Last year, cybercriminals attacked the California-based Hollywood Presbyterian Medical Center, encrypting files crucial in running the hospital’s operating systems and demanding a ransome to restore them to working order. The scam worked – after 10 d
backup (2)
NAKIVO releases its much-awaited Backup & Replication solution v9.1. The new release takes data protection to a new level. The backup functionality extends to the untouched zones. The new release adds support for backup to tape and Linux Server Backu
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
Webinar On SRE/DevOps Lesson For Your SOC
- Description:
Register Here : https://info.cisoplatform.com/sre/devops-lesson-for-your-soc
Key Pointers:
- How does the security analyst role evolve?
- How security processes change in an ASO SOC?
- How automation reduces toil (and what is toil, anyway)?
Register Here : …
- Created by: pritha
Webinar - Q1 Entire Cybersecurity Industry
- Description:
Register Here : https://info.cisoplatform.com/q1-entire-cybersecurity-industry
Key Discussion Pointers:
- Zero signs of industry consolidation
- Digital Mercantilism is driving the growth in number of vendors
- Still no solution to the SolarWinds problem
Register Here : …
- Created by: pritha
Webinar On Stories From The Web3 Battlefield: A Hacker's Point Of View
- Description:
Register Here : https://info.cisoplatform.com/stories-from-the-web3-battlefield-a-hackers-point-of-view
Key Pointers:
- Key web3 security incidents
- What went right
- What went wrong
- How to make sure that it doesn’t happen to you
Register Here : …
- Created by: pritha
Webinar On Creating Scalable, Sustainable, Cybersecurity For Any Size Organization
- Description:
Register Here : https://info.cisoplatform.com/creating-scalable-sustainable-cybersecurity-for-any-size-organization
Key Pointers:
- Describe the relationship between the cybersecurity and IT Operations
- Assess organizational cybersecurity, GRC & operational readiness
- Successfully communicated with the C-Suite and to the Board on the…
- Created by: pritha