Social Network For Security Executives: Network, Learn & Collaborate
Opening the Door to DoD Perspectives on Cyber Threat Intelligence (RSA Conference 2017)
Cyber threats are growing in volume and variety. It is critical for the security industry to understand how to help DoD improve its cyber-intelligence. Defence Intelligence Officer for Cyber, Mr. Carback, will share DoD imperatives that will baseline your understanding of the actors, their intent and impact, the role of…
ContinueAdded by Meghana P on May 4, 2017 at 10:30am — No Comments
How To Improve Phishing Awareness by 300% in 18 Months (RSA Conference 2017)
Employees are our front line of defence, but it is our responsibility as security professionals to educate and equip them with the tools and knowledge they need in order to help us fight the phish. This session will give you practical, inexpensive, real-life ways we went about educating 100,000 employees in 150 countries around the…
ContinueAdded by Meghana P on May 4, 2017 at 10:30am — No Comments
What We’ve Learned Building a Cybersecurity Operation Center: du Case Study (RSA Conference 2017)
The cybersecurity landscape is rapidly evolving, with new threats and threat actors emerging, and traditional security operations centers (SOCs) need to be augmented accordingly. This session will detail the journey of du in building and continually enhancing its SOC, physically and philosophically, to best deal…
ContinueAdded by Meghana P on May 4, 2017 at 10:30am — No Comments
Learnings from the Cloud: What to Watch When Watching for Breach (RSA Conference 2017)
Protecting against account breach and misuse when using a cloud service can be challenging, as the cloud service decides what tooling is available, and control may be limited. This session will share learnings and best practices from the Office 365 engineering team: from the patterns observed, what are best practices to…
ContinueAdded by Meghana P on May 4, 2017 at 10:30am — No Comments
Can I Get a Witness? Technical Witness Bootcamp (RSA Conference 2017)
As the stakes rise in data breach litigation, more and more information security professionals will be called upon to testify on behalf of their organization. This boot camp will teach participants the basics of providing solid, credible testimony, and point out traps for the unwary first time…
ContinueAdded by Meghana P on May 4, 2017 at 10:30am — No Comments
Deep Impact: Explore the Wide-Reaching Impact of a Cyberattack (RSA Conference 2017)
The impacts of a cyberattack are long-lasting and extend well beyond technology. In this cyber-wargame, participants will test their assumptions and incident response know-how against a cyberattack scenario with complex business impacts that unfolds over a simulated year.…
ContinueAdded by Meghana P on May 4, 2017 at 10:30am — No Comments
Diagnosis SOC-Atrophy: What To Do When Your SOC Is Sick (RSA Conference 2017)
Leaders continue to discover poorly designed security operations centre's that struggle to protect the organization against today’s advanced threats. This session will address what you can do when your SOC is sick and how to create a get well plan to balance people, process, technology and…
ContinueAdded by Meghana P on May 4, 2017 at 10:30am — No Comments
Building a Strategic Plan for Your Security Awareness Program (RSA Conference 2017)
The key to securing your employees behaviors is an effective strategic plan that is both realistic and supported by your leadership. Learn how other organizations are doing this and how you can apply their lessons learned to build your own strategic plan when you get back to your…
ContinueAdded by Meghana P on May 4, 2017 at 10:30am — No Comments
Gamification Using “Science of Habit Cycle” to Transform User Behaviour (RSA Conference 2017)
Forty percent of our daily activities are automated routines or habits which are not under conscious control. Gamification for security awareness has been tried but almost no work has happened in the context of “Habit Cycle.” What is the science behind the formation of habits in our brain? How can you use…
ContinueAdded by Meghana P on May 4, 2017 at 10:30am — No Comments
Expanding your Blue Team by Creating Security Culture (RSA Conference 2017)
In 2012, Salesforce launched a program aimed at increasing the difficulty of a successful phishing attack on their employees. By driving vulnerability reporting through positive incentives and behavioural science, this talk will show how to account for human mistakes to enable a culture where it is “safe to fail” with improved results…
ContinueAdded by Meghana P on May 4, 2017 at 10:30am — No Comments
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.
RSA Conference held its event at the Moscone Center in San Francisco and brought together a record number of more…
ContinueAdded by Meghana P on May 3, 2017 at 9:30pm — No Comments
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.
RSA Conference held its event at the Moscone Center in San Francisco and brought together a record number of more…
ContinueAdded by Meghana P on April 28, 2017 at 11:30pm — No Comments
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.
RSA Conference held its event at the Moscone Center in San Francisco and brought together a record number of more…
ContinueAdded by Meghana P on April 26, 2017 at 4:00pm — No Comments
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.
RSA Conference held its event at the Moscone Center in San Francisco and brought together a record number of more…
ContinueAdded by Meghana P on April 26, 2017 at 4:00pm — No Comments
Before you go all torches and pitchforks on me, hear me out.
I hated writing this article. Truly. My industry is, at its core, a service industry. Overwhelmingly I meet people who go into IT service, support and cybersecurity that have a real desire to help others.…
ContinueAdded by Meghana P on March 8, 2017 at 1:00pm — No Comments
One is not exactly channeling Nostradamus to predict that ransomware attacks will hit Industrial Control Systems (ICS). The importance of a reliable, high integrity backup and ability to recover in an acceptable timeframe is the same for ICS and enterprise network…
ContinueAdded by Meghana P on March 8, 2017 at 11:30am — No Comments
Our editorial team has handpicked the best of the best articles from LinkedIn which contains the details about the trending Ransomware posts.
1) …
ContinueAdded by Meghana P on March 7, 2017 at 4:50pm — No Comments
Started by Priyanka Aash Mar 3. 0 Replies 1 Like
What are the challenges you as a CISO have been facing since the last year and share some security trends that are catching up? Help the community by sharing your knowledge and personal views on this subject. Or if you have any specific questions…Continue
Started by Maheshkumar Vagadiya Jul 30, 2020. 0 Replies 0 Likes
Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue
Started by CISO Platform. Last reply by Yogesh Nov 19, 2020. 2 Replies 0 Likes
(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue
Started by CISO Platform. Last reply by ANAND SHRIMALI May 20, 2020. 4 Replies 1 Like
(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue
# Manageengine Adaudit Plus -vs- Netwrix Auditor
# Rapid7 Nexpose -vs- Tenable Network Security Nessus
# Algosec Firewall Analyzer -vs- Tufin Orchestration Suite
# Hp Arcsight Siem Solutionarcsight Express -vs- Splunk Enterprise Splunk Cloud Splunk Light
# Cisco Meraki Mx Appliances -vs- Fortinet Fortigate
# Cloud Access Security Broker
# Distributed Denial of Service
# Network Advanced Threat Protection
Follow us
© 2021 Created by CISO Platform.
Powered by
Badges | Report an Issue | Privacy Policy | Terms of Service