Pritha's Blog – September 2014 Archive (5)

SIEM Tools: Implementation Guide and Vendor Evaluation Checklist

Current Project Synopsis:

  • Responsible for Information Security of next generation mobile and fixed broadband networks (LTE/WiFi/FTTx) with All-IP networks over a cloud based framework for B2C/B2B markets connecting 200 Million 4G LTE, 50 Million…

Added by pritha on September 16, 2014 at 6:30pm — 2 Comments

Data Leakage Protection (DLP) via email gateway and Regulated Internet access

About Project

The scope of the project encompassing Business Units, Support Functions, 200+ Processes and 8500+ employees. The project was an outcome of the data pilferage risk envisaged in terms of sensitive customer information and financial data. The risk assessment took inputs from various avenues such as internal audits, external audits, risk event, control committees conducted with the Top Management, business requirement were driven by the…


Added by pritha on September 16, 2014 at 5:30pm — No Comments

Information Security Infrastructure: Assessing and analyzing

The project scope is to perform a security assessment of the current environment of MBE including the major business processes, operating functions, organizational units and information systems and a thorough evaluation of the configuration and design of the existing network and systems infrastructure and main servers. Based on the assessment, need to define and implement the desired Information security architecture which protects the information base and aligns with the business…


Added by pritha on September 12, 2014 at 2:30pm — No Comments

A CISO Guide to Privilege Identity&Access Management(PIM) Implementation

Achieved Solution Benefits

To mitigate risk

  • Prevent access breaches through privileged accounts
  • Monitor activities carried out by privileged users
  • Enforce accountability for use of generic privileged accounts
  • Enforce granular…

Added by pritha on September 9, 2014 at 6:30pm — 1 Comment

Sneak Peek Into the Top Talks @ CISO Platform Annual Summit, 2014

Turbo Talks

How the Heartbleed bug was found?

Antti Karjalainen discoverer of Heartbleed

The Heartbleed bug was a catastrophic vulnerability in widely used OpenSSL TLS implementation. This talk will give background how the Heartbleed bug was found by Codenomicon. The…


Added by pritha on September 9, 2014 at 12:30pm — No Comments

Monthly Archives











© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service