All Posts (2678)

Sort by

Hot Topics In Cyber Law 2017

Hot Topics In Cyber Law 2017 (RSA Conference 2017)

ABA Information Security leaders kick off Law Track with the annual expert panel on critical new issues. “Hot Topics” gives attendees a snapshot of new developments in law, public policy, regulation,

Read more…
Views: 332
Comments: 0

Hacking Exposed: The Adversary Oscars

Hacking Exposed: The Adversary Oscars (RSA Conference 2017)

Demos and mitigation strategies from real-world case studies of advanced intrusions like the hack of the Democratic National Committee and others that CrowdStrike has detected globally. The s

Read more…
Views: 144
Comments: 0

Hot Topics In Cyber Law 2017

Hot Topics In Cyber Law 2017 (RSA Conference 2017)

ABA Information Security leaders kick off Law Track with the annual expert panel on critical new issues. “Hot Topics” gives attendees a snapshot of new developments in law, public policy, regulation,

Read more…
Views: 104
Comments: 0

Hacking Exposed: The Adversary Oscars

Hacking Exposed: The Adversary Oscars (RSA Conference 2017)

Demos and mitigation strategies from real-world case studies of advanced intrusions like the hack of the Democratic National Committee and others that CrowdStrike has detected globally. The s

Read more…
Views: 163
Comments: 0

Developing useful metrics

Developing useful metrics (RSA Conference 2017)

It is critical to measure the right things in order to make better-informed management decisions, take appropriate actions and change behaviors. But how do managers figure out what those right things are

Read more…
Views: 108
Comments: 0

Threat Modeling Demystified

Threat Modeling Demystified (RSA Conference 2017)

Most organizations require threat models. The industry has recommended threat modeling for years. What holds us back? Master security architect, author and teacher Brook Schoenfield will take participa

Read more…
Views: 241
Comments: 0

The Malware Monetization Machine

The Malware Monetization Machine (RSA Conference 2017)

A new generation of Internet startups is focused on converting malware infections into revenue. Who are these new CEOs, what can we learn from their business models? No longer in the shadows of th

Read more…
Views: 150
Comments: 0

Cyber-Insurance: Fraud, Waste or Abuse?

Cyber-Insurance: Fraud, Waste or Abuse? (RSA Conference 2017)

Cyber-insurance is quickly becoming one of the hottest selling products on the market and an ever-increasing variety is being offered to businesses. Did you know that a security breach caus

Read more…
Views: 125
Comments: 0

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

Atlanta Chapter Meet: Build the Pen Test Maturity Model (Virtual Session)

  • Description:

    The Atlanta Pen Test Chapter has officially begun and is now actively underway.

    Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …

  • Created by: Biswajit Banerjee
  • Tags: ciso, pen testing, red team, security leadership