Welcome to CISO Platform's Panel! CISO Platform is the world's first online community dedicated exclusively to senior security executives, including CISOs, CIOs, and cybersecurity managers. The platform's vision is simple yet powerful: enable senior…
In this episode of the CISOPlatform QnA, we dived into the recent Securities and Exchange Commission rules or SEC rules, that are setting a new standard for cybersecurity incident reporting, and Denise, our very own community manager at CISOPlatform…
Penetration testing, often referred to as "pen testing" or "ethical hacking," is a cybersecurity assessment technique used to evaluate the security of computer systems, networks, applications, or other digital environments. The primary purpose of…
"The below response is based on CISO Platform closed group discussion:
(private CISO member):
It's cheap and good product , In comparison with cyber ark"
"The below response is based on CISO Platform closed group discussion:
(private CISO member)
If not Forescout, did any of you use any other product?
I saw the demo of Axonius at RSA conf USA and it was pretty good .."
"The below response is based on CISO Platform closed group discussion:
(private CISO member)
In my view, it will be a combination of Self Assessments + Onsite reviews depending on the risk profile of vendors. With Banks typically having the largest…"
"The below response is based on CISO Platform closed group discussion:
(private CISO member):
McAfee is for full disk encryption we are also using but the query seems to be for pen drive."
"The below response is based on CISO Platform closed group discussion:
(private CISO member): Yes, we also use McAfee for Full disk encryption. Works well."
"The below response is based on CISO Platform closed group discussion:
(private CISO member):
It is build on lucin platform, very quick for search, rules , analytics and threat huntingUse cases and other enhancement will have to be done as per use…"
So, looks like maintaining genuine identity on many areas still is a huge security and privacy concern.And how many are you are trying to address it withing technology?
And how many of you think that Spam can be used positively too?
Comments
Per the email address it was a She :)
So, looks like maintaining genuine identity on many areas still is a huge security and privacy concern.And how many are you are trying to address it withing technology?
And how many of you think that Spam can be used positively too?
Thank you! Surprised to recieve spams from this portal...Otherwise hope to get the best out of this networking portal..
Thank you very much !
Thanks...
Thanks....
Thanks to all.
"Information without Information Security is just like sending letter without an envelope".
Thanks Priyanka
Thank you Priyanka
Thanks for inviting me
Thanks to All he earlier members and to you Priyanka.
Pradeep Yadav