On 2nd July 2013, National Cyber Security Poilicy has been released. First point in the preamble is an eye opener. It says " Cyberspace is a complex environment consisting of interactions between people, software and services supported by worldwide d
to (10)
Top Steps During Implementation Of A Firewall Project
- Clearly defined requirements such as type of firewall, architecture, performance requirements, compliance requirement, sizing, reporting, and minimum specifications are important for identifying
Second critical category. Default passwords for access to the application
For the two previous weeks we’ve been discussing the top-9 critical areas and the 33 steps to be taken for security assessment. Ultimately, we’ve covered patch management flaw
Each application has several security settings that do not fit into any of the critical issues groups mentioned in our series of articles.Among such settings there are both standard settings (such as password length or the number of attempts given to
Everyone wants to know this today. One of the key attributes I have found in all the security people in last 14 years of my career is you need to be naturally skeptical when you look at stuff. This is one key aspect and if you don’t have this you wou
OAuth has become a highly influential protocol due to its swift and wide adoption in the industry. The initial objective of the protocol was specific: it serves the authorization needs for websites. However, the protocol has been significantly repurp
In the fast moving world of cyber security incident response, the challenge is to rapidly identify and stay ahead of the threat. Incident responders must move faster, be more agile, have longer stamina than the attacker. Additionally they must also b
Overview
With millions of Bluetooth Low Energy (BLE) IoT devices deployed per year, comes the responsibility to secure them. BLE was designed for low power personal area networks. Security was not a focus while designing it. But nowadays, BLE devices
There is a steep rise in interest from the Board & CEO of an organization to understand the security posture of their company. Partly because of the increasing pressure from the government regulators, stakeholders & discussions on the potential risk
At CISO Platform Annual Summit 2020, we had a panel discussion on the topic of Presenting Security to Your Board and Managing Your Stakeholders, including industry stalwart like Vishwas Pitre [Zensar Technologies Ltd] (Moderator), Yogesh Kumar [Tata
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
CISO Platform Talks : Security FireSide Chat With A Top CISO or equivalent (bi-monthly)
- Description:
CISO Platform Talks: Security Fireside Chat With a Top CISO
Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.
We’ve had the privilege of…
- Created by: Biswajit Banerjee
- Tags: ciso, fireside chat
Playbook Round Table - London, Europe | Infosec Europe
- Description:
We are pleased to invite you to an exclusive roundtable series hosted by CISO Platform in partnership with FireCompass.
Date: June 2025
Venue: London, Atlanta, New York, San Francisco, Houston, Dubai, Riyadh, Doha
- Created by: Biswajit Banerjee
Fireside Chat With Rick Doten (VP - Information Security at Centene Corporation)
- Description:
We’re excited to bring you an exclusive fireside chat on "A CISO’s Guide on How to Manage a Dynamic Attack Surface" with Rick Doten (VP - Information Security, Centene Corporation) and Erik Laird (Vice President - North America, FireCompass). In this session, we’ll explore how top CISOs are tackling today’s rapidly expanding attack surface and what it takes to stay ahead of evolving threats in a cloud-first, AI-driven world.
As…
- Created by: Biswajit Banerjee
- Tags: ciso, attack surface management, rick doten, ciso guide
CISO Meetup at BlackHat Las Vegas 2025
- Description:
We are excited to welcome you to the CISO Meetup during BlackHat USA 2025 in Las Vegas! Join us for an exclusive networking, meaningful conversations, and community building with top CISOs and cybersecurity leaders from around the globe.
Meetup Details:
Location: Mandalay Bay, Las Vegas …
- Created by: Biswajit Banerjee
- Tags: ciso, black hat, black hat 2025, black hat usa