Speaker: Richard Bussiere, Principal Architect @ Tenable Network Security
Please Note - Speaker presentations represent the views of the in
Speaker: Richard Bussiere, Principal Architect @ Tenable Network Security
Please Note - Speaker presentations represent the views of the in
Speaker: Matt Suiche, Co - Founder & Chief Scientist @ Cloud Volumes
Please Note - Speaker presentations represent the views of the individu
Speaker: Shomiron Das Gupta, Founder & CEO @ NETMONASTRY Inc.
Please Note - Speaker presentations represent the views of the individual spea
Speaker: Shomiron Das Gupta, Founder & CEO @ NETMONASTRY Inc.
Please Note - Speaker presentations represent the views of the individual spea
Speaker: Shomiron Das Gupta, Founder & CEO @ NETMONASTRY Inc.
Please Note - Speaker presentations represent the views of the individual spea
Speaker: Tamaghna Basu, CEO @ neoEYED
Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Pla
Speaker : Chandra Prakash Suryawanshi, SVP and Business Head - India and APAC @ Aujas Networks Pvt Ltd
Speaker: Kanneth Bradberry, CTO @ Xerox Healthcare
Please Note - Speaker presentations represent the views of the individual speakers and n
Speakers : Arnab Chattopadhyay, VP - Engineering @ Infoworks Inc & Bikash Barai, Co-Founder Cigital India ( Earlier iViZ )
*We suggest you use Chrome to view the slides, as the it may be inaccessible on other browsers like safari etc.
Please Note - Spe
Speaker: Satish K Sreenivasaiah, Lead Architect @ TCS
*We suggest you use Chrome to view the slides, as the it may be inaccessible on other browsers like safari etc.
Please Note - Speaker presentations represent the views of the individual speakers an
Short of resources, but still want to have a strong IT-security ecosystem? There are multiple tools in the market specially for small to medium enterprises who can use these open source tools. Although, they can't match the capabilities as provided b
Everyone wants to know this today. One of the key attributes I have found in all the security people in last 14 years of my career is you need to be naturally skeptical when you look at stuff. This is one key aspect and if you don’t have this you wou
Our editorial team has handpicked the best of the best talks at Black Hat Conference USA, 2016 - one of the largest IT Security Conferences in the world.
Black Hat conference is a security conference which brings together variety of security professio
This is about developing information security master plan, the concept is the fact that when you develop a plan you begin by starting risk assessment, not a risk assessment from security stand point but from a business standpoint. You go through that
We are keep getting surprises in the cyber-security world and this is one of the biggest surprise. Few weeks back, someone out of the blue started leaking the NSA's secret. The so called Shadow Brokers leak dropped 300MB of stolen data onto the open
Turbo Talks
Paul Wright, Author of "Big Data Security"
Emerging Healthcare Tech & Future Security Impact
Kenneth Bradberry, CTO at Xerox
The NIST Cybersecurity Framework: Overview
Richard Bussiere, RSA Conference Speaker
T
Cyber-targeted attacks such as APTs are the primary cause of concern for any organization that holds data which can be of interest to attackers. The motivations are diverse and the attackers are highly sophisticated and relentless in their approach.
Cyber security is an increasing concern for every business. And especially for banks who held a lot of confidential data and transaction details, it is utmost important for banks to have required cyber security solution and processes at the place.
Man
An average CISO Tenure is 17 months. This is why we brought up the burnout issue.
CISO Role Expectations-
Below are the expectations from CISO's and these challenges faced by CISO's can make them fired/quit. Sometimes, they can't bear pressure and res
Today, I am going to talk about the game which has become more than a game for people around the world. You guessed it right, I am talking about Pokemon Go, developed by Niantic. The important mechanic in the game is to be able to use GPS which can t
The Atlanta Pen Test Chapter has officially begun and is now actively underway.
Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …