pritha's Videos (CISO Platform) - CISO Platform 2020-04-08T02:57:19Z https://www.cisoplatform.com/video/video/listForContributor?screenName=3jykggirq3vut&rss=yes&xn_auth=no (Best Of The World) The Dark Future of Privacy By Menny Barzilay (Ex CISO, Israeli Defense) tag:www.cisoplatform.com,2019-07-25:6514552:Video:158370 2019-07-25T07:35:32.430Z pritha https://www.cisoplatform.com/profile/pritha <a href="https://www.cisoplatform.com/video/best-of-the-world-the-dark-future-of-privacy-by-menny-barzilay"><br /> <img src="https://storage.ning.com/topology/rest/1.0/file/get/3382298810?profile=original&amp;width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />How do tech companies manipulate the way people think? What would a top-secret Russian agency do to affect the outcome of the US presidential elections? Can ... <a href="https://www.cisoplatform.com/video/best-of-the-world-the-dark-future-of-privacy-by-menny-barzilay"><br /> <img src="https://storage.ning.com/topology/rest/1.0/file/get/3382298810?profile=original&amp;width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />How do tech companies manipulate the way people think? What would a top-secret Russian agency do to affect the outcome of the US presidential elections? Can ... (Webinar) 5 Shocking Results From The Hidden Internet 12 Months Of Monitoring tag:www.cisoplatform.com,2019-06-21:6514552:Video:158118 2019-06-21T11:48:44.877Z pritha https://www.cisoplatform.com/profile/pritha <a href="https://www.cisoplatform.com/video/webinar-5-shocking-results-from-the-hidden-internet-12-months-o-1"><br /> <img src="https://storage.ning.com/topology/rest/1.0/file/get/2922613719?profile=original&amp;width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />What will you learn ?<br /> -Major causes of recent breaches<br /> -Results from indexing the deep, dark &amp; surface web (Exposed databa... <a href="https://www.cisoplatform.com/video/webinar-5-shocking-results-from-the-hidden-internet-12-months-o-1"><br /> <img src="https://storage.ning.com/topology/rest/1.0/file/get/2922613719?profile=original&amp;width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />What will you learn ?<br /> -Major causes of recent breaches<br /> -Results from indexing the deep, dark &amp; surface web (Exposed databa... Webinar Building an App centric security program tag:www.cisoplatform.com,2018-02-06:6514552:Video:58638 2018-02-06T09:09:20.427Z pritha https://www.cisoplatform.com/profile/pritha <a href="https://www.cisoplatform.com/video/webinar-building-an-app-centric-security-program"><br /> <img src="https://storage.ning.com/topology/rest/1.0/file/get/840397065?profile=original&amp;width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />Key Learnings<br /> -API Programming Interface<br /> -Four Pillars of API Security<br /> -F5 API Protection <a href="https://www.cisoplatform.com/video/webinar-building-an-app-centric-security-program"><br /> <img src="https://storage.ning.com/topology/rest/1.0/file/get/840397065?profile=original&amp;width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />Key Learnings<br /> -API Programming Interface<br /> -Four Pillars of API Security<br /> -F5 API Protection 5 Real ways to destroy business by breaking SAP Applications tag:www.cisoplatform.com,2015-02-09:6514552:Video:30292 2015-02-09T10:42:49.843Z pritha https://www.cisoplatform.com/profile/pritha <a href="https://www.cisoplatform.com/video/5-real-ways-to-destroy-business-by-breaking-sap-applications"><br /> <img alt="Thumbnail" height="180" src="https://storage.ning.com/topology/rest/1.0/file/get/840396738?profile=original&amp;width=240&amp;height=180" width="240"></img><br /> </a> <br></br>Do you know where all the critical data of your company is stored? Is it possible for attacker to commit sabotage or espionage against your company by breaking into just one of your business critical systems? And if so - what kind of systems could be under attack? Is it easy to break them? Is it a myth that SAP systems could be accessed only… <a href="https://www.cisoplatform.com/video/5-real-ways-to-destroy-business-by-breaking-sap-applications"><br /> <img src="https://storage.ning.com/topology/rest/1.0/file/get/840396738?profile=original&amp;width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />Do you know where all the critical data of your company is stored? Is it possible for attacker to commit sabotage or espionage against your company by breaking into just one of your business critical systems? And if so - what kind of systems could be under attack? Is it easy to break them? Is it a myth that SAP systems could be accessed only internally? Time has come not only to answer all of these questions. This time the real examples of different attacks on Enterprise Business application systems will be shown, based on eight-year research experience in that field. First of all we will cover all possible business risks related to each end every type of systems such as ERP, SRM, HR, Business Intelligence, PLM’s and Industry solutions so that every high level executive will get the full understanding of what could happen. After that, we will show examples of how easy is it to do such critical actions in different systems by exploiting vulnerabilities and misconfigurations from more business-related - such as Abusing SRM systems - to win the bid, for example. From frauds in HR system and salary-increasing to more technical things, such as drilling into corporate network via SAP Portal or delivering backdoors, which look like official updates via SAP Router. Our presentation will be the first to show real threats for business during those attacks with demo of the most interesting ones, and a guide to avoid them. BadUSB — On accessories that turn evil by Karsten Nohl tag:www.cisoplatform.com,2015-02-09:6514552:Video:30479 2015-02-09T10:40:27.381Z pritha https://www.cisoplatform.com/profile/pritha <a href="https://www.cisoplatform.com/video/badusb-on-accessories-that-turn-evil-by-karsten-nohl"><br /> <img alt="Thumbnail" height="180" src="https://storage.ning.com/topology/rest/1.0/file/get/840394741?profile=original&amp;width=240&amp;height=180" width="240"></img><br /> </a> <br></br>This talk introduces a new form of malware that operates from controller chips inside USB devices. Peripherals can be reprogrammed in order to take control of a computer, exfiltrate data, or spy on the user. We demonstrate a full system compromise from USB and a self-replicating USB virus not detectable with current… <a href="https://www.cisoplatform.com/video/badusb-on-accessories-that-turn-evil-by-karsten-nohl"><br /> <img src="https://storage.ning.com/topology/rest/1.0/file/get/840394741?profile=original&amp;width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />This talk introduces a new form of malware that operates from controller chips inside USB devices. Peripherals can be reprogrammed in order to take control of a computer, exfiltrate data, or spy on the user. We demonstrate a full system compromise from USB and a self-replicating USB virus not detectable with current defenses