Social Network For Security Executives: Network, Learn & Collaborate
Happy festive season to all our readers.
“BYOD adoption is much easier now, If "CISO / IT" Gets Its Way. It helps IT decision makers supporting BYOD to anticipate the day to minimise the device expenses of any organisation for its employees and secure & simplify management. Now your enterprise applications can be SECURELY accessed on…
Added by Sharat AIRANI on August 17, 2014 at 11:30am — No Comments
The 2012 Cost of Data Breach Study conducted provides some valuable information about the average cost of an enterprise data breach. The study, released in March’13, also recognized that organizations with a chief information security officer (CISO) in place experienced reduced costs for data breaches, which is right on target from my experience.
I am right in suspecting that an organization without a CISO is more prone to a security fault.
The role of a…
ContinueAdded by Sharat AIRANI on August 22, 2013 at 4:30pm — No Comments
I have seen many blogs, articles and most of them stated as, CISO need the ability to adopt the business. The role of the CISO in any organisation is to protect the business and bring the operations under secured mode, under the policy defined, governance so on and so forth. So obviously he has to aware of the business, competition and more than that the risk to the organisation and compliance matter.
Here I am putting this in other side of the context. Does business also need to…
ContinueAdded by Sharat AIRANI on August 1, 2013 at 2:30pm — No Comments
If you start off blowing the whistle too quickly, too early on — and believe me, early in my career, I did — I didn't make any friends, didn't get any further with the program of work I was trying to do.
You are going to discover some very, very ugly things. The secret that I have personally found is when you find the ugly stuff, don't go trumpet it to everybody and say, 'Hey, I've found all these flaws’.
Instead, what you need to do is to sit with the IT operations staff,…
ContinueAdded by Sharat AIRANI on July 12, 2013 at 1:00pm — No Comments
On 2nd July 2013, National Cyber Security Poilicy has been released. First point in the preamble is an eye opener. It says " Cyberspace is a complex environment consisting of interactions between people, software and services supported by worldwide distribution of information and communication technology (ICT) devices and networks".
Enterprise information security is more than just protecting against viruses. The collaborative and diverse nature of modern business means that…
Added by Sharat AIRANI on July 5, 2013 at 5:00pm — No Comments
Regardless of how safe and secure any organisation may think its IT infrastructure is, they realize that they are still not immune to information security threats. In addition to deploying the right tools and technology, organisations globally needs to develop a robust and competent workforce equipped with the necessary skills to adequately defend its IT infrastructures. These cyber defenders need not just basic trained to sufficiently defend against mounting security threats, more than…
ContinueAdded by Sharat AIRANI on June 26, 2013 at 8:00pm — No Comments
IT Trends and challenges:
World is becoming Instrumental, Interconnected and Intelligent. IT security teams in enterprises are faced with rapidly mutating threats at every possible point of entry. This is fuelled by the fast evolution of threat landscape and sea of changes in network and security architecture.
Added by Sharat AIRANI on June 16, 2013 at 5:00pm — No Comments
IT arena is like a security battle ground, where internet is fundamentally open considering the major far-ends like social media, mobility, cloud, virtualisation etc which leads to targeted attacks.
On any given day; any organisation can suffer irreparable harm at the hands of cyber- attackers. No organisation is too small or too big for this.
Unfortunately this battle field is not symmetric. The attackers have the clear advantage. Defenders have to protect a wide perimeter…
ContinueAdded by Sharat AIRANI on April 12, 2013 at 8:00pm — No Comments
We have developed the myth that technology can be an effective fortress – We can have security.
Traditional focus on:
Added by Sharat AIRANI on February 13, 2013 at 5:00pm — 4 Comments
Started by Priyanka Aash Mar 3. 0 Replies 1 Like
What are the challenges you as a CISO have been facing since the last year and share some security trends that are catching up? Help the community by sharing your knowledge and personal views on this subject. Or if you have any specific questions…Continue
Started by Maheshkumar Vagadiya Jul 30, 2020. 0 Replies 0 Likes
Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue
Started by CISO Platform. Last reply by Yogesh Nov 19, 2020. 2 Replies 0 Likes
(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue
Started by CISO Platform. Last reply by ANAND SHRIMALI May 20, 2020. 4 Replies 1 Like
(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue
# Manageengine Adaudit Plus -vs- Netwrix Auditor
# Rapid7 Nexpose -vs- Tenable Network Security Nessus
# Algosec Firewall Analyzer -vs- Tufin Orchestration Suite
# Hp Arcsight Siem Solutionarcsight Express -vs- Splunk Enterprise Splunk Cloud Splunk Light
# Cisco Meraki Mx Appliances -vs- Fortinet Fortigate
# Cloud Access Security Broker
# Distributed Denial of Service
# Network Advanced Threat Protection
Follow us
© 2021 Created by CISO Platform.
Powered by
Badges | Report an Issue | Privacy Policy | Terms of Service