CISO Platform's Videos (CISO Platform) - CISO Platform 2020-02-20T14:12:26Z https://www.cisoplatform.com/video/video/listForContributor?screenName=06chlks3jaa2a&rss=yes&xn_auth=no (Webinar) 5 Shocking Results From The Hidden Internet 12 Months Of Monitoring tag:www.cisoplatform.com,2019-06-14:6514552:Video:158105 2019-06-14T18:28:46.519Z CISO Platform https://www.cisoplatform.com/profile/06chlks3jaa2a <a href="https://www.cisoplatform.com/video/webinar-5-shocking-results-from-the-hidden-internet-12-months-of"><br /> <img alt="Thumbnail" height="180" src="https://storage.ning.com/topology/rest/1.0/file/get/2922613719?profile=original&amp;width=240&amp;height=180" width="240"></img><br /> </a> <br></br>What will you learn ?<br></br> -Major causes of recent breaches<br></br> -Results from indexing the deep, dark &amp; surface web (Exposed database, Leaked passwords, Code leaks, Open cloud resources, Exposed network services)<br></br> <br></br> From major breaches, some key reasons were seen to be Shadow IT Risks, Leaked Credentials, 3rd Party/Vendor Risks.… <a href="https://www.cisoplatform.com/video/webinar-5-shocking-results-from-the-hidden-internet-12-months-of"><br /> <img src="https://storage.ning.com/topology/rest/1.0/file/get/2922613719?profile=original&amp;width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />What will you learn ?<br /> -Major causes of recent breaches<br /> -Results from indexing the deep, dark &amp; surface web (Exposed database, Leaked passwords, Code leaks, Open cloud resources, Exposed network services)<br /> <br /> From major breaches, some key reasons were seen to be Shadow IT Risks, Leaked Credentials, 3rd Party/Vendor Risks. Major breaches like American Express, Uber, Dropbox, Dunkin Donuts, British Airways &amp; many more. This research was in line with this to continuosly monitor the web (surface,deep,dark) to understand the leaked credentials, pattern of data loss etc.<br /> <br /> Speaker : Jitendra Chauhan, Head Of Engineering, FireCompass Hacking Exposed: LIVE-Why Current Security Solutions Fail tag:www.cisoplatform.com,2019-06-12:6514552:Video:157699 2019-06-12T07:33:14.230Z CISO Platform https://www.cisoplatform.com/profile/06chlks3jaa2a <a href="https://www.cisoplatform.com/video/hacking-exposed-live-why-current-security-solutions-fail-1"><br /> <img alt="Thumbnail" height="180" src="https://storage.ning.com/topology/rest/1.0/file/get/2863222450?profile=original&amp;width=240&amp;height=180" width="240"></img><br /> </a> <br></br>Stuart McClure, Ex McAfee CTO &amp; lead author of HACKING EXPOSED, along with Bikash Barai, CEO of iVIZ, and Gary Golumb, Sr. Researcher at Cylance. This episode is a joint effort between Hacking Exposed and CISO Platform.<br></br> <br></br> What you will Learn:<br></br> <br></br> How security products can be exploited<br></br> Vulnerability trends in security… <a href="https://www.cisoplatform.com/video/hacking-exposed-live-why-current-security-solutions-fail-1"><br /> <img src="https://storage.ning.com/topology/rest/1.0/file/get/2863222450?profile=original&amp;width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />Stuart McClure, Ex McAfee CTO &amp; lead author of HACKING EXPOSED, along with Bikash Barai, CEO of iVIZ, and Gary Golumb, Sr. Researcher at Cylance. This episode is a joint effort between Hacking Exposed and CISO Platform.<br /> <br /> What you will Learn:<br /> <br /> How security products can be exploited<br /> Vulnerability trends in security products over last decade<br /> Vulnerability statistics of Major Security Vendors /Products<br /> Classes of Vulnerabilities in Security Products and comparative analysis New Realities in Aviation Security by Hugo Teso tag:www.cisoplatform.com,2019-06-12:6514552:Video:157771 2019-06-12T07:25:16.588Z CISO Platform https://www.cisoplatform.com/profile/06chlks3jaa2a <a href="https://www.cisoplatform.com/video/new-realities-in-aviation-security-hugo-teso"><br /> <img src="https://storage.ning.com/topology/rest/1.0/file/get/2863177125?profile=original&amp;width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />CISO Platform presents an exciting opportunity to listen to Hugo Teso, who recently “created global news by demonstrating how an aircraft can be compromised and remotely controlled by using an android phone"! <a href="https://www.cisoplatform.com/video/new-realities-in-aviation-security-hugo-teso"><br /> <img src="https://storage.ning.com/topology/rest/1.0/file/get/2863177125?profile=original&amp;width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />CISO Platform presents an exciting opportunity to listen to Hugo Teso, who recently “created global news by demonstrating how an aircraft can be compromised and remotely controlled by using an android phone"! A Sprint To Protect POS by Nir Valtman Discoverer of Point-of-Sale Vulnerabilities tag:www.cisoplatform.com,2019-06-12:6514552:Video:157767 2019-06-12T07:12:31.212Z CISO Platform https://www.cisoplatform.com/profile/06chlks3jaa2a <a href="https://www.cisoplatform.com/video/a-sprint-to-protect-pos-by-nir-valtman-discoverer-point-of-sales"><br /> <img alt="Thumbnail" height="180" src="https://storage.ning.com/topology/rest/1.0/file/get/2863116875?profile=original&amp;width=240&amp;height=180" width="240"></img><br /> </a> <br></br>A journey to protect POS by Nir Valtman Discoverer of Point-of-Sale Vulnerabilities<br></br> <br></br> From Target to other retail chains were all about 'POS'. Point-Of-Sale vulnerability has been at its peak for a while. This talk illustrates the POS vulnerabilities from both retailer and software vendor's perspective. Get an insight into how the POS… <a href="https://www.cisoplatform.com/video/a-sprint-to-protect-pos-by-nir-valtman-discoverer-point-of-sales"><br /> <img src="https://storage.ning.com/topology/rest/1.0/file/get/2863116875?profile=original&amp;width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />A journey to protect POS by Nir Valtman Discoverer of Point-of-Sale Vulnerabilities<br /> <br /> From Target to other retail chains were all about 'POS'. Point-Of-Sale vulnerability has been at its peak for a while. This talk illustrates the POS vulnerabilities from both retailer and software vendor's perspective. Get an insight into how the POS devices are compromised including difficult methods like memory scraping. This talk will demonstrate the working of POS vulnerability and how threats can be minimized. It will also explain the ways to mitigate the risk while you get the basic concepts and get to know which of these actually work.<br /> <br /> <iframe src="//www.slideshare.net/slideshow/embed_code/42963422" width="476" height="400" frameborder="0"></iframe> SACON (Security Architecture Conference): Community Takeaways tag:www.cisoplatform.com,2018-08-27:6514552:Video:61653 2018-08-27T10:08:23.853Z CISO Platform https://www.cisoplatform.com/profile/06chlks3jaa2a <a href="https://www.cisoplatform.com/video/sacon-security-architecture-conference-community-takeaways"><br /> <img src="https://storage.ning.com/topology/rest/1.0/file/get/840397104?profile=original&amp;width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />SACON (Security Architecture Conference) is India's 1st and Only Security Architecture Conference held on 12th July, Bangalore, India with senior security pr... <a href="https://www.cisoplatform.com/video/sacon-security-architecture-conference-community-takeaways"><br /> <img src="https://storage.ning.com/topology/rest/1.0/file/get/840397104?profile=original&amp;width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />SACON (Security Architecture Conference) is India's 1st and Only Security Architecture Conference held on 12th July, Bangalore, India with senior security pr...