Conference on Security Playbooks & Strategic Threat Modeling for Senior Security Professionals
What Will You Learn?

 

  • How to use Threat Modeling for creating enterprise security strategy?
  • Playbooks based on experience driven knowledge on implementing specific solutions from start to finish
  • Emerging Technology Landscape: Latest Trends in Tools and Technologies
  • Summary of the Best of the Security Talks across the globe in last 12 months

 

Venue,Date & Time

Venue: Crowne Plaza, Kochi, Kerela
Date: 6th & 7th May
[Starts 9 AM on 6th May; Ends 6 PM on 7th May]
Is there any criteria for attending the conference?
 
It is only for senior IT Security Professionals for end user organizations.

Q

Registration Process & Fees

Q

Q

A

A

A

Are there any charges for registration?
 
Yes. The current early bird registration fee is INR 6,500.
I am a sales/marketing professional. Should I register?
 
Please do not register. In case you accidentally do so, we will return your fees minus the handling charges.

Sign Up for most important Conference for Senior Security Professionals

REGISTER NOW

Copyright © 2016   CISO Platform

Mobility & Cloud Security Track

 

  • Checklist for what you need to do different for cloud – making a Cloud Security Playbook
  • Solving the problem of Shadow IT, Cloud Encryption and Compliance Management in cloud - CASB Playbook
  • Why conventional encryption fails and what you need to do - Cloud Encryption Playbook
  • Mobile Security Playbook - For securing distributed and mobile workforce

 

Security Strategy & Operation Tracks

 

  • SecOps Playbook - Game plan for closing the SecOps gap
  • DLP Playbook - From Data classification to fine tuning
  • SIEM or SA - Building a playbook for effective detection and monitoring capability
  • Next Gen EPS Playbook - EPS is dead, long live EDR, ATP,  Machine learning and beyond
  • NGFW Playbook - Use cases, evaluation and adoption
  • Enterprise Encryption Playbook - For implementing an Enterprise wide encryption program
  • IAM & PIM Adoption Playbook - Tying Identities to everything
  • DDoS Security Playbook - understanding ALL the critical capabilities and building an effective DDoS defense program

 

Security Response & Prediction Track

 

  • IR Playbook - Building case specific incident response playbook
  • Playbook for building fraud prevention program
  • CISO Platform Threat Intel Sharing Framework across verticals
  • Threat Intel Program Playbook - Moving beyond Feeds to HUMINT, OSINT, TI Platform and more..

 

Governance, Risk & Compliance Tracks

 

  • Compliance Management Playbook - Unifying your compliance programs
  • Risk Management Playbook - Perspective checklist for building your risk management program
  • Playbook for building Vendor Risk Management Program
  • GRC Playbook - Defining, Navigating the GRC landscape and building a GRC program in phased manner

 

Emerging & Niche Track

 

  • Startup security Playbook : What Startups can learn from mature organizations
  • POS Security Playbook
  • IOT Security Playbook
  • Automotive Security Playbook
  • Attack Simulation Technologies - Playbook for using AS for Risk Management and Prioritization
  • SCADA Security Playbook - Defending Super Fragile environments against super targeted attacks

 

General Interest Tracks

 

  • Playbook for presenting security to management
  • Playbook for building awareness program
  • Metrics & Dashboards Playbook across SecOps

 

Malware & Application Security Track

 

  • AppSec Program Playbook - Prioritizing from the 100+ elements of AppSec Program beyond Pen Testing
  • AST Playbook - Navigating the alphabet soup of SAST, DAST and IAST
  • WAF Playbook - Use cases beyond compliance
  • Ransomware – How to deal & how not to pay?

 

Threat Modeling for Enterprise Security Strategy Creation

 

  • Learn how to use Threat Modeling for creating your enterprise security strategy
  • Threat Modeling for Banking Industry
  • Threat Modeling for Telecom Industry

 

REGISTER NOWREGISTER NOWREGISTER NOWREGISTER NOWREGISTER NOWREGISTER NOWREGISTER NOWREGISTER NOWREGISTER NOW

Subrahmanya Boda

Group CISO
GMR Infrastructure

Bikash Barai

Co-Founder
iViZ Security(A Cigital Company)

CISO
RBL Bank

Nitin Chauhan

Arnab Chattopadhayay

Senior Technical Director
MetricStream

Nadir Bhalwani

Director-Technology Operations
CRISIL

Nilanjan De

Principal Architect
Cigital

Ravi Mishra

Sr. Principal Product Management
Ex-Symantec

Amit Pradhan

CISO
Vodafone India

We brought together a group of people that have devoted their time and energy in information security industry.

REGISTER NOWREGISTER NOW
Partial List of Speakers

 

I work for a IT Security Vendor. Should I register?
 
The online delegate registration is not valid for IT Security Vendors irrespective of the role.

Q

A