All Posts (2677)

Sort by

AI & Future Of Offensive Security

12744917094?profile=RESIZE_710xIn the presentation, the focus is on the transformative impact of artificial intelligence (AI) in cybersecurity, particularly in the context of malware generation and adversarial attacks. AI promises to revolutionize the field by enabling scalable so

Read more…
Views: 147
Comments: 0

Presentation on SASE Technology

12744919260?profile=RESIZE_710xSecure Access Service Edge (SASE) solutions are revolutionizing enterprise networks by integrating SD-WAN with comprehensive security services. Traditionally, enterprises managed multiple point solutions for network and security needs, leading to com

Read more…
Views: 278
Comments: 0

Cyber Insurance & Risk Quantification

12744902488?profile=RESIZE_710xThe presentation on Cyber Risk Quantification (CRQ) and insurance highlighted key strategies for integrating advanced analytics with risk management. Emphasizing the importance of actionable insights tied to financial impacts, the speakers outlined a

Read more…
Views: 63
Comments: 0

Digital Personal Data Protection Act

12744915078?profile=RESIZE_710xIn today's digital age, the importance of safeguarding personal data has become increasingly paramount. The implementation of data protection laws, such as the Digital Personal Data Protection Act (DPDPA), represents a crucial step towards ensuring t

Read more…
Views: 117
Comments: 0

Gen AI & Deepfake In Overall Security

The rapid integration of AI, notably Gen AI, across sectors like manufacturing, finance, and technology is revolutionizing operations with advanced analytics and tailored services. However, this transformation underscores heightened concerns surround

Read more…
Views: 83
Comments: 0

Most Dangerous Attack Techniques

12744923080?profile=RESIZE_710xEmerging attack techniques in 2024 have profoundly impacted the cybersecurity landscape. The shift to cloud environments has made cloud security a critical focus. Attackers often exploit misconfigured cloud resources and stolen credentials to gain in

Read more…
Views: 41
Comments: 0

A program that involves several processes to run simultaneously without having to wait for completion of execution for previous ones is called Asynchronous programming. When data driven tasks are done sequentially then it might spoil the user experie

Read more…

The Cybersecurity Vault - episode 34, with guest Chase Cunningham.

We take a hard look at when organizations make big cybersecurity mistakes, how the attackers see those as opportunities, and how they will maneuver to take advantage.

 

Chase’s LinkedIn

Read more…
Bruce is one of the foremost cryptographers and a leading mind in cybersecurity. Often referred to as the "security guru", he is the bestselling author of 14+ books. Bikash is a serial cybersecurity entrepreneur and the co-founder of CISO Platform
Read more…

As the saying goes “Culture trumps strategy”, which very much holds true when it comes to cybersecurity!   Pooja Shimpi, Sameer Gemawat, and I discuss strategies leaders can use to promote a robust security mindset and a security-first approach withi

Read more…

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

Atlanta Chapter Meet: Build the Pen Test Maturity Model (Virtual Session)

  • Description:

    The Atlanta Pen Test Chapter has officially begun and is now actively underway.

    Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …

  • Created by: Biswajit Banerjee
  • Tags: ciso, pen testing, red team, security leadership