Social Network For Security Executives: Network, Learn & Collaborate
SACON is India's 1st & Only Security Architecture Conference. With over 60 participants, this was the first year of SACON and here are a few highlights we wanted to share with you. It was held on 12th July, Ritz Carlton, Bangalore, India.
We had with us Top Security Industry Leaders who helped SACON with great content. For more details visit: sacon.io…
ContinueAdded by pritha on July 22, 2016 at 7:30pm — No Comments
Speaker: Bikash Barai, Co-Founder Cigital India ( Earlier iViZ )
Please Note - Speaker presentations…
ContinueAdded by pritha on July 20, 2016 at 5:30pm — No Comments
Speaker: Dr. Rajesh P. Deo, Senior Manager @Ernst&Young
*We suggest you use Chrome to view the slides, as the it may be inaccessible on other browsers like safari etc.
Please Note - Speaker presentations represent the views of the individual speakers…
ContinueAdded by pritha on July 20, 2016 at 5:30pm — No Comments
Speaker:Arnab Chattopadhyay, Senior Technical Director @MetricStream
*We suggest you use Chrome to view the slides, as the it may be inaccessible…
ContinueAdded by pritha on July 20, 2016 at 5:30pm — No Comments
Speaker: Bikash Barai, Co-Founder Cigital India ( Earlier iViZ )
Added by pritha on July 20, 2016 at 5:30pm — No Comments
Added by pritha on July 20, 2016 at 5:30pm — No Comments
Speaker: Ravi Mishra, Head Of Advisory @CISO Platform
Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Platform or their employers
Added by pritha on July 20, 2016 at 5:30pm — No Comments
Speaker: Nilanjan De, Principal Architect @Cigital
Added by pritha on July 20, 2016 at 5:30pm — No Comments
Ransomware is a type of malicious software (malware) when infected with encrypts all the important files such as documents, pictures, movie file etc with a virtually unbreakable encryption key. Here we have compiled some of the Good-reads blogs, articles, freely available Decryptors and removal kits to keep you up-to-date on the latest happenings in the Ransomware…
ContinueAdded by pritha on July 19, 2016 at 2:30pm — No Comments
Turbo Talks
How the Heartbleed bug was found?
Antti Karjalainen discoverer of Heartbleed
The Heartbleed bug was a catastrophic vulnerability in widely used OpenSSL TLS implementation. This talk will give background how the Heartbleed bug was found by Codenomicon. The mechanism…
Added by pritha on July 14, 2016 at 5:30pm — No Comments
We believe, isn't a single technology/solution but is a complex program which consists of people, process and technology. Sandboxing or any single technology can only provide partial protection against “real” advanced attacks. We suggest organizations to look at the complete stack of technologies mentioned below and build a holistic…
ContinueAdded by pritha on July 14, 2016 at 5:30pm — No Comments
2020
2019
2018
2017
2016
2015
2014
2013
2012
1999
Started by Maheshkumar Vagadiya Jul 30, 2020. 0 Replies 0 Likes
Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue
Started by CISO Platform. Last reply by Yogesh Nov 19, 2020. 2 Replies 0 Likes
(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue
Started by CISO Platform. Last reply by ANAND SHRIMALI May 20, 2020. 4 Replies 0 Likes
(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue
Started by CISO Platform. Last reply by Bhushan Deo Mar 20, 2020. 12 Replies 0 Likes
(question posted on behalf of a CISO member)Due to CORONA virus most of the organizations are allowing their employees to work form home.Has any one issued security advisory for work from home ?Continue
Tags: #COVID19
# Manageengine Adaudit Plus -vs- Netwrix Auditor
# Rapid7 Nexpose -vs- Tenable Network Security Nessus
# Algosec Firewall Analyzer -vs- Tufin Orchestration Suite
# Hp Arcsight Siem Solutionarcsight Express -vs- Splunk Enterprise Splunk Cloud Splunk Light
# Cisco Meraki Mx Appliances -vs- Fortinet Fortigate
# Cloud Access Security Broker
# Distributed Denial of Service
# Network Advanced Threat Protection
Follow us
© 2021 Created by CISO Platform.
Powered by
Badges | Report an Issue | Privacy Policy | Terms of Service