The discussion centers on the evolving role of CISOs in the wake of significant cybersecurity incidents, such as the SolarWinds breach. The conversation explores the responsibilities of CISOs, the interaction between different departments, and the ne
fireside chat (131)
Welcome to today’s webinar on the CESA platform. We are exploring the critical and contentious legal implications of the SEC's enforcement action against SolarWinds and its CISO, Timothy Brown. This case has ignited significant debate within the cybe
Welcome to today’s webinar on the CESA platform. We're exploring the legal and professional implications of the SEC's enforcement action against SolarWinds and its CISO, Timothy Brown. This discussion has ignited significant debate within the cybers
Welcome to today's webinar on the CESA platform. We're discussing the significant legal and professional implications arising from the SEC's enforcement action against SolarWinds and its CISO, Timothy Brown. This topic has sparked intense debate wit
In today's webinar, we delve into the legal implications and ramifications stemming from the SEC's enforcement action against SolarWinds and its Chief Information Security Officer (CISO), Timothy Brown. This case has significant implications for cybe
The recent enforcement action by the SEC against SolarWinds' CISO has sparked significant debate within the cybersecurity industry. This unprecedented move has set a precedent that raises important questions about regulatory governance, enforcement
Gregory Pickett, the speaker, extends gratitude to the audience and opens the floor for questions, emphasizing the interactive nature of the session. The moderator encourages participants to engage either through the chat or by raising their hand,
This discourse explores the essentiality of cybersecurity fundamentals in both traditional IT spaces and the emerging landscape of Web 3.0. It underscores the importance of proactive threat intelligence and attribution methodologies while advocati
This discussion offers a comprehensive exploration of cybersecurity challenges, from user-level vulnerabilities to strategic risk management practices. By dissecting real-world incidents and industry insights, it sheds light on the evolving nature
This discussion unveils critical security vulnerabilities and an incident of unauthorized access, emphasizing the importance of robust security measures to prevent data breaches. While some details are withheld for confidentiality reasons, the nar
This discussion emphasizes the importance of prioritizing understanding and proactive measures over relying solely on tools in addressing cybersecurity challenges. It underscores the necessity of comprehending potential attacks specific to an orga
This content addresses two critical security breaches in decentralized systems. Firstly, it discusses how attackers exploited vulnerabilities in the governance token system of a decentralized autonomous organization (DAO) called The DAO. By acquir
This blog offers insights into a hacker's perspective on defensive measures and concerns regarding detection and response capabilities. The speaker emphasizes the importance of monitoring for suspicious activities and implementing effective coun
we will explore essential operational capabilities necessary for ensuring the security and integrity of decentralized finance (DeFi) platforms. Among these capabilities is the ability to blacklist wallets, transfer funds, and pause or terminate
we will explore three recent incidents in the crypto space and personal experiences to extract valuable lessons that can help reduce the frequency of such events. While these incidents can be intriguing and sometimes exciting, it is in everyone's
Welcome to the CISO Platform "Best of the World" Security Webinar Series, a premier event featuring the world's leading cybersecurity minds. This series presents security content that is often hard to find and understand, featuring notable exper
This blog delves into two critical aspects of decentralized finance (DeFi) security: the manipulation of liquidity pools and the importance of proper validation in algorithmic decision-making. By examining a specific case of liquidity pool exploit
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
The Insider Risk Summit (West)
- Description:
- Created by: pritha
- Tags: insider risk summit, monterey, california
CISO Cocktail Reception, San Francisco
- Description:
Are you @RSAC?
CISO Yacht Cocktail Dinner
Going to RSA Conference?
After a day of attending sessions at RSA, join us on a luxury yacht for drinks, food, and live entertainment while enjoying the stunning skyline views, cruising on San Francisco Bay.
Yacht Party…
- Created by: pritha
- Tags: san francisco, rsac, rsac2026, ciso, cocktail, yacht, invite-only

.png?profile=RESIZE_710x)
.png?profile=RESIZE_710x)












