Root cause analysis/investigation/forensic analysis of crisis, acquisition and retention of evidence and logs are necessary from legal point of view. Collection of evidence needs to be efficient so that the bank should not face any legal complexity d
All Posts (2199)
There are four phases in Cyber Crisis Management, namely Detection, Response, Containment & Recovery. Here is a glimpse of the four phases.
>>Get the Complete Report on Crisis Management Plan (Banking Industry)
Detection Phase:
Input to
Here is brief Summary of Top 5 Enterprise Security Architecture Measurement Categories. This was earlier presented in SACON (India's only Security Architecture Conference in India)by Arnab Chattopadhyay, VP - Engineering @ Infoworks Inc & Bikash Bara
This article examined the field of security architecture from the point of view of security governance. It explains how security architecture governance can be created as a sub-field of security governance and how the principles and structure of the
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.
RSA Conference h
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.
RSA Conference he
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.
RSA Conference he
This is a study done by Ponemon Institute on 2016 Cost of Data Breach Study in India. This report includes 150 Indian Organisations who have participated in the benchmarking process.
This study examines the costs incurred by 37Indian companies in 12i
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC, this paper will outline the typical
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.
RSA Conference
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.
RSA Conference he
Applied Cognitive Security: Complementing the Security Analyst (RSA Conference 2017)
Security incidents are increasing dramatically and becoming more sophisticated, making it almost impossible for security analysts to keep up. A cognitive solution tha
Automated Prevention of Ransomware with Machine Learning and GPOs (RSA Conference 2017)
This talk will highlight a signature-less method to detect malicious behavior before the delivery of the ransomware payload can infect the machine. The ML-driven d
Hello false flags! The art of deception in targeted attack distribution (RSA Conference 2017)
When it comes to targeted attacks, everyone is obsessed with attribution. It’s a near impossible question to answer. Attackers often try to muddy the waters
Applied Machine Learning: Defeating Modern Malicious Documents (RSA Conference 2017)
A common tactic adopted by attackers for initial exploitation is the use of malicious code embedded in Microsoft Office documents. This attack vector is not new, but
Confusion and Deception: New Tools for Data Protection (RSA Conference 2017)
Cyberthreats are assymetric risks: corporate defenders must secure and detect everything, but the attacker needs to exploit only once. As petabytes of data traverse the ecos
Advances in Cloud-Scale Machine Learning for Cyber-Defense (RSA Conference 2017)
Picking an attacker’s signals out of billions of log events in near real time from petabyte scale storage is a daunting task, but Microsoft has been using security data s
Ridge-based Profiled Differential Power Analysis (RSA Conference 2017)
Ridge-based differential power analysis techniques and side-channel attacks on intermediate states with no partial key guessing are discussed. Topic 1: Ridge-Based Profiled Differ
Machine Learning: Cybersecurity Boon or Boondoggle? (RSA Conference 2017)
Machine learning (ML) and artificial intelligence (AI) are the latest “shiny new things” in cybersecurity technology but while ML and AI hold great promise for automating routin
These are top 5 FREE tools you should consider while building your Enterprise Mobility Management:
It is a privately held company recognized as a “pure player” in the enterprise Mobility market and the first software vendor to distribute it
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
CISO Platform Talks on Offensive Security: Breach Stories to Defense Using Offense
- Description:
Speaker: Saravanakumar Ramaiah, Director - Technology Risk Management at Sutherland
Moderator: Rajiv Nandwani, Global Information Security Director at BCG.
Topic: Offensive Security: Breach Stories to Defense Using Offense… - Created by: Biswajit Banerjee