Top Security Worskshops

IT GRC Workshop Session

  • Key Components and Architecture for GRC
  • How to Jumpstart your GRC program with freely available tools and content
  • Overview of Free Tools that you can use today
  • Complete Vendor and Technology Taxonomy
  • Customer Satisfaction based Rating of vendors along with Analysts opinion
  • Checklist to evaluate a GRC Vendor
  • CISOs who implemented GRC to share their real life experiences

Threat Intelligence Workshop

  • Key components (People, Process and Technology)
  • Threat Intelligence Maturity model
  • Threat Collection & Analysis eg. OSINT
  • Integrating Actionable Intelligence
  • Technology and Vendor Landscape

Identity & Access Management Workshop

  • Key Components And Architecture Of IAM
  • Example Reference Architecture In An Industry (Telecom & Financial Industry)
  • Complete Vendor and Technology Taxonomy
  • Customer Satisfaction based Rating of vendors along with Analysts opinion
  • Checklist to evaluate a IAM Vendor

Content Security(Web & Email) Workshop

  • Complete Vendor and Technology Taxonomy
  • Critical Capabilities Of Email
  • Critical Capabilities Of Web
  • Where Current Solutions Fail?
  • Future Scope/Expectations Of Content Security
  • Why 'SAAS Vs Not SAAS' ?
  • SWOT Analysis For Landscape


Data Loss Prevention Workshop

  • DLP Drivers
  • Types of DLP Solutions
  • Complete Vendor and Technology Taxonomy
  • Customer Satisfaction based Rating of vendors along with Analysts opinion
  • Checklist to evaluate a DLP Vendor
  • Key Learning from CISOs

Cloud Security & Cloud Access Security Brokers Workshop

  • Technology Taxonomy for Cloud Security
  • Key components of cloud security architecture
  • Blue print to build your cloud security program
  • Basics of Cloud Security Access Brokers

Key Advancement in Application Security

  • New Technologies like IAST,RASP
  • Vendor and Technology Taxonomy
  • Customer Satisfaction based Rating of vendors along with Analysts opinion

Top Talks

  • BSIMM: Key Learning from 100+ Enterprises on Building a Software Security Program
  • Critical Security controls while implementing SDN
  • Future of networking technologies – an incremental change or a disruptive
  • Using Predictive Analytics & Behavioural Economics for security decision making
  • Data Classification – The key ingredient for information security

Top CISO Security Checklist Presentation

 

  • IOT Adoption Checklist
  • IPV6 Adoption Checklist
  • Checklist For Evaluating A UTM Vendor
  • Enterprise Risk Management Checklist
  • IRM Vendor Selection Checklist
  • How To Utilize Full Power Of OSSEC And OSSIM
  • Checklist On Data Classification, Policy Formulation, Identification of Key words
  • Choosing MDM Vendor To Suit Requirements
  • Vendor Selection Framework For Integrating Threat Intelligence With SIEM
  • Checklist to choose a Mobile Device Management Solution

Launch CISO Platform Index

Index developed based on User Satisfaction Survey by CISOs who used the vendor product on different evaluation metrics. To know more click here

Example domains covered (partial list)-

  • Content Security (Web & Email)
  • DOS/DDOS Security
  • Identity & Access management
  • IT Governance, Risk & Compliance
  • Application Security (Testing)
  • Security Analytics/SIEM

Launch Taxonomy (Complete Vendor Landscape)

Get a holistic view of the major players in the security domains and the coverage each of them have to offer.

Partial Domains List to be covered

  • Content Security (Web & Email)
  • DOS/DDOS Security
  • Identity & Access management
  • IT Governance, Risk & Compliance
  • Application Security (Testing)
  • Security Analytics/SIEM
  • Cloud Security (CASB)
  • Threat Intelligence

Launch Technology Evaluation Checklist

A Comprehensive checklist to save you months of effort before floating an RFP everytime! Read More

Partial list of domains covered-

  • Checklist To Evaluate Content Security (Web & Email) Technology
  • Checklist To Evaluate DOS/DDOS Security Technology
  • Checklist To Evaluate Identity & Access Management Technology
  • Checklist To Evaluate IT Governance, Risk & Compliance Technology
  • Checklist To Evaluate Application Security (Testing) Technology

Top Panel Discussions

  • Wargame Simulation: We are breached- What next?
  • Managing Identity And Access In The Cloud & IOT: What Do We Need To Do Differently?
  • Selecting And Implementing The Right Risk Management Framework
  • Learning From Trenches: Moving To New Compliances PCI 3.0, ISO 27001:2013 And More..
  • What Worked And Did Not While Implementing Your Content Security Program?
  • Is Your DLP Really Working? How To Make It Work?
  • CISO Reporting Dashboard For The Board/CEO
  • Creating A Blueprint For Cloud Security In Your Organization
  • Beyond SIEM:Blueprint For Building Advanced Enterprise SOC

Round Tables / War Gaming & Strategy Simulation Exercise

  • Using Metrics to Manage the Risks & Application Security Investments
  • Creating your software security strategy using BSIMM
  • Strategy Roadmap For ERM
  • Hit By DDOS- What Next?
  • Dealing With Malware Attack

Top Technical Training

  • Cyber Forensics & Incident Response Training Cyber Course
  • Network Forensics & Practical Packet Analysis
  • Application Security Testing & Web Hacking

For More Details On Trainings click here

E-mail me when people leave their comments –

CISO Platform

You need to be a member of CISO Platform to add comments!

Join CISO Platform

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)