cyber security - CISO Webinars - CISO Platform2024-03-29T06:36:19Zhttps://www.cisoplatform.com/videos/feed/tag/cyber+security(Keynote) The As, Bs, and Four Cs of Testing Cloud Native Applications - Dan Cornellhttps://www.cisoplatform.com/videos/keynote-the-as-bs-and-four-cs-of-testing-cloud-native-application2021-08-23T12:12:20.000Z2021-08-23T12:12:20.000Zprithahttps://www.cisoplatform.com/members/pritha<div><img src="https://storage.ning.com/topology/rest/1.0/file/get/9461745889?profile=RESIZE_400x&width=400"></div><div><p>For cloud-native applications, the combination of new technologies and architectural elements has introduced questions about how to scope, plan, and execute security assessments. This presentation looks at how the assessment landscape has changed with the introduction of cloud-native applications and explores how threat modeling is central to testing their security. In addition, the “Four C’s” conceptual model for looking at cloud-native application security is introduced, including a discussion of how both automated and manual testing methodologies can be used to accomplish assessment goals.</p></div>(Fireside Chat) Lessons Learnt From The SolarWinds Attack - Sudhakar Ramakrishna & Bikash Baraihttps://www.cisoplatform.com/videos/fireside-chat-lessons-learnt-from-the-solarwinds-attack-sudhakar-2021-08-23T12:09:43.000Z2021-08-23T12:09:43.000Zprithahttps://www.cisoplatform.com/members/pritha<div><img src="https://storage.ning.com/topology/rest/1.0/file/get/12381456267?profile=RESIZE_400x&width=400"></div><div><p>The ‘SolarWinds hack’, a cyberattack recently discovered in the United States, has emerged as one of the biggest ever targeted against the US government, its agencies and several other private companies.</p></div>(Keynote) The Entire IT Security Industry - Richard Stiennonhttps://www.cisoplatform.com/videos/keynote-the-entire-it-security-industry-richard-stiennon2021-08-23T12:08:24.000Z2021-08-23T12:08:24.000Zprithahttps://www.cisoplatform.com/members/pritha<div><img src="https://storage.ning.com/topology/rest/1.0/file/get/9461743452?profile=RESIZE_400x&width=400"></div><div><p>This talk dispels myths about our industry. One myth is that consolidation occurs. Another is the slow growth of the industry usually pegged at less than 10% a year by the major research firms. Another is that security startups fail at an alarming rate. They do not. There were only two failures of funded startups in 2020, although there were some acquisitions at fire sale prices. Stiennon shares the data from the Directory in Security Yearbook 2021. There are 2,615 vendors broken into 16 major categories.</p></div>Webinar On 'A Business First Approach To Security With Zero Trust'https://www.cisoplatform.com/videos/webinar-on-a-business-first-approach-to-security-with-zero-trust2021-08-23T12:06:38.000Z2021-08-23T12:06:38.000Zprithahttps://www.cisoplatform.com/members/pritha<div><img src="https://storage.ning.com/topology/rest/1.0/file/get/9461742258?profile=RESIZE_400x&width=400"></div><div><p>Webinar On 'A Business First Approach To Security With Zero Trust'</p></div>(Keynote) MITRE ATT&CK Demystified - Arnab Chattopadhyayhttps://www.cisoplatform.com/videos/keynote-mitre-att-ck-demystified-arnab-chattopadhyay2021-08-23T12:04:40.000Z2021-08-23T12:04:40.000Zprithahttps://www.cisoplatform.com/members/pritha<div><img src="https://storage.ning.com/topology/rest/1.0/file/get/9461741089?profile=RESIZE_400x&width=400"></div><div><p>MITRE ATT&CK is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations of cyber security threats. They’re displayed in matrices that are arranged by attack stages, from initial system access to data theft or machine control. The goal is to create a comprehensive list of known adversary tactics and techniques used during a cyberattack.</p></div>(Keynote) Cybersecurity Challenges Of IOT - Chuck Brookshttps://www.cisoplatform.com/videos/keynote-cybersecurity-challenges-of-iot-chuck-brooks2021-08-23T12:00:49.000Z2021-08-23T12:00:49.000Zprithahttps://www.cisoplatform.com/members/pritha<div><img src="https://storage.ning.com/topology/rest/1.0/file/get/9461736898?profile=RESIZE_400x&width=400"></div><div><p>The IoT security challenge comes down to understanding what is connected in the IoT landscape, knowing how to best protect the most important assets and effectively mitigating and remediating a security incidents and breaches.</p></div>(Keynote) Inculcating Cyber Hygiene Especially For Non Tech Staff In Organisations - Gopi Gargehttps://www.cisoplatform.com/videos/keynote-inculcating-cyber-hygiene-especially-for-non-tech-staff-i2021-08-23T11:59:31.000Z2021-08-23T11:59:31.000Zprithahttps://www.cisoplatform.com/members/pritha<div><img src="https://storage.ning.com/topology/rest/1.0/file/get/9461734888?profile=RESIZE_400x&width=400"></div><div><p>While defence technologies in cyber security will remain a catch-up game, given the degree of "functions softwarisation", security breach trends unambiguously point at the human as the primary cause. “Lack of secure user behaviour” is the overwhelming evidence in a substantial number of breaches, which are caused due to people and processes rather than technology. End-users have become the weakest link in the cyber chain. The user-side perception of "security as an overhead" seems persistent – a barrier to adopting secure use practices.</p></div>(Keynote) Emerging Fraud Techniques - James Tinhttps://www.cisoplatform.com/videos/keynote-emerging-fraud-techniques-james-tin2021-08-23T11:56:54.000Z2021-08-23T11:56:54.000Zprithahttps://www.cisoplatform.com/members/pritha<div><img src="https://storage.ning.com/topology/rest/1.0/file/get/9461729667?profile=RESIZE_400x&width=400"></div><div><p>We aim to discuss how to leverages AI and ML to accurately classify web and protect mobile application sessions in real-time over a billion times per day Understanding the key challenges which an organization can face and how to defeat application fraud.</p></div>(Keynote) How Can We Prevent Account Compromise: A Google Perspective - By Elie Burszteinhttps://www.cisoplatform.com/videos/keynote-how-can-we-prevent-account-compromise-a-google-perspect-12021-08-23T11:54:16.000Z2021-08-23T11:54:16.000Zprithahttps://www.cisoplatform.com/members/pritha<div><img src="https://storage.ning.com/topology/rest/1.0/file/get/9461727663?profile=RESIZE_400x&width=400"></div><div><p>This Google talk helps us understand which are the main areas to look first in and create a process to prevent account compromise. Once compromised, it is much harder to stop access.</p></div>(Keynote) The Tale Of The APT - By Raj Samanihttps://www.cisoplatform.com/videos/keynote-the-tale-of-the-apt-by-raj-samani2021-08-23T11:44:13.000Z2021-08-23T11:44:13.000Zprithahttps://www.cisoplatform.com/members/pritha<div><img src="https://storage.ning.com/topology/rest/1.0/file/get/9461716888?profile=RESIZE_400x&width=400"></div><div><p>This talk focuses on detailed analysis of state sponsored tactics to target and compromise large enterprises. The talk will evaluate the emerging tactics used by adversaries, and the mechanisms required to not only defend but also how to stay up to date with developing TTPs.</p></div>New Trends FromGartner Hype Cycle2021 That YouCan't Miss.https://www.cisoplatform.com/videos/new-trends-fromgartner-hype-cycle2021-that-youcan-t-miss2021-08-23T11:42:04.000Z2021-08-23T11:42:04.000Zprithahttps://www.cisoplatform.com/members/pritha<div><img src="https://storage.ning.com/topology/rest/1.0/file/get/9461715098?profile=RESIZE_400x&width=400"></div><div><div id="meta" class="style-scope ytd-watch-flexy">
<div id="meta-contents" class="style-scope ytd-watch-flexy">
<div id="container" class="style-scope ytd-video-secondary-info-renderer">
<div id="content" class="style-scope ytd-expander">
<div id="description" class="style-scope ytd-video-secondary-info-renderer">New Trends From Gartner Hype Cycle 2021 That You Can't Miss.</div>
</div>
<div id="always-shown" class="style-scope ytd-metadata-row-container-renderer"> </div>
</div>
</div>
</div>
<div id="ticket-shelf" class="style-scope ytd-watch-flexy"> </div>
<div id="merch-shelf" class="style-scope ytd-watch-flexy"> </div>
<p> </p>
<div id="header" class="style-scope ytd-item-section-renderer"> </div>
<p> </p>
<p> </p></div>