Social Network For Security Executives: Network, Learn & Collaborate
Now that we have examined the differences between traditional firewalls and the next generation firewalls (NGFW), let's look at five of the top NGFW solutions from Cisco, CheckPoint, Fortinet, WatchGuard and Dell (SonicWALL).
It is important to note that these five vendors were selected as they were highlighted in the most recent industry reports; they're not the only NGFW vendors on the market today and enterprises have other…
ContinueAdded by Meghana P on June 10, 2019 at 2:00pm — No Comments
Businesses and organizations are fielding more & more next-generation Information Security technologies to reduce their risks as businesses leverage cloud capabilities and from advanced persistent threats. Unfortunately, we see our customers falling into a common Information Technology and general acquisition trap: Significantly underestimating the complexity, cost, and time to complete the Next Generation Firewall (NGFW)…
ContinueAdded by Meghana P on April 4, 2019 at 2:27pm — No Comments
How Google Protects Its Corporate Security Perimeter without Firewalls (RSA Conference 2017)
The increasing mobility of professional users has brought an end to the traditional corporate security perimeter. Google has reinvented its security perimeter around devices through its ground breaking "BeyondCorp" initiative. In this talk, two Google security leaders will share how this transformation took place,…
ContinueAdded by Meghana P on May 4, 2017 at 11:00am — No Comments
Cybersecurity vs. Tokenization (RSA Conference 2017)
Tokenization is the latest data protection method, but does it help or hinder cybersecurity-this is the current debate. This session will look at who, what, where, when, how and why of using tokens.
Detailed Presentation:…
ContinueAdded by Meghana P on May 4, 2017 at 11:00am — No Comments
Hacking Blockchain (RSA Conference)
Bitcoin has exploded in popularity and skyrocketed in value. Proponents of blockchain, the technology that makes cryptocurrency possible, now want to apply it to a wide range of other applications like identity management, verifiable records and digital assets such as stocks. Is the industry building new systems on a cryptographically…
ContinueAdded by Meghana P on May 4, 2017 at 11:00am — No Comments
IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and Cloud (RSA Conference 2017)
In this technical deep dive, Email Isaakian will explain the details of the protocol, cryptography, key management and vulnerabilities mitigated by MAC Sec/ESS. Additionally he'll show use cases to show how to successfully deploy MAC Sec/ESS technologies (Network Encryptors + NVF) to protect your WAN (MPLS, PBBN, Carrier…
ContinueAdded by Meghana P on May 4, 2017 at 11:00am — No Comments
Client side encryption without knowing its limits is a ticking time bomb! (RSA Conference 2017)
Cloud and mobile computing give room to an unprecedented level of access points into corporate data leaving you to rethink how to protect it. Client-side encryption is increasingly being used as a solution. While it solves the problem of unauthorized access, it is still in its infancy and has many limitations and…
ContinueAdded by Meghana P on May 4, 2017 at 11:00am — No Comments
Open Security Controller - Security Orchestration for OpenStack (RSA Conference 2017)
Open Security Controller enables orchestration of multiple security functions in an OpenStack DC. OSC integrates with multiple SDN controllers and Security VNFs to automate protection of DC resources.
Detailed…
ContinueAdded by Meghana P on May 4, 2017 at 11:00am — No Comments
The Strategic Advantage of Adaptive Multi-Engine Advanced Threat Protection (RSA Conference 2017)
The dramatic rise in malicious code designed to evade detection, specifically from network sandboxes, caused industry analysts to suggest the deployment of multiple network sandboxes for the same network. Learn how to maximise protection from advanced persistent threats by using multiple security…
ContinueAdded by Meghana P on May 4, 2017 at 11:00am — No Comments
ghting Cybercrime Using the Blockchain (RSA Conference 2017)
Bitcoin is sometimes described as the “currency of criminals,” and we all see stories about how criminals use bitcoin to move money and extract ransoms. But did you know that law enforcement also uses the blockchain—bitcoin’s distributed, immutable, permanent record of transactions—to investigate cybercrime? Come learn more about how…
ContinueAdded by Meghana P on May 4, 2017 at 11:00am — No Comments
Intelligence-Led Security: Powering the Future of Cyber-Defense (RSA Conference 2017)
A new class of intelligence-led security is powering the future of cyber-defense, driven by deeper and broader visibility into the attacker ecosystem. This session will look at how intelligence is influencing the development of security products/services and how defenses will benefit from the integration of…
ContinueAdded by Meghana P on May 4, 2017 at 10:30am — No Comments
A Vision for Shared, Central Intelligence to Ebb a Growing Flood of Alerts (RSA Conference 2017)
Despite the positive advancements in machine learning and intelligence, security professionals remain overwhelmed. How is it that we keep wasting time and energy on analyzing and assembling the information presented by our supposedly “intelligent” solutions? This session will explore a conjoint…
ContinueAdded by Meghana P on May 4, 2017 at 10:30am — No Comments
Keeping Up with the Adversary: Creating a Threat-Based Cyber-Team (RSA Conference 2017)
With advanced cyber-actors evolving quickly and becoming more stealthy, it has become imperative to question the status quo of our existing cyber-operations. This session will outline how a case study and incident response led to changes in focus and philosophy and how that changed the structure of Defensive Cyber…
ContinueAdded by Meghana P on May 4, 2017 at 10:30am — No Comments
A Fully Automated SOC: Fact or Fiction (RSA Conference 2017)
Organizations continuously look to drive more value with less resources for their security operations. The deluge of data and lack of skilled security professionals highlight the critical need for automation to help manage today’s sophisticated attacks, but is it feasible to automate everything? HPE Security will discuss the potential for security…
ContinueAdded by Meghana P on May 4, 2017 at 10:30am — No Comments
Isolating the Ghost in the Machine: Unveiling Post Exploitation Threats (RSA Conference 2017)
During the past year IR teams and security researchers around the world witnessed a rise in the use of legitimate tools and common scripts in malware and APT attacks. This talk will explore the presenters’ research that focused on automating the analysis of PowerShell and Macro/VBA/VBS attacks by building a…
ContinueAdded by Meghana P on May 4, 2017 at 10:30am — No Comments
Your Sector Doesn’t Matter: Achieving Effective Threat Prioritization ( RSA Conference 2017)
Many organizations’ security functions determine what threats they care about based on what threats are known to be affecting their sector, or comparably simple criteria. In reality, this approach is poorly suited to dealing with the significant security issues of today. Malicious actors scope their victims based on…
ContinueAdded by Meghana P on May 4, 2017 at 10:30am — No Comments
The Human Exploitation Kill Chain (RSA Conference 2017)
Whenever a user falls victim to a phishing or other social engineering attack, or makes an error, critics claim awareness efforts are useless. However, if a single user action can compromise an entire security program, the problem is the security program. This presentation will detail how technology, process and awareness should combine to stop human…
ContinueAdded by Meghana P on May 4, 2017 at 10:30am — No Comments
Lessons from Billions of Breached Records (RSA Conference 2017)
What motivates attackers to dump data publicly? How is it sold, traded and redistributed? These are questions the presenter dealt with while running the ethical data breach search service “Have I been pwned.” This talk will share the lessons from working with more than a billion publicly dumped records and provide a unique inside look at security…
ContinueAdded by Meghana P on May 4, 2017 at 10:30am — No Comments
Weaponizing Intelligence: Interdiction in Today’s Threat Landscape (RSA Conference 2017)
The threat environment is evolving every single day. As adversaries find more efficient and effective ways of making money they will reinvest that money to create more advanced and evasive malware. Disrupting that economy is key. This talk will focus on moving from gathering threat intelligence toward providing consistent…
ContinueAdded by Meghana P on May 4, 2017 at 10:30am — No Comments
Achieving and Measuring Success with the Security Awareness Maturity Model (RSA Conference 2017)
Far too often security awareness officers are not sure what stage their awareness program is at, what success looks like or what path to take to achieve their goals. Learn how others have used the proven Security Awareness Maturity Model to build, maintain and measure a mature awareness…
ContinueAdded by Meghana P on May 4, 2017 at 10:30am — No Comments
Started by Maheshkumar Vagadiya Jul 30, 2020. 0 Replies 0 Likes
Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue
Started by CISO Platform. Last reply by Yogesh Nov 19, 2020. 2 Replies 0 Likes
(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue
Started by CISO Platform. Last reply by ANAND SHRIMALI May 20, 2020. 4 Replies 0 Likes
(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue
Started by CISO Platform. Last reply by Bhushan Deo Mar 20, 2020. 12 Replies 0 Likes
(question posted on behalf of a CISO member)Due to CORONA virus most of the organizations are allowing their employees to work form home.Has any one issued security advisory for work from home ?Continue
Tags: #COVID19
# Manageengine Adaudit Plus -vs- Netwrix Auditor
# Rapid7 Nexpose -vs- Tenable Network Security Nessus
# Algosec Firewall Analyzer -vs- Tufin Orchestration Suite
# Hp Arcsight Siem Solutionarcsight Express -vs- Splunk Enterprise Splunk Cloud Splunk Light
# Cisco Meraki Mx Appliances -vs- Fortinet Fortigate
# Cloud Access Security Broker
# Distributed Denial of Service
# Network Advanced Threat Protection
Follow us
© 2021 Created by CISO Platform.
Powered by
Badges | Report an Issue | Privacy Policy | Terms of Service