We believe, isn't a single technology/solution but is a complex program which consists of people, process and technology. Sandboxing or any single technology can only provide partial protection against “real” advanced attacks. We suggest organizat
Featured Posts (246)
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Mobile Security at RSA Conference 2016.
RSA Conference held its 25th annua
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Incident Response & SIEM at RSA Conference 2016.
RSA Conference held its 2
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Cloud Security at RSA Conference 2016.
RSA Conference held its 25th annual
Application Security has emerged over years both as a market as well as a technology. Some of the key drivers had been the explosion in the number of applications (web and mobile), attacks moving to the application layer and the compliance needs. Fol
Identity Access Management (IAM) is a set of business policies, framework and processes which ensures the right person has access to the right asset/resources. Identity Access Management solutions can deliver intangible benefits that are revenue incr
Firewall in simple terms acts as a barrier to prevent unauthorized access or malicious traffic within a system or in a network. The rapid growth of new innovative technology and alongside with the massive growth of new security threat, the tradition
Below are Top 6 Reasons Why Data Loss Prevention/ Data Leakage Prvention (DLP) Fails:
- Lack of business/key-stakeholders involvement: Failure to include key stakeholders (Including Business and C-level executives) while defining requirements and fo
Session on Practical Demo of Collecting Threat Intel Using OSINT Tools Video by Sachin Deodhar.
( Read More: How To Benchmark A Web Application Security Scanner? )
More: Want to be a infosec community contributor? Click here
CISO Platform recognizes World's Top 100 IT Security Influencers who have/are impacting the information security industry's in various ways. This list includes top researchers, industry experts, leading entrepreneurs, a must follow for infosec indu
Wargame Strategy Simulation : Creating Action Items For Responding To A Breach In First 24 Hours Video by Paul Raines, Pravesh Sharma, Shirish Dandekar, Sunil Mehta.
It is very important to properly define the right Information Security Metrics for an organization to estimate the security structure and to communicate it efficiently to the Board level executives.There is a growing interest from the Board and the C
CASB Workshop Part 2 by Gaurav Bhatia:
- Technology Taxonomy For Cloud Security
- Key Components of Cloud Security Architecture
- Blue Print To Build Your Cloud Security Program
- Basics of Cloud Security Access Brokers
CASB Workshop Part 2 Video by Gaurav Bhati
Threat Intelligence Workshop by Bikash Barai:
- Key Components (People,Process and Technology)
- Threat Intelligence Maturity Model
- Threat Collection & Analysis
- Integrating Actionable Intelligence
- Technology & Vendor Landscape
( Read More: Beyond Secure Softw
Webinar on "Defusing Cyber Threats Using Malware Intelligence" Video by Arun Lakhotia.
- How a Malware can be source of intelligence about the attacker
- How Large scale, automated malware analysis to extract intelligence is feasible
- How Malware intelligenc
CASB Workshop Part 1 by Bikash Barai:
- Technology Taxonomy For Cloud Security
- Key Components of Cloud Security Architecture
- Blue Print To Build Your Cloud Security Program
- Basics of Cloud Security Access Brokers
Network Forensic Tools & Techniques Workshop by Tamaghna Basu:
- Introduction,Basic Protocol Analysis,
- Forensic Analysis Network/Web/Malware,
- Basic Packet Analysis Challenges
Network Forensic Tools & Techniques Workshop video by Tamaghna Basu:
Application Security Workshop Part 1 by Jitendra Chauhan:
- Web Attack Chaining
- Understanding IAST/RASP
- Realtime Polymorphism
Application Security Workshop Part 1 Video by Jitendra Chauhan:
What Is Bad USB?
The phenomenon of using the USB for malicious intent can be termed as Bad USB. USB Thumb Drives are the last considerations of malicious intent. However, if manipulated, they can takeover almost everything.
Some interesting demonstra
Governance, Risk and Compliance is sometimes a managerial step or a mandatory step to adhere with regulations & maintain compliant systems. It widely helps in Risk Management.
Some of the major components of IT GRC are:
- IT Policy Management
- IT Risk
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
Best Of The World Talks With Anton Chuvakin (Security Advisor at Office of the CISO, Google Cloud)
- Description:
We are hosting an exclusive Best of the World Talks session on "Practical AI In Cybersecurity" featuring Anton Chuvakin (Security Advisor at Office of the CISO, Google Cloud) & David Randleman (Field CISO at FireCompass).…
- Created by: Biswajit Banerjee
16th CISO Platform Top 100 Awards, 2025
- Description:
16th CISO Platform, Top 100 Awards 2025Top 100 Awards is India's 1st & Oldest CISO Awards, happening on February 21st 2025 at Bengaluru, Karanataka, India.
Nominate Yourself: Click Here
- Created by: Biswajit Banerjee