Keynotes & Speakers
All Posts (2221)
Get free access to the presentations by Moshe Ferber, Gregory Pickett, Murray Goldschmidt, Dr.Philip Polstra & more. SACON is one of the largest Security Architecture Conferences in APAC region. With over 400+ participants, this was the 4th edition o
We are seeking 4-5 McAfee IDS Engineers with 3-5 year experience for British Telecom Gurgaon, please ask the candidates to email resumes at akashdeep.bhardwaj@BT.com
The security information and event management (SIEM) market is defined by the customer's need to analyze event data in real time for the early detection of targeted attacks and data breaches, and to collect, store, investigate and report on log data
Here are some indicators which will help you detect a compromise :
- Identification of same email from public domain to significant number of users or C-level employees or high value targets; encrypted attachments, password protected and zipped and pr
Top Past Talks By Moshe Ferber
Frequent Speaker at DEFCON, Blackhat, RSAC APJ, Royal Society London
Renowned Cloud Security Expert
1. From Zero To Secure In 1 Minute (Securing IaaS)
Conference : DEFCON 23
For complete presentation/slide : Click Her
Enterprise mobility management suites connect mobile devices to enterprise workflows while supporting the perpetual growth in device numbers and types. Professionals responsible for mobile and endpoint strategies, must maintain focus on near- and lo
This article is a contribution by Chitranjan Kesari, AVP IT, Lodha Group for the information security community.
The need for flexibility, speed and information sharing means is mandatory to maintain a robust security arrangement that can protect th
This article was contributed by Sridhar Govardhan, CISA, CISM, CEH, General Manager-Cyber Security at Wipro
Phishing is a type of social engineering attack. Using phishing email, the attacker cleverly manipulates the natural human tendency to trust o
Below are a few free & open source software evaluation parameters:
Parameters | Description |
Community | The driving force and main resource for open source project |
Release Activity | Status of development and progress activity |
Longevity | Indication of stability and |
Everybody has logs and that means that everybody ultimately will have to deal with them—if only because many regulatory mandates prescribe that. In this guide, Dr. Anton Chuvakin will analyze the relationship between SIEM and log management, focusing
Deception is a very useful and effective tactic to detect and evade threats in many situations. The modern cybersecurity situation is one such example.
This book explains cybersecurity deception and technologies in six short chapters which includes:
Dr. Philip Polstra
Author of ‘Linux Forensic’, 'Windows Forensic', 'Hacking & Penetration Testing With Low Power Devices' | Frequent speaker at DEFCON, Blackhat, BSides, GrrCON, ShakaCON | Renowned forensic expert
About : Digital forensics professor
The project title for this task force is “Reference security architecture for Mobility”. Some of the key things that you are going to learn from this presentation is:
- The reader will learn about the current aspects of mobility, its use cases, control
It is important to understand the new trends that are occurring amongst cyber security experts to make sure you properly protect your organization. The following are some key trends that you need to be aware of.
1) Data Co-relation Before adding more
The project title for this task force is “Cyber Security Maturity Model for Organizations”. Some of the key things that you are going to learn from this presentation is:
- The user organizations will learn, how to easily adapt a cyber security maturity
Cyber Kill Chain Model
In military strategy, a 'Kill Chain' is a phase model to describe the stages of an attack, which also helps inform ways to prevent attacks
- Situational Awareness - Ability to identify what is happening in the networks and sys
This article highlights the Threat Management Process in Incident Response and brings in the understanding of the Kill chain model. Excerpts have been taken from a session presented at SACON - The Security Architecture Conference. You can view the fu
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)