cybersecurity (253)
Here's a list of World's Best and Most Popular IT Security Conferences. Details such as Tentative Time, Pass Price and Locations are mentioned so you can plan your Calendar.
Top IT Security Conferences In The World:
1. Black Hat
Claims to be the mo
At BlackHat Europe, Alexander Polyakov, CTO at ERPScan, and Mathieu Geli delivered a presentation detailing security issues and misconfigurations affecting the oil and gas industry. In the interview, they highlighted particular vulnerabilities in SAP
The Cyber Defense Matrix enables organizations to define clear categories for the range of products and services that are available in the marketplace to solve our various infosec problems. This model removes confusion around the security technologie
To understand the differences between terms like cyber security and information security is important because many banking regulatory bodies like Reserve bank of India, Hong Kong Monetary Authority, Monetary Authority of Singapore, etc. have asked ba
Speakers: Bikash Barai [ Co-Founder @FireCompass ] & Ravi Mishra [ Co-Founder & Product management @FireCompass ]
There is a steep rise in interest from the Board & CEO of an organization to understand the security posture of their company. Partly because of the increasing pressure from the government regulators, stakeholders & discussions on the potential risk
There has been much discussion of "software liability," and whether new laws are needed to encourage or require safer software. My presentation will discuss how -- regardless of whether new laws are passed -- a tidal wave of litigation over defective
DevSecOps, or the blending of an enterprise’s applications development with systems operations teams with collaboration of security has become a trendy IT topic. The new operating model is often employed in conjunction with Agile software development
In Cyber Security Maturity Report of Indian Industry (2017), we’ve researched the current cybersecurity maturity of Indian industry based on the kind of technical security controls they have in place against modern day attacks.
Cyber security is now
We have completed our selection of the final list of 50 emerging IT Security Vendors to look out for in 2017 from the 1500+ Vendors globally. Believe me this was not easy & we don’t claim this is exhaustive list as it probably will never be as we mi
- Cyber risks have evolved significantly over the last couple of years across industry sectors. Cybersecurity is a matter of growing concern as cyber-attacks cause loss of income, sensitive information leaks, and even vital infrastru
- Network Forensics is related to the monitoring and analysis of network traffic for the purposes of information gathering, legal evidence collection also to detect and identify any intrusion. Network investigation deals with volatile and dynamic da
As our world embraces a digital transformation, innovative technologies bring greater opportunities, cost efficiencies, abilities to scale globally, and entirely new service capabilities to enrich the lives of people globally. But there is a catch.
Cybersecurity will be hard pressed to take on the new challenges of bank managed digital currencies.
Banks are developing their own digital currencies. The introduction of Central Bank Digital Currencies (CBDC) is the beginning of an interesting tren
The United States and allies' national cyber response may soon be tested with the latest escalating conflict in the middle east. The U.S. conducted an airstrike that killed a revered Iranian general while in Iraq. This was in retaliation to a number
I am excited to join the development team for the U.S. National Institute of Standards and Technology (NIST) Smart Cities and Communities Framework (SCCF) with a focus on cybersecurity and privacy. The volunteer team is working to develop a comprehe
Vice magazine recently reported that the Avast anti-virus company was harvesting their customer’s browsing data and selling it to other companies. This included what sites, keyword searches, YouTube videos, and other data which showcased user’s acti
Privacy Day promotes the fundamental principles of being able to control your personal information and to raise awareness of the risks in our digital society. The advancement and adoption of communication technology have elevated this issue to a worl
New CPU Vulnerabilities Discovered
RIDL/ZombieLoad and L1DES/CacheOut are just the latest variants of vulnerabilities discovered in Intel CPU’s that target Micro-architectural Data Sampling (MDS) weaknesses. Discovered over 7 months ago, researchers r
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
CISOPlatform Breakfast Meetup @ San Francisco
- Description:
CISOPlatform is hosting Breakfast meetup @ San Francisco.
Topic: CISO Burnout & Stress Management: Addressing Through Mindfulness
Join us if you are interested.Register Here: https://www.cisoplatform.com/ciso-burnout-stress-management-roundtable
- Created by: pritha
CISOPlatform Breakfast Meetup @ Reston
- Description:
CISOPlatform is hosting Breakfast meetup @Reston
Topic: CISO Burnout & Stress Management: Addressing Through Mindfulness
Join us if you are interested.Register Here: https://www.cisoplatform.com/ciso-burnout-stress-management-roundtable
- Created by: pritha
CISOPlatform Breakfast Meetup @ Philadelphia
- Description:
CISOPlatform is hosting Breakfast meetup @Reston
Topic: CISO Burnout & Stress Management: Addressing Through Mindfulness
Join us if you are interested.Register Here: https://www.cisoplatform.com/ciso-burnout-stress-management-roundtable
- Created by: pritha
CISOPlatform Summit 2024
- Description:
CISOPlatform Summit: Stronger Together As A Community.
Join us on 30th May, Thursday, Shangri-La at Bangalore
Register Here : https://events.cisoplatform.com/cisoplatform-summit-2024
- Created by: pritha