September 2015 Blog Posts (8)

Webinar on "Defusing Cyber Threats Using Malware Intelligence"

Webinar on "Defusing Cyber Threats Using Malware Intelligence" Video by Arun Lakhotia.

  • How a Malware can be source of intelligence about the attacker
  • How Large scale, automated malware analysis to extract intelligence is feasible
  • How Malware intelligence can aid defuse targeted attacks

( Read more:  …

Continue

Added by Gireesh Kumar on September 29, 2015 at 2:30pm — No Comments

Workshop: CASB - Part 1

CASB Workshop Part 1 by Bikash Barai:

  • Technology Taxonomy For Cloud Security
  • Key Components of Cloud Security Architecture
  • Blue Print To Build Your Cloud Security Program
  • Basics of Cloud Security Access Brokers…

Continue

Added by Gireesh Kumar on September 28, 2015 at 5:30pm — No Comments

Webinar on "Front Door Access to Pwning Millions of Android Devices"

Webinar on  "Front Door Access to Pwning Millions of Android Devices" Video by Avi Bashan.

  • Learn about Android certificate & permission framework including the roles of Google, OEMs, & mobile carriers. 
  • Overview of the Mobile Remote Support Tools Architecture (mRST) implementation and flaws & how it correlates to the Android architecture. 
  • Explain how these certifi-gate vulnerabilities can be exploited, the implications on enterprise…
Continue

Added by Gireesh Kumar on September 22, 2015 at 3:30pm — No Comments

Wargame : Dashboard & Metrics For The Management

Wargame : Dashboard & Metrics For The Management Video by Renu Rajani,Sridhar Govardhan,Raghu Kumar Paruchuri,Tamaghna Basu.

Added by Gireesh Kumar on September 11, 2015 at 7:00pm — No Comments

Workshop: Application Security - Part 2

Application Security Workshop Part 2 by Nilanjan De:

  • Web Attack Chaining
  • Understanding IAST/RASP
  • Realtime Polymorphism…

Continue

Added by Gireesh Kumar on September 11, 2015 at 6:30pm — No Comments

Workshop: Application Security-Part 1

Application Security Workshop Part 1 by Jitendra Chauhan:

  • Web Attack Chaining
  • Understanding IAST/RASP
  • Realtime Polymorphism

Application Security Workshop Part 1 Video by Jitendra Chauhan:…

Continue

Added by Gireesh Kumar on September 9, 2015 at 7:30pm — No Comments

Workshop: Network Forensic Tools & Techniques

Network Forensic Tools & Techniques Workshop by Tamaghna Basu:  

  • Introduction,Basic Protocol Analysis,
  • Forensic Analysis Network/Web/Malware,
  • Basic Packet Analysis Challenges…

Continue

Added by Gireesh Kumar on September 9, 2015 at 7:00pm — No Comments

Analysis Report: Cyber Attack & Incident Data, 2015

IBM Managed Security Services continuously monitors billions of events per year, as reported by more than 8,000 client devices in over 100 countries. This report is based on data IBM collected between 1 January 2014 and 31 December 2014 in the course of monitoring client security devices as well as data derived from responding to and performing analysis on cyber attack incidents. Because our client profiles can differ significantly across industries and company…

Continue

Added by CISO Platform on September 9, 2015 at 4:30pm — No Comments

Monthly Archives

2020

2019

2018

2017

2016

2015

2014

2013

2012

1999

FireCompass

Forum

CISO as an enabler

Started by Maheshkumar Vagadiya Jul 30. 0 Replies

Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue

Has Anyone Evaluated Digital Signature (like Docusign)?

Started by CISO Platform. Last reply by SACHIN BP SHETTY Apr 24. 1 Reply

(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue

What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?

Started by CISO Platform. Last reply by ANAND SHRIMALI May 20. 4 Replies

(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue

[Please Suggest] Corona Virus: Security advisory for work from home

Started by CISO Platform. Last reply by Bhushan Deo Mar 20. 12 Replies

(question posted on behalf of a CISO member)Due to CORONA virus most of the organizations are allowing their employees to work form home.Has any one issued security advisory for work from home ?Continue

Tags: #COVID19

Follow us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service