2013
Time: 11:00 AM EST / 05:00 PM CET / 04:00 PM GMT / 09:30 PM IST
Click here to Join - Created by: CISO Platform