All Posts (2678)

Sort by

Critical Hygiene for Preventing Major Breaches (RSA Conference 2017)

Microsoft's Incident Response teams investigate major breaches week after week and almost always see the exact same pattern of attacks and customer vulnerabilities. Microsoft and the

Read more…
Views: 145
Comments: 0

Securing Serverless Applications in the Cloud (RSA Conference 2017)

Serverless applications offer a number of advantages, the biggest one being freedom from a number of standard operational tasks. And while you may not need to do basic ops tasks, you

Read more…
Views: 97
Comments: 0

Cloud Security: Automate or Die

Cloud Security: Automate or Die (RSA Conference)

Much has been said about DevOps and SecDevOps for security automation and integration. However, to many in the security community, this is still a buzzword. There are many practical applications of auto

Read more…
Views: 110
Comments: 0

One hour privacy for security officers

One hour privacy for security officers (RSA Conference 2017)

Information security officers will need to become involved in privacy issues to maintain relevance in the future. This session will provide the fundamentals of information privacy and buildi

Read more…
Views: 101
Comments: 0

Threat Modeling the Trenches to the Clouds (RSA Conference 2017)

What wisdom percolates from building threat modeling practices across four organizations? This presentation will draw from hundreds of students, years of coaching, 100 formal trainings a

Read more…
Views: 106
Comments: 0

How to Transform Developers into Security People (RSA Conference 2017)

Developers should be the first line of security defense. Security teams purchase secure coding classes and claim success. Hours of training does not change the developer mindset. W

Read more…
Views: 78
Comments: 0

Securing 100 Products - How Hard Can It Be? ( RSA Conference 2017 )

Many companies establish their Secure Development Lifecycle. The adoption of it crucial especially for corporations with dozens of applications. The main challenges they face are the

Read more…
Views: 147
Comments: 0

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

Atlanta Chapter Meet: Build the Pen Test Maturity Model (Virtual Session)

  • Description:

    The Atlanta Pen Test Chapter has officially begun and is now actively underway.

    Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …

  • Created by: Biswajit Banerjee
  • Tags: ciso, pen testing, red team, security leadership