Skip to main content
Home

Main menu

  • News
  • Security Agenda
  • CSO100
  • Threats
  • Compliance
  • Breaches
  • Videos
  • tw
  • fb
  • rss

Videos

  • CSO Alert
  • Executive Viewpoints
  • Explained
  • IDG Security Day

Quick links:

  • CISO Speaks
  • CISO Movements
  • Latest Hacks
  • Malware
  • Vulnerabilities
  • Patches & Updates
  • Advisory Board

Sections:

  • News
  • Security Agenda
  • CSO100
  • Threats
  • Compliance
  • Breaches
  • Videos
  • tw
  • fb
  • rss

Breadcrumb

  1. Home
  2. All video
Companies rethink threat landscape to reduce attack surface: Vishak Raman, Cisco
Rajnish-Gupta_Splash-Image.jpg
Data is a weapon for cybercriminals: Rajnish Gupta, RSA Security
Home_Page_23.png
CSO Alert: Facebook will wind up data sharing partnerships with more companies
Home_Page_22.png
CSO Alert: Fortinet signs threat information sharing agreement with INTERPOL
Partner Content
Debjyoti-Guha.png
EDR to be mainstay of security blueprint for CSOs: Debjyoti Guha, F-Secure
Slide31.JPG
Panel Discussion - Is Indian Enterprise Blockchain Ready?
Slide25.JPG
Cyber Warfare: Have you Become Part of it Unknowingly?- Prashant Mali
Slide20.JPG
CrowdStrike's Game-changing Security Platform - Built to Stop Breaches: Ramanand Kambli
Slide36.JPG
GDPR in India: Preparedness in India, Indian Enterprise- Jaspreet Singh
Slide15.JPG
The Trust Fabric- Securing the Cloud Journey: Bharat Kalyanram
Slide12_0.JPG
Cybersecurity Framework: Critical Processes, Including Incidence Response Management- Shubhagata Kumar
CyberCrime.jpg
Top Cybercrime Manifestations: Explained
  • Loading...

SECURITY AGENDA

Security and business are intertwined: Prasad Mandava, Akamai India
Indian enterprises are highly exposed to advanced cyber threats: Bhaskar Bakthavatsalu, Check Point
Adopt a ‘trust, but verify’ approach for a zero trust security environment: Edgar Dias, F5 Networks
Enterprises should invest in people and build cyber threat-hunting practices: Shrikant Shitole, FireEye
Critical enterprise and govt data will be the new oil: Surendra Singh, Forcepoint
Automated threat intelligence is a valuable tool against attack vectors: Rajesh Maurya, Fortinet
A cognitive SOC can help determine threats which are applicable to you: Vaidyanathan Iyer, IBM India/South Asia
AI, AR and blockchain are disrupting the cybersecurity landscape: Shrenik Bhayani, Kaspersky Labs
Next big wave of innovation in cybersecurity solution is ML and AI: Venkat Krishnapur, McAfee India
Big data analytics, AI and blockchain can help reclaim surrendered ground: Anil Bhasin, Palo Alto Networks 
Businesses must focus on digital risk management : Rajnish Gupta, RSA
CISOs must shape IT security programs around overall corporate strategy: Gaurav Agarwal, Symantec
CSOs must develop a training program focused on advanced threats: Nilesh Jain, Trend Micro

Security Trends for 2019

State of Cybersecurity

A simple app penetration test could have prevented the 7-Eleven data breach, say experts
McAfee in talks for US$1B public market return
Cisco sounds warning on 3 critical security patches for DNA Center
Latest cyberattack from the TrickBot malware family identified: Research

Hacked

Executive Interviews

You can't take a zero-trust view with traditional hub-and-spoke architecture: Scott Robertson, Zscaler
Vulnerability management, surface visibility is imperative for modern CSOs: Gerry Sillars
Spear phishing has come a long way since the ‘Nigerian prince’ racket: Hatem Naguib, Barracuda
Bring your own key to resolve trust issues: Jin MA, Alibaba Cloud

Footer

  • About Cso
  • ADVERTISING
  • PRIVACY POLICY
  • Contact Us
  • tw
  • fb
  • rss
X

idg

Copyright © 2005-2019 IDG Media Private Ltd. All rights reserved

Reproduction in whole or part in any form or medium without express written permission of IDG Media Pvt. Ltd is prohibited.

the idg network

  • THE IDG NETWORK:
  • Cio.in
  • ComputerWorld.in
  • Channelworld.in