In the ever-evolving landscape of cybersecurity, organizations are constantly seeking effective solutions to manage their external attack surface and mitigate risks. One approach gaining traction is the utilization of open-source tools for reco
In the ever-evolving landscape of cybersecurity, organizations are constantly seeking effective solutions to manage their external attack surface and mitigate risks. One approach gaining traction is the utilization of open-source tools for reco

In today's dynamic cybersecurity landscape, traditional security measures are no longer sufficient to combat evolving threats. As organizations strive to fortify their defenses, they must adopt new tools, techniques, and procedures (TTPs) to st
In this insightful discussion, a new Chief Information Security Officer (CISO) shares their top priorities for the first month on the job. Emphasizing the importance of building relationships, understanding the business strategy, and assessing

In today's ever-evolving cybersecurity landscape, organizations face an array of threats that require proactive and robust defense mechanisms. External Attack Surface Management (EASM) emerges as a critical component in fortifying organizational
In the intricate realm of cybersecurity, vigilance is paramount. As the digital landscape continues to evolve, organizations face a myriad of threats, from network vulnerabilities to sophisticated zero-day attacks. In this blog, we delve into th
In this insightful conversation, the speakers delve into the intricate world of cybersecurity, focusing on the challenges of data protection, business alignment, and effective communication with organizational leaders. The discussion highlights th
Embark on a journey into the world of cybersecurity resilience, where External Attack Surface Management (EASM) intersects with the powerful insights of the MITRE ATT&CK Framework. In this exploration, we unravel the key capabilities of EASM solut
Welcome to a deep dive into the realm of cybersecurity vigilance, where External Attack Surface Management (EASM) emerges as a critical pillar in safeguarding digital assets. In today's discussion, we unravel the multifaceted layers of EASM, explo
Welcome, everyone, to a riveting exploration of External Attack Surface Management (EASM) and its pivotal role in modern cybersecurity. As we navigate the ever-evolving digital landscape, it's imperative to understand the genesis of EASM and the c
This illuminating discussion explores the shift in perspective from security to business safety within the realm of cybersecurity, emphasizing the importance of understanding and addressing the specific needs of a company's revenue, customers, bra

Greetings, everyone! Whether it's morning, afternoon, or evening for you, I'm thrilled to welcome you to today's panel discussion on a topic that's gaining momentum in the cybersecurity realm: External Attack Surface Management (EASM). My name
In today's digital landscape, managing an organization's external attack surface is paramount for cybersecurity. External Attack Surface Management (ASM) involves understanding and securing all assets, including those beyond the traditional netw
The speakers express appreciation for the enriching dialogue and highlight the value of sharing strategies and stories within the cybersecurity community. Matt's approach to understanding different industries by immersing himself in complex topics
In today's rapidly evolving cybersecurity landscape, the need for comprehensive defense strategies is more critical than ever. External Attack Surface Management (EASM) emerges as a crucial component, offering organizations valuable insights int
In the ever-changing landscape of cybersecurity, staying ahead of threats requires a proactive approach. Over the years, we've witnessed the rise of Effective Attack Surface Management (EASM) products, offering valuable insights into an organizati
In the complex world of cybersecurity, bridging the gap between technical experts and business stakeholders is paramount for effective communication and collaboration. However, business leaders often find themselves lost in a sea of acronyms and
Embark on a journey of strategic planning and preparedness as we explore the nuances of conducting tabletop exercises effectively. Our narrative unfolds with a discussion on the optimal approach to conducting these exercises, whether as a single c
Embark on a journey of insight and innovation as we explore the dynamics of feedback-driven improvement and the importance of creating engaging environments for tabletop exercises. Our narrative begins with an examination of the 'hot wash' proce
CISO Platform Talks: Security Fireside Chat With a Top CISO
Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.
We’ve had the privilege of…
We are pleased to invite you to an exclusive roundtable series hosted by CISO Platform in partnership with FireCompass. The roundtable will focus on "New Guidelines & CISO Priorities for 2025"
Date: December 1st - December 31st 2025
Venue: Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata
We’re excited to bring you an insightful fireside chat with Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.) and Erik Laird (Vice President - North America, FireCompass).
About Sandro:
Sandro Bucchianeri is an award-winning global cybersecurity leader with over 25…