The Task Force initiative by CISO platform is a community initiative formed to voluntarily take up projects in information security domain and create deliverables for the larger community benefits. Usually, projects decided upon by the task-force mem
All Posts (2199)
The Task Force initiative by CISO platform is a community initiative formed to voluntarily take up projects in information security domain and create deliverables for the larger community benefits. Usually, projects decided upon by the task-force mem
This gives a glimpse of Advanced Security Operations Centre (SOC) Features & Technical Capabilities. This document is not explicit, it assumes you have…
This was presented at SACON and speakers explain subjects in detail during sessions for de
This gives a glimpse of how 'Machine Learning & Analytics' can be used for Threat Detection. This document is not explicit, it assumes you have prior knowledge of the subject, therefore only pointers have been mentioned.
This was presented at SACON a
Components of Google BeyondCorp
Device & Hosts
- Device : Collection of physical & virtual components that act as computer. Eg. PC, Server, VMs
- Host : Snapshot of a device state at a given point of time. Eg. Device might be a mobile phone, while a
Here's a small classification of Types Of Threats In Application Threat Modeling. This was earlier presented in SACON (International Security Architecture Conference) by Nilanjan De [Multiple patents, Zero Day Discovery, Co-Founder at FireCompass]
With Big Data and Behavior Analytics advances, the need of an SIEM at the enterprise level may be a question. This question is addressed in this report. It analyses, dissects and tries to find out the pros and cons of both sides.
Why R
This report gives insight into 4 key cyber security incident trends observed in 2015. Includes top insights and detailed analysis of each attack and how one could prevent their organisation from being a target as well as mitigation.
A ransomware attack crippled hundreds of computer networks across the globe. The systems were shut down and rendered useless until the attackers received the “ransom” through money transfer on Bitcoin. The ransomware essentially encrypts the files on
Building a new SOC capability may involve lot of planning and would attract huge initial investment.
While there are multiple approaches to address this, given below are some of the simple steps one can follow:
1. Understanding Business Goals, type of
Author - Sanjay D. Tiwari, CISO, Suryoday Small Finance Bank
Prioritizing the handling of the incident is perhaps the most critical decision point in the incident handling process.
Incidents should not be handled on a first come, first served basis b
In this Forrester's report they identify and analyze 13 significant firms in the IT security consulting services - Accenture, Atos, BAE Systems, Dell SecureWorks, Deloitte, EY, HPE, IBM Security Services, KPMG, Protiviti, PwC, Verizon & Wipro
Why
Organizations around the globe are investing heavily in cyber defense capabilities to protect their critical assets. Whether protecting brand, intellectual capital, and customer information or providing controls for critical infrastructure, the means
As mobile gains more capabilities and access to company data, mobile devices continue to play an important role in how workers do their jobs. Information workers are no longer tied to their PCs — smartphones, tablets, and laptops give them the flexib
Author - Tushar Vartak, Director Information Security, Rak Bank
Since 12th Apr 2017, a Ransomware exploiting MS17-010 has been wreaking havoc worldwide.
Precautions to be taken:
1 - Patch Management
- Ensure all Workstations and Servers have th
On 12th May, 2017 a Ransomware attack named as “WannaCry” Ransomeware, one of the largest ever cyber attacks - was reported, infecting the 19 trusts of NHS (National Health Services) in UK and infecting computers in many other countries including Spa
SACON is India's 1st & Only Security Architecture Conference. With over 100 participants, this was the second year of SACON and here are a few highlights we wanted to share with you. It was held on 12 -13th May, Hotel Hyatt, Pune, India.
We had with u
Speaker: Nilanjan De [Co-Founder @FireCompass]
Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Platform or their employers
Speaker: Arnab Chattopadhayay [ Senior Director @Capgemini ]
Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Platform or their employers
Speakers: Nagasai Arun Panchakarla [ Co-Founder @SensiBridge ], Sri Chakradhar K [ Co-Founder & CTO @Entersoft ]
Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Platform or their employers
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
CISO Platform Talks on Offensive Security: Breach Stories to Defense Using Offense
- Description:
Speaker: Saravanakumar Ramaiah, Director - Technology Risk Management at Sutherland
Moderator: Rajiv Nandwani, Global Information Security Director at BCG.
Topic: Offensive Security: Breach Stories to Defense Using Offense… - Created by: Biswajit Banerjee