We heavily rely on references while taking a decision on adoption of a new technology or a product. However, there is no dedicated analysis of product leadership purely based on customer recommendation. From CISO Platform technology Analyst team, w
Featured Posts (251)
This is a fundamental principle of the data privacy jurisprudence that the organization cannot disclose personal information without having prior consent of the data subject unless it is required by law. Global data privacy laws imbibed this principl
There is a common misconception that cyber criminals and hacktivists only target large enterprises to reap a bumper. The reality is actually very different, recently published surveys reveal that
- 84% of Small and Medium Businesses had a security breac
Our dependence on E-services has increased tremendously. All such services have the usernames and Passwords. This is main gateway for entry in to systems. Apart from that, transactional passwords. Even the password with secured and digital certified
IT arena is like a security battle ground, where internet is fundamentally open considering the major far-ends like social media, mobility, cloud, virtualisation etc which leads to targeted attacks.
On any given day; any organisation can suffer irrepa
Jayantha Prabhu,CTO , Essar Group, talks to CISO Platform on the Top Security Trends that he feels, will define the future.
What do you think are the top technologies that will define the future?
As I see it, broadly the following technologies will
Is there anything common to Magic and Hacking? Is there a hacker in a magician? Is there a magician in a hacker?
In my personal journey, I adopted Magic first and later got acquainted with Hacking when I met my co-founder and started working on a prod
One of the most important functionality which we do in our day to day work is Vendor Management,or should I say how to do it effectively. Here are a few tips which I would recommend and if needed you can add as well:
1.Always do a thorough check of th
Hackers that use their skills for good are classified as "white hat." These white hats often work as certified "Ethical Hackers,"hired by companies to test the integrity of their systems. Others, operate without company permission b
Organizations across industry verticals shall adopt IAM as it has become the need of the hour.However IAM solution may not be able to address some of the requirements, due to limitations in the features it supports or lack of flexibility to customize
Is CISO responsible for secure cording or it should be handled by quality fuction.
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
CISO Platform Talks : Security FireSide Chat With A Top CISO or equivalent (bi-monthly)
- Description:
CISO Platform Talks: Security Fireside Chat With a Top CISO
Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.
We’ve had the privilege of…
- Created by: Biswajit Banerjee
- Tags: ciso, fireside chat
Playbook Round Table - London, Europe | Infosec Europe
- Description:
We are pleased to invite you to an exclusive roundtable series hosted by CISO Platform in partnership with FireCompass.
Date: June 2025
Venue: London, Atlanta, New York, San Francisco, Houston, Dubai, Riyadh, Doha
- Created by: Biswajit Banerjee
Fireside Chat With Rick Doten (VP - Information Security at Centene Corporation)
- Description:
We’re excited to bring you an exclusive fireside chat on "A CISO’s Guide on How to Manage a Dynamic Attack Surface" with Rick Doten (VP - Information Security, Centene Corporation) and Erik Laird (Vice President - North America, FireCompass). In this session, we’ll explore how top CISOs are tackling today’s rapidly expanding attack surface and what it takes to stay ahead of evolving threats in a cloud-first, AI-driven world.
As…
- Created by: Biswajit Banerjee
- Tags: ciso, attack surface management, rick doten, ciso guide
CISO Meetup at BlackHat Las Vegas 2025
- Description:
We are excited to welcome you to the CISO Meetup during BlackHat USA 2025 in Las Vegas! Join us for an exclusive networking, meaningful conversations, and community building with top CISOs and cybersecurity leaders from around the globe.
Meetup Details:
Location: Mandalay Bay, Las Vegas …
- Created by: Biswajit Banerjee
- Tags: ciso, black hat, black hat 2025, black hat usa