Session, Workshops, Round Tables & Wargames @ CISO Platform Decision Summit 2015 (June 4-5, New Delhi)

Top Security Worskshops

IT GRC Workshop Session

  • Key Components and Architecture for GRC
  • How to Jumpstart your GRC program with freely available tools and content
  • Overview of Free Tools that you can use today
  • Complete Vendor and Technology Taxonomy
  • Customer Satisfaction based Rating of vendors along with Analysts opinion
  • Checklist to evaluate a GRC Vendor
  • CISOs who implemented GRC to share their real life experiences

Threat Intelligence Workshop

  • Key components (People, Process and Technology)
  • Threat Intelligence Maturity model
  • Threat Collection & Analysis eg. OSINT
  • Integrating Actionable Intelligence
  • Technology and Vendor Landscape

Identity & Access Management Workshop

  • Key Components And Architecture Of IAM
  • Example Reference Architecture In An Industry (Telecom & Financial Industry)
  • Complete Vendor and Technology Taxonomy
  • Customer Satisfaction based Rating of vendors along with Analysts opinion
  • Checklist to evaluate a IAM Vendor

Content Security(Web & Email) Workshop

  • Complete Vendor and Technology Taxonomy
  • Critical Capabilities Of Email
  • Critical Capabilities Of Web
  • Where Current Solutions Fail?
  • Future Scope/Expectations Of Content Security
  • Why 'SAAS Vs Not SAAS' ?
  • SWOT Analysis For Landscape


Data Loss Prevention Workshop

  • DLP Drivers
  • Types of DLP Solutions
  • Complete Vendor and Technology Taxonomy
  • Customer Satisfaction based Rating of vendors along with Analysts opinion
  • Checklist to evaluate a DLP Vendor
  • Key Learning from CISOs

Cloud Security & Cloud Access Security Brokers Workshop

  • Technology Taxonomy for Cloud Security
  • Key components of cloud security architecture
  • Blue print to build your cloud security program
  • Basics of Cloud Security Access Brokers

Key Advancement in Application Security

  • New Technologies like IAST,RASP
  • Vendor and Technology Taxonomy
  • Customer Satisfaction based Rating of vendors along with Analysts opinion

Top Talks

  • BSIMM: Key Learning from 100+ Enterprises on Building a Software Security Program
  • Critical Security controls while implementing SDN
  • Future of networking technologies – an incremental change or a disruptive
  • Using Predictive Analytics & Behavioural Economics for security decision making
  • Data Classification – The key ingredient for information security

Top CISO Security Checklist Presentation

 

  • IOT Adoption Checklist
  • IPV6 Adoption Checklist
  • Checklist For Evaluating A UTM Vendor
  • Enterprise Risk Management Checklist
  • IRM Vendor Selection Checklist
  • How To Utilize Full Power Of OSSEC And OSSIM
  • Checklist On Data Classification, Policy Formulation, Identification of Key words
  • Choosing MDM Vendor To Suit Requirements
  • Vendor Selection Framework For Integrating Threat Intelligence With SIEM
  • Checklist to choose a Mobile Device Management Solution

Launch CISO Platform Index

Index developed based on User Satisfaction Survey by CISOs who used the vendor product on different evaluation metrics. To know more click here

Example domains covered (partial list)-

  • Content Security (Web & Email)
  • DOS/DDOS Security
  • Identity & Access management
  • IT Governance, Risk & Compliance
  • Application Security (Testing)
  • Security Analytics/SIEM

Launch Taxonomy (Complete Vendor Landscape)

Get a holistic view of the major players in the security domains and the coverage each of them have to offer.

Partial Domains List to be covered

  • Content Security (Web & Email)
  • DOS/DDOS Security
  • Identity & Access management
  • IT Governance, Risk & Compliance
  • Application Security (Testing)
  • Security Analytics/SIEM
  • Cloud Security (CASB)
  • Threat Intelligence

Launch Technology Evaluation Checklist

A Comprehensive checklist to save you months of effort before floating an RFP everytime! Read More

Partial list of domains covered-

  • Checklist To Evaluate Content Security (Web & Email) Technology
  • Checklist To Evaluate DOS/DDOS Security Technology
  • Checklist To Evaluate Identity & Access Management Technology
  • Checklist To Evaluate IT Governance, Risk & Compliance Technology
  • Checklist To Evaluate Application Security (Testing) Technology

Top Panel Discussions

  • Wargame Simulation: We are breached- What next?
  • Managing Identity And Access In The Cloud & IOT: What Do We Need To Do Differently?
  • Selecting And Implementing The Right Risk Management Framework
  • Learning From Trenches: Moving To New Compliances PCI 3.0, ISO 27001:2013 And More..
  • What Worked And Did Not While Implementing Your Content Security Program?
  • Is Your DLP Really Working? How To Make It Work?
  • CISO Reporting Dashboard For The Board/CEO
  • Creating A Blueprint For Cloud Security In Your Organization
  • Beyond SIEM:Blueprint For Building Advanced Enterprise SOC

Round Tables / War Gaming & Strategy Simulation Exercise

  • Using Metrics to Manage the Risks & Application Security Investments
  • Creating your software security strategy using BSIMM
  • Strategy Roadmap For ERM
  • Hit By DDOS- What Next?
  • Dealing With Malware Attack

Top Technical Training

  • Cyber Forensics & Incident Response Training Cyber Course
  • Network Forensics & Practical Packet Analysis
  • Application Security Testing & Web Hacking

For More Details On Trainings click here

Views: 222

Join the Discussion ...

You need to be a member of CISO Platform to join the discussion!

Join CISO Platform


Forum

Security Trends and Emerging Technologies That A CISO Should Adopt In 2021

Started by Priyanka Aash on Wednesday. 0 Replies

What are the challenges you as a CISO have been facing since the last year and share some security trends that are catching up? Help the community by sharing your knowledge and personal views on this subject. Or if you have any specific questions…Continue

CISO as an enabler

Started by Maheshkumar Vagadiya Jul 30, 2020. 0 Replies

Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue

Has Anyone Evaluated Digital Signature (like Docusign)?

Started by CISO Platform. Last reply by Yogesh Nov 19, 2020. 2 Replies

(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue

What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?

Started by CISO Platform. Last reply by ANAND SHRIMALI May 20, 2020. 4 Replies

(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue

Follow us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2021   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

/* */