Data Loss Prevention (DLP)
- DLP Drivers
- Types of DLP: Network, Endoint, Data Identification, Data leakage detection, Data at rest
- Types of data-structured & unstructured
- Data detection techniques
- Pattern Macthing
- Tagging & fingerprinting
- When to choose which technology?
- Pros and cons
- Under the hood of AST Technologies
- Monitoring, analyzing, log monitoring
- Compliance
- DLP tools
- Security Architecture
- Best Practices
- CISO Platform Taxonomy of Vendors
- Complete listing of DLP product vendors
- Top Vendors as per CISO Platform Index
- Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
- Feature Comparison Matrix
- TCO Analysis
- Technology evaluation checklist
- Key Learning
- Case studies from CISOs and their key learning
- Q&A
Application Security Testing
- AST Drivers
- Types of AST: DAST, SAST, IAST, RASP
When to choose which technology?
Pros and cons -
Under the hood of AST Technologies
-
CISO Platform Taxonomy of VendorsComplete listing of AST product vendors
-
Top Vendors as per CISO Platform IndexDetailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
-
Feature Comparison Matrix
-
TCO Analysis
-
Technology evaluation checklist
-
Key Learning
-
Case studies from CISOs and their key learning
-
Q&A
Identity & Access Management(IAM)
- IAM Drivers
- IAM Authorization & Authentication
- Security Assertion markup language (SAML) and WS-security
- IAM Requirements
- Compliance and regulatory issues
- IAM governance and organizational issues
- Implementation and Under the hood of IAM Technologies
- Best practices for Implementation
- Implementing Enterprise IAM
- Identity Management, Enterprise Access Management
- Identity as a service architectures
- Managing Users in Cloud
- CISO Platform Taxonomy of Vendors
- Complete listing of IAM product vendors
- Top Vendors as per CISO Platform Index
- Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
- Feature Comparison Matrix
- TCO Analysis
- Technology evaluation checklist for IAM
- IAM ROI
- Making compelling business case for IAM
- Key Learning
- Case studies from CISOs and their key learning
- Q&A
Governance Risk Management & Compliance (IT GRC)
- GRC Drivers
-
GRC Components-Policy, Risk, Compliance, Audit, Vendor Risk, Threat & Vulnerability, Incident-GRC Content–Questionnaires, Controls, Policies, Procedures
-
CISO Platform Taxonomy of Vendors–Complete listing of GRC product vendors
-
Top Vendors as per CISO Platform Index–Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
-
Feature Comparison Matrix
-
TCO Analysis
-
Technology evaluation checklist
-
Key Learning
-
Case studies from CISOs and their key learning
-
Q&A
Security Information & Event management (SIEM)
- SIEM Drivers
- SIEM Coverage
- Threat coverage/landscape
- Evolving threats
- Manage log monitoring
- SIEM Requirements
- Compliance Requirements
- Balance Threat and Compliance
- Under the hood of SIEM Technologies
- NTP Setup
- Security Architecture
- Alerting Real-Time
- Log Management
- CISO Platform Taxonomy of Vendors
- Complete listing of SIEM product vendors
- Top Vendors as per CISO Platform Index
- Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
- Feature Comparison Matrix
- TCO Analysis
- Technology evaluation checklist
- Key Learning
- Case studies from CISOs and their key learning
- Q&A
Malware Protection System /APT
- MPS Drivers
- Types of MPS Detection Techniques
- Anomaly Based Technique
- Specification Based Technique
- Signature Based Technique
- Under the hood of MPS Technologies
- Sensor & Sandbox Deployment
- Proof of concept (POC)
- End to end analysis
- Tools required
- Rendering network harmless
- CISO Platform Taxonomy of Vendors
- Complete listing of MPS product vendors
- Top Vendors as per CISO Platform Index
- Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
- Feature Comparison Matrix
- TCO Analysis
- Technology evaluation checklist
- Key Learning
- Case studies from CISOs and their key learning
- Q&A
Cloud Security
- Cloud security Drivers
- Types of Cloud security Platoforms:
- Cloud Management Platforms
- When to choose which? Pros & Cons
- Cloud security techniques
- Oauth
- OpenID
- Virtualization
- Under the hood of Cloud Security Technologies
- Cloud Security Standards
- Cloud Data Protection Gateways
- SaaS Platform Security Management
- Data Center Storage Encryption
- CISO Platform Taxonomy of Vendors
- Complete listing of Cloud Security product vendors
- Top Vendors as per CISO Platform Index
- Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
- Feature Comparison Matrix
- TCO Analysis
- Technology evaluation checklist
- Key Learning
- Case studies from CISOs and their key learning
- Q&A
Web Application Firewall (WAF)
- WAF Drivers
- WAF addons:
- Caching & Compression
- Speed Up the SSL
- Load Balance
- Connection Pooling
- Types Of WAF & When to choose what?
- Reverse Proxy, Transparent proxy, inline transparent Or Layer 2 Bridge, Network based, Host/server based
- When to choose which technology?
- Pros and cons
- Under the hood of WAF Technologies
-
Securing Apps with WAF
- Best practices
-
- CISO Platform Taxonomy of Vendors
- Complete listing of WAF product vendors
- Top Vendors as per CISO Platform Index
- Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
- Feature Comparison Matrix
- TCO Analysis
- Technology evaluation checklist
- Key Learning
- Case studies from CISOs and their key learning
- Q&A
Next Gen Firewall
- Next Gen Firewall Drivers (Vs Standard Firewall)
-
IDS/IPS
-
SSH & SSL interception
-
QoS/bandwidth management
-
Anti Virus inspection
-
3rd party protection
-
- Types of Next Gen Firewall Solutions
-
When to choose which technology?
-
Pros and cons
-
-
More than the conventional:
-
Overview: Webapp attacks
-
SQLi and Blind SQLi
-
Cross site scripting (XSS)
-
-
Under the hood of Next Gen Firewall Technologies
- CISO Platform Taxonomy of Vendors
- Complete listing of Next Gen Firewall product vendors
- Top Vendors as per CISO Platform Index
- Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
- Feature Comparison Matrix
- TCO Analysis
- Technology evaluation checklist
- Key Learning
- Case studies from CISOs and their key learning
- Q&A
Endpoint
-
Endpoint Drivers
- Types of Isolations
-
Isolating the Host
-
Major splits: Split DNS;Split-Brain DNS,Split-horizon DNS…
-
-
Isolating the Web application
-
Cross site attacks –CSRF
-
Logical & Session flaws
-
Injection attacks
-
-
-
More than the conventional Endpoint
- Dig Deep
-
HIPS
-
Whitelisting
-
USB protection
-
Zero-day attacks
-
-
Pros and cons
- Dig Deep
- Under the hood of Endpoint Technologies
-
Testing tools for DNS and SMTP frameworks
-
Recursion & Spam Relay challenges
-
- CISO Platform Taxonomy of Vendors
- Complete listing of endpoint product vendors
- Top Vendors as per CISO Platform Index
- Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
- Feature Comparison Matrix
- TCO Analysis
- Technology evaluation checklist
- Key Learning
- Case studies from CISOs and their key learning
- Q&A
Content Security(web/email)
- Content Security Drivers
-
Types of data security solutions
-
Ways: Network security,Content filtering, Digital Rights Management (DRM)
-
Common Techniques: Disk Encryption(DE),Data Masking,Data Erasure
-
Major Laws and standards (National,International)
-
When to choose which technology?
-
Pros and cons
-
- Under the hood of Content Security Technologies
- CISO Platform Taxonomy of Vendors
- Complete listing of content security product vendors
- Top Vendors as per CISO Platform Index
- Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
- Feature Comparison Matrix
- TCO Analysis
- Technology evaluation checklist
- Key Learning
- Case studies from CISOs and their key learning
- Q&A
Security Intelligence/Analytics, Forensics & Incident Response
- Forensics & Incidence Response Drivers
- Major How-To:
-
Basic Forensic techniques
- Moderate level IR techniques:
-
Preparation: Tools, techniques and procedures
-
Identification & Containment: Finding out what is compromised and securing other assets
-
Eradication: Planning the main steps to fixing the vulnerabilities
-
Recovery: Primary steps an organization needs to take for proper recovery
-
Remote system handling
-
-
Basic Network Forensics:
-
Proxy Solutions, proxy server examinations, analysis & logging
-
Common protocols and session rebuilding techniques
-
Tools, filters and file formats
-
Architectural challenges
-
-
- Under the hood of Forensics & IR Technologies
- CISO Platform Taxonomy of Vendors
- Complete listing of of Forensics & IR product vendors
- Top Vendors as per CISO Platform Index
- Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
- Feature Comparison Matrix
- TCO Analysis
- Technology evaluation checklist
- Key Learning
- Case studies from CISOs and their key learning
- Q&A
Comments