Open Source Intelligence Top 20 Tools
Below is a curated list of Top 20 OSINT tools that a CISO (or security professional) could use. The structure of the document mentions the 'Tool Name' followed by 'Tool Usage & Benefits'. Download file link
Open Source Intelligence Top 20 Tools
Below is a curated list of Top 20 OSINT tools that a CISO (or security professional) could use. The structure of the document mentions the 'Tool Name' followed by 'Tool Usage & Benefits'. Download file link
Below the whole GDPR CISO kit has been presented. You may want to download them, the links are provided on top. Below that you can avail the content and decide which documents you need to download
Download Links To GDPR Kit Documents
#1.CISO Priorit
Session Brief
This session was co-presented by 2speakers.
The first part by Wasim Halani included fundamentals, threat hunting approaches, elastic stack primer (elastic search, log stash, kibana, beats), concepts (nodes & cluster, index & shards,
Parents
more....
IoT(Internet Of Things) Task force
Objective
In order to ensure a consistent and a practical approach in responding to IoT related threats, some documents have been developed for adoption and use.
Members
Top Talks @ RSA Conference USA 2018: Your Complete Guide
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Securit
Session Brief
This session was heavily covered with demos, the slides cover very little material. Includes Latest IoT Attacks
About Speaker
Sri Chakradhar, CTO, Entersoft
>> Pre-Register for SACON 2018
Presentation
Session Brief
Includes basic IoT security key components, hyper scale, key players, key security functions, functional aspects of IoT Security, Access control, network segments & more
About Speaker
Arnab Chattopadhayay, Senior-Director, Capgemini
Session Brief
This is a joint initiative by TiE & CISO Platform. It explains IoT Security Challenges, Complexity and Introduces some ways of solving it (a fresh approach)
About Speaker
Arvind Tiwary - Chair, IoT Forum & Bikash Barai - Co-Founder
Session Brief
This includes Mobile App Development - Attack Surface, Data authentication & App protection challenges, iOS & Android protection measures & more
About Speaker
Srinath Venkataramani, Director-Development, Symantec
Session Brief
Includes fundamentals of connected cars, ECU (Electronic Control Unit) & types, Controlled Area Network (CAN) Protocol, On-Board Diagnostics, Components Of Connected Cars
About Speaker
Aditya Kakrania, Security Innovation
Session Brief
Includes fundamental understanding of threat hunting, process, plan and execution, tools & techniques, resources to learn, DNS Tunnelling, Webshells & more
About Speaker
Shomiron Das Gupta, Founder, Netmonastery
Session Brief
This includes an understanding of deception and who should use it
About Speaker
Sahir Hidayatullah, Smokescreen
>> Pre-Register for SACON 2018
Presentation
Session Brief
Includes threat hunting platform drivers, hunting styles, hunting maturity model (HMM), hunting strategy, data domains, data diversity, toolset diversity, kill chain, hunting process, data type & location, analytic technique, beacon,
Session Brief
Includes Threat Modeling Basics, Approach, Purpose, Threat Vs Vulnerability, STRDE Framework, Threat Rating, Risk Analysis Model, DREAD, Countermeasures & more
About Speaker
Abhishek Datta - Head Of Technology, Appsecco
Session Brief
Includes API Security Trends, Risks & Security Governance
About Speaker
Suhas Desai, VP - Digital Security, Aujas
>> Pre-Register for SACON 2018
Presentation