All Articles (384)

Sort by
8669936666?profile=original

Why Do We Need A Summit On Security Decision Making?

  • 100+ Security Technologies: Which one to choose?
  • 2000+ Information Security Companies: Which is the right fit for you?
  • Are you choosing the best product or the one that does best marketing?
  • Wh
Comments: 0

Call for Papers closes: 16th March, 2015.

*We strongly suggest that you submit your papers early as the window will close earlier if sufficient quality papers have been received. 

Comments: 0
155m91l.jpg

Conference on Security Decision Making Tools

Checklist, Metrics & Dashboard

About Decision Summit

The information security world needs to transition from the verbose and opinions based approaches to precise, measurable, metrics oriented approac

Comments: 0

Nomination: Top 100 CISO Awards, 2015

Applications for the Top 100 CISO Awards, 2015 are now open. The deadline for application is February 26th, 2015.

Offline Alternative (if you don't want to use the online form below): Please download the form &

Comments: 0
8669934473?profile=original

CISO Platform recognizes the contribution of the
Top Information Security Executives of the World

About Top 100 CISO Awards

The ‘Top 100 CISO Award', the first of its kind award felicitates the finest CISO's who are using information securit

Comments: 0

CISO Platform
Annual Summit, 2014 Highlights

Annual Summit, 2014

CISO Platform Annual Summit @ Mumbai, last week saw over 300+ CISOs for over 2 days making the the spirit of knowledge sharing and learning a huge success in the Information Secur

Comments: 0
Organization Designation
   
Pine Labs Pvt Ltd CIO
MakeMyTrip Manager - Information Security
GeBBS HealthCare Solution Director-IT
FSS(P)Ltd Head - Compliance and Audit
Endurance Technologies Pvt. Ltd. Head - Group IT & CISO
Relia
Comments: 0

Day 2

9:00-10:00am

f0q3o8.png?width=83

Defending Online Attacks on Cloud Instances

Nir Valtman ( Discoverer of Point-of-Sale Vulnerabilities ) & Moshe Ferber ( Cloud Security Entreprenuer )

10:00-11:00am

okrlh2.png?width=83

Bitcoin Transaction Malleability - An Insight

Daniel Chechik

Comments: 0

Day 1

9:00-10:00am

8669800481?profile=original

How the Heartbleed bug was found?

Antti Karjalainen discoverer of Heartbleed

2a7wytl.jpg?width=83

Ants and Elephants in the CISO's Office

Paul Raines - CISO, UNDP

10:00-11:00am

20uei61.jpg?width=83

5 Real ways to destroy business by breaking SAP Applications

Alexand

Comments: 0

Plan A

INR15Lac /Year

"Product Page and Blogging helps to Stay in touch with 1500+ CISO's/Decison Makers"

  • Unlimited Tokens
  • Unlimited Analyst Querry
  • Online Training Access
  • Offline Training Access
  • 2 Event Pass (Annual Summit, Top 100)
  • CPI Repor
Comments: 0

Turbo Talks

8669800481?profile=original

How the Heartbleed bug was found?

Antti Karjalainen discoverer of Heartbleed

The Heartbleed bug was a catastrophic vulnerability in widely used OpenSSL TLS implementation. This talk will give background how the Heartbleed bug was found

Comments: 0

Workshops & Trainings (20-21 Nov)

8669800481?profile=original

Fuzz Testing Techniques for Discovering Zero Days

Antti Karjalainen ( discoverer of Heartbleed ) 

The workshop gives an introduction to fuzz testing. Common fuzzing techniques are presented, and it is discussed, wh

Comments: 0

Speakers:

8669800481?profile=originalAntti Karjalainen discoverer of Heartbleed

Talk: How I Discovered Heartbleed ?

Antti Karjalainen was simply doing his job when he stumbled upon one of the biggest security holes the Internet has ever seen-the Heartbleed bug.Heartbleed is a 

Comments: 0
8669935663?profile=original

The largest security conference in India of
exclusive Senior Security executives/Decision makers

Best of the World Keynotes

  • How I discovered Heartbleed ? -by Antii Karjalainen
  • Bitcoin Maleability - by Daniel Chechik
  • A Journey to protect POS -
Comments: 0