SACON is India's 1st & Only Security Architecture Conference. With over 100 participants, this was the second year of SACON and here are a few highlights we wanted to share with you. It was held on 12 -13th May, Hotel Hyatt, Pune, India.
We had with us Top Security Industry Leaders who helped SACON with great content. For more details visit: sacon.io
( Read More: TOP 10 METRICS FOR YOUR VULNERABILITY MANAGEMENT PROGRAM )
What We Covered? (Key Highlights)
- Need for Security Architecture and Key Challenges
- Security Architecture Models and Views ( TOGAF, Zachman, SABSA etc. )
- Security Architecture Process and Deliverables
- CISO Platform Security Strategy Model & Comparison to existing models
- Overview of Google’s BeyondCorp Approach to Security
- SOC Architecture (Tech Stack, Process, Org Structure, People Skills)
- Threat Hunting - Moving from the ad hoc to the formal
- Threat Detection using Analytics & Machine Learning
- Deception Technology: Use Cases & Implementation Approaches
- Incident Response: Validation, Containment & Forensics
- IoT Hardware Teardown, Security Testing & Control Design
- Industrial IoT Security Standards and Frameworks
- Automotive Security
- Technical Architecture of RASP Technology
- Understanding Application Threat Modelling & Architecture Review
( Read More: 9 KEY SECURITY METRICS FOR MONITORING CLOUD RISKS)
Presentations
Click on each presentation name to open slide in new tab
- Enterprise Security Architecture Design & NIST CSF Overview by Bikash Barai [ Co-Founder @FireCompass ] & Arnab Chattopadhayay [ Senior Director @Capgemini ]
- CyberSecurity Portfolio Management: Approaches by Bikash Barai [ Co-Founder @FireCompass ] & Ravi Mishra [ Co-Founder & Product management @FireCompass ]
- Overview of Google’s BeyondCorp Approach to Security by Arnab Chattopadhayay [ Senior Director @Capgemini ]
- SOC Architecture (Tech Stack, Process, Org Structure, People Skills) by Chandra Prakash Suryawanshi [ SVP @Aujas Networks Pvt. Ltd. ]
- Threat Hunting - Moving from the ad hoc to the formal by Sachin Deodhar [ SpiderLabs Incident Response & Readiness @Trustwave ]
- Threat Detection using Analytics & Machine Learning by Shomiron Das Gupta [ Co-Founder @NetMonastery]
- Deception Technology: Use Cases & Implementation Approaches by Raj Gopalakrishna [ Co-Founder & Chief Product Architect @Acalvio Technologies ]
- Incident Response: Validation, Containment & Forensics by Chandra Prakash Suryawanshi [ SVP @Aujas Networks Pvt. Ltd. ]
- IoT Hardware Teardown, Security Testing & Control Design by Nagasai Arun Panchakarla [ Co-Founder @SensiBridge ], Sri Chakradhar K [ Co-Founder & CTO @Entersoft ]
- Industrial IoT Security Standards and Frameworks by Sujata Tilak [ Managing Director @Ascent Intellimation Pvt. Ltd. ]
- Automotive Security by Arnab Chattopadhayay [ Senior Director @Capgemini ]
- Technical Architecture of RASP Technology by Ajin Abhraham [ Security Engineer @Immunio ]
- Understanding Application Threat Modelling & Architecture Review by Nilanjan De [Co-Founder @FireCompass]
.
Photo Album
Some great photographs have been compiled into an album. Help us Tag you ( Tag yourself ) and let us know if you want to add some pictures you took at the event. Email - pritha.aash@cisoplatform.com
Here's the Photo Album link - https://goo.gl/CHqLkr
( Read More: 8 KEY METRICS TO TRACK YOUR ENTERPRISE MOBILITY MANAGEMENT PROGRAM )
Comments