Meet, meet and meet, the last few weeks all we've done is meet you and try to help you better. Your views shape us and those plenty views needed a To-Do List, which is right here. We are grateful for each of your contributions and hope to have more of these exciting sessions soon again.
Quick event meets-
- New York CISO Platform Breakfast Meetup (15th August)
- San Francisco CISO Platform Breakfast Meetup (14th August)
- Los Angeles CISO Platform Breakfast Meetup (11th August)
- LasVegas CISO Platform Breakfast Meetup (6th August)
- Mumbai - CISO Platform Breakfast Meetup (24th July)
- Delhi-CISO Platform Breakfast Meetup (25th July)
- CISO Handbook Meet up on DLP & Data Security" and "Advanced Cyber Security Threat Protection(13th August) [*sponsored websense]
- Bali CISO Platform Meetup (4th September)
CISOs were very enthusiastic and shared their views on various aspects like their current obstacles etc. Below are the best of all this discussion at a glance.
Topics CISOs are Interested in:
- Corporate espionage
- Business and security alignment-sensitizing
- Board level communication
- Template to derisk-cya
- Acceptable risk communication and sign off
- Evaluation checklist
- Handling audit and auditors- jwt
- Handling consultants - satish
- Latest tools and technologies-comparison
- Taxonomy
- Mobile security-hacking
- Live - Demo of products,hackers and social engineering
- Masking of phone
- Csr for ciso
- Open source tools repository
- Work life balance
- Forensics- case studies of frauds
- Utilities security - electricity
- How do I protect my computer phone?
- How to do mssp business in usa?
- Governance for cloud vendors- sla
- Thought leadership in appsec
- Cost optimization for security
- Not getting logs from the vendor
- Controlling internet bandwidth
- Erp security
- Securing retail supply chain
- Connecting small office - securing
- How to get appliance testing? Best practices: what should I do before I get an appliance into my network?
- New tech to protect cloud
- Data security for eprocurement:
- Erp customization security
- Third party coding or vendor risk
- Vendor locked! - code changes and security
- Cyber defense- setting tolerance
- Mobile security enterprise framework:
- Legal framework universally acceptable for security
- Minimum requirements from government
- Knowing your cyber liabilities
- Cyber assurance for security
- Innovations in security
- Negotiating licenses and contracts
- Moderated discussions: focused topics
Ideas of Engagement:
- Sharing content on website
- Weekly, monthly, weekly checklist for ciso
- Selling security- case studies
- Art of living or meditation
- Topic for month-ask the community
- Certification-checklist
- Subject matter expert -breakfast
- Open source appsec testing tools
- Government level compliance or checklists for data on cloud for other vendors
- Meetup.com and linked.in
- Any of your customers (BYOC), invitation
- At somebody's office
- Museum or interesting place
- Fs-isac (heads)
- Bill sieglien - breakfast (ciso executive network)
- Breakfast club (pay money)
- Get intro for isac and bill (kispert)
- Kispert- top 100 ciso email (draft)
- Only CISO
- First 90 days for a CISO
- Maslows law
- Paul martin
- Securosis
- John orison- tim tech
- Chin lady (2)
- Dlp, ids,
- Invite for cp annual summit
- Email- invite, advisory
- sujeet and garrett (advisors+invite to speak+send meeting notes+invite to join)
Feedback on CISO Platform Index(CPI):
- When is the rating done? How recent is the product?
- Ciso satisfaction index
- Version and date of purchase
Key notes on content ( uncategorized )-
- How well am I doing as a CISO?
- 90 days plan to get started
- Cmm model for security
- Lonely ciso: 1 man shop
- Security on a shoestring
red- either removed or in wrong category
Comments