Article submitted by Suryanarayanan K, ,Central Bank Of India
Phishing attacks are one of the most common security challenges that both individuals and organizations face in keeping their information secure. Phishing is the attempt to obtain sensit
Article submitted by Suryanarayanan K, ,Central Bank Of India
Phishing attacks are one of the most common security challenges that both individuals and organizations face in keeping their information secure. Phishing is the attempt to obtain sensit
Announcing Pre-registrations for the 4th edition of SACON - Security Architecture Conference in Bangalore on 10-11 November 2017.
Agenda Highlights: SACON 2017 aims to give an Overview of the Cyber Security Landscape, Emerging Security Technologies
The Task Force initiative by CISO platform is a community initiative formed to voluntarily take up projects in information security domain and create deliverables for the larger community benefits. Usually, projects decided upon by the task-force mem
The Task Force initiative by CISO platform is a community initiative formed to voluntarily take up projects in information security domain and create deliverables for the larger community benefits. Usually, projects decided upon by the task-force mem
This gives a glimpse of Advanced Security Operations Centre (SOC) Features & Technical Capabilities. This document is not explicit, it assumes you have…
This was presented at SACON and speakers explain subjects in detail during sessions for de
This gives a glimpse of how 'Machine Learning & Analytics' can be used for Threat Detection. This document is not explicit, it assumes you have prior knowledge of the subject, therefore only pointers have been mentioned.
This was presented at SACON a
Components of Google BeyondCorp
Device & Hosts
Here's a small classification of Types Of Threats In Application Threat Modeling. This was earlier presented in SACON (International Security Architecture Conference) by Nilanjan De [Multiple patents, Zero Day Discovery, Co-Founder at FireCompass]
With Big Data and Behavior Analytics advances, the need of an SIEM at the enterprise level may be a question. This question is addressed in this report. It analyses, dissects and tries to find out the pros and cons of both sides.
Why R
This report gives insight into 4 key cyber security incident trends observed in 2015. Includes top insights and detailed analysis of each attack and how one could prevent their organisation from being a target as well as mitigation.
A ransomware attack crippled hundreds of computer networks across the globe. The systems were shut down and rendered useless until the attackers received the “ransom” through money transfer on Bitcoin. The ransomware essentially encrypts the files on
Building a new SOC capability may involve lot of planning and would attract huge initial investment.
While there are multiple approaches to address this, given below are some of the simple steps one can follow:
1. Understanding Business Goals, type of
Author - Sanjay D. Tiwari, CISO, Suryoday Small Finance Bank
Prioritizing the handling of the incident is perhaps the most critical decision point in the incident handling process.
Incidents should not be handled on a first come, first served basis b
In this Forrester's report they identify and analyze 13 significant firms in the IT security consulting services - Accenture, Atos, BAE Systems, Dell SecureWorks, Deloitte, EY, HPE, IBM Security Services, KPMG, Protiviti, PwC, Verizon & Wipro
Why
Organizations around the globe are investing heavily in cyber defense capabilities to protect their critical assets. Whether protecting brand, intellectual capital, and customer information or providing controls for critical infrastructure, the means
As mobile gains more capabilities and access to company data, mobile devices continue to play an important role in how workers do their jobs. Information workers are no longer tied to their PCs — smartphones, tablets, and laptops give them the flexib
Author - Tushar Vartak, Director Information Security, Rak Bank
Since 12th Apr 2017, a Ransomware exploiting MS17-010 has been wreaking havoc worldwide.
Precautions to be taken:
1 - Patch Management
On 12th May, 2017 a Ransomware attack named as “WannaCry” Ransomeware, one of the largest ever cyber attacks - was reported, infecting the 19 trusts of NHS (National Health Services) in UK and infecting computers in many other countries including Spa
SACON is India's 1st & Only Security Architecture Conference. With over 100 participants, this was the second year of SACON and here are a few highlights we wanted to share with you. It was held on 12 -13th May, Hotel Hyatt, Pune, India.
We had with u
Speaker: Nilanjan De [Co-Founder @FireCompass]
Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Platform or their employers