All Posts (2678)

Sort by

Most Important Tools for Incidence Response

Based on OS

Windows tools:

Specific Tools:

  1. Log Parser - 
  2. EnCase -
  3. ILook(LEO Only) -
  4. Paraben -
  5. ProDiscover -
  6. TCPView -
  7. AccessData -
  8. COFEE(LEO Only) -
  9. WinHex
  10. X-Way Forensics/WinHex Pro
  11. FileControl-DD etc.
  12. Wireshark-Ethereal(packet sniffer)
  13. Dsniff-Dug
Read more…
Views: 28
Comments: 0

What are the stages of Incident Response

Stages of Incident Response-

1. method 1

2. method 2

Method1(7-steps)

  1. Preparation
  2. Identification
    categories based on incident type
  3. Containment
  4. Investigation
  5. Iradication
  6. Recovery
  7. Follow up

Method2(4-steps)

  1. Preparation
  2. Detection and Analysis
  3. Conta
Read more…
Views: 51
Comments: 0

Top 5 Big Data Vulnerability Classes

bgoabk.jpgRecently, we were pentesting a Data mining and Analytics company. The amount of data that they talked about is phenomenal and they are planning to move to Big Data. They invited me to write a blog on state of the art, Big Data security concerns and c

Read more…

CISO opinion in Global Round Table and Breakfast meet

Meet, meet and meet, the last few weeks all we've done is meet you and try to help you better. Your views shape us and those plenty views needed a To-Do List, which is right here. We are grateful for each of your contributions and hope to have more o

Read more…
Views: 23
Comments: 0

What Cisos Want

1.  How to do a better vendor evaluation?






  • Know both Success and failure stories.
  • A strong network among CISOs for sharing failure stories
  • A common checklist for vendor evaluation should be made once we are aware of the success and failure sto
Read more…
Views: 26
Comments: 0

14 Things to Consider While Defining a GRC Framework

Information Security function had to be aligned to Risk Management function to provide independence by separating Infosec Governance and Infosec operations responsibilities. Enhancement in the policy was focused on the wider and strategic modificatio

Read more…
Views: 206
Comments: 0

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

Atlanta Chapter Meet: Build the Pen Test Maturity Model (Virtual Session)

  • Description:

    The Atlanta Pen Test Chapter has officially begun and is now actively underway.

    Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …

  • Created by: Biswajit Banerjee
  • Tags: ciso, pen testing, red team, security leadership