CISO Platform Annual Summit, 2014 Highlights

CISO Platform Annual Summit @ Mumbai, last week saw over 250+ attendees for over 2 days making the the spirit of knowledge sharing and learning a huge success in the Information Security Executives of India. Here are the highlights of the awesome keynotes, electrocuting Turbo sessions and some great knowledge boost training sessions.

(Read more:  Under the hood of Top 4 BYOD Security Technologies: Pros & Cons)

Top Turbo Talks

After several requests for training sessions, this time we did it. For all with an eye for detail, took back a bag full of operational knowledge and in-depth insights.

  • How the Heartbleed bug was found?

    Antti Karjalainen discoverer of Heartbleed 

  • BadUSB — On accessories that turn evil

    Karsten Nohl is a cryptographer and security researcher

  • Bitcoin Transaction Malleability - An Insight

    Daniel Chechik

  • 5 Real ways to destroy business by breaking SAP Applications

    Alexander Polyakov ( The father of ERPScan )

  • A journey to protect POS

    Nir Valtman Discoverer of Point-of-Sale Vulnerabilities

  • Intrinsic Leadership

    Deb Maes Neuro-Linguistic Master Practitioner & Trainer

  • Cyber Safety in Cars and Medical Devices

    Beau Woods - Creator of IOT Security Framework

  • The notorious 9 in Cloud Security

    Moshe Ferber

  • More Shadow Walker- The Progression Of TLB-Splitting On X86

    Jacob Torrey - Discoverer of TLB-Splitting on x86

  • Ants and Elephants in the CISO's Office

    Paul Raines - CISO, United Nations Development Program

  • Embedding risk assessment into your project workstream

    Michael Calderin - Security Officer, Bupa Global Latin America

  • Application Security Best Practices

    Yuval Idan

  • Cyber Threat Alliance – Actionable Threat Intelligence

    Derek Manky

(Read more: Hardware Trojans: Sneak Peek into the Future)

Top Training Sessions

After several requests for training sessions, this time we did it. For all with an eye for detail, took back a bag full of operational knowledge and in-depth insights.

  • Defending Online Attacks on Cloud Instances

    Nir Valtman ( Discoverer of Point-of-Sale Vulnerabilities ) & Moshe Ferber ( Cloud Security Entreprenuer ) 

  • Building an Incident Management Program

    Paul Raines ( CISO @UNDP,ex-OPCW )

  • Fuzz Testing Techniques for Discovering Zero Days

    Antti Karjalainen ( discoverer of Heartbleed ) 

  • Implementing SAP security

    Alexander Polyakov ( The father of ERPScan )

  • Practical Forensics- Tools and Techniques

    Sachin Deodhar

  • Mobile Security

    Devesh Bhatt(Prominent Security Researcher) & Nutan Kumar

  • Spooky Threats and Selling Infosec

    Jacob Torrey - Discoverer of TLB-Splitting on x86

  • Implementation Guide for Big Data and Machine Learning

    Sayan Pathak (Microsoft)

  • Building a Threat Intelligence Organization: Tools,Techniques,Processes and Team Structure

    Derek Manky

(Read more:  BYOD Security: From Defining the Requirements to Choosing a Vendor)

More Turbo Sessions

  • Machine Learning in Information Security

    Arnab Chattapadhayay

  • Using Security Information & Analytics - As Actionable Intelligence

    Ahmed Qurram Baig

  • Operational Vulnerability Management Essentials using Open Source Tools

    Vikram Mehta

  • OSINT:Tools and Techniques for Open Source Threat Intelligence

    Sachin Deodhar

  • Zero day Vulnerability disclosure in Big Data (Hadoop )

    Jitendra Singh Chauhan 

Top Panel Discussions

Exploring and sharing the viewpoints in predefined security topics by the topmost CISOs allowed the community to grow together and leap forward into the future of security.

  • Managing the “Board” from CISO Perspective

    (Paul Raines, Bikash Barai, Nadir Bhalwani, Amit Pradhan, Venkatesh Subramaniam)

  • Prioritization, Dashboard and Metrics

    (Burgess Cooper, Rajiv Nandwani, Fal Ghancha, Sunil Mehta, Michael Calderin)

  • Managing Third party Vendor Risks

    (Arnab Chattopadhyay, Moshe Ferber, Pravesh Sharma, Ranjeet Mishra, Sirish Dandekar, Durga Dube, Jacob Torrey)

  • Learning from Failures

    (KS Narayanan, Nir Valtman, Beau Woods, Dhananjay Rokde, Mahesh Sonavane, Sudarshan Singh)

  • Future of CISO-Planning the career roadmap

    (Bikash Barai, Yuvnesh Modi, Amal Saha, ID Ganeshan, Arindam Roy, Deb Maes)

Top Round Table Discussions

Round Tables are more informal and aim at dissecting a particular security topic/concern etc.

  • Surviving data stealing security advanced attacks
  • Changing role of CISO-Staying ahead of threats in an era of constant change
  • Application Security as a business enabler
  • Managing DDOS-Practical tools and technologies
  • What's inside your software? Managing third party application security risk

(Read more: Hardware Trojans: Sneak Peek into the Future)

To find exclusive capture of the event - Click here

Views: 608

Join the Discussion ...

You need to be a member of CISO Platform to join the discussion!

Join CISO Platform

FireCompass

Forum

CISO as an enabler

Started by Maheshkumar Vagadiya Jul 30. 0 Replies

Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue

Has Anyone Evaluated Digital Signature (like Docusign)?

Started by CISO Platform. Last reply by SACHIN BP SHETTY Apr 24. 1 Reply

(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue

What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?

Started by CISO Platform. Last reply by ANAND SHRIMALI May 20. 4 Replies

(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue

[Please Suggest] Corona Virus: Security advisory for work from home

Started by CISO Platform. Last reply by Bhushan Deo Mar 20. 12 Replies

(question posted on behalf of a CISO member)Due to CORONA virus most of the organizations are allowing their employees to work form home.Has any one issued security advisory for work from home ?Continue

Tags: #COVID19

Follow us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service