pritha's Posts (580)

Sort by

Here's a list of World's Best and Most Popular IT Security Conferences. Details such as Tentative Time, Pass Price and Locations are mentioned so you can plan your Calendar.

Top IT Security Conferences In The World:

1. Black Hat

Claims to be the most technical and relevant global IT security conference in the world. Black Hat USA believes in providing a vendor neutral environment for latest information technology research and development and trends.

  • Participation fees: $1800- $2600
  • When & Where:
    • Black Hat USA 2015 : August 1-6, 2015, Mandalay Bay | Las Vegas, NV
    • Black Hat Europe 2015 : November 10-13, 2015, Amsterdam RAI | The Netherlands
    • Black Hat Asia 2016 : March 29 - April 1, 2016, Marina Bay Sands 10 Bayfront Avenue | Singapore
  • Number of Attendees: About 7500
  • Website: https://www.blackhat.com/

( Read More: How To Benchmark A Web Application Security Scanner? )

2. RSAC:

This IT Security Conference claims to attract the highest number of attendees approx. 30,000. However according to RSA “the real value of the Conference lies not in their size, but in the valuable content they provide and their commitment to finding new industry voices and new ways for the community to feel inspired and engaged”.

  • Participation fees: $1900 approx. (Delegate pass)
  • When & Where:
    • RSA USA - April 20 - 24, 2015, | Moscone Center | San Francisco, CA
    • RSA Conference Asia Pacific & Japan Singapore | 22 – 24 July, 2015, | Marina Bay Sands
    • RSA Conference Abu Dhabi | 4 – 5 November, 2015 | Emirates Palace Abu Dhabi
  • Number of Attendees: 30000
  • Website: https://www.rsaconference.com/

3. DEFCON:

Started in 1993, Defcon is one of the oldest and also one of the largest hacker IT Security conferences.Last year saw a record number of attendees.

  • Participation fees: $1900 approx. (Delegate pass)
  • When & Where:
    • DEF CON 23 – August 6-9, 2015, Paris/Bally's in Las Vegas
  • Number of Attendees: 14,500
  • Website: https://www.defcon.org/index.html

4. Infosecurity Europe:

Infosecurity Europe claims to be the biggest and the most attended IT security conference in Europe. Infosecurity Europe 2015 seems to be Europe's largest information security industry gathering.

5. InfoSec World

Organized by MIS Training Institute, they seem to have a diverse range of speakers that attracts attendees to the IT Security Conference.

  • Participation fees: Max $3995
  • When & Where:
    • InfoSec World 2015- (23-25) March 2015 | Disney’s Contemporary Resort -Orlando - FL
  • Number of Attendees: 1300 +
  • Website: http://www.infosec-world.com/

( Read More: 4 Areas Where Artificial Intelligence Fails In Automated Penetration Testing )

6. ShmooCon:

Organized by The Shmoo Group, ShmooCon is an American hacker IT Security Conference. It has three days for demonstrating with technology exploits, inventive software, hardware solutions and open discussions of critical Information Security issues. Costs are relatively low.

  • Participation fees: $150 general admission ticket
  • When & Where:
    • ShmooCon 2015- (16-18) January 2015 | Washington Hilton Hotel- Washington -USA
  • Number of Attendees: 1500+
  • Website: https://www.shmoocon.org/

7. SANS Summits:

Organized by SANS Institute, it is a 2-Day IT Security Conference hosted with focus on the current Information Security Concerns. Some segments include -User Panels, Debates, Vendor Demos and short talks by industry experts.

  • Participation fees: 1299 USD- 5350 USD
  • When & Where:
    • Digital Forensics & Incident Response Summit - Austin, TX Jul 7, 2015 - Jul 14,2015
  • Number of Attendees:
  • Website: https://www.sans.org/summit/

8. Gartner Security & Risk Management Summit

Gartner's conference hosts the its IT Security Conference which focuses on work of 1200 Research Analysts. The Summit includes six in depth programs including current issues on IT security and risk management.

( Read More: Comprehensive Salary Guide For Cyber Security Professionals: First Time Ever In India )

9. APPSEC USA

A software IT Security Conference for developers, auditors, risk managers, technologists, and entrepreneurs gathering with the world’s top practitioners to share the latest research and practices in the field of security. Two-days of training followed by two-days of world-class speakers. This is an excellent platform for developers, security experts and technologists to discuss cutting edge approaches to secure web applications. AppSec USA is also one of the largest sources of funding to help advance all of the free, open source OWASP projects the security world rely upon.

  • Participation fees: $300 - $1500
  • When & Where:
    • OWASP APPSECUSA 2015 - September 22-25 – San Francisco
  • Number of Attendees:
  • Website: https://2015.appsecusa.org/

10. SACON - Security Architecture Conference

Focused on Security Architecture, you could find deep technical session & strategic sessions on Security Architecture, SecDevOps, Threat Modelling, SOC, Incident Response, IoT Security and More. It brings IT Security Professionals and architects together. It strives at understanding and incorporating security at the architectural level. Also offers some great discount schemes, use the pre-registration for these.

  • Participation fees: $250 - $500
  • When & Where:
    • SACON 2017 - November  – Bangalore, India
  • Number of Attendees: 300+ to 500+
  • Website: sacon.io

Of course we have our very own community events which we have to mention.

CISO Platform Annual Summit/ Decision Summit

CISO Platform Annual Summit and Decision Summit are two of the largest IT Security Conference in India/Asia which is exclusively for Senior Security executives/Decision makers. Typically there are over 50+ sessions and 80+ speakers from 8 different countries sharing their insights and experiences with the CISO’s working to secure businesses of all sizes in various innovative ways.

  • Content Focus
    • Vendor Evaluation and Bench marking Tools
    • Security Management Tools and Frameworks
    • Metrics and Dashboard for Security Management and Decisions
    • Professional Development Checklists and Frameworks

Calendar of Events

January ShmooCon
March InfoSec World
April RSA
June
  • Gartner Security and Risk management summit
  • CISO Platform Decision Summit
  • Infosecurity Europe
July
  • SANS Summit
  • RSA
August
  • SANS Summit
  • DEFCON
  • Black Hat
September Appsec USA
November
  • Black Hat
  • RSA
  • SANS Summit
  • CISO Platform Annual Summit
  • SACON
December SANS Summit

What are Your Favorite IT Security Conferences? Share with us in comments below.

8669802070?profile=original

Read more…

Convincing the board to spend on the security initiatives has always been challenging. The ROI being very complex, the information security world is often overlooked. Here's a template to help structure the IT security content for the Board.

Key Considerations while presenting to the Board

Less is more. Board doesn't want the technical details.

We might want to fill up the presentation with a lot of metrics and data but the board wants the most critical ones which they can understand and relate to. E.g. They might not be interested in knowing about patching status or the number of incidents that you handled. 

Board speaks different language

Understanding the language of the board is very important. Use technical jargon as sparingly as possible. Change your language and examples to something that the non security audience can easily relate to.

Board is worried about how good the security is....minus the technicalities

That's a hard problem to answer. Security cannot be measured on absolute terms. However you got to explain it in simple way. You also need to assure how ready you are in terms of handling any critical incident

Be cautious: Verify your assumptions

Al lot of times we assume that the board might be interested in certain things. Most of the time people guess it wrong. It is a good idea to assume but definitely verify and take feedback

List of To-Do before the Board Meeting:

  • Understand what the Board wants
  • Understand the level of understanding of each individual in the board
  • Align your security strategy to the Business Goals
  • Be Clear on 'How Secure The Organization Is?'
  • Consider sending papers before hand to the members for a better understanding
  • Real Life example simulations can be easier to communicate with
  • Represent numbers or other complex stuff graphically which gives an idea of trend
  • Always be ready with the synopsis of all the security projects running and the most vital ones needing approval
  • Create a story board where the problem statement is well defined and the action taken highlights its fatality
  • Engage the board, get their views and keep your plan flexible
  • Compute the security philosophy in simple numbers eg. If scenario 1 happens, Loss=$1million
  • References to stats and competing organizations can help with the budgets

CISO Platform Recommended Board Level Metrics

  • State of Security in comparison with competition
  • Open business critical risks
  • No of critical incidents reported to media/regulatory agency
  • Loss/Downtime due security incidents
  • Compliance status
  • Budget performance
  • Key security initiative performance status

 

 

Read more…

Here is a comprehensive checklist to Evaluate SIEM Vendors. We highly appreciate this community contribution.
by Sunil Soni, CISO, Punjab National Bank

Vendor Selection Framework For Integration Of Threat Intelligence With SIEM

8669803265?profile=original

Key Selection Criteria (Minimum):

Financial/business stability

  • Its legal status in India
  • Condition of financial health
  • Mode of presence in India (directly or through subsidiary or a Joint venture)
  • Is it an OEM (Original Equipment Manufacturer) or their authorized Representative in India
  • Financial turnover for last three years
  • Turn over from Information Security Business during last two years
  • Is there a legal action pending against them for any cause in any legal jurisdiction?
  • A minimum of 5 years of experience in Information Security Business (Including consulting, actual implementation and support thereafter)?
  • Availability of skilled staff to support proposed solution (CISA/CISSP/CISM and PMP)
  • Have they implemented at least one SIEM solution on the proposed solution, if not then on earlier versions of SIEM solution?
  • Unsatisfactory record in completion of any of the earlier contracts with the Bank ?
  • Have experience in implementation of enterprise-wide SOC?

( Read More: 5 Reasons Why You Should Consider Evaluating Security Information & Event Management (SIEM) Solution )

>> Compare Top SIEM Vendors: Click Here

Key Selection Criteria (Technical):


A. Capability

  • Capability to meet 24*7*365 support requirement
  • Availability of their DR Site?
  • Ability to handle any critical issue within least possible time?
  • The capability to monitor all kind of incidents?

B. Technical Criteria

  • Their ability to provide legal support
  • Capability to provide technical support on a continuous basis.
  • Their capability to scan all website of the Bank for malicious activities and its reporting using online dashboard
  • Ability to provide training to bank's staff
  • Capability to meet SLA as defined in RFP?

C. Tie-up arrangement with Service provider & Technical groups

  • How many Major leading browser developers (minimum 5), it has contact?
  • How many (Internet Service Providers) ISPs (Minimum 500). It has contact?
  • With how many ISPs (foreign countries) they have tie up with. (minimum 20 countries )
  • Is SI / OEM member of Anti Phishing Work Group / Data Security council?
  • Ability to provide training on SOC to at least 30 bank's official every 3 months
  • "Do they have Experience in Anti Phishing, Anti Pharming and anti Trojan services  (minimum 3 years)"

D. Validation of Customer Credentials

  • Provide number of customers using proposed / offered Anti Phishing services (minimum 5)
  • Provide number of phishing, pharming and Trojan incidents closed during last 1 year.
  • Provide number of Banking customers using proposed / offered malware scanning services.
  • Their readiness to adhere to secured flow of data from vendor to the client?
  • Their readiness to  provide undertaking to abide by security policy of the bank?
  • Ability to monitor the performance on a regular basis.

E. Responsiveness

  • How soon an incident can be closed by them?
  • How soon advisory service is provided by them on critical vulnerability?

( Read More: Comprehensive Salary Guide For Cyber Security Professionals: First Time Ever In India )

F. Communication

  • What is the native language spoken in the company? How many international languages, it is  able to communicate ?(minimum 9 languages should be supported)

G. Legal Service

  • Ability to provide legal support in the form of communication with CERT/Cyber Crime (with special permission from the Bank). 

H. Advisory Service

  • Ability to provide advisory service for online threats.
  • Ability to provide advisory service for intelligence alerts.
  • Ability to share article & white paper .
  • Ability to provide regular alerts on critical vulnerabilities.
  • Ability to provide advisory service for tools and other methods used by the fraudster against the Bank

I. DashBoard

  • Ability to provide display of high and low level reports
  • Ability to provide regular update of incidents
  • Ability to customized reports/ option to process adhoc queries
  • Capacity to download extracted data
  • Availability of screen shots of all phishing related incidents
  • Facility of case management with the flexibility to include comments from both the parties.
  • Ability to provide role based authentication to the dashboard .
  • Display of ongoing compliance status

J. Forensic Ability

  • Capability to provide forensics analysis
  • Ability to provide data for investigation purposes
  • Ability of extracting critical data
  • Ability to providing  critical information as per the nature of the incident
  • Ability to provide comprehensive analysis of incidents or data

K. Background Checking of Staff

  • Provide background of character & qualification of  proposed staff

L. Legal & Regulatory Compliance

  • Status of  compliance on income tax law and employment regulation
  • Status of complaine on  labour law i.e. minimum monthly pay salary, deduction, etc.

( Read More: Checklist To Evaluate A Cloud Based WAF Vendor )

>> Compare Top SIEM Vendors: Click Here

M. Capabilities of the Threat Intelligence Solution

  • Tapping Geo-location hopping vis-à-vis time zone
  • Ability to do device mapping (Screen resolution, Version of OS, Base Lining SDK)
  • Device identification vis-à-vis device mapping
  • Fraudlent devices to have an increased risk level
  • Global Information harvesting i.e. IP Reputaton, Web Reputation, Detail with respect to Drop zones, infection point, C & C servers controlling end points
  • Frequency of updation of rule in EFN (e-fraud network)
  • Services (Manuals or automated through scripts)
  • Blacklist feeds (General & specific to institution) & its frequency
  • Ability to check for web & mobile (SDK kit- Rogue mobile apps & ability to bring them down and Anti Rogue Apps
  • Checking of market campaign

N. Application Interface (API) Challenge

  • Issue / ability with API & its upgradation with SIEM dashboard
  • Ability to create a unified view

O. Solution Evaluation

  • To verify the working of offered solution at a live site (Cross check with the limited countries)
  • To validate technical adequacy of the offered configuration through a benchmark test. (Each  shortlisted vendor at his cost)
  • To get a bench marking test conducted, research/testing finding & report evaluated

How do you evaluate SIEM Vendors? Share with us in the comments below or write your own article here 

Read more…

Technical Skills:

Major Areas Of Focus:

  • Incident Response
  • Computer Forensics
  • Network Security
  • Secure Architecture

( Read More: CISO Platform Top IT Security Influencers (Part 1) )

Conceptual (Understand How-It-Works):

  • Fundamental security concepts- CIA Triad(Confidentiality,Integrity,Availability),Authentication vs Authorization vs Access control, Non-Repudiation etc.
  • Working Principles & Protocols of Internet- TCP/IP, IPV4, IPV6 etc.
  • Security Domains- MDM, IDS/IPS, Database, DLP etc.
  • Transport Layer- SMTP, MIME etc.
  • Social Engineering tactics
  • **Network security (Protocols, Configurations, Infrastructure, Vulnerabilities)- MIM, Spoofing, Firewall, Routers, Public Data networks etc.
  • **Coding Practices- Secure coding, Malicious code, Buffer Overflows,Cross-site scripting etc.
  • ** Coding Languages- C, Java, Perl, Shell, Awk etc.
  • **Encryption (Processes & Algorithms)- Digital Signature & Certificate, Hash Algorithms & Encrypted Hash, AES, DH Key Exchange, PGP, DES & Triple DES, Blowfish, Twofish, Serpent

** - Preferably expertise level understanding and HandsOn in these areas, however basics must be tested first.

Expertise & handsOn:

  • Internet protocols - DNS, TLS, IPSEC, HTTP, TCP, UDP etc.
  • OS - Windows,UNIX/Linux etc.
  • File system - Zfs, NTFS, FAT etc.
  • Encryption - PGP, symmetric/asymmetric, ECB/CBC operations, AES etc.
  • DLP - network vs endpoint DLP, Vontu, Websense, Verdasys etc.
  • eDiscovery & Digital Forensics Concepts/Technologies - Encase, FTK etc.
  • Threat or Risk Modelling - STRIDE, DREAD, FAIR etc.
  • Pentesting Fundamentals
  • Technical expertise - Windows, Linux, Solaris, AIX, OS400, Apple, Databases, Routers/Firewalls

Computer Forensics:

  • Process- Data Extraction, Data Imaging, Data Preservation & Data Handling
    - Methodology for proper copy of storage devices that can be used as evidence
    - Tools like FTK, AccessData
  • Popular tools- FTK, Access Data,Caine,EnCase etc.
  • Techniques- Cross Drive Analysis(CDA), File Carving or Carving, Live Analysis, Steganalysis or Steganography Tools, Volatile Data Analysis

( Read More: Pre-launch Preview: State of Security Technology Adoption in Enterprises - Annual Report 2015 )

Added Certification

  • CISSP
  • ENCE(Encase Certified Examiner),
  • CCE, GCFE(GIAC Certified Forensic Examiner ),
  • GCFA(GIAC Certified Forensic Analyst),
  • GREM(GIAC Reverse Engineering Malware),
  • GCIA(GIAC Certified Intrusion Analyst),
  • GCIH(GIAC Certified Incident Handler),
  • CHFI, QSA, EnCE,
  • CCE(Certified Computer Examiner),
  • ACE(AccessData Certified Examiner),
  • CISM

Personal Skills:

  1. Good Management abilities
  2. Stress Handling Capability
  3. Impromptu action taker
  4. Good Reasoning abilities
  5. Process defining abilities
  6. Good Communication skills
  7. Team worker 

Notes

1. Test scenarios.Hand over test scenarios to the recruit, the process of resolving the problem will demonstrate - logical thinking, spontaneity, knowledge, forensic basics. This can be also done in idle teams as an exercise.

2. Learner.Since information security changes every day, the personnel should be open to learning and eager to demonstrate them. Educational courses made can also be useful for other members outside CIRT.

3. Think of hiring a hacker. Big companies are hiring hackers full-time to hack their systems, this enables faster resolving the easiest hackable points, moreover the hacker thinks like a hacker!

4. Domain experts of certain fields can be a good choice like- applications, network, mail and database.

5. Consider outsourcing this effort to a consultancy which results in lower costs as you don't need a team waiting for incidents to take place, rather treat only when affected. However, this must be preceded by references and study.

6. A Legal Advisor can be of umpteen help, in assisting of gathering information, recommendations and remediation when an incident/breech takes places

(Read more: CISO Guide for Denial-of-Service (DoS) Security)

Reference:

https://en.wikipedia.org/wiki/Computer_forensics

https://en.wikipedia.org/wiki/Information_security

http://ptgmedia.pearsoncmg.com/images/1578702569/samplechapter/1578702569.pdf

https://msisac.cisecurity.org/resources/guides/documents/Incident-Response-Guide.pdf

http://www.cert.org/incident-management/csirt-development/csirt-staffing.cfm

http://www.bankinfosecurity.in/incident-response-5-critical-skills-a-4214/op-1

8669801067?profile=original

Read more…

Amazing Technology-Science Fiction Coming True?

The Future of Techs look so promising that we may live in Sci-Fis super soon. So, I thought of covering some mind blowing concepts, some of which may have also taken shape:

  • Google Automated Cars
    This is a very popular project and the interesting things are these are Driver Less cars with extreme accuracy. It could look into a future of reduced accidents and human errors.

  • MIT Squishy Robots (like Terminator 2)
    Notice the Robots in Terminator being able to change form to get through smaller spaces? MIT is working on phase changing robot, which can change form, it will be able to aid in Medical fields by going into the human body and finding survivors in a Rubble after natural calamities, and many more.

  • Mind Controlling Aircrafts-No Pilot Planes
    A little scary but the Pilot is driving it with his mind. The pilot's brain waves will transform into commands for the flight. The tests gave very accurate flying results

  • Rain Or Lightening on Demand
    University of Arizona worked on a way to shoot a Lazer Beam into the clouds to create electrical activity, the lightening is yet to happen though

  • Invisibility Cloak
    A very common phenomenon in Sci-Fi, it is almost workable. One such way is to make the materials reflect light in such a manner, it turns invisible to the viewer.

  • Watson-plays game Jeopardy, takes automated customer call etc.
    IBM Watson replicates the power of human learning i.e. cognitive learning. The best part is it can gobble up all the information available unlike humans helping us with deeper insights. It can takes automated calls and play Jeopardy.

  • Artificial Brain
    Google's Brain didn't need teaching, with high volumes to videos given to it, wit high levels of accuracy recognized human faces and body parts. Amazingly it could detect the overwhelming cats too!

  • Real Time Language Translation
    Skype allows one to communicate with someone who speaks a different language. Eliminates language barriers, already available in few popular languages

  • Smartphones- diagnosis of infections, heart attacks etc.
    Your health monitoring device will be the smartphone, it will diagnose your mental health, your heart and all others. Processes will also be automated for quick notifications to the doctors and ambulance alert

  • Intel Edison
    An SD Card size can fit in the whole of your bulky computer. Believed to be targeted towards developers.

  • Form 1 3D Printer
    A design prototype is easier than ever, a quick 3D prototype with the Form1 is amazing.

  • Eye Tribe & Leap Motion
    Both the above small devices are quick at recognizing hand motion and eye motion which are then actionable. Scroll the page or browse the web with your eyes or hands without touching the screen

With the amazing Techs comes a challenge, the Information Security world will take a leap light years forward, prediction can be key.

Read more…

Leap Second-Are You Ready For It?

The next Leap(26th leap) Second will be on 30 June,2015. The last one was on 30 June,2012.

What Is It?

Earth's rotation is slowing down around it's own axis, so we need to Leap a few seconds to catch up. Occasionally seconds are added to UTC to compensate for its drift from the Solar Mean Time or UT1. UTC (Coordinated Universal Time) is followed universally which approximates to UT1.

Who Will Be Impacted?

Anyone who relies on modern computing devices for their services and have strict time dependencies on it may be affected.

How Will You Be Impacted?

The 25th Leap reported plenty technology failures where the leap was not smooth. To avoid this, proper planning is required. Exact time for Leap is at GMT 23:59:59 on 30th June,2015.

The adding of a second to the Computer Systems gets complex. In systems, it may happen to report the earlier second '60' or may double show earlier second '59', this can create chaos and overprocessing CPUs.

Some Impact In 2012:

  • Delayed flights, manual check-in had to be conducted
  • System crashes were reported even by Reddit, LinkedIn etc. last year.

How To Deal?

  • Leap Smear-  It adds fractions of seconds from time to time during the preceding year instead of a single leap. Google takes this approach.
  • Check for instruction on your software partner websites and create a checklist of action items for smooth transition
  • If you of devices using PTP (Precision Time Protocol), there could be time manipulation,check with the providers
  • It is noted UNIX Systems are highly susceptible, check for fixes
  • Let your clocks go Out-Of-Sync. It's a serious option, US takes it. This can have a huge impact if it were to follow thereon as we might never have clocks in sync again.

Some Sites Guiding Fixes:

Cisco Products-

http://www.cisco.com/web/about/doing_business/leap-second.html#~ProductInformation

Linux Platforms -

https://access.redhat.com/articles/15145

Windows Platform-

https://support.microsoft.com/en-us/kb/909614

https://technet.microsoft.com/en-us/library/cc773013

Apple Platform-

https://developer.apple.com/library/ios/documentation/System/Conceptual/ManPages_iPhoneOS/man3/time2posix.3.html

Next Steps-The International Telecommunications Union will vote in November for abandoning the Leap Second. What are you views on this?

Read more…

Top Security Worskshops

IT GRC Workshop Session

  • Key Components and Architecture for GRC
  • How to Jumpstart your GRC program with freely available tools and content
  • Overview of Free Tools that you can use today
  • Complete Vendor and Technology Taxonomy
  • Customer Satisfaction based Rating of vendors along with Analysts opinion
  • Checklist to evaluate a GRC Vendor
  • CISOs who implemented GRC to share their real life experiences

Threat Intelligence Workshop

  • Key components (People, Process and Technology)
  • Threat Intelligence Maturity model
  • Threat Collection & Analysis eg. OSINT
  • Integrating Actionable Intelligence
  • Technology and Vendor Landscape

Identity & Access Management Workshop

  • Key Components And Architecture Of IAM
  • Example Reference Architecture In An Industry (Telecom & Financial Industry)
  • Complete Vendor and Technology Taxonomy
  • Customer Satisfaction based Rating of vendors along with Analysts opinion
  • Checklist to evaluate a IAM Vendor

Content Security(Web & Email) Workshop

  • Complete Vendor and Technology Taxonomy
  • Critical Capabilities Of Email
  • Critical Capabilities Of Web
  • Where Current Solutions Fail?
  • Future Scope/Expectations Of Content Security
  • Why 'SAAS Vs Not SAAS' ?
  • SWOT Analysis For Landscape


Data Loss Prevention Workshop

  • DLP Drivers
  • Types of DLP Solutions
  • Complete Vendor and Technology Taxonomy
  • Customer Satisfaction based Rating of vendors along with Analysts opinion
  • Checklist to evaluate a DLP Vendor
  • Key Learning from CISOs

Cloud Security & Cloud Access Security Brokers Workshop

  • Technology Taxonomy for Cloud Security
  • Key components of cloud security architecture
  • Blue print to build your cloud security program
  • Basics of Cloud Security Access Brokers

Key Advancement in Application Security

  • New Technologies like IAST,RASP
  • Vendor and Technology Taxonomy
  • Customer Satisfaction based Rating of vendors along with Analysts opinion

Top Talks

  • BSIMM: Key Learning from 100+ Enterprises on Building a Software Security Program
  • Critical Security controls while implementing SDN
  • Future of networking technologies – an incremental change or a disruptive
  • Using Predictive Analytics & Behavioural Economics for security decision making
  • Data Classification – The key ingredient for information security

Top CISO Security Checklist Presentation

 

  • IOT Adoption Checklist
  • IPV6 Adoption Checklist
  • Checklist For Evaluating A UTM Vendor
  • Enterprise Risk Management Checklist
  • IRM Vendor Selection Checklist
  • How To Utilize Full Power Of OSSEC And OSSIM
  • Checklist On Data Classification, Policy Formulation, Identification of Key words
  • Choosing MDM Vendor To Suit Requirements
  • Vendor Selection Framework For Integrating Threat Intelligence With SIEM
  • Checklist to choose a Mobile Device Management Solution

Launch CISO Platform Index

Index developed based on User Satisfaction Survey by CISOs who used the vendor product on different evaluation metrics. To know more click here

Example domains covered (partial list)-

  • Content Security (Web & Email)
  • DOS/DDOS Security
  • Identity & Access management
  • IT Governance, Risk & Compliance
  • Application Security (Testing)
  • Security Analytics/SIEM

Launch Taxonomy (Complete Vendor Landscape)

Get a holistic view of the major players in the security domains and the coverage each of them have to offer.

Partial Domains List to be covered

  • Content Security (Web & Email)
  • DOS/DDOS Security
  • Identity & Access management
  • IT Governance, Risk & Compliance
  • Application Security (Testing)
  • Security Analytics/SIEM
  • Cloud Security (CASB)
  • Threat Intelligence

Launch Technology Evaluation Checklist

A Comprehensive checklist to save you months of effort before floating an RFP everytime! Read More

Partial list of domains covered-

  • Checklist To Evaluate Content Security (Web & Email) Technology
  • Checklist To Evaluate DOS/DDOS Security Technology
  • Checklist To Evaluate Identity & Access Management Technology
  • Checklist To Evaluate IT Governance, Risk & Compliance Technology
  • Checklist To Evaluate Application Security (Testing) Technology

Top Panel Discussions

  • Wargame Simulation: We are breached- What next?
  • Managing Identity And Access In The Cloud & IOT: What Do We Need To Do Differently?
  • Selecting And Implementing The Right Risk Management Framework
  • Learning From Trenches: Moving To New Compliances PCI 3.0, ISO 27001:2013 And More..
  • What Worked And Did Not While Implementing Your Content Security Program?
  • Is Your DLP Really Working? How To Make It Work?
  • CISO Reporting Dashboard For The Board/CEO
  • Creating A Blueprint For Cloud Security In Your Organization
  • Beyond SIEM:Blueprint For Building Advanced Enterprise SOC

Round Tables / War Gaming & Strategy Simulation Exercise

  • Using Metrics to Manage the Risks & Application Security Investments
  • Creating your software security strategy using BSIMM
  • Strategy Roadmap For ERM
  • Hit By DDOS- What Next?
  • Dealing With Malware Attack

Top Technical Training

  • Cyber Forensics & Incident Response Training Cyber Course
  • Network Forensics & Practical Packet Analysis
  • Application Security Testing & Web Hacking

For More Details On Trainings click here

Read more…

Top 10 Mitigation steps in information security

A simple 4-step model to information security

  1. Maintaining & Monitoring IT resource/asset integrity 
  2. Preparing & Limiting damage/loss in the course of attack
  3. Proper Access control/Authentication & Authorization
  4. Secure Data Communication

Top 10 steps to mitigation

  1. Application Whitelisting
  2. Training & Awareness
  3. Proper Admin Privilege control & monitoring
  4. Anti-Virus File Recommendations for Cloud interactions
  5. Use of HIPSi.e.Host Intrusion Prevention System Rules
  6. Configure secure host baseline
  7. Web-Domain i.e. DNS Trusted Ratings
  8. Updated systems always
  9. Secure Architecture planning & revise
  10. Incident Log review and monitoring process setup

Courtesy: https://www.nsa.gov/ia/_files/factsheets/I43V_Slick_Sheets/Slicksheet_Top10IAMitigationStrategies_Web.pdf

Read more…

Top Talks from RSA Conference 2015 - San Francisco

We had a long and nice week at RSA Conference 2015 in San Franciso. Some of you might have missed the event or missed some of the good talks even though you were there. so we have handpicked the best of RSA  just for you.

Important Note:

  • All presentations are courtesy RSA and is presented as-is without any modification
  • Some of the descriptions below are taken from RSA website (www.rsaconference.com)
  • You need to Sign in/Sign up to view the detailed presentations. (It's free). You can also access all the presentations on the official website of RSA conference for free.

( Read more : Hottest Buzzword Trend Analysis from RSA Conference 2015- San Francisco )

Cyber Security Operations Center for Critical Infrastructure Protection

Critical Infrastructure elements are mostly major business assets, a sudden emergency without preparation is often not the right way. It can be planned, how is in the slide. Click here to view ppt

Threat Intelligence Is Like Three Day Potty Training

Along with 3 main elements being People, Process & Technology, learn the maturity model and its application. Click here to view ppt

Security Metrics That Your Board Actually Cares About

This is a question to all CISOs/CIOs, here's you answer or at least a base you can build on. Click here to view ppt

Don't Get Left In The Dust How To Evolve From CISO To CIRO

The security world is changing, so are the roles. From CISO to CIRO, the transition and its application find all. Click here to view ppt

Achieving Defendable Architectures Via Threat Driven Methodologies

The threat driven approach is a combination of threat analysis and intelligence, here go through the details. Click here to view ppt

Making Threat Intelligence Actionable with STIX

Find out the ways to implement threat intelligence in practice. Click here to view ppt

( Read more : 5 Security Trends from Defcon 2014 - The Largest Hacker Conference )

Implementing An Automated Incident Response Architecture

Have you not dreamt of a day when the issues didn't wake you up? It's time for automating the Incident Response! Click here to view ppt

Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain

Trace out the major areas of APT level entry and configure your SDNs to disrupt them. Click here to view ppt

Rapid Threat Modeling Techniques

DFD & STRIDE Techniques-how effective they are? Issues, customization & analysis tools are explained. Click here to view ppt

Westjets Security Architecture Made Simple: We Finally Got It Right

Cracking the Westjets Security Architecture in a simple way. Click here to view ppt

How To Avoid The Top Ten Software Security Flaws

What are the Top 10 Flaws and how you can not make it-all are given as a crisp brief

Click here to view ppt

Tools Of The Hardware Hacking Trade

Firmware to Chip-set, a hacker's mind is unwind while discovering the right tools for hardware hacks

Click here to view ppt

Cryptography Keynote Panel: Shamir, Rivest, Diffie et al

Panel discusses the latest advances in cryptography

More:  Want to be a infosec community contributor? Click here 

Read more…