During the last few penetration testing conducted for certain organizations, we have discovered a surprising fact that almost all the SIEM implementation had gaps on the implementation levels. For example, in certain cases, SIEM did not even detect
siem (7)
Demystifying Security Analytics: Data, Methods, Use Cases
Many vendors sell “security analytics” tools. Also, some organizations built their own security analytics toolsets and capabilities using Big Data technologies and approaches. How do you find
Short of resources, but still want to have a strong IT-security ecosystem? There are multiple tools in the market specially for small to medium enterprises who can use these open source tools. Although, they can't match the capabilities as provided b
Author - Anil Upadhyay, DM - ITGS, ITSD, Gujarat Gas Limited
We have listed a Key Parameter are required for Security Incident and Event Management and The Framework was attached at the end.
Major Parameters To Consider :
Ability to identify non
With Big Data and Behavior Analytics advances, the need of an SIEM at the enterprise level may be a question. This question is addressed in this report. It analyses, dissects and tries to find out the pros and cons of both sides.
Why R
One of the most common questions I received in my analyst years of covering SIEM and other security monitoring technologies was “what data sources to integrate into my SIEM first?”
And of course the only honest answer to this question is: it depen
Current Project Synopsis:
- Responsible for Information Security of next generation mobile and fixed broadband networks (LTE/WiFi/FTTx) with All-IP networks over a cloud based framework for B2C/B2B markets connecting 200 Million 4G LTE, 50 Million W
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
Webinar On Creating Scalable, Sustainable, Cybersecurity For Any Size Organization
- Description:
Register Here : https://info.cisoplatform.com/creating-scalable-sustainable-cybersecurity-for-any-size-organization
Key Pointers:
- Describe the relationship between the cybersecurity and IT Operations
- Assess organizational cybersecurity, GRC & operational readiness
- Successfully communicated with the C-Suite and to the Board on the…
- Created by: pritha
Webinar On Understanding Cloud Attack Vectors
- Description:
Register Here : https://info.cisoplatform.com/understanding-cloud-attack-vectors
Key Pointers:
- Understanding current cloud threats landscape
- Reviewing cloud attack vectors
- Recent examples of cloud security incidents
- Prioritize cloud security efforts
Register Here : …
- Created by: pritha
Webinar - Incident Response Exercise Lifecycle Program For Cyber Resilience
- Description:
Register Here : https://info.cisoplatform.com/incident-response-exercise-lifecycle-program-for-cyber-resilience
Key Discussion Pointers:
- New concept called Developing Cyber Resilience through the Cyber Incident Response Lifecycle
- Active testing through cyber ranges, purple, red and gold teaming
- How to ascertain competency at each activity and…
- Created by: pritha