Speaker:Arnab Chattopadhayay [ Senior Director @Capgemini ]
Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Platform or their employers
Speaker:Arnab Chattopadhayay [ Senior Director @Capgemini ]
Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Platform or their employers
Speaker: Bikash Barai [ Co-Founder @FireCompass ] & Arnab Chattopadhayay [ Senior Director @Capgemini ]
Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Platform or their employers
Speaker: Chandra Prakash Suryawanshi [ SVP @Aujas Networks Pvt. Ltd. ]
To view slide on SlideShare click here
( Do more : Compare all major SIEM products and technologies instantly here )
Please Note - Speaker presentations represent the views of the in
Speakers: Bikash Barai [ Co-Founder @FireCompass ] & Ravi Mishra [ Co-Founder & Product management @FireCompass ]
Author - Abdur Rafi, CISO, ABP Pvt. Ltd., India
A series of broad attack began that spread the latest version of the WanaCryptor ransomware. This attack, also referred to as WannaCrypt or WannaCry, reportedly impacted systems of public and private o
A new ransomware attack, very recently has caught many organizations and users off guard. The ransomware Wannacry has infected systems across the globe and has been the topic of discussion among security professionals for quite some days now.
The new
CISO Platform Decision Summit @Pune, last week saw over 150+ attendees for over 2 days making the the spirit of knowledge sharing and learning a huge success in the Information Security Executives of India. Here are the highlights of the awesome keyn
The document is intended to be a guide for organizations faced with a ransomware infection. This guide is split into several sections, with the most critical and time-sensitive being in the initial response section.
If you are currently experienc
The notorious hackers are increasingly planting more sophisticated attack. With Social engineering and phishing emails proliferating each day, having a strong and robust security awareness program is of paramount importance for securing company’s ass
It is an arduous task to convince management to sanction information security budgets. An additional hurdle arises from the fact that most security professionals have a technical background, and hence face difficulties in clearly explaining to execut
Risk Management is the name given to a logical and systematic method of identifying, analyzing, treating and monitoring the risks involved in any activity or process.
Risk is an inbuilt part of all human activities so, not surprisingly, assessing risk
Abstract: The opinion discussed here is based on the study of the current initiatives of the government in the growth of Digital Economy, there are needs to be a focused to bring up the Suitable Infrastructure to cater the growing demand for the Dig
This Article was shared by Nachiket Sathaye, Information Security Consultant, Ultradefence Solutions
“We are PCI Compliant, now we are secured”- While assisting customers with their PCI DSS Compliance, I always come across teams making this statement
(Author : Chandra Prakash Suryawanshi, SVP- India & APAC at Aujas Networks Pvt. Ltd. )
Information security incident management if often a combination of technical controls, processes, communication strategy, detailed procedure and plan. The objecti
How Google Protects Its Corporate Security Perimeter without Firewalls (RSA Conference 2017)
The increasing mobility of professional users has brought an end to the traditional corporate security perimeter. Google has reinvented its security perimete
Client side encryption without knowing its limits is a ticking time bomb! (RSA Conference 2017)
Cloud and mobile computing give room to an unprecedented level of access points into corporate data leaving you to rethink how to protect it. Client-side
Open Security Controller - Security Orchestration for OpenStack (RSA Conference 2017)
Open Security Controller enables orchestration of multiple security functions in an OpenStack DC. OSC integrates with multiple SDN controllers and Security VNFs to
Hacking Blockchain (RSA Conference)
Bitcoin has exploded in popularity and skyrocketed in value. Proponents of blockchain, the technology that makes cryptocurrency possible, now want to apply it to a wide range of other applications like identity mana
Cybersecurity vs. Tokenization (RSA Conference 2017)
Tokenization is the latest data protection method, but does it help or hinder cybersecurity-this is the current debate. This session will look at who, what, where, when, how and why of using tokens.
IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and Cloud (RSA Conference 2017)
In this technical deep dive, Email Isaakian will explain the details of the protocol, cryptography, key management and vulnerabilities mitigated by MAC Sec/ESS. Add
The Atlanta Pen Test Chapter has officially begun and is now actively underway.
Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …