Speaker: Raj Gopalakrishna [ Co-Founder & Chief Product Architect @Acalvio Technologies ]
Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Platform or their employers
Speaker: Raj Gopalakrishna [ Co-Founder & Chief Product Architect @Acalvio Technologies ]
Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Platform or their employers
Speaker: Sujata Tilak [ Managing Director @Ascent Intellimation Pvt. Ltd. ]
What Will You Learn ?
Speaker: Ajin Abhraham [ Security Engineer @Immunio ]
What Will You Learn ?
This was presented at SACON - The Security Architecture Conference - largest security architecture conference in the region. You can find the full presentation here.
Speaker: Chandra Prakash Suryawanshi [ SVP @Aujas Networks Pvt. Ltd. ]
What Will You Learn ?
Presentation: Threat Detection using Analytics & Machine Learning
Speaker: Shomi
Speaker:Arnab Chattopadhayay [ Senior Director @Capgemini ]
Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Platform or their employers
Speaker: Bikash Barai [ Co-Founder @FireCompass ] & Arnab Chattopadhayay [ Senior Director @Capgemini ]
Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Platform or their employers
Speaker: Chandra Prakash Suryawanshi [ SVP @Aujas Networks Pvt. Ltd. ]
To view slide on SlideShare click here
( Do more : Compare all major SIEM products and technologies instantly here )
Please Note - Speaker presentations represent the views of the in
Speakers: Bikash Barai [ Co-Founder @FireCompass ] & Ravi Mishra [ Co-Founder & Product management @FireCompass ]
Author - Abdur Rafi, CISO, ABP Pvt. Ltd., India
A series of broad attack began that spread the latest version of the WanaCryptor ransomware. This attack, also referred to as WannaCrypt or WannaCry, reportedly impacted systems of public and private o
A new ransomware attack, very recently has caught many organizations and users off guard. The ransomware Wannacry has infected systems across the globe and has been the topic of discussion among security professionals for quite some days now.
The new
CISO Platform Decision Summit @Pune, last week saw over 150+ attendees for over 2 days making the the spirit of knowledge sharing and learning a huge success in the Information Security Executives of India. Here are the highlights of the awesome keyn
The document is intended to be a guide for organizations faced with a ransomware infection. This guide is split into several sections, with the most critical and time-sensitive being in the initial response section.
If you are currently experienc
The notorious hackers are increasingly planting more sophisticated attack. With Social engineering and phishing emails proliferating each day, having a strong and robust security awareness program is of paramount importance for securing company’s ass
It is an arduous task to convince management to sanction information security budgets. An additional hurdle arises from the fact that most security professionals have a technical background, and hence face difficulties in clearly explaining to execut
Risk Management is the name given to a logical and systematic method of identifying, analyzing, treating and monitoring the risks involved in any activity or process.
Risk is an inbuilt part of all human activities so, not surprisingly, assessing risk
Abstract: The opinion discussed here is based on the study of the current initiatives of the government in the growth of Digital Economy, there are needs to be a focused to bring up the Suitable Infrastructure to cater the growing demand for the Dig
This Article was shared by Nachiket Sathaye, Information Security Consultant, Ultradefence Solutions
“We are PCI Compliant, now we are secured”- While assisting customers with their PCI DSS Compliance, I always come across teams making this statement
(Author : Chandra Prakash Suryawanshi, SVP- India & APAC at Aujas Networks Pvt. Ltd. )
Information security incident management if often a combination of technical controls, processes, communication strategy, detailed procedure and plan. The objecti
How Google Protects Its Corporate Security Perimeter without Firewalls (RSA Conference 2017)
The increasing mobility of professional users has brought an end to the traditional corporate security perimeter. Google has reinvented its security perimete
Speaker: Saravanakumar Ramaiah, Director - Technology Risk Management at Sutherland
Moderator: Rajiv Nandwani, Global Information Security Director at BCG.
Topic: Offensive Security: Breach Stories to Defense Using Offense…