Emerging Vendors are the vendors who have been innovative and has given the fresh perspective to the conventional security methods. In very less time, these start-ups have been able to make their name in the APT space. Here is the list of the Top Eme
All Posts (2678)
A sandbox is a security mechanism to analyze the behaviour of any suspicious file types and web objects by allowing it to execute in an isolated environment with constrained resources. It allows one to execute any untested, un-trusted/outsourced code
Log management is one of the primary requirements for building an enterprise class SOC. In security, Log analysis is often the first step in incident forensics. Operating systems such as windows, Unix, Linux and other network devices such as routers,
RansomWare is a type of malicious software (malware) when infected with encrypts all the important files such as documents, pictures, movie file etc with a virtually unbreakable encryption key. [RM1] The RansomWare arrives via email attachments, inse
In its June 2, 2016 notification, RBI has issued new cybersecurity guidelines, which says that scheduled commercial banks (private, foreign and nationalized banks listed in the schedule of RBI Act, 1934) must proactively create or modify their polici
SACON is India's 1st & Only Security Architecture Conference. With over 60 participants, this was the first year of SACON and here are a few highlights we wanted to share with you. It was held on 12th July, Ritz Carlton, Bangalore, India.
We had with
To understand the differences between terms like cyber security and information security is important because many banking regulatory bodies like Reserve bank of India, Hong Kong Monetary Authority, Monetary Authority of Singapore, etc. have asked ba
Are you planning to Implement the Advanced Persistent Threats (APT) Security?. It's important to know what all questions you need to ask to APT security Vendor and get their views on APTs. Also, be sure whether the solution you are going to buy is ca
We are happy to announce the results of the annual survey of Security Buying Status in which 230 Companies have participated in the enterprise segment. We define enterprise as organisations that have 5000+ employees. This is a preview of the key find
Speaker: Bikash Barai, Co-Founder Cigital India ( Earlier iViZ )
Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Platform or their employers
Speaker: Dr. Rajesh P. Deo, Senior Manager @Ernst&Young
*We suggest you use Chrome to view the slides, as the it may be inaccessible on other browsers like safari etc.
Please Note - Speaker presentations represent the views of the individual s
Speaker:Arnab Chattopadhyay, Senior Technical Director @MetricStream
*We suggest you use Chrome to view the slides, as the it may be inaccessible on other browsers like safari etc.
Please Note - Speaker presentations represent the views of the
Speaker: Ravi Mishra, Head Of Advisory @CISO Platform
Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Platform or their employers
Speaker: Bikash Barai, Co-Founder Cigital India ( Earlier iViZ )
Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Platform or their employers
Speaker: Vinayak Godse, Senior Director-Data Protection @DSCI
Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Platform or their employers
Speaker: Nilanjan De, Principal Architect @Cigital
Ransomware is a type of malicious software (malware) when infected with encrypts all the important files such as documents, pictures, movie file etc with a virtually unbreakable encryption key. Here we have compiled some of the Good-reads blogs, ar
Turbo Talks
How the Heartbleed bug was found?
Antti Karjalainen discoverer of Heartbleed
The Heartbleed bug was a catastrophic vulnerability in widely used OpenSSL TLS implementation. This talk will give background how the Heartbleed bug was found
We believe, isn't a single technology/solution but is a complex program which consists of people, process and technology. Sandboxing or any single technology can only provide partial protection against “real” advanced attacks. We suggest organizat
The quantity of vulnerabilities are exploding in today’s dynamic environments, while attackers are exploiting them faster than ever before—and with greater sophistication and stealth. In so- called “zero-day attacks,” exploits are created for vulnera
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
Atlanta Chapter Meet: Build the Pen Test Maturity Model (Virtual Session)
- Description:
The Atlanta Pen Test Chapter has officially begun and is now actively underway.
Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …
- Created by: Biswajit Banerjee
- Tags: ciso, pen testing, red team, security leadership
The Insider Risk Summit (West)
- Description:
- Created by: pritha
- Tags: insider risk summit, monterey, california
