SACON is India's 1st & Only Security Architecture Conference. With over 100 participants, this was the second year of SACON and here are a few highlights we wanted to share with you. It was held on 12 -13th May, Hotel Hyatt, Pune, India.

We had with us Top Security Industry Leaders who helped SACON with great content. For more details visit: sacon.io

( Read More: TOP 10 METRICS FOR YOUR VULNERABILITY MANAGEMENT PROGRAM )

8669815854?profile=original

What We Covered? (Key Highlights)

  • Need for Security Architecture and Key Challenges
  • Security Architecture Models and Views ( TOGAF, Zachman, SABSA etc. )
  • Security Architecture Process and Deliverables
  • CISO Platform Security Strategy Model & Comparison to existing models
  • Overview of Google’s BeyondCorp Approach to Security
  • SOC Architecture (Tech Stack, Process, Org Structure, People Skills)
  • Threat Hunting - Moving from the ad hoc to the formal
  • Threat Detection using Analytics & Machine Learning
  • Deception Technology: Use Cases & Implementation Approaches
  • Incident Response: Validation, Containment & Forensics
  • IoT Hardware Teardown, Security Testing & Control Design
  • Industrial IoT Security Standards and Frameworks
  • Automotive Security
  • Technical Architecture of RASP Technology
  • Understanding Application Threat Modelling & Architecture Review

( Read More: 9 KEY SECURITY METRICS FOR MONITORING CLOUD RISKS)

Presentations

Click on each presentation name to open slide in new tab

( Note - Speaker presentations represent the views of the individual speakers and not of CISO Platform or their employers )
.

.

Photo Album

Some great photographs have been compiled into an album. Help us Tag you ( Tag yourself  ) and let us know if you want to add some pictures you took at the event. Email - pritha.aash@cisoplatform.com

 

 

Here's the Photo Album link - https://goo.gl/CHqLkr

( Read More: 8 KEY METRICS TO TRACK YOUR ENTERPRISE MOBILITY MANAGEMENT PROGRAM )

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform