Featured Posts (265)
The intent of using IT Governance Risk Compliance (IT GRC) tools and capabilities is to report and manage IT Risks. We will study the critical platform capabilities for IT GRC Tools.
Critical Platform Capabilities In IT GRC Solution
- IT Risk Mana
Watch Video: (Webinar) Intelligence Driven Security - SIEM & Beyond
( Read more: Checklist to Evaluate a DLP Provider )
What will you Learn:
- How to gain Complete Visibility, Rapid investigations, SIEM and beyond
- How added packet collection and
The latest RBI circular highlights the importance of safety in digital payments. As a part of CISO Platform’s next BFSI webinar in association with FireCompass, we covered how safety in digital payments is changing and what the new regulations me
As technological advances create business opportunities for businesses, they also present huge security risks of information of the same businesses. According to the U.K. government’s Cybersecurity Breaches Survey 2019, 32% of UK businesses reported
[Posted on Behalf of Gary Hayslip CISO Softbank Investment advisor]
Over the years in my career, I have heard some variation of this question from many of my peers. Usually, the discussion starts over a cold beverage as we catch up and discuss ho
With Ransomware attacks becoming increasingly frequent, we thought of putting together a list of technologies that can help organizations protect themselves against ransomware attacks. Please note that even though this blog discusses technology meas
The cybersecurity industry is consumed with scale and effectiveness of one of the biggest hacks in recent memory. The emerging narrative and stories are missing important pieces of the puzzle. The attackers, likely a nation-state, gained unpreceden
You may not have the resources to employ an army of white-hat hackers to stress test your security infrastructure; most organizations don’t. However, you want to make sure that the resources you do have are used in the most effective way.
It’s smart t
In today's rapidly changing environment, threat actors are using an arsenal of new and sophisticated techniques that make attacks unrecognizable. With a plethora of products and a rapidly shifting landscape of threat and risk, cybersecurity remains
In our recent CISO Platform Fireside chat in association with FireCompass, we had Matthew Rosenquist, CISO Eclipz, and Bikash Barai, Co-Founder, FireCompass, who discussed a bunch of things related to the cybersecurity practices that are gaining mo
Counting down to the absolutely worst cybersecurity strategies. Sadly, these are all prevalent in the industry. Many organizations have failed spectacularly simply because they chose to follow a long-term path that leads to disaster. You know who you
FireCompass is conducting a two-day Hands-on workshop on “Shifting from Pentest to Continuous Automated Red Teaming (CART)” @ Best In the world Of Security Summit - 2020
CISO Platform Virtual Conference brings together the be
Hello,
We're excited to bring to you some awesome security minds who generously contributed to make security knowledge accessible to the community. We're giving free passes for the community. We request you to tag your security peers and everyone to
This is a Cheat Sheet for Security and Risk Management for the CISSP Exam created by Comparitech.
For reference click here
I am highly excited to tell you the 'Call For Speakers' for 'Best Of The World In Security' Conference is now open
We are more excited because now is the time when we will receive your innovation, those billions of papers and the most exciting hacks
Boston October 14, 2020 - FireCompass today unveils its new artificial intelligence-powered Continuous Automated Red Teaming (CART) platform that mimics thousands of hackers trying to break into an organization. The solution enables organizations to
This is a Cheat Sheet for Security Assessment & Testing for the CISSP Exam created by Comparitech. For reference click here
A report by Frost & Sullivan found that more than 80% of survey respondents admit to using non-approved applications in their jobs.If you don’t know what to protect, then you cannot protect.
Creating an asset inventory is the first step of any cyber
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
Atlanta Chapter Meet: Build the Pen Test Maturity Model (Virtual Session)
- Description:
The Atlanta Pen Test Chapter has officially begun and is now actively underway.
Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …
- Created by: Biswajit Banerjee
- Tags: ciso, pen testing, red team, security leadership
