NIST (5)
Writing not only functional but secure applications is not a new concept or idea that has taken the Industry by storm. However, many Government and Commercial Organizations are still not adhering to or requiring their Organizations to adopt, implemen
(Author : Chandra Prakash Suryawanshi, SVP- India & APAC at Aujas Networks Pvt. Ltd. )
Information security incident management if often a combination of technical controls, processes, communication strategy, detailed procedure and plan. The objecti
This article highlights the Threat Management Process in Incident Response and brings in the understanding of the Kill chain model. Excerpts have been taken from a session presented at SACON - The Security Architecture Conference. You can view the fu
COBIT, ISO/IEC 27001, NIST 800.53, PCI, oh my. The path to compliance is not a yellow brick road. IT professionals face a variety of security standards that they must meet simultaneously. This talk will present the NIST Open Security Controls Assessm
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
16th CISOPlatform 100 Awards
- Description:
16th CISO Platform, Top 100 Awards
Top 100 Awards is India's 1st & Oldest CISO Awards, happening on 17-18 October at Chennai, Mahabalipuram, India
Click here for the agenda & details: https://www.cisoplatform.com/top-100-ciso-awards-2024Click here to nominate: …
- Created by: Priyanka Aash