List Of CISO Platform Task Force & Goals

Below are the few indicator topics upon which we will centre our discussion for different domains.

Cloud Security

  • How to assess the organizational need and readiness for cloud services
  • How to define the policies and controls for protection against risk in cloud services
  • How to evaluate the risk factors while opting for cloud services
  • How to evaluate cloud security providers
  • How to comply with regulations and standards and address data residency related concerns

Threat Modeling for Banking & Telcos

  • Understanding the various models of for conducting threat model
  • Practical use cases for threat modeling
  • Practical exercise of Threat Modeling for specific industry verticals
  • Threat Modeling for Banking Ecosystem (Only for participating banks)
  • Threat Modeling for Telcos (Only for participating telecom organizations)

SOC and SIEM

  • Learn how to architect your SOC or SIEM solution
  • Learn the benefits of moving from traditional SIEM to Security analytics
  • How to assess your organizational maturity for SIEM solutions?
  • How to evaluate SIEM vendors/tools
  • How to build Security and operations center
  • How to build incident response process and organization
  • Learn the Success and failure factors behind SIEM implementation from experts

Enterprise Mobility Security

  • Learn the taxonomy of EMM solution
  • How to architect your Mobility solution
  • How to apply data security policies to users/devices that frequent on and off your corporate network 
  • How to enable BYOD trend without compromising on the security of data and violating the regulatory mandates
  • How to evaluate different Mobility vendors/tools

iAM

  • How do you plan for IAM, PIM and PAM tool deployment in your organization 
  • How do you sell your idea to implement IAM solution to your management 
  • How do you evaluate IAM/PIM vendors and tools ?
  • How do you decide between the Multiple deployment options ?
  • How do you audit and report the actions of privileged users ?
  • What are the best practices, success and failure factors in IAM tool implementation ?
  • How do you measure the effectiveness of your IAM/PIM deployment

Data Security and DLP

  • How to do data classification ?
  • How to assess the organizational need and readiness for DLP solution
  • How to define requirements for selecting proper data security solution
  • How to evaluate a DLP vendor/Tool ?
  • What are the Success factors and failure factors in DLP implementation ?
  • How to define metrics to  measure the effectiveness of DLP tool ?

Advanced Persistent Threats

  • How do you deal with targeted and sophisticated attacks?
  • Critical capabilities for a APT solution and taxonomy
  • How do you prevent and respond to Ransomware attacks ?
  • How to you Identify and block complex javascript based attacks ?
  • What are the questions to ask APT vendor before selecting any APT solution ?
  • What metrics can be used to define & measure the effectiveness of your APT solution ?

DDOS attacks

  • How to Identify and remediate DDOS attacks ?
  • What are the different ways and tools to protect yourself from DDOS attacks ?
  • Critical capabilities for a DDOS security solution
  • How to evaluate DDOS vendors and tools ?
  • What are the best practices in implementing DDOS solution ?

Vendor risk management

  • Understanding the Vendor risks
  • How do you assess and manage the risk associated by the use of third party IT products and services ?
  • How to create a vendor risk management process and framework within your organization

SCADA Security

  • Understanding the risks and attack vectors for SCADA
  • Critical controls for SCADA security
  • Building a roadmap for securing SCADA

Enterprise Security Strategy

  • How to understands the Information Risk Model of your organization
  • Connecting the risks to controls using frameworks like COBIT
  • Building a roadmap and dashboard
  • Framework to present enterprise security strategy to management

IT GRC

  • Learn how to architect for GRC solution
  • How to Jumpstart your GRC program with freely available tools and content
  • Assess your organization's readiness for IT GRC solution
  • Learn to set up and  risk assessment workflow, risk acceptance process and IT risk metrics
  • Learn how to automate incidence response workflows
  • Learn to  measure and report compliance with regulation and other standards.
  • Critical capabilities for a IT GRC solution and taxonom
  • CISOs who implemented GRC to share their real life experiences
Votes: 0
E-mail me when people leave their comments –

Community Head, CISO Platform

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

CISO Platform Talks : Security FireSide Chat With A Top CISO or equivalent (Monthly)

  • Description:

    CISO Platform Talks: Security Fireside Chat With a Top CISO

    Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.

    We’ve had the privilege of…

  • Created by: Biswajit Banerjee
  • Tags: ciso, fireside chat

6 City Round Table On "New Guidelines & CISO Priorities for 2025" (Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata)

  • Description:

    We are pleased to invite you to an exclusive roundtable series hosted by CISO Platform in partnership with FireCompass. The roundtable will focus on "New Guidelines & CISO Priorities for 2025"

    Date: December 1st - December 31st 2025

    Venue: Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata

    >> Register Here

  • Created by: Biswajit Banerjee

Fireside Chat With Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.)

  • Description:

    We’re excited to bring you an insightful fireside chat with Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.) and Erik Laird (Vice President - North America, FireCompass). 

    About Sandro:

    Sandro Bucchianeri is an award-winning global cybersecurity leader with over 25…

  • Created by: Biswajit Banerjee
  • Tags: ciso, sandro bucchianeri, nab