SlideShare a Scribd company logo
  • Upload
  • Home
  • Explore
  • Login
  • Signup
SlideShare a Scribd company logo
  • Home
  • Explore
  • Upload
  • Login
  • Signup

We've updated our privacy policy. Click here to review the details. Tap here to review the details.

×
×
×
×
×
×
Priyanka Aash

Priyanka Aash

376 Followers
611 SlideShares 1 Clipboard 376 Followers 78 Followings
  • Unblock User Block User
611 SlideShares 1 Clipboard 376 Followers 78 Followings

Personal Information
Organization / Workplace
Bengaluru Area, India India
Occupation
Founder @ CISOPlatform,Worlds only exclusive social network for Senior Information Security Executives
Website
www.cisoplatform.com
About
Very passionate about Entrepreneurship,Painting and knowing the unknown. Key Skills: Business development,Brand development,Competitive Market Analysis,Strategy and Execution,Digital Marketing, Social Media Marketing Strategic Consulting- including business plan & sales strategy, Aggressive development for the entire business from scratch
Contact Details
Tags
cyber security information security information technology ciso platform annual summit security defcon sacon ciso cisoplatform information cisco emerging areas hacking and attack techniques architecture technology cloud security mobile security . incident response + soc hacking security awareness and human element privacy framework software/application security and devops data hardware security threat intelligence security architecture chief information security officer 3rdpartyrisk vulnerabilities & exploits threat hunting network grc cio infosec zero trust application security malware iot iot security informationsecurity soc owasp api kubernetes gdpr data protection wireless attack aws mac/ios security docker android security deception in security deception technologies internet of things security trends workshop webinar forensic shadow it devsecops informatica threat threat protection management devops supply chain case study program mapping project regulations personal python infrastructure mitigations learning ai cloud shadowit vendorrisk breach appsec blue team red team deception big data reverse engineering network security windows loader protocol blockchain yara rules threat modelling machine learning incident response crypto data security artificial intelligence cpas informationtechnology hardware attacks ci log4j ransomware new age threats api governance data resilience security challenges ciso priorities new threats mfa bypass head it it managers mfa device compromise third party supply chain application saas cnap identity threats non human cwp zta api security vendor supply chain third party security governance types of ethical hacking ethical hacking steps ethical hacking wapt web hacking security vulnerabilities sim architecture radio signals mobile network bec cyber terrorism risk mitigation strategies with better context. next generation threat covid19 destress offense practical exploitation of iot networks and ecosyst (sacon 2020) adventures in sdn security dev lifecycle oss dat mapping discovery data inventory building cycle enumeration mitre attack dwell time ttp ioc generation process hypothesis hunting transformation developing digital digital transormation life world api architecture monetization steganography government risk drives market economy organization security control scalability work future personal data sol ml database website mobile apps hackathon standard pims certification international standards privacy principles dp regulation iso iso 27701 transport transportation industry policy data privacy challenges sme protection landscape law structure data destruction data collection data usage ecosystem processing program data pam redash waf blitz vlan pcr siem processor automation workflow intelligence open source enterprise industrial systems control operations wireless tech machine global india financial payments empowerment change share surf 5g vendor networks trust system windows source international chennaichapter savetheworld kids cyber safety osint digitalfootprint databreach nasa vendorriskassessment vendorriskmanagement thirdpartyrisk checklist thirdparty murraygoldschmidt paas bos bestofsecurity containersecurity breachdisclosure architecture setup surface web hidden internet cyber range gcp azure cloud pentest eternal exploits ms17-010 exploit of nxp socs vulnerability macos kernel graphics driver what the fax active directory administrator insecurities qualcomm basebands ios 11 sandbox automated disassembly malware analysis breaking parser logic reaping and breaking keys criminal justice system rf fuzzing tools phy layer vulnerabilities deserialization gadget chains pre-owned domains residual certificates lost and found certificates nation-state big brothers digital leviathan attacking apple kernel drivers embedded supply chain breaking smart speakers breaking signatures backdooring multi-container applications hacking ble bicycle locks hacking plcs homographs beyond idns weaponizing unicode end-to-end secure communication authentication security cellular networks wifi mana wifi mitm jailbreaking the 3ds macos firewalls tineola man-in-the-disk rce on pie binaries matlab tracking malware developers google play store instrumenting android emulators game hackers compression oracle attacks vpn networks embedded devices firmware security uefi exploitation barcode scanners barcode security cracking voicemail systems compromising online accounts edge side include injection ransparent session hijacking ssrf mobile point of sales systems exploiting vulnerabilities extreme networks wingos authentication 802.1x-2010 macsec bypassing port-security pwn an sdn controller hacking the brain soviet russia smartcard security in pharma security in medical smart watch vulnerabilities samsung gear smart watch privilege pitfalls reverseengineering scripting engine genesis scripting engine nano drones anti-drone systems drones smart city attacks smart city security ble devices security x86 cpus hardware backdoors in x86 cpus replay attacks on ethereum smart contracts automatic yara rules generation browser security secure communication tls windows reverse engineering windows defender antivirus windows security darkweb securityprogram industrial iot security standards & frameworks industrial iot connected vehicle security issues automotive security google’s beyondcorp approach to security cybersecurity portfolio management cybersecurity portfolio application threat modelling technical architecture of rasp technology injecting security into web apps with runtime patc kill chain forensics threat detection soc architecture advance soc nist cyber security framework ciso platform security maturity model sabsa zachman framework internet change management evolution healthcare risk management exhibitor taxonomy (source: rsa usa 2016-san francisco) iam enterprise security computer security alexanderpolyakov erp sap usb incidentresponse csirt internetofthings operating system infosec media def top100ciso branding professional prof. indranil sengupta iit 2013
See more
Users being followed by Priyanka Aash
Amit Ranjan Profile
Amit Ranjan
Co-founded SlideShare | Architect @ National Di...
104 presentations • 12 documents
•
7,353 followers • 3,128 followings
Sanjay Mehta Profile
Sanjay Mehta
Angel & PE Investor Director CORE Media, In...
25 presentations
•
649 followers • 456 followings
Mohit Bhishikar Profile
Mohit Bhishikar
Information Technology at Persistent
76 followers • 76 followings
Dorai Thodla Profile
Dorai Thodla
Founder at iMorph, Inc.
24 presentations
•
1,449 followers • 899 followings
NASSCOM Product Connect Profile
NASSCOM Product Connect
Consultant at NASSCOM Product Connect
287 presentations • 14 documents
•
1,850 followers • 1,492 followings
Vishnu Gupta Profile
Vishnu Gupta
Member Health Committee at Bengal Chamber of Co...
1 presentation
•
202 followers • 150 followings
Dushyant Totlani Profile
Dushyant Totlani
CIO at INTERNATIONAL KNOWLEDGE PARK
38 followers • 36 followings
Ishwar Jha Profile
Ishwar Jha
Founder and CEO @appetals. Digital Transformati...
12 presentations
•
1,016 followers • 1,108 followings
Samir Arora Profile
Samir Arora
VP Global IT Services & Digital Transformat...
202 followers • 77 followings
Dr. Srinivas Kishan Anapu Profile
Dr. Srinivas Kishan Anapu
CEO at Insights of Data & Chairman at Doyen...
1 presentation
•
189 followers • 171 followings
Bikram. Seth Profile
Bikram. Seth
Experienced Business Oriented CIO, Mentoring St...
536 followers • 528 followings
Subodh Dubey Profile
Subodh Dubey
Group CIO at Shapporji Pallonji Group * Startu...
190 followers • 203 followings
Sandeep Ajgaonkar Profile
Sandeep Ajgaonkar
Country Manager at TechTarget, Inc.
153 followers • 86 followings
Grey Head Media Profile
Grey Head Media
3 presentations
•
196 followers • 73 followings
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • About
  • Support
  • Terms
  • Privacy
  • Copyright
  • Cookie Preferences
  • Do not sell or share my personal information
English
Current Language: English
Español
Português
Français
Deutsch

© 2023 SlideShare from Scribd

We've updated our privacy policy.

We’ve updated our privacy policy so that we are compliant with changing global privacy regulations and to provide you with insight into the limited ways in which we use your data.

You can read the details below. By accepting, you agree to the updated privacy policy.

Thank you!

View updated privacy policy
We've encountered a problem, please try again.