CP test page

Data Loss Prevention (DLP)

  • DLP Drivers
  • Types of DLP: Network, Endoint, Data Identification, Data leakage detection, Data at rest
    • Types of data-structured & unstructured
    • Data detection techniques
  • Pattern Macthing
  • Tagging & fingerprinting
    • When to choose which technology?
    • Pros and cons
  • Under the hood of AST Technologies
    • Monitoring, analyzing, log monitoring
    • Compliance
    • DLP tools
    • Security Architecture
    • Best Practices
  • CISO Platform Taxonomy of Vendors
  • Complete listing of DLP product vendors
  • Top Vendors as per CISO Platform Index
    • Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
  • Feature Comparison Matrix
  • TCO Analysis
  • Technology evaluation checklist
  • Key Learning
  • Case studies from CISOs and their key learning
  • Q&A

Application Security Testing

  • AST Drivers
  • Types of AST: DAST, SAST, IAST, RASP
    –When to choose which technology?
    –Pros and cons
  • Under the hood of AST Technologies
  • CISO Platform Taxonomy of Vendors
    –Complete listing of AST product vendors
  • Top Vendors as per CISO Platform Index
    –Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
  • Feature Comparison Matrix
  • TCO Analysis
  • Technology evaluation checklist
  • Key Learning
  • Case studies from CISOs and their key learning
  • Q&A

Identity & Access Management(IAM)

  • IAM Drivers
  • IAM  Authorization & Authentication
    • Security Assertion markup language (SAML) and WS-security
  • IAM Requirements
    • Compliance and regulatory issues
    • IAM governance and organizational issues
  • Implementation and Under the hood of IAM Technologies
    • Best practices for Implementation
    • Implementing  Enterprise IAM
    • Identity Management, Enterprise Access Management
    • Identity as a service architectures
    • Managing Users  in Cloud
  • CISO Platform Taxonomy of Vendors
    • Complete listing of IAM product vendors
  • Top Vendors as per CISO Platform Index
    • Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
  • Feature Comparison Matrix
  • TCO Analysis
  • Technology evaluation checklist  for IAM
  • IAM ROI
    • Making compelling business case for IAM
  • Key Learning
  • Case studies from CISOs and their key learning
  • Q&A

Governance Risk Management & Compliance (IT GRC)

  • GRC Drivers
  • GRC Components
    –Policy, Risk, Compliance, Audit, Vendor Risk, Threat & Vulnerability, Incident
    –GRC Content – Questionnaires, Controls, Policies, Procedures
  • CISO Platform Taxonomy of Vendors
    –Complete listing of GRC product vendors
  • Top Vendors as per CISO Platform Index
    –Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
  • Feature Comparison Matrix
  • TCO Analysis
  • Technology evaluation checklist
  • Key Learning
  • Case studies from CISOs and their key learning
  • Q&A

Security Information & Event management (SIEM)

  • SIEM Drivers
  • SIEM Coverage
    • Threat coverage/landscape
    • Evolving threats
  • SIEM Requirements
    • Compliance Requirements
    • Intersection of Threats and Compliance
  • Under the hood of SIEM Technologies
  • CISO Platform Taxonomy of Vendors
    • Complete listing of SIEM product vendors
  • Top Vendors as per CISO Platform Index
    • Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
  • Feature Comparison Matrix
  • TCO Analysis
  • Technology evaluation checklist
  • Key Learning
  • Case studies from CISOs and their key learning
  • Q&A

Malware Protection System /APT

  • MPS Drivers
  • Types of MPS Detection Techniques
    • Anomaly Based Technique
    • Specification Based Technique
    • Signature Based Technique
  • Under the hood of MPS Technologies
    • Sensor & Sandbox Deployment
  • Proof of concept (POC)
    • End to end analysis
    • Tools required
    • Rendering network harmless 
  • CISO Platform Taxonomy of Vendors
    • Complete listing of MPS product vendors
  • Top Vendors as per CISO Platform Index
    • Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
  • Feature Comparison Matrix
  • TCO Analysis
  • Technology evaluation checklist
  • Key Learning
  • Case studies from CISOs and their key learning
  • Q&A

Cloud Security

  • Cloud security Drivers
  • Types of Cloud security  Platoforms:
    • Cloud Management Platforms
    • When to choose which? Pros & Cons
  • Cloud security  techniques
    • Oauth
    • OpenID
    • Virtualization
  • Under the hood of Cloud Security Technologies
    • Cloud Security Standards
    • Cloud Data Protection Gateways
    • SaaS Platform Security Management
    • Data Center Storage Encryption
  • CISO Platform Taxonomy of Vendors
    • Complete listing of Cloud Security product vendors
  • Top Vendors as per CISO Platform Index
    • Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
  • Feature Comparison Matrix
  • TCO Analysis
  • Technology evaluation checklist
  • Key Learning
  • Case studies from CISOs and their key learning
  • Q&A

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform