Social Network For Security Executives: Help Make Right Cyber Security Decisions
For years, enterprises and the security community have debated whether the cloud is more secure or less secure than the datacenter. Always a strawman argument, now that debate becomes moot. The cloud is here to stay. And the job now is to operationalize security across the datacenter and into the cloud architecture, fully…Continue
Added by CISO Platform on January 27, 2016 at 2:00pm — No Comments
Session on Practical Demo of Collecting Threat Intel Using OSINT Tools Video by Sachin Deodhar.
( Read More: How To Benchmark A Web Application Security Scanner? )…Continue
Added by Gireesh Kumar on January 19, 2016 at 3:30pm — No Comments
Identity and Access Management Workshop by Manjula Sridhar:
Added by Gireesh Kumar on January 13, 2016 at 6:00pm — No Comments
Wargame Strategy Simulation : Creating A Successful Evaluation & Implementation Checklist For IT GRC Solution Video by Ajay Agarwal,Nadir Bhalwani,Aditya Sarangapani,Sudarshan Singh.
( Read More: Using 80/20 Rule In Application Security Management )…Continue
Added by Gireesh Kumar on January 12, 2016 at 5:00pm — No Comments
CISO Platform recognizes World's Top 100 IT Security Influencers who have/are impacting the information security industry's in various ways. This list includes top researchers, industry experts, leading entrepreneurs, a must follow for infosec industry. The list will be declared in 4 parts each with 25 Top Influencers, this is the first…
Added by pritha on January 8, 2016 at 2:30am — No Comments