CISO Platform
  • Female
  • bangalore
  • India
  • CISOPlatform
Share on Facebook

CISO Platform's Friends

  • Prasanta Bhattacharjee
  • SUSHIL KUMAR SHARMA
  • Sanket Daptardar
  • Tushar Kanchan
  • Anand Anwekar
  • Rajesh R Nair
  • Dhananjay Rokde
  • Yatendra Kumar
  • Priyanka Aash
  • Amit Pradhan
  • Satish Papnoi
  • Rajit Kartha
  • Vishal Jaitak
  • Bikram Seth
  • Prashant Deo

CISO Platform's Discussions

[Nominate] Suggest Your Favourites For Top 100 Global IT Influencers 2020

Started this discussion. Last reply by Jason Lau on Monday. 1 Reply

Recommend an influencer whom we might have missed: We have chosen 82 and look forward to remaining 18 nominations. Now you can suggest us names with their contribution.----> Just reply to the…Continue

Can anyone share their experiences with DNIF and aujas as they are their partner for implementation

Started Oct 4 0 Replies

Anyone can share their experiences with DNIF and aujas as they are their partner for implementation (question posted on behalf of a CISO member) Continue

Need Views on Concept Shifting The Security to Left

Started Sep 27 0 Replies

Concept Shifting the Security to Left.. to get views and is it practical? Also how and what tools & processes required for it to be successful ?  (question posted on behalf of a CISO member) Continue

Wanted To Get Feedback on Arcon, for Privilege Account/Access management

Started this discussion. Last reply by CISO Platform Sep 4. 1 Reply

Anyone using Arcon, for Privilege Account/Access management? Wanted to get feedback? (question posted on behalf of a CISO member) Continue

 

Welcome, Priyanka Aash!

Profile Information

Company
CISOPlatform

Comment Wall (24 comments)

You need to be a member of CISO Platform to join the discussion!

Join CISO Platform

At 10:55am on April 15, 2013, Jayaramachandran Rajendran said…

Per the email address it was a She :)

So, looks like maintaining genuine identity on many areas still is a huge security and privacy concern.And how many are you are trying to address it withing technology?

And how many of you think that Spam can be used positively too?

At 2:16pm on April 13, 2013, Jayaramachandran Rajendran said…

Thank you! Surprised to recieve spams from this portal...Otherwise hope to get the best out of this networking portal..

 

At 12:06pm on March 19, 2013, Parasuram M R said…

Thank you very much !

At 7:51pm on March 18, 2013, Jaideep Khanduja said…

Thanks...

At 6:51pm on March 15, 2013, Sachin Kharade said…

Thanks....

At 5:49pm on March 14, 2013, Heramba Naik said…

Thanks to all.

"Information without Information Security is just like sending letter without an envelope".

At 2:53pm on February 11, 2013, Vaman Amarjeet G Kini said…

Thanks Priyanka 

At 2:17am on January 26, 2013, ashish bansal said…

Thank you Priyanka

At 3:48pm on January 23, 2013, G Aswathanarayana Rao said…

Thanks for inviting me

At 3:18pm on January 23, 2013, Pradeep K. Yadav said…

Thanks to All he earlier members and to you Priyanka.
Pradeep Yadav

CISO Platform's Blog

100 Top Security Influencers To Follow In 2020

Posted on November 13, 2019 at 1:27pm 0 Comments

We created "CISO Platform 100" with the vision to recognise those who are making a difference to the world of security. Top 100 Influencers on an average have over 68170 followers on twitter in which some of the Top Influencers have over 3,81,304 followers. Top 100 influencers are divided into 8 categories – CISO, Ethical Hackers, Innovator, Author, Appsec , Academia & Media/Analyst.

As a part of our CISO Platform 100 (Global)…

Continue

9 Critical Capabilities For Digital Risk Protection Program

Posted on October 24, 2019 at 12:41pm 0 Comments

Digital Risk Protection ( DRP ) is a term possibly popularized or coined by Forrester to describe the market of tools and technologies to protect from the risks posed by externally facing digital assets. As per Forrester: “Most buyers (77%) are purchasing DRP tools as net-new solutions for their organizations (as opposed to replacing an existing capability). They’re adding DRP to their existing security technology stacks to better tackle digital risk activities — namely, to improve…

Continue

Short Guide On Attack Surface Analysis

Posted on October 24, 2019 at 12:00pm 0 Comments

A report by Frost & Sullivan found that more than 80% of survey respondents admit to using non-approved applications in their jobs.If you don’t know what to protect, then you cannot protect.

Creating an asset inventory is the first step of any cyber security management function. However due rapid digitization, cloud adoption, IoT adoption and agile disperse teams, 3rd party integrations etc cyber…

Continue

Learn More About the Key Use Cases Of Network ATP Technology

Posted on September 4, 2019 at 12:37pm 0 Comments

Advanced Threat Protection (ATP) is used to protect against sophisticated, highly skilled, well funded and motivated threat actor . The solution uncovers advance threats across Endpoints, Network, Email and Cloud. These solutions are used to detect advanced persistent threats that existing controls are not able to detect or are simply not capable of doing it.

Advance threat protection is not about a single security solution, It is about a combination of security…

Continue
 
 
 

© 2019   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service