With the increased growth in the usage of the internet, mobile applications, and the Internet of Things, applications become ubiquitous but their security is low key. Deploying an effective WAF will be one of the baseline measures organizations can t
All Posts (2220)
Security Technology Adoption Report 2018 is a study by CISO Platform in association with FireCompass. This survey was conducted online and the results discussed in the report are based on the responses of CISO’s across the country. There are more tha
In a rapidly changing threat landscape one threat vector always appears to stay ahead in the game. This one is Malware. From SWIFT hacks to its cousin targeting individual users (Ransomware), Malware has continued to evolve and beat security defenses
Defining The Scope
- Embedding human security as a part of organization culture
- Empowering and enabling every individual
Understanding The Attack Surface & Risks
- Expansion of attack surface due to merging of official and personal spaces
- Non-o
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Technology Infrastructure & Operations at RSA Conference USA 2018.
RSA Con
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Mobile & IoT Security at RSA Conference USA 2018.
RSA Conference held its
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Machine Learning at RSA Conference USA 2018.
RSA Conference held its event
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Identity & Access Management at RSA Conference USA 2018.
RSA Conference he
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Governance, Risk & Compliance at RSA Conference USA 2018.
RSA Conference h
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on DevOps at RSA Conference USA 2018.
RSA Conference held its event in San Fr
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Cryptography at RSA Conference USA 2018.
RSA Conference held its event in
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Application Security at RSA Conference USA 2018.
RSA Conference held its eve
Time is of the essence when protecting your organization from complex cyberthreats. The clock doesn’t start when you have been breached—it’s always ticking. The board must articulate risk tolerances, management must set the strategy and IT must execu
Software-defined networking has come onto the scene and changed the way we think about moving packets throughout a network. But it has also morphed into multiple definitions and approaches, driven by both vendors and enterprise customers. But how doe
You own a SIEM, but to be secure, you need a Security Operations Center! How do you cross the chasm? Do you hire staff or outsource? And what skills are needed? Mike Ostrowski, a cybersecurity industry veteran, will review common pitfalls experienced
In the last year, we’ve seen numerous attacks with global consequences leveraging exploits against well-publicized vulnerabilities with available patches. This presentation will provide Forrester’s perspective on the challenges clients face in the vu
Most cybersecurity professionals know the CIS Top Five Critical Security Controls. Yet, the evidence that they are effective is slim. Using data on cyber-incidents, researchers looked at the attack paths used by adversaries and determined what contro
A virus-like cyberattack spreading over the air may sound far-fetched, but new research proves the airborne attack surface is here. Join the Armis researchers who discovered the viral IoT vulnerability, BlueBorne, as they walk through the airborne th
While near-ultrasonic communications are gradually established as an alternative to Bluetooth and WiFi, the technology remains largely unregulated. This talk will go through the security challenges that the ecosystem faced from its inception, demonst
With the widespread growth of IOT devices and services, security is a priority. This session will discuss the challenges of implementing security solutions for IoT services for security professionals who are looking at things from an IT viewpoint. Tr
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)