Data Loss Prevention (DLP)
- DLP Drivers
- Types of DLP: Network, Endoint, Data Identification, Data leakage detection, Data at rest
- Types of data-structured & unstructured
- Data detection techniques
- Pattern Macthing
- Tagging & fingerprinting
- When to choose which technology?
- Pros and cons
- Under the hood of AST Technologies
- Monitoring, analyzing, log monitoring
- Compliance
- DLP tools
- Security Architecture
- Best Practices
- CISO Platform Taxonomy of Vendors
- Complete listing of DLP product vendors
- Top Vendors as per CISO Platform Index
- Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
- Feature Comparison Matrix
- TCO Analysis
- Technology evaluation checklist
- Key Learning
- Case studies from CISOs and their key learning
- Q&A
Application Security Testing
- AST Drivers
- Types of AST: DAST, SAST, IAST, RASP
–When to choose which technology?
–Pros and cons -
Under the hood of AST Technologies
-
CISO Platform Taxonomy of Vendors–Complete listing of AST product vendors
-
Top Vendors as per CISO Platform Index–Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
-
Feature Comparison Matrix
-
TCO Analysis
-
Technology evaluation checklist
-
Key Learning
-
Case studies from CISOs and their key learning
-
Q&A
Identity & Access Management(IAM)
- IAM Drivers
- IAM Authorization & Authentication
- Security Assertion markup language (SAML) and WS-security
- IAM Requirements
- Compliance and regulatory issues
- IAM governance and organizational issues
- Implementation and Under the hood of IAM Technologies
- Best practices for Implementation
- Implementing Enterprise IAM
- Identity Management, Enterprise Access Management
- Identity as a service architectures
- Managing Users in Cloud
- CISO Platform Taxonomy of Vendors
- Complete listing of IAM product vendors
- Top Vendors as per CISO Platform Index
- Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
- Feature Comparison Matrix
- TCO Analysis
- Technology evaluation checklist for IAM
- IAM ROI
- Making compelling business case for IAM
- Key Learning
- Case studies from CISOs and their key learning
- Q&A
Governance Risk Management & Compliance (IT GRC)
- GRC Drivers
-
GRC Components–Policy, Risk, Compliance, Audit, Vendor Risk, Threat & Vulnerability, Incident–GRC Content – Questionnaires, Controls, Policies, Procedures
-
CISO Platform Taxonomy of Vendors–Complete listing of GRC product vendors
-
Top Vendors as per CISO Platform Index–Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
-
Feature Comparison Matrix
-
TCO Analysis
-
Technology evaluation checklist
-
Key Learning
-
Case studies from CISOs and their key learning
-
Q&A
Security Information & Event management (SIEM)
- SIEM Drivers
- SIEM Coverage
- Threat coverage/landscape
- Evolving threats
- SIEM Requirements
- Compliance Requirements
- Intersection of Threats and Compliance
- Under the hood of SIEM Technologies
- CISO Platform Taxonomy of Vendors
- Complete listing of SIEM product vendors
- Top Vendors as per CISO Platform Index
- Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
- Feature Comparison Matrix
- TCO Analysis
- Technology evaluation checklist
- Key Learning
- Case studies from CISOs and their key learning
- Q&A
Malware Protection System /APT
- MPS Drivers
- Types of MPS Detection Techniques
- Anomaly Based Technique
- Specification Based Technique
- Signature Based Technique
- Under the hood of MPS Technologies
- Sensor & Sandbox Deployment
- Proof of concept (POC)
- End to end analysis
- Tools required
- Rendering network harmless
- CISO Platform Taxonomy of Vendors
- Complete listing of MPS product vendors
- Top Vendors as per CISO Platform Index
- Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
- Feature Comparison Matrix
- TCO Analysis
- Technology evaluation checklist
- Key Learning
- Case studies from CISOs and their key learning
- Q&A
Cloud Security
- Cloud security Drivers
- Types of Cloud security Platoforms:
- Cloud Management Platforms
- When to choose which? Pros & Cons
- Cloud security techniques
- Oauth
- OpenID
- Virtualization
- Under the hood of Cloud Security Technologies
- Cloud Security Standards
- Cloud Data Protection Gateways
- SaaS Platform Security Management
- Data Center Storage Encryption
- CISO Platform Taxonomy of Vendors
- Complete listing of Cloud Security product vendors
- Top Vendors as per CISO Platform Index
- Detailed analysis in terms of overall rating, rating by factors like Support, features, price or implementation
- Feature Comparison Matrix
- TCO Analysis
- Technology evaluation checklist
- Key Learning
- Case studies from CISOs and their key learning
- Q&A
Comments