May 2021 has been an eventful year for the CISO community. From Colonial Pipeline to to Conti Ransomware attack, cybercriminals have become more cunning and sophisticated at taking advantage of loopholes.In this report we have discussed some of the…
"1) District wise, state wise, Seismic zone wise employee population analysis is important.
2) Historical Situations arising due to power issues, internet issues, natural calamities and political issues to be collected and impact analysis to be done…"
"Hello wonderful team, I would like to nominate myself - https://www.linkedin.com/in/shamane/
Shamane Tan, Chief Growth Officer, Author and TEDx Speaker:
Shamane Tan works with C-Suite and executives on managing cyber risk as part of their business…"
"VKYC completely revolves on Confidentiality, Integrity, Availability & Authorisation.
How you capture the date and store the date - device security
Can it be tamper proof ?
Have Audit Controls for data movement
How the process undergoes multiple…"
"10% of what? Workforce of what? Maturity of what? A fundamental issue is that since "cybersecurity" has come into vogue as its own creation different than "information security" - as defined by NIST CSF and regulatory bodies (such as NY DFS),…"
"I agree with Mr.Anoop. We use the Mac binding for all the devices for any network connectivity and allowing any resources including hardware, software, information assets accesses after due authentication."