We believe, isn't a single technology/solution but is a complex program which consists of people, process and technology. Sandboxing or any single technology can only provide partial protection against “real” advanced attacks. We suggest organizat
Featured Posts (265)
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Mobile Security at RSA Conference 2016.
RSA Conference held its 25th annua
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Incident Response & SIEM at RSA Conference 2016.
RSA Conference held its 2
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Cloud Security at RSA Conference 2016.
RSA Conference held its 25th annual
Application Security has emerged over years both as a market as well as a technology. Some of the key drivers had been the explosion in the number of applications (web and mobile), attacks moving to the application layer and the compliance needs. Fol
Identity Access Management (IAM) is a set of business policies, framework and processes which ensures the right person has access to the right asset/resources. Identity Access Management solutions can deliver intangible benefits that are revenue incr
Firewall in simple terms acts as a barrier to prevent unauthorized access or malicious traffic within a system or in a network. The rapid growth of new innovative technology and alongside with the massive growth of new security threat, the tradition
Below are Top 6 Reasons Why Data Loss Prevention/ Data Leakage Prvention (DLP) Fails:
- Lack of business/key-stakeholders involvement: Failure to include key stakeholders (Including Business and C-level executives) while defining requirements and fo
Session on Practical Demo of Collecting Threat Intel Using OSINT Tools Video by Sachin Deodhar.
( Read More: How To Benchmark A Web Application Security Scanner? )
More: Want to be a infosec community contributor? Click here
CISO Platform recognizes World's Top 100 IT Security Influencers who have/are impacting the information security industry's in various ways. This list includes top researchers, industry experts, leading entrepreneurs, a must follow for infosec indu
Wargame Strategy Simulation : Creating Action Items For Responding To A Breach In First 24 Hours Video by Paul Raines, Pravesh Sharma, Shirish Dandekar, Sunil Mehta.
It is very important to properly define the right Information Security Metrics for an organization to estimate the security structure and to communicate it efficiently to the Board level executives.There is a growing interest from the Board and the C
CASB Workshop Part 2 by Gaurav Bhatia:
- Technology Taxonomy For Cloud Security
- Key Components of Cloud Security Architecture
- Blue Print To Build Your Cloud Security Program
- Basics of Cloud Security Access Brokers
CASB Workshop Part 2 Video by Gaurav Bhati
Threat Intelligence Workshop by Bikash Barai:
- Key Components (People,Process and Technology)
- Threat Intelligence Maturity Model
- Threat Collection & Analysis
- Integrating Actionable Intelligence
- Technology & Vendor Landscape
( Read More: Beyond Secure Softw
Webinar on "Defusing Cyber Threats Using Malware Intelligence" Video by Arun Lakhotia.
- How a Malware can be source of intelligence about the attacker
- How Large scale, automated malware analysis to extract intelligence is feasible
- How Malware intelligenc
CASB Workshop Part 1 by Bikash Barai:
- Technology Taxonomy For Cloud Security
- Key Components of Cloud Security Architecture
- Blue Print To Build Your Cloud Security Program
- Basics of Cloud Security Access Brokers
Network Forensic Tools & Techniques Workshop by Tamaghna Basu:
- Introduction,Basic Protocol Analysis,
- Forensic Analysis Network/Web/Malware,
- Basic Packet Analysis Challenges
Network Forensic Tools & Techniques Workshop video by Tamaghna Basu:
Application Security Workshop Part 1 by Jitendra Chauhan:
- Web Attack Chaining
- Understanding IAST/RASP
- Realtime Polymorphism
Application Security Workshop Part 1 Video by Jitendra Chauhan:
What Is Bad USB?
The phenomenon of using the USB for malicious intent can be termed as Bad USB. USB Thumb Drives are the last considerations of malicious intent. However, if manipulated, they can takeover almost everything.
Some interesting demonstra
Governance, Risk and Compliance is sometimes a managerial step or a mandatory step to adhere with regulations & maintain compliant systems. It widely helps in Risk Management.
Some of the major components of IT GRC are:
- IT Policy Management
- IT Risk
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
Atlanta Chapter Meet: Build the Pen Test Maturity Model (Virtual Session)
- Description:
The Atlanta Pen Test Chapter has officially begun and is now actively underway.
Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …
- Created by: Biswajit Banerjee
- Tags: ciso, pen testing, red team, security leadership
