Sign Up
Sign In
CISO Platform
Home
My Page
My Page
Invite My Friends
Members
Top 100 ciso awards 2023
Top 100 Awards Apply Now
CISO Resources
All Articles
CISO Webinars
CISO Podcast
CISO QnA
Comparison Tool:1000+
Events
Top100 Awards Nomination
Call For Speaker 2022
Annual Summit 2022
Global 100 Influencers
Upcoming Events
Past Events
Kids Cyber Security
Security Courses
CISO Webinars
All Videos
Featured Videos
conference (35)
Practical Forensics - Tools & Techniques by Sachin Deodhar (Part-2)
pritha
Jan 9, 2015
132
Comments:
0
Practical Forensics - Tools & Techniques by Sachin Deodhar (Part-1)
pritha
Jan 9, 2015
151
Comments:
0
The Notorious 9 in Cloud Security
CISO Platform
Dec 23, 2014
128
Comments:
0
Antti Karjalainen on How we discovered Heartbleed?
CISO Platform
Dec 22, 2014
122
Comments:
0
More Shadow Walker The Progression of TLB Splitting On X86 Jacob Torrey
CISO Platform
Dec 16, 2014
120
Comments:
0
Bitcoin Transaction Malleability: An Insight by Daniel Chechik
CISO Platform
Dec 16, 2014
125
Comments:
0
Cyber Safety in Cars and Medical Devices
CISO Platform
Dec 16, 2014
123
Comments:
0
How to build your Professional Brand? by Adityanath Jha
pritha
Jun 5, 2014
141
Comments:
0
Sneak Peek into the Future:by Professor Indranil Sengupta, IIT Kharagpur
pritha
Jun 5, 2014
124
Comments:
0
Managing multi-geography and multi-cultural organization: A CISO journey
CISO Platform
Jan 9, 2014
131
Comments:
0
Top Myths of IPV-6 Security
CISO Platform
Dec 11, 2013
131
Comments:
0
New Framework for ERP Security
CISO Platform
Dec 11, 2013
131
Comments:
0
Delivering Security Intelligence to the Modern Enterprise
CISO Platform
Dec 11, 2013
110
Comments:
0
Top Logical Vulnerabilities in Web based Applications
CISO Platform
Dec 11, 2013
126
Comments:
0
How comprehensive situational awareness framework can help enterprises
CISO Platform
Dec 11, 2013
79
Comments:
0
Latest Attacks Vectors and Threats on Aircrafts and Unmanned Arial Vehicles
CISO Platform
Dec 10, 2013
118
Comments:
0
Future of Secure Mobile Payment: From zero effort payments to Trusted Mobile Computing
CISO Platform
Dec 10, 2013
137
Comments:
0
How we defended against Man in the Browser Attacks
CISO Platform
Dec 10, 2013
145
Comments:
0
Remote access server architecture for multi vendors access using Multi-Tenant Cloud
CISO Platform
Dec 6, 2013
116
Comments:
0
Top learning while dealing with organization changes
CISO Platform
Dec 6, 2013
169
Comments:
0
Top learnings from evaluating and implementing a DLP Solution
CISO Platform
Dec 5, 2013
134
Comments:
0
New Standard for security leaders: Insights from 2013 IBM CISO assesment
CISO Platform
Dec 4, 2013
133
Comments:
0
Defending Against APT
CISO Platform
Dec 4, 2013
118
Comments:
0
Key Pillars of an effective Risk Management Program
CISO Platform
Dec 4, 2013
139
Comments:
0
1
2
of
2
Next
Hello, you need to enable JavaScript to use CISO Platform.
Please check your browser settings or contact your system administrator.