Log management is one of the primary requirements for building an enterprise class SOC. In security, Log analysis is often the first step in incident forensics. Operating systems such as windows, Unix, Linux and other network devices such as routers,
open (5)
Short of resources, but still want to have a strong IT-security ecosystem? There are multiple tools in the market specially for small to medium enterprises who can use these open source tools. Although, they can't match the capabilities as provided b
CISO Platform 100, 2018 (India):
Applications for the Top 100 CISO Awards is open for 2018. Kindly fill in your responses asap.
We are very happy to announce that nominations are now open for the 7th Edition of Top 100 CISO Awards - India's 1st Securit
These are top 5 FREE tools you should consider while building your Enterprise Mobility Management:
Convertigo:
It is a privately held company recognized as a “pure player” in the enterprise Mobility market and the first software vendor to distribute i
Many new devices are trying to fit into our life seamlessly. As a result, there’s a quest for a “universal access methods” for all devices. Voice activation seems to be a natural candidate for the task and many implementations for it surfaced in rece
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
Webinar On Creating Scalable, Sustainable, Cybersecurity For Any Size Organization
- Description:
Register Here : https://info.cisoplatform.com/creating-scalable-sustainable-cybersecurity-for-any-size-organization
Key Pointers:
- Describe the relationship between the cybersecurity and IT Operations
- Assess organizational cybersecurity, GRC & operational readiness
- Successfully communicated with the C-Suite and to the Board on the…
- Created by: pritha
Webinar On Understanding Cloud Attack Vectors
- Description:
Register Here : https://info.cisoplatform.com/understanding-cloud-attack-vectors
Key Pointers:
- Understanding current cloud threats landscape
- Reviewing cloud attack vectors
- Recent examples of cloud security incidents
- Prioritize cloud security efforts
Register Here : …
- Created by: pritha
Webinar - Incident Response Exercise Lifecycle Program For Cyber Resilience
- Description:
Register Here : https://info.cisoplatform.com/incident-response-exercise-lifecycle-program-for-cyber-resilience
Key Discussion Pointers:
- New concept called Developing Cyber Resilience through the Cyber Incident Response Lifecycle
- Active testing through cyber ranges, purple, red and gold teaming
- How to ascertain competency at each activity and…
- Created by: pritha