Webinar- Mastering Next Gen SIEM Use Cases (Part3)

Webinar- Mastering Next Gen SIEM Use Cases (Part3)

Explore in-depth Use Cases of Next-Gen Security Information and Event Management (SIEM) – Part 3 of 3 series.   What will you learn: Tools and techniques – understanding the taxonomy Top use cases for the SOC Attack surfaces Insider threat Credential theft Endpoint compromise Application attack Monitoring / Building / SWIFT Fraud Analytics and hunting playbooks for SWIFT AboutRead more about Webinar- Mastering Next Gen SIEM Use Cases (Part3)[…]

Top Emerging Cyber Security Vendors To Look Out For In 2018

Top Emerging Cyber Security Vendors To Look Out For In 2018

Looking for Top Emerging Companies in the Cyber Security Industry?  FireCompass presents 50 Emerging Cyber Security Vendors to look out for in 2018. We don’t claim this is exhaustive list because there might be a possibility that we might have missed some of the products. But still we gave our best to give you theRead more about Top Emerging Cyber Security Vendors To Look Out For In 2018[…]

Webinar-Insider Threat Intelligence: Creating A Robust Information Security System

Webinar-Insider Threat Intelligence: Creating A Robust Information Security System

What will you learn: Overview of data leakages Cases Risks Solutions Protection against data leakages Main challenges Sources of data leakages Tools and solutions Data Leakage Prevention systems Core principles and technologies involved Layered insider threat intelligence Visualization of information flows Pinpoint control of suspicious activities Mobile environment and insider threats About Speaker:   NikitaRead more about Webinar-Insider Threat Intelligence: Creating A Robust Information Security System[…]

Webinar- Mastering Next Gen SIEM Use Cases (Part2)

Webinar- Mastering Next Gen SIEM Use Cases (Part2)

Explore in-depth Use Cases of Next-Gen Security Information and Event Management (SIEM) – Part 2 of 3 series.   What will you learn: Tools and techniques – understanding the taxonomy Top use cases for the SOC Attack surfaces Insider threat Credential theft Endpoint compromise Application attack Monitoring / Building / SWIFT Fraud Analytics and hunting playbooks for SWIFT AboutRead more about Webinar- Mastering Next Gen SIEM Use Cases (Part2)[…]

Webinar- Mastering Next Gen SIEM Use Cases (Part1)

Webinar- Mastering Next Gen SIEM Use Cases (Part1)

Explore in-depth Use Cases of Next-Gen Security Information and Event Management (SIEM) – Part 1 of 3 series.   What will you learn: Tools and techniques – understanding the taxonomy Top use cases for the SOC Attack surfaces Insider threat Credential theft Endpoint compromise Application attack Monitoring / Building / SWIFT Fraud Analytics and hunting playbooks for SWIFT AboutRead more about Webinar- Mastering Next Gen SIEM Use Cases (Part1)[…]

Cybersecurity Landscape for Indian BFSI Industry (2018)

Cybersecurity Landscape for Indian BFSI Industry (2018)

Cyber risks have evolved significantly over the last couple of years across industry sectors. Cybersecurity  is  a  matter  of  growing  concern  as  cyber-attacks  cause  loss  of income,  sensitive  information  leaks,  and  even  vital  infrastructures  to  fail. The BFSI industry, in particular, has become the target of choice with malicious actors exploring every avenue they canRead more about Cybersecurity Landscape for Indian BFSI Industry (2018)[…]

20 Emerging IT Security Vendors to Look Out for in RSA Conference 2018, USA

20 Emerging IT Security Vendors to Look Out for in RSA Conference 2018, USA

We are here, once again, with our list of Top 20 Emerging IT Security Vendors from 500+ vendors attending RSAC 2018, April 16 to 20 in San Francisco. BTW, We have also created a RSAC 1-Minute Itinerary tool for the ease of attendees, through which you can now navigate the maze of 500+ Vendors at RSAC Expo likeRead more about 20 Emerging IT Security Vendors to Look Out for in RSA Conference 2018, USA[…]

Information Security Metrics and Dashboard for the CEO / Board

Information Security Metrics and Dashboard for the CEO / Board

It is very important to properly define the right Information Security Metrics for an organization to estimate the security structure and to communicate it efficiently to the Board level executives.There is a growing interest from the Board and the CEO to understand the information security posture of the company. Many of the CISOs I knowRead more about Information Security Metrics and Dashboard for the CEO / Board[…]