Join Bikash Barai (co-founder CISOPlatform Community & FireCompass) and Dave Lawy (Co-founder Qun
CISO (87)
Learn About Top Breches, Attack Trends & Techniques And How To Defend Against Them. Our editorial team has handpicked the top sessions at Breach & Attack Summit held in Bangalore, Mumbai and Chennai. Here are the list of top sessions in Breach & Atta
In my new LinkedIn Learning class, I discuss the five biggest mistakes made by cybersecurity organizations, regardless of their size or stature, and how to manage risk more effectively to avoid costly blunders.
Do any of these cybersecurity organizati
I am looking forward to the upcoming 2022 Silicon Valley CIO Executive Leadership Summit in Mountain View CA on Oct 27th! HMG Strategy always puts on a great event for CIOs, CEOs and CISOs.
I am on a panel, moderated by Mark Egan, with David Hahn, an
In the next few years, the biggest challenge in cybersecurity won’t be dealing with a specific threat, but rather conveying a meaningful value proposition throughout the organization, and especially to the C-suite and board. It is key to the sustaina
CISO burnout is a serious issue and through this discussion, we try to find out the impact of this issue on organizations and individuals. The CISO role is operation intensive and gruelling. In most cases CISOs remain in an organisation for about 1 t
Keynotes From World-Renowned Industry Experts (Best Of The World) :
- "The state of security markets and changing buying priorities" by Maria Kussmaul - Head Security, Investment Banking | Wharton School
- "Q3 2021 Changes To The Entire IT Secur
The cybersecurity industry had challenges with bringing in new blood and facilitating the career growth. Misinformation has unfortunately played a part in making various roles appear unattainable, when we should be doing the opposite. We should be
Where should a CISO report into within an organization? No common standard exists as we can find them operating under many different organizations, including IT, Legal, the CTO, and CEO just to name a few.
In today’s video, I break down some of the
Watch Talk:
(Read more: 5 Best Practices to secure your Big Data Implementation)
BadUSB — On accessories that turn evil by Karsten Nohl
Karsten Nohl is a cryptographer and security researcher
This talk introduces a new form of malware that oper
CISO Platform 100, 2018 (India):
Applications for the Top 100 CISO Awards is open for 2018. Kindly fill in your responses asap.
We are very happy to announce that nominations are now open for the 7th Edition of Top 100 CISO Awards - India's 1st Securit
Securely Moving Data to the Cloud with Confidence and Customer Focus (RSA Conference)
This session will provide a deep dive of best practices to securely move customer data to the cloud through AWS, while keeping the customers’ interest top of mind. M
Building a Strategic Plan for Your Security Awareness Program (RSA Conference 2017)
The key to securing your employees behaviors is an effective strategic plan that is both realistic and supported by your leadership. Learn how other organizations are
Building a new SOC capability may involve lot of planning and would attract huge initial investment.
While there are multiple approaches to address this, given below are some of the simple steps one can follow:
1. Understanding Business Goals, type of
2018 started with our community meets for Security Priority Planning for 2018.. and through our live survey we gathered some interesting insights. Technologies that are part of Key Focus Area for a CISO in 2018 are Security Analytics, SOC Implementat
COBIT, ISO/IEC 27001, NIST 800.53, PCI, oh my. The path to compliance is not a yellow brick road. IT professionals face a variety of security standards that they must meet simultaneously. This talk will present the NIST Open Security Controls Assessm
There is a steep rise in interest from the Board & CEO of an organization to understand the security posture of their company. Partly because of the increasing pressure from the government regulators, stakeholders & discussions on the potential risk
The future of technology is at risk as there are not enough skilled cybersecurity workers to fulfill the demands for keeping digital technology secure, private, and safe to use. Some estimates predict there will be over 3 million unfilled positions
The video conference company Zoom has skyrocketed to new heights and plummeted to new lows in the past few weeks. It is one of the handful of communications applications that is perfectly suited to a world beset by quarantine actions, yet has fallen
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
16th CISOPlatform 100 Awards
- Description:
16th CISO Platform, Top 100 Awards
Top 100 Awards is India's 1st & Oldest CISO Awards, happening on 17-18 October at Chennai, Mahabalipuram, India
Click here for the agenda & details: https://www.cisoplatform.com/top-100-ciso-awards-2024Click here to nominate: …
- Created by: Priyanka Aash