We’ve got more assets in the cloud than ever. Unfortunately, we also have less visibility and control in these environments, as well. Implementing detection and response controls that leverage cloud provider tools and controls, as well as automation
All Posts (2199)
Security is overdue for actionable forecasts. Like predicting the weather, similar models should work for vulnerabilities. With some open source data and a clever machine learning model, Kenna Securities can predict which vulnerabilities attackers ar
Cloud is a new frontier that requires new architectures, higher velocity processes and crisper business-level metrics—all of which smacks security programs square in the face. This session will leverage the nearly 20 years of the speakers’ combined c
We have handpicked the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Cloud Security & Virtualization at RSA Conference USA 2018.
RSA Conference held its event in San Franci
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Cloud Security & Virtualization at RSA Conference USA 2018.
RSA Conference h
ChaoSlingr introduces the discipline of security testing into chaos engineering with the focus on driving failure out of the model and going beyond the reactive processes that currently dominate traditional security testing methodology.
Speakers: Gray
Living BeyondCorp comes with its own challenges. This talk will dive into how Duo gets our hands around difficult problems regarding the security and management of cloud services and endpoints internally. This session will cover technical details of
This talk will explore the concepts and experiences of using configuration management in a highly disposable environment of ephemeral virtual machines. It will cover why an operations team may desire such an environment, the tools the presenter used
This will show how, on a large container deployment, the speaker achieved insight into security events like file events on sensitive files, system call auditing, user level activity trail, network activity, etc., by customizing and plumbing a stack o
While the causes of outages are varied, human error far outpaces all hardware failures. The risk of humans touching sensitive data is clear, but the tools, techniques and risk-mitigation strategies lag behind current realities. Stephen Schmidt, AWS C
Based on investigations of real-world attacks, Microsoft Office 365 cybersecurity experts provide a prescriptive approach to identifying and implementing the most critical security controls to protect your Office 365 tenant. You will learn threats an
Everything in cloud computing is automated and API-enabled, giving security teams a big opportunity to build and embed security into infrastructures. From continuous guardrails to automated "afterburners" to speed up complex processes, this advanced
Cloud attack vectors and security controls are different. Many companies breached on AWS moved sensitive data to AWS following best practices or implementing cloud security controls correctly. Reports indicate that hybrid cloud implementations have w
Machine learning algorithms are key to modern at-scale cyberdefense. Transfer learning is a state of the art ML paradigm that enables applying knowledge and algorithms developed from one field to another, resulting in innovative solutions. This talk
CISO Platform Decision Summit @Pune, last week saw over 200+ attendees for over 2 days making the the spirit of knowledge sharing and learning a huge success in the Information Security Executives of India. Here are the highlights of the awesome keyn
SACON is India's 1st & Only Security Architecture Conference. With over 70+ participants, this was the 5th edition of SACON and here are a few highlights we wanted to share with you. It was held on 18-19th May, Hotel Hyatt, Pune, India.
We had with u
Speaker : Rohit Srivastwa, Founder of ClubHack, Quick Heal Technologies, Senior Director Cyber Education & Services
Please Note - Speaker presentations represent the vi
Speaker : Subrat Panda, Capillary Technologies, Principal Architect AI & Data Sciences
Please Note - Speaker presentations represent the views of the individual speakers and not of CIS
Artificial intelligence, and machine learning are not merely a buzz word but is increasingly becoming part of hacker’s tool kit. AI tools are getting more sophisticated with time and aiding hackers to hack data covertly.
Hackers are able to perform mo
Deep Web is the internet that cannot be accessed through standard search engines or the pages that are not indexed in any way.
Top 3 Misconceptions About the Deep Web
Deep Web & Dark Web are the Same
Dark Web is classified as a small portion of the
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
CISO Platform Talks on Offensive Security: Breach Stories to Defense Using Offense
- Description:
Speaker: Saravanakumar Ramaiah, Director - Technology Risk Management at Sutherland
Moderator: Rajiv Nandwani, Global Information Security Director at BCG.
Topic: Offensive Security: Breach Stories to Defense Using Offense… - Created by: Biswajit Banerjee