It cannot be argued that as the global march of digitization continues to grow unchecked, it has brought high convenience, shorter delivery times, cost-effectiveness, and unprecedented access to the customer base for the organizations. However, this
Blog (871)
My recent interview with Mark Byrne, from Cybx Security, covered a great range of cybersecurity questions, including new threats and solutions, Artificial Intelligence, DevSecOps, cybercrime, security impacts of Coronavirus, and the future of cybers
How do tech companies manipulate the way people think? What would a top-secret Russian agency do to affect the outcome of the US presidential elections? Can systems today analyze people’s behavior to the point where they can predict every move they’l
The scary truth
It's one of the biggest fears for an IT department. You have anti-malware agents on your desktops, you have scanning engines for incoming email, you have IPS/IDS systems, and you have even locked the permissions down on your file shar
Thought leaders within the IT community are beginning to view cybersecurity not just as part and parcel of the everyday cost of doing business, but as an enabler, a direct driver of business continuity and bottom line growth. This shift in perception
Watch Video: (Webinar) OS Security & Latest Attack Vectors
(Read more: Top 5 Big Data Vulnerability Classes)
Quick Glimpse-
A fairly technical content, highlighting the major interesting hardware threats, main intentions behind attacks, the trust
(Read More: Top 6 'Cloud Security' talks from RSA Conference 2016 (USA))
The Notorious 9 in Cloud Security by Moshe Ferber.
Cloud Computing presents major opportunities and benefits for the organization worldwide. It is scalable, flexible and eff
This talk will cover the concept of mis-using the hardware (x86 translation lookaside buffer) to provide code hiding and how the evolution of the Intel x86 architecture has rendered previous techniques obsolete and new techniques to perform TLB-split
Current Project Synopsis:
- Responsible for Information Security of next generation mobile and fixed broadband networks (LTE/WiFi/FTTx) with All-IP networks over a cloud based framework for B2C/B2B markets connecting 200 Million 4G LTE, 50 Million W
Vulnerability Management System was implemented as a practice within the Organization across the Global Business Unit (India, Middle East & Africa). The implementation included Vulnerability Assessment and Remediation. The assessment is made based
Fundamentally we associate branding with bragging ,thus embarrassment. Rather branding is what others think of you, a response to the stimulus you provide. Adityanath Jha(CEO Crayon Pictures, Former Global Head of Branding at infosys) shows a comp
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
CISO Platform Talks : Security FireSide Chat With A Top CISO or equivalent (Monthly)
- Description:
CISO Platform Talks: Security Fireside Chat With a Top CISO
Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.
We’ve had the privilege of…
- Created by: Biswajit Banerjee
- Tags: ciso, fireside chat
Live AI Demo - ChatGPT + Company Tools (MCP) = Data Leak: Agent-firewall Mitigations (Nov 12)
- Description:
Join us for a live AI Demo Talk on "ChatGPT + Company Tools (MCP) = Data Leak: Agent-firewall Mitigations" with Eito Miyamura, Co-Founder, EdisonWatch.
What You'll See :
- Walkthrough: how a crafted calendar entry can trigger an agent to surface private email content
- Threat model: the lethal trifecta (private data, untrusted input, external comms) and…
- Created by: Biswajit Banerjee
- Tags: ai, ciso, data leak, privacy, chatgpt
6 City Round Table On "New Guidelines & CISO Priorities for 2025" (Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata)
- Description:
We are pleased to invite you to an exclusive roundtable series hosted by CISO Platform in partnership with FireCompass. The roundtable will focus on "New Guidelines & CISO Priorities for 2025"
Date: December 1st - December 31st 2025
Venue: Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata
- Created by: Biswajit Banerjee
Round Table Discussion - Inside the Silent Battlefield: Lessons from the Shadows
- Description:
Inside the Silent Battlefield: Lessons from the Shadows: An exclusive, closed-door round-table for senior CISOs and security leaders
Date: December 4, 2025
Time: 8:00 AM – 5:30 PM
Venue: Aloft New Delhi AerocityJoin us for an immersive, high-level discussion exploring the evolving landscape of cyber-conflict in India and beyond. This intimate round-table, hosted by the CISO Platform,…
- Created by: Biswajit Banerjee
