Technical Skills:
Major Areas Of Focus:
- Incident Response
- Computer Forensics
- Network Security
- Secure Architecture
( Read More: CISO Platform Top IT Security Influencers (Part 1) )
Conceptual (Understand How-It-Works):
- Fundamental security conce
Technical Skills:
Major Areas Of Focus:
( Read More: CISO Platform Top IT Security Influencers (Part 1) )
Conceptual (Understand How-It-Works):
In the fast moving world of cyber security incident response, the challenge is to rapidly identify and stay ahead of the threat. Incident responders must move faster, be more agile, have longer stamina than the attacker. Additionally they must also b
Faced with the risk of cyberattacks, the prospect of losing data and the potential for large fines, the private sector has turned to the insurance industry to protect against losses arising from all manner of information security incidents. Research
|
(Author : Chandra Prakash Suryawanshi, SVP- India & APAC at Aujas Networks Pvt. Ltd. )
Information security incident management if often a combination of technical controls, processes, communication strategy, detailed procedure and plan. The objecti
Author - Anil Upadhyay, DM - ITGS, ITSD, Gujarat Gas Limited
We have listed a Key Parameter are required for Security Incident and Event Management and The Framework was attached at the end.
Major Parameters To Consider :
Ability to identify non
This article highlights the Threat Management Process in Incident Response and brings in the understanding of the Kill chain model. Excerpts have been taken from a session presented at SACON - The Security Architecture Conference. You can view the fu
The cyber incident of the Coop Bank heist of over Rs. 94 Cr compromised to cyber-criminals is a “wake-up” call not only for the entire Banking Sector but every technology services company and OEMs, resulting organizations are taking necessary action
Don’t boil the ocean. Start with that.
Before I dipped my toes into security I did a stint as an application administrator. I was responsible for managing system and application monitoring. More performance and capacity monitoring than anything but th
This article gives a 5 principal steps and questions one must solicit the emergency from the cyber security incident response steps. This includes the incident, the control points, plan of action, communication, business impacts.
( Read More: Incide
We are hosting an exclusive "Best of the World" Talks session on "The CISO’s Journey: From Expert to Leader" featuring David B. Cross (SVP & CISO at Oracle), Bikash Barai (Co-founder of CISO Platform & FireCompass) & David Randleman (Field CISO at FireCompass).
The journey from cybersecurity expert to strategic leader is a transformative one for CISOs. This session delves into the stages of a CISO’s evolution, the balance…