All Articles (378)

Sort by

image.png?width=750

Session Brief

Includes threat hunting platform drivers, hunting styles, hunting maturity model (HMM), hunting strategy, data domains, data diversity, toolset diversity, kill chain, hunting process, data type & location, analytic technique, beacon,

Comments: 0

image.png?width=750

Session Brief

Includes Threat Modeling Basics, Approach, Purpose, Threat Vs Vulnerability, STRDE Framework, Threat Rating, Risk Analysis Model, DREAD, Countermeasures & more

About Speaker

Abhishek Datta - Head Of Technology, Appsecco

>> Pre-Regis

Comments: 0

image.png?width=750

Session Brief

Includes Architectural Methodologies, Major frameworks - Zachman & SABSA, challenges, CP - SSM, Key Elements, Threat Repository, NIST CSF & more

About Speaker

Bikash Barai is the co-founder of FireCompass, an AI assistant for IT Sec

Comments: 0

image.png?width=750

Session Brief

It includes Google Beyond Corp principles, Beyond Corp Architecture Components, Types Of Data, Data Processing Flow, Correlation, Exceptions, Deployment, 3rd party systems, Challenges & more

About Speaker

Arnab Chattopadhayay, Senio

Comments: 0

image.png?width=750

Session Brief

Dynamic, high-velocity DevOps production environments deliver impressive results to enterprises. Security Teams now need to catch-up and be effective immediately. This 4-hour lab, on Security Automation for DevOps teaches ways improve

Comments: 0

image.png?width=750

Session Brief

Adaptive Network Protocol (ANP) allows systems to share events with each other. When one system sees a threat, they all see it and can respond in a coordinated fashion. Your network can, quite literally, respond to a threat all on its

Comments: 0

image.png?width=750

Session Brief

Have you ever wanted to investigate a Windows and/or Linux breach but could not justify the 8 lakh rupees in software? This workshop will introduce attendees to Windows and Linux forensics using 100% free and open source software. Py

Comments: 0

image.png?width=750

Session Brief

Includes understanding IaaS, threats & risks of cloud computing, securing IaaS platforms, securing IaaS instances

About Speaker

Moshe Ferber is a renowned cloud security expert, frequent speaker at Defcon, BlackHat, RSA Conference &

Comments: 0


Thank you! Your registration is confirmed.

2017 CISO Platform Annual Summit

Next steps:

We will send you a confirmation mail with more details. Due to limited seats, we may not not be able to incorporate everyone.

For queries mail to contact@cisopl

Comments: 0

List 2018

Designation

Organization
Group CISO Aditya Birla Capital Ltd
AVP Risk Management, CISO Bharti AXA general insurance
Head Cyber Security Vodafone
AVP and Information Security Officer DSP BlackRock Investment Managers
CISO BSE
Comments: 0

Partial List of Past Attendee

ICICI Bank Xerox
Yes Bank Toshiba
Adobe Kuwait Oil Company
Infosys Robert Bosch
Deutsche bank Essar Oil
Royal Bank of Scotland Target
HSBC Technology India Ruby Mills
One Mobikwik Systems Pvt. Ltd. B
Comments: 0