Past Events (147)

Date range
March 15, 2018
Thursday
  • Breakfast Playbook Round Table @ Delhi 15th March

  • Mar 15, 2018 from 1:30pm to 4:00pm
  • Location: Playbook Round Table (Domain Specific)
  • Description:

    Playbook Round Table (Domain Specific)

    Domains: APT, Mobile, Deception, Container Security, Breach Response, SOC/SIEM, Cloud, AppSec, IAM, Threat Intelligence…

    Attendees

    CISO Platform Analyst driven, closed door event with about 10-15 key decision maker

  • Created by: Balaji Gowda
March 14, 2018
Wednesday
  • Breakfast Playbook Round Table @ Bangalore 14th March

  • Mar 14, 2018 from 1:30pm to 4:00pm
  • Location: Playbook Round Table (Domain Specific)
  • Description:

    Playbook Round Table 

    Domains: APT, Mobile, Deception, Container Security, Breach Response, SOC/SIEM, Cloud, AppSec, IAM, Threat Intelligence…

    Attendees

    CISO Platform Analyst driven, closed door event with about 10-15 key decision makers/influencers fro

  • Created by: Balaji Gowda
March 13, 2018
Tuesday
March 8, 2018
Thursday
  • Breakfast Playbook Round Table @ Mumbai 8th March

  • Mar 8, 2018 from 1:30pm to 4:00pm
  • Location: Playbook Round Table (Domain Specific)
  • Description:

    Playbook Round Table 

    Domains: APT, Mobile, Deception, Container Security, Breach Response, SOC/SIEM, Cloud, AppSec, IAM, Threat Intelligence…

    Attendees

    CISO Platform Analyst driven, closed door event with about 10-15 key decision makers/influencers fro

  • Created by: Balaji Gowda
February 23, 2018
Friday
February 22, 2018
Thursday
November 14, 2017
Tuesday
November 10, 2017
Friday
  • International Conference on Security Architecture

  • Nov 10, 2017 at 1:30pm to Nov 11, 2017 at 11:30pm
  • Location: International Conference on Security Architecture
  • Description:

    Security Architecture Conference started as a simple idea to grow the Information Security builder community. The 4th edition of SACON is organized by CISO Platform, the largest social collaboration platform exclusively for CISOs and senior informati

  • Created by: Balaji Gowda
August 24, 2017
Thursday
  • Webinar: Under the Hood of Deception Technologies

  • Aug 24, 2017 from 8:30pm to 9:30pm
  • Location: Under the Hood of Deception Technologies
  • Description:

    Webinar: Under the Hood of Deception Technologies

    You'll Learn

    • Beyond the buzzword - How is deception technology different from honeypots?
    • The Shootout - Deception v/s EDR, UEBA and NTA
    • A hacker’s view of deception across the kill-chain
    • Key technology cap
  • Created by: Balaji Gowda
 
August 23, 2017
Wednesday
August 22, 2017
Tuesday
August 17, 2017
Thursday
May 12, 2017
Friday
  • SACON- India's Only Security Architecture Conference

  • May 12, 2017 at 2:30pm to May 13, 2017 at 10:30pm
  • Location: SACON- India's Only Security Architecture Conference
  • Description:

    8669815267?profile=original

    The sacon conference was held 12&13 at Pune in 2019,The main focus of this event was Security Architecture, SecDevOps, Threat Modelling, SOC, Incident Response, IoT Security and More.

    Date & Location: 12-13 May @ Pune

    WHAT's NEW & EXCITING?

    • Thre
  • Created by: CISO Platform
 
  • 7th,Top 100 CISO Awards & Conference @ Pune (12-13 May)

  • May 12, 2017 to May 14, 2017
  • Location: Community Playbooks - Buying Priorities, Evaluation and Implementation best practices
  • Description:

    India's 1st security awards where Top 100 CISOs of India along with prominent other security professionals meet :


     Community Playbooks - Buying Priorities, Evaluation and Implementation best practices
     1-1 Analysts meetings with CISOs
     Wargaming on

  • Created by: Gireesh Kumar
February 9, 2017
Thursday
  • Security Priority Planning for 2017 @ Mumbai on 9th Feb

  • Feb 9, 2017 from 1:30pm to 4:00pm
  • Location: Security Priority Planning for 2017
  • Description:

    Breakfast Playbook Round Table Series: Security Priority Planning for 2017


    1. Preparing for 2017 Security Strategy
    2. Moving beyond detection/prevention to response and prediction
    3. How to build your security based on Security Architecture
    4. IT Sec

  • Created by: Gireesh Kumar