SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
People = all those who are interested and passionate about InfoSec and all that it covers!
What is ISE
• Virtual meetings for Information Security learning
• Informative sessions using common language
• Duration –one hour (max) who wants to be stuck to a
connection listening to a longer gyaan session !!
• It goes better – the sessions will actually be 15 / 20
min as a presentation or a video broadcast and
then… open discussion / questions
• Frequency at least twice a month late evening
• Schedule calendar published online (barcamp
style)
VisionA platform where people volunteer and share their
knowledge and expertise in Information Security and
related subjects helping people learn through simple
webinars
MissionPeel the hype off information security concepts to
help people understand IS using common terms
and in their own language
Stakeholders
Owner The guy who started this all and is using his free
conferencing account or paying for it!
Managers Guys, gals who have volunteered to help run ISE and
manage the loose ends so everyone benefits and has fun!
Presenters Volunteer experts and professionals who have agreed to
share their knowledge and resources.
Participants You! Anyone from anywhere who wants to get to know
about InfoSec or understand some complex components.
Moderator /
Reviewer
Someone who has been authorized by the community
members and is responsible to see that the content is not
complex or inappropriate
Topics
• Cyber security cases from media
• Report writing for InfoSec leets
• Incident Response (Public
Communication)
• What is Information Security
• Information Security Certifications
(CISA, CISM, CISSP etc)
• BCP/DR
• A look at common infosec
technologies like SIEM, DLP
• Internet of Things
• Shape of things to come
• Analysis of InfoSec events from
public sources
• Risks and Threats
• Nigerian Scam
• Cyberwar and terrorism - a myth
or reality
• Cybercrime and increasing
sophistication
• Cyber Patrolling and Intelligence
gathering
• Threat Intelligence
• Privacy
• Etc…
There can be hundreds of topics and this can go on
all our lives! A short listing is given below and more
topics will be added to the schedule based on
feedback from all stakeholders:
Presentation Guidelines
• Presentations should be short and simple
• Provide practical guidance and knowledge
• Presentation is followed up with 30 – 40 minutes of
discussions, questions and answers
• Discussions may not (necessarily) be on the same
subject !
• The presenter will plan the one hour
• Focus will be on one topic / subject in order not to
confuse the learner
• Presentation will be made in a manner that translation
is easy
Day Dreaming about the future
• ISE becomes the biggest repository of IS
domain knowledge
• using commonly understood language
• Presentations are targeted in different
countries through their local presenters
• Are translated into Indian and Foreign
language by their presenters
License & Copyright
• All the programs are available for non-commercial
use under the Creative Commons license
requiring attribution
• The license holder will be the person who has
created the course content.
• The course creator will be responsible for ensuring
all graphics and content is copyright compliant.
• Any copyright violations may please be informed
and site moderators will ensure the removal asap.
Legal Stuff
• We will ask you to provide your email address, phone number and some more contact and personal
information.
• The information collected will be used to send emails or to connect with you otherwise to send out webinar
schedules, information and updates to help you attend the event or present.
• The information will be used to add you to our mailing list(s) whenever it is set up – these mailing list(s) will only
relate to ISE programs.
• No information will be shared with anyone without your permission nor will it be used to spam you with any
crappy schemes or offers.
• We assume that you accept this policy and that you provide your consent for the collection and use of your
information.
• This policy may be updated by addition / deletion / update of terms and conditions from time to time, to reflect
changes in legislative or data retention / collection / storage environment – and you will be informed about
any changes for your consent and acceptance.
PrivacyPolicy
Disclaimer
• All content on this platform is by way of voluntary contributions and the organizers are
not responsible for the same.
• Every contributor has undertaken to provide correct and appropriate content.
• The information is provided as-is without any warranties and use of the same may be
done by the users at their own risk.
• The presentations are created with the objective of providing information about
Information Security domains and may be accepted in the same spirit.
Useful Links
• Register as a Presenter: http://bit.ly/ISE-participate
• Register as a Participant: http://bit.ly/ISE-presenter
• Schedule Calendar
• Website for ISE
• Missing links will be added as information is online

Weitere ähnliche Inhalte

Was ist angesagt?

Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
Jacqueline Fick
 

Was ist angesagt? (20)

Security Awareness
Security AwarenessSecurity Awareness
Security Awareness
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and Resources
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security; one banker s perspective
Cyber security; one banker s perspectiveCyber security; one banker s perspective
Cyber security; one banker s perspective
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Introduction to Raspberry Pi
Introduction to Raspberry PiIntroduction to Raspberry Pi
Introduction to Raspberry Pi
 
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
 
Ethics and information security 2
Ethics and information security 2Ethics and information security 2
Ethics and information security 2
 
Can Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRC
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Cyber security
Cyber security Cyber security
Cyber security
 
What is Importance of Cyber Security
What is Importance of Cyber Security What is Importance of Cyber Security
What is Importance of Cyber Security
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from Patents
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
General Aware Ness On Cyber Security & Ethical
General Aware Ness On Cyber Security & EthicalGeneral Aware Ness On Cyber Security & Ethical
General Aware Ness On Cyber Security & Ethical
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime case
 

Andere mochten auch

Andere mochten auch (8)

Compliance Awareness
Compliance AwarenessCompliance Awareness
Compliance Awareness
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India Ready
 
Community Disaster Incident Response
Community Disaster  Incident ResponseCommunity Disaster  Incident Response
Community Disaster Incident Response
 
Mind Your Manners On Linked In
Mind Your Manners On Linked InMind Your Manners On Linked In
Mind Your Manners On Linked In
 
Business - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITBusiness - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of IT
 
Indian Thoughts in Information Security
Indian Thoughts in Information SecurityIndian Thoughts in Information Security
Indian Thoughts in Information Security
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Common Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSCommon Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CS
 

Ähnlich wie ISE - InfoSec Essentials .. an introduction

Project considerations etp
Project considerations etpProject considerations etp
Project considerations etp
missko
 
Secure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrongSecure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrong
bryns
 
Demystifying digital accessibility webinar
Demystifying digital accessibility webinarDemystifying digital accessibility webinar
Demystifying digital accessibility webinar
Association for Project Management
 
Role of social media in strengthening the employee community
Role of social media in strengthening the employee communityRole of social media in strengthening the employee community
Role of social media in strengthening the employee community
Dr. Mazlan Abbas
 
Accessibility and Inclusion
Accessibility and InclusionAccessibility and Inclusion
Accessibility and Inclusion
Chris Barber
 

Ähnlich wie ISE - InfoSec Essentials .. an introduction (20)

Project considerations etp
Project considerations etpProject considerations etp
Project considerations etp
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018
 
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck – Class Session 1 – FRSecure CISSP Mentor ProgramSlide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
 
Epping forest college interactive exhibition
Epping forest college interactive exhibitionEpping forest college interactive exhibition
Epping forest college interactive exhibition
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Secure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrongSecure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrong
 
Ein incl171212
Ein incl171212Ein incl171212
Ein incl171212
 
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
 
Demystifying digital accessibility webinar
Demystifying digital accessibility webinarDemystifying digital accessibility webinar
Demystifying digital accessibility webinar
 
Role of social media in strengthening the employee community
Role of social media in strengthening the employee communityRole of social media in strengthening the employee community
Role of social media in strengthening the employee community
 
Fearless Virtual Facilitation Skills
Fearless Virtual Facilitation SkillsFearless Virtual Facilitation Skills
Fearless Virtual Facilitation Skills
 
Accessibility and Inclusion
Accessibility and InclusionAccessibility and Inclusion
Accessibility and Inclusion
 
Innovations in Technology-enabled Pro Bono
Innovations in Technology-enabled Pro BonoInnovations in Technology-enabled Pro Bono
Innovations in Technology-enabled Pro Bono
 
AFCPE 2016 Workshop-Webinar Best Practices
AFCPE 2016 Workshop-Webinar Best PracticesAFCPE 2016 Workshop-Webinar Best Practices
AFCPE 2016 Workshop-Webinar Best Practices
 
Virtual Communities, Real Connections
Virtual Communities, Real ConnectionsVirtual Communities, Real Connections
Virtual Communities, Real Connections
 
Hamparian - IP Authentication for STEM e-Content Access
Hamparian - IP Authentication for STEM e-Content AccessHamparian - IP Authentication for STEM e-Content Access
Hamparian - IP Authentication for STEM e-Content Access
 
Low and No Cost ICT tools
Low and No Cost ICT tools   Low and No Cost ICT tools
Low and No Cost ICT tools
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICT
 
Introduction and panel slides
Introduction and panel slidesIntroduction and panel slides
Introduction and panel slides
 

Mehr von Dinesh O Bareja

Mehr von Dinesh O Bareja (7)

Cybersecurity 2.0
Cybersecurity 2.0Cybersecurity 2.0
Cybersecurity 2.0
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
Finance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITFinance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with IT
 
Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0
 
India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in India
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Kürzlich hochgeladen (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

ISE - InfoSec Essentials .. an introduction

  • 1. People = all those who are interested and passionate about InfoSec and all that it covers!
  • 2. What is ISE • Virtual meetings for Information Security learning • Informative sessions using common language • Duration –one hour (max) who wants to be stuck to a connection listening to a longer gyaan session !! • It goes better – the sessions will actually be 15 / 20 min as a presentation or a video broadcast and then… open discussion / questions • Frequency at least twice a month late evening • Schedule calendar published online (barcamp style)
  • 3. VisionA platform where people volunteer and share their knowledge and expertise in Information Security and related subjects helping people learn through simple webinars MissionPeel the hype off information security concepts to help people understand IS using common terms and in their own language
  • 4. Stakeholders Owner The guy who started this all and is using his free conferencing account or paying for it! Managers Guys, gals who have volunteered to help run ISE and manage the loose ends so everyone benefits and has fun! Presenters Volunteer experts and professionals who have agreed to share their knowledge and resources. Participants You! Anyone from anywhere who wants to get to know about InfoSec or understand some complex components. Moderator / Reviewer Someone who has been authorized by the community members and is responsible to see that the content is not complex or inappropriate
  • 5. Topics • Cyber security cases from media • Report writing for InfoSec leets • Incident Response (Public Communication) • What is Information Security • Information Security Certifications (CISA, CISM, CISSP etc) • BCP/DR • A look at common infosec technologies like SIEM, DLP • Internet of Things • Shape of things to come • Analysis of InfoSec events from public sources • Risks and Threats • Nigerian Scam • Cyberwar and terrorism - a myth or reality • Cybercrime and increasing sophistication • Cyber Patrolling and Intelligence gathering • Threat Intelligence • Privacy • Etc… There can be hundreds of topics and this can go on all our lives! A short listing is given below and more topics will be added to the schedule based on feedback from all stakeholders:
  • 6. Presentation Guidelines • Presentations should be short and simple • Provide practical guidance and knowledge • Presentation is followed up with 30 – 40 minutes of discussions, questions and answers • Discussions may not (necessarily) be on the same subject ! • The presenter will plan the one hour • Focus will be on one topic / subject in order not to confuse the learner • Presentation will be made in a manner that translation is easy
  • 7. Day Dreaming about the future • ISE becomes the biggest repository of IS domain knowledge • using commonly understood language • Presentations are targeted in different countries through their local presenters • Are translated into Indian and Foreign language by their presenters
  • 8. License & Copyright • All the programs are available for non-commercial use under the Creative Commons license requiring attribution • The license holder will be the person who has created the course content. • The course creator will be responsible for ensuring all graphics and content is copyright compliant. • Any copyright violations may please be informed and site moderators will ensure the removal asap.
  • 9. Legal Stuff • We will ask you to provide your email address, phone number and some more contact and personal information. • The information collected will be used to send emails or to connect with you otherwise to send out webinar schedules, information and updates to help you attend the event or present. • The information will be used to add you to our mailing list(s) whenever it is set up – these mailing list(s) will only relate to ISE programs. • No information will be shared with anyone without your permission nor will it be used to spam you with any crappy schemes or offers. • We assume that you accept this policy and that you provide your consent for the collection and use of your information. • This policy may be updated by addition / deletion / update of terms and conditions from time to time, to reflect changes in legislative or data retention / collection / storage environment – and you will be informed about any changes for your consent and acceptance. PrivacyPolicy Disclaimer • All content on this platform is by way of voluntary contributions and the organizers are not responsible for the same. • Every contributor has undertaken to provide correct and appropriate content. • The information is provided as-is without any warranties and use of the same may be done by the users at their own risk. • The presentations are created with the objective of providing information about Information Security domains and may be accepted in the same spirit.
  • 10. Useful Links • Register as a Presenter: http://bit.ly/ISE-participate • Register as a Participant: http://bit.ly/ISE-presenter • Schedule Calendar • Website for ISE • Missing links will be added as information is online