All Articles (384)

Sort by
8669936457?profile=original

Highlights Of Threat Intelligence  Workshop

Following is the high level overview of the Threat Intelligence Workshop

  • Threat Intelligence Maturity model
  • People
  • Process
  • Technology
  • Threat Collection & Analysis eg. OSINT
  • Integrating Actionable Intel
Comments: 0
8669935260?profile=original

Highlights Of Cloud Security Workshop & CASB

Following is the high level overview of the Cloud Security Workshop

  • Technology Taxonomy for Cloud Security
  • Key components of cloud security architecture
  • Blue print to build your cloud security program
Comments: 0

8669937272?profile=original

 

8669937460?profile=original

                                                                                                                                                                               

 

iViZ Security is a pioneer in providing cloud-based Web Application Penet

Comments: 0

Organization                 Designation
ABP Pvt Ltd Corporate Manager - IT
Adobe APAC IT Security Leader
AGS Health Inc. EVP – IT      
Alcatel Lucent Managed Solutions India Pvt. Ltd Head IT
Andhra Bank CISO
Angel Broking Pvt Ltd Associate Director IT 
Apollo Mu
Comments: 0

259lpjc.jpg?width=980

Testing & Securing Cloud Infrastructure 

oswlj6.jpg?width=150

Workshop Duration: 2 days
Date: 4 & 5th June,2015

Price: INR 25,000

Description:

Cloud computing has taken over the world and completely transformed how web and mobile applications are written. The combined

Comments: 0

Special ISACA Passes for CISO Platform Decision Summit

Pre-registration form

Please fill in the details to tentatively hold your seats. The passes are not guaranteed unless you make the payment. Filling the form is considered only as a form of expres

Comments: 0

4uyjk5.png

Advanced Android & iOS Hands-on Exploitation

oswlj6.jpg?width=150

Workshop Duration: 2 days
Date: 4 & 5th June,2015

Price: INR 25,000

Description:

Advanced Android and iOS Hands-on Exploitation is a unique training which covers security and exploitation of the two dom

Comments: 0