Living BeyondCorp comes with its own challenges. This talk will dive into how Duo gets our hands around difficult problems regarding the security and management of cloud services and endpoints internally. This session will cover technical details of
All Posts (2717)
This talk will explore the concepts and experiences of using configuration management in a highly disposable environment of ephemeral virtual machines. It will cover why an operations team may desire such an environment, the tools the presenter used
This will show how, on a large container deployment, the speaker achieved insight into security events like file events on sensitive files, system call auditing, user level activity trail, network activity, etc., by customizing and plumbing a stack o
While the causes of outages are varied, human error far outpaces all hardware failures. The risk of humans touching sensitive data is clear, but the tools, techniques and risk-mitigation strategies lag behind current realities. Stephen Schmidt, AWS C
Based on investigations of real-world attacks, Microsoft Office 365 cybersecurity experts provide a prescriptive approach to identifying and implementing the most critical security controls to protect your Office 365 tenant. You will learn threats an
Everything in cloud computing is automated and API-enabled, giving security teams a big opportunity to build and embed security into infrastructures. From continuous guardrails to automated "afterburners" to speed up complex processes, this advanced
Cloud attack vectors and security controls are different. Many companies breached on AWS moved sensitive data to AWS following best practices or implementing cloud security controls correctly. Reports indicate that hybrid cloud implementations have w
Machine learning algorithms are key to modern at-scale cyberdefense. Transfer learning is a state of the art ML paradigm that enables applying knowledge and algorithms developed from one field to another, resulting in innovative solutions. This talk
CISO Platform Decision Summit @Pune, last week saw over 200+ attendees for over 2 days making the the spirit of knowledge sharing and learning a huge success in the Information Security Executives of India. Here are the highlights of the awesome keyn
SACON is India's 1st & Only Security Architecture Conference. With over 70+ participants, this was the 5th edition of SACON and here are a few highlights we wanted to share with you. It was held on 18-19th May, Hotel Hyatt, Pune, India.
We had with u
Speaker : Rohit Srivastwa, Founder of ClubHack, Quick Heal Technologies, Senior Director Cyber Education & Services
Please Note - Speaker presentations represent the vi
Speaker : Subrat Panda, Capillary Technologies, Principal Architect AI & Data Sciences
Please Note - Speaker presentations represent the views of the individual speakers and not of CIS
Artificial intelligence, and machine learning are not merely a buzz word but is increasingly becoming part of hacker’s tool kit. AI tools are getting more sophisticated with time and aiding hackers to hack data covertly.
Hackers are able to perform mo
Deep Web is the internet that cannot be accessed through standard search engines or the pages that are not indexed in any way.
Top 3 Misconceptions About the Deep Web
Deep Web & Dark Web are the Same
Dark Web is classified as a small portion of the
RSA Innovation Sandbox 2018, is one of the platform where information security startups can showcase their research and innovation. For the past 12 years, it is working as interface for cybersecurity companies to promote their new technology and conn
There are millions of pages on the internet however about 90% of the pages are not indexed by search engines like Google, Yahoo, Bing ..etc. Which means only a tiny portion of the internet is accessible through search engines or standard means. Deep
Why Is OSINT So Important ?
OSINT (Open-Source Intelligence) is intelligence collected from publicly available sources.
It is becoming a key resource for collecting threat intelligence even in enterprise space. A factor being that now we live in a ve
The Playbook Round Table was set in 3 cities - mumbai, bangalore & delhi where security heads got together to contribute in building a plan to measure an organisation's security program against 2018's application attacks
Key Highlights
- Key Expecta
2018 started with our community meets for Security Priority Planning for 2018.. and through our live survey we gathered some interesting insights. Technologies that are part of Key Focus Area for a CISO in 2018 are Security Analytics, SOC Implementat
Top 10 Emerging Technologies in 2018:
2018 started with our community meets for Security Priority Planning for 2018.. and through our live survey we gathered some interesting insights. Most votes (in percentage) were for network behaviour analytics,
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
