Personal Information
Unternehmen/Arbeitsplatz
Bengaluru Area, India India
Beruf
Founder @ CISOPlatform,Worlds only exclusive social network for Senior Information Security Executives
Webseite
www.cisoplatform.com
Info
Very passionate about Entrepreneurship,Painting and knowing the unknown.
Key Skills:
Business development,Brand development,Competitive Market Analysis,Strategy and Execution,Digital Marketing, Social Media Marketing
Strategic Consulting- including business plan & sales strategy, Aggressive development for the entire business from scratch
Tags
cyber security
information security
information technology
ciso platform annual summit
security
defcon
sacon
ciso
cisoplatform
information
hacking and attack techniques
cisco
emerging areas
architecture
technology
cloud security
mobile security
.
incident response + soc
hacking
security awareness and human element
privacy
framework
software/application security and devops
data
hardware security
threat intelligence
security architecture
chief information security officer
3rdpartyrisk
vulnerabilities & exploits
threat hunting
network
grc
cio
infosec
zero trust
application security
malware
iot
iot security
informationsecurity
soc
owasp
api
cloud
kubernetes
gdpr
data protection
wireless attack
aws
mac/ios security
docker
android security
deception in security
deception technologies
incident response
internet of things
security trends
workshop
webinar
forensic
ransomware
saas
shadow it
devsecops
informatica
threat
threat protection
management
devops
supply chain
case study
program
mapping project
regulations
personal
python
infrastructure
mitigations
learning
ai
shadowit
vendorrisk
breach
appsec
blue team
red team
deception
big data
reverse engineering
network security
windows loader
protocol
blockchain
yara rules
threat modelling
machine learning
crypto
data security
artificial intelligence
cpas
informationtechnology
hardware attacks
ci
dpdp
vectors
security incidents
web3
attacks
lessons
log4j
new age threats
api governance
data resilience
security challenges
ciso priorities
new threats
mfa bypass
head it
it managers
mfa
device compromise
third party supply chain
application
cnap
identity threats
non human
cwp
zta
api security
vendor supply chain
third party
security governance
types of ethical hacking
ethical hacking steps
ethical hacking
wapt
web hacking
security vulnerabilities
sim architecture
radio signals
mobile network
bec
cyber terrorism
risk mitigation strategies with better context.
next generation threat
covid19
destress
offense
practical exploitation of iot networks and ecosyst
(sacon 2020) adventures in sdn security
dev
lifecycle
oss
dat mapping
discovery
data inventory
building
cycle
enumeration
mitre attack
dwell time
ttp
ioc
generation process
hypothesis
hunting
transformation
developing
digital
digital transormation
life
world
api architecture
monetization
steganography
government
risk
drives
market
economy
organization
security control
scalability
work
future
personal data
sol
ml
database
website
mobile apps
hackathon
standard
pims
certification
international standards
privacy principles
dp regulation
iso
iso 27701
transport
transportation
industry
policy
data privacy
challenges
sme
protection
landscape
law
structure
data destruction
data collection
data usage
ecosystem
processing
program data
pam
redash
waf
blitz
vlan
pcr
siem
processor
automation
workflow
intelligence
open source
enterprise
industrial
systems
control
operations
wireless
tech
machine
global
india
financial
payments
empowerment
change
share
surf
5g
vendor
networks
trust
system
windows
source
international
chennaichapter
savetheworld
kids cyber safety
osint
digitalfootprint
databreach
nasa
vendorriskassessment
vendorriskmanagement
thirdpartyrisk
checklist
thirdparty
murraygoldschmidt
paas
bos
bestofsecurity
containersecurity
breachdisclosure
architecture setup
surface web
hidden internet
cyber range
gcp
azure
cloud pentest
eternal exploits
ms17-010
exploit of nxp socs vulnerability
macos kernel graphics driver
what the fax
active directory administrator insecurities
qualcomm basebands
ios 11 sandbox
automated disassembly
malware analysis
breaking parser logic
reaping and breaking keys
criminal justice system
rf fuzzing tools
phy layer vulnerabilities
deserialization gadget chains
pre-owned domains
residual certificates
lost and found certificates
nation-state big brothers
digital leviathan
attacking apple kernel drivers
embedded supply chain
breaking smart speakers
breaking signatures
backdooring
multi-container applications
hacking ble bicycle locks
hacking plcs
homographs beyond idns
weaponizing unicode
end-to-end secure communication
authentication security
cellular networks
wifi mana
wifi mitm
jailbreaking the 3ds
macos firewalls
tineola
man-in-the-disk
rce on pie binaries
matlab
tracking malware developers
google play store
instrumenting android emulators
game hackers
compression oracle attacks
vpn networks
embedded devices
firmware security
uefi exploitation
barcode scanners
barcode security
cracking voicemail systems
compromising online accounts
edge side include injection
ransparent session hijacking
ssrf
mobile point of sales systems
exploiting vulnerabilities
extreme networks
wingos
authentication
802.1x-2010
macsec
bypassing port-security
pwn an sdn controller
hacking the brain
soviet russia smartcard
security in pharma
security in medical
smart watch vulnerabilities
samsung gear smart watch
privilege pitfalls
reverseengineering
scripting engine
genesis scripting engine
nano drones
anti-drone systems
drones
smart city attacks
smart city security
ble devices security
x86 cpus
hardware backdoors in x86 cpus
replay attacks on ethereum smart contracts
automatic yara rules generation
browser security
secure communication
tls
windows reverse engineering
windows defender antivirus
windows security
darkweb
securityprogram
industrial iot security standards & frameworks
industrial iot
connected vehicle security issues
automotive security
google’s beyondcorp approach to security
cybersecurity portfolio management
cybersecurity portfolio
application threat modelling
technical architecture of rasp technology
injecting security into web apps with runtime patc
kill chain
forensics
threat detection
soc architecture
advance soc
nist cyber security framework
ciso platform security maturity model
sabsa
zachman framework
internet
change management
evolution
healthcare
risk management
exhibitor taxonomy
(source: rsa usa 2016-san francisco)
iam
enterprise security
computer security
alexanderpolyakov
erp
sap
usb
incidentresponse
csirt
internetofthings
operating system
infosec media
def
top100ciso
branding
professional
prof. indranil sengupta
iit
2013
Mehr anzeigen
Präsentationen
(614)Dokumente
(11)Personal Information
Unternehmen/Arbeitsplatz
Bengaluru Area, India India
Beruf
Founder @ CISOPlatform,Worlds only exclusive social network for Senior Information Security Executives
Webseite
www.cisoplatform.com
Info
Very passionate about Entrepreneurship,Painting and knowing the unknown.
Key Skills:
Business development,Brand development,Competitive Market Analysis,Strategy and Execution,Digital Marketing, Social Media Marketing
Strategic Consulting- including business plan & sales strategy, Aggressive development for the entire business from scratch
Tags
cyber security
information security
information technology
ciso platform annual summit
security
defcon
sacon
ciso
cisoplatform
information
hacking and attack techniques
cisco
emerging areas
architecture
technology
cloud security
mobile security
.
incident response + soc
hacking
security awareness and human element
privacy
framework
software/application security and devops
data
hardware security
threat intelligence
security architecture
chief information security officer
3rdpartyrisk
vulnerabilities & exploits
threat hunting
network
grc
cio
infosec
zero trust
application security
malware
iot
iot security
informationsecurity
soc
owasp
api
cloud
kubernetes
gdpr
data protection
wireless attack
aws
mac/ios security
docker
android security
deception in security
deception technologies
incident response
internet of things
security trends
workshop
webinar
forensic
ransomware
saas
shadow it
devsecops
informatica
threat
threat protection
management
devops
supply chain
case study
program
mapping project
regulations
personal
python
infrastructure
mitigations
learning
ai
shadowit
vendorrisk
breach
appsec
blue team
red team
deception
big data
reverse engineering
network security
windows loader
protocol
blockchain
yara rules
threat modelling
machine learning
crypto
data security
artificial intelligence
cpas
informationtechnology
hardware attacks
ci
dpdp
vectors
security incidents
web3
attacks
lessons
log4j
new age threats
api governance
data resilience
security challenges
ciso priorities
new threats
mfa bypass
head it
it managers
mfa
device compromise
third party supply chain
application
cnap
identity threats
non human
cwp
zta
api security
vendor supply chain
third party
security governance
types of ethical hacking
ethical hacking steps
ethical hacking
wapt
web hacking
security vulnerabilities
sim architecture
radio signals
mobile network
bec
cyber terrorism
risk mitigation strategies with better context.
next generation threat
covid19
destress
offense
practical exploitation of iot networks and ecosyst
(sacon 2020) adventures in sdn security
dev
lifecycle
oss
dat mapping
discovery
data inventory
building
cycle
enumeration
mitre attack
dwell time
ttp
ioc
generation process
hypothesis
hunting
transformation
developing
digital
digital transormation
life
world
api architecture
monetization
steganography
government
risk
drives
market
economy
organization
security control
scalability
work
future
personal data
sol
ml
database
website
mobile apps
hackathon
standard
pims
certification
international standards
privacy principles
dp regulation
iso
iso 27701
transport
transportation
industry
policy
data privacy
challenges
sme
protection
landscape
law
structure
data destruction
data collection
data usage
ecosystem
processing
program data
pam
redash
waf
blitz
vlan
pcr
siem
processor
automation
workflow
intelligence
open source
enterprise
industrial
systems
control
operations
wireless
tech
machine
global
india
financial
payments
empowerment
change
share
surf
5g
vendor
networks
trust
system
windows
source
international
chennaichapter
savetheworld
kids cyber safety
osint
digitalfootprint
databreach
nasa
vendorriskassessment
vendorriskmanagement
thirdpartyrisk
checklist
thirdparty
murraygoldschmidt
paas
bos
bestofsecurity
containersecurity
breachdisclosure
architecture setup
surface web
hidden internet
cyber range
gcp
azure
cloud pentest
eternal exploits
ms17-010
exploit of nxp socs vulnerability
macos kernel graphics driver
what the fax
active directory administrator insecurities
qualcomm basebands
ios 11 sandbox
automated disassembly
malware analysis
breaking parser logic
reaping and breaking keys
criminal justice system
rf fuzzing tools
phy layer vulnerabilities
deserialization gadget chains
pre-owned domains
residual certificates
lost and found certificates
nation-state big brothers
digital leviathan
attacking apple kernel drivers
embedded supply chain
breaking smart speakers
breaking signatures
backdooring
multi-container applications
hacking ble bicycle locks
hacking plcs
homographs beyond idns
weaponizing unicode
end-to-end secure communication
authentication security
cellular networks
wifi mana
wifi mitm
jailbreaking the 3ds
macos firewalls
tineola
man-in-the-disk
rce on pie binaries
matlab
tracking malware developers
google play store
instrumenting android emulators
game hackers
compression oracle attacks
vpn networks
embedded devices
firmware security
uefi exploitation
barcode scanners
barcode security
cracking voicemail systems
compromising online accounts
edge side include injection
ransparent session hijacking
ssrf
mobile point of sales systems
exploiting vulnerabilities
extreme networks
wingos
authentication
802.1x-2010
macsec
bypassing port-security
pwn an sdn controller
hacking the brain
soviet russia smartcard
security in pharma
security in medical
smart watch vulnerabilities
samsung gear smart watch
privilege pitfalls
reverseengineering
scripting engine
genesis scripting engine
nano drones
anti-drone systems
drones
smart city attacks
smart city security
ble devices security
x86 cpus
hardware backdoors in x86 cpus
replay attacks on ethereum smart contracts
automatic yara rules generation
browser security
secure communication
tls
windows reverse engineering
windows defender antivirus
windows security
darkweb
securityprogram
industrial iot security standards & frameworks
industrial iot
connected vehicle security issues
automotive security
google’s beyondcorp approach to security
cybersecurity portfolio management
cybersecurity portfolio
application threat modelling
technical architecture of rasp technology
injecting security into web apps with runtime patc
kill chain
forensics
threat detection
soc architecture
advance soc
nist cyber security framework
ciso platform security maturity model
sabsa
zachman framework
internet
change management
evolution
healthcare
risk management
exhibitor taxonomy
(source: rsa usa 2016-san francisco)
iam
enterprise security
computer security
alexanderpolyakov
erp
sap
usb
incidentresponse
csirt
internetofthings
operating system
infosec media
def
top100ciso
branding
professional
prof. indranil sengupta
iit
2013
Mehr anzeigen