Social Network For Security Executives: Help Make Right Cyber Security Decisions
The scope of the project encompassing Business Units, Support Functions, 200+ Processes and 8500+ employees. The project was an outcome of the data pilferage risk envisaged in terms of sensitive customer information and financial data. The risk assessment took inputs from various avenues such as internal audits, external audits, risk event, control committees conducted with the Top Management, business requirement were driven by the…
ContinueAdded by Denise on November 29, 2019 at 3:30pm — No Comments
Here are some Tips To Evaluate Your Readiness Before Implementing Data Loss Prevention (DLP) Solution:
To draw true value from any DLP deployment an organization must first come up with a Data Loss Prevention specific policy to start with. The policy should clearly talk about…
Added by Denise on November 29, 2019 at 2:00pm — No Comments
Myth: – DLP is for IT and it is an IT Project | Truth: – DLP is for Business and it is a Business Project
DLP Solution is implemented by IT for the business with the close association of various business departments; DLP implementation requires strong upper management commitment and support, in-depth involvement of middle management, IT operation and business/data owners of various…
ContinueAdded by Denise on November 29, 2019 at 2:00pm — No Comments
Here is the list of my top 10 blogs on DLP solution, which you should go through if you are in-charge of creating, implementing and managing DLP program in your organisation.
A good small write up giving out some of the tips for building a business case for DLP in terms of…
ContinueAdded by pritha on November 28, 2019 at 5:30pm — No Comments
This article is a contribution by Chitranjan Kesari, AVP IT, Lodha Group for the information security community.
The need for flexibility, speed and information sharing means is mandatory to maintain a robust security arrangement that can protect the data and offer ability to stay connected. A reliable BYOD policy is required to help and safeguard our network. BYOD is to develop a policy that…
ContinueAdded by pritha on August 30, 2017 at 2:00pm — No Comments
Kotak Mahindra Bank has initiated the DLP implementation across all business units in a phased manner and the implementation was started 6 months ago with critical business units. The solution monitors all channels, viz. Internet, Email and End point.
1. Proper strategy and planning are vital for successful DLP implementation.
2. Get management support for the Project. Identify the critical business units considered for DLP implementation.
3. Get the data classification…
ContinueAdded by pritha on October 21, 2014 at 2:30pm — 2 Comments
About Project
The scope of the project encompassing Business Units, Support Functions, 200+ Processes and 8500+ employees. The project was an outcome of the data pilferage risk envisaged in terms of sensitive customer information and financial data. The risk assessment took inputs from various avenues such as internal audits, external audits, risk event, control committees conducted with the Top Management, business requirement were driven by the…
ContinueAdded by pritha on September 16, 2014 at 5:30pm — No Comments
The Data Leak Prevention Project was rolled out in Lanco Infratech Ltd
Added by pritha on June 24, 2014 at 8:00pm — No Comments
We are happy to announce the results of the annual survey of Security Implementation Status and Industry Benchmarking (CPSMM), in which 331 companies have participated. The data has been collected through the survey conducted online as well as during Top 100 CISO Awards. We have planned a series of interesting information which shall provide…
Added by pritha on January 31, 2014 at 1:00am — 3 Comments
2019
2018
2017
2016
2015
2014
2013
2012
1999
# Manageengine Adaudit Plus -vs- Netwrix Auditor
# Rapid7 Nexpose -vs- Tenable Network Security Nessus
# Algosec Firewall Analyzer -vs- Tufin Orchestration Suite
# Hp Arcsight Siem Solutionarcsight Express -vs- Splunk Enterprise Splunk Cloud Splunk Light
# Cisco Meraki Mx Appliances -vs- Fortinet Fortigate
# Cloud Access Security Broker
# Distributed Denial of Service
# Network Advanced Threat Protection
© 2019 Created by CISO Platform.
Powered by
Badges | Report an Issue | Privacy Policy | Terms of Service