All Articles (379)

Sort by

Pre-registration form

Please fill in the details to tentatively hold your seats. The passes are not guaranteed unless you make the payment. Filling the form is considered only as a form of expression of interest and not a binding commitment. In case

Comments: 0
8669936457?profile=original

Highlights Of Threat Intelligence  Workshop

Following is the high level overview of the Threat Intelligence Workshop

  • Threat Intelligence Maturity model
  • People
  • Process
  • Technology
  • Threat Collection & Analysis eg. OSINT
  • Integrating Actionable Intel
Comments: 0
8669935260?profile=original

Highlights Of Cloud Security Workshop & CASB

Following is the high level overview of the Cloud Security Workshop

  • Technology Taxonomy for Cloud Security
  • Key components of cloud security architecture
  • Blue print to build your cloud security program
Comments: 0

8669937272?profile=original

 

8669937460?profile=original

                                                                                                                                                                               

 

iViZ Security is a pioneer in providing cloud-based Web Application Penet

Comments: 0