SlideShare a Scribd company logo
CISO Platform - Our 10+ Year
Journey
Dedicated Social Platform For CISOs and Senior IT Security Leaders (Network,
Share, Learn)
Building Tangible Community
Goods Through Sharing &
Collaboration
Frameworks, Checklists, Playbooks..
40,000+
Members ,
5,000+ CISOs ..
20+ Countries
500+ Checklists,
Frameworks &
Playbooks
Product
Discovery &
Comparison
Platform
• 30+ Security Markets
• 1000+ Security Products
• Open Source Initiative
CISO Platform
Task Force
Initiative
Global Top
Influencer
Recognition -
CISO Platform
100 & Top 20
SACON -
Security
Architecture
Conference
CISO Platform
Fellowship
Program
Startup Support
Program
Open Source
Tool Building
Local Chapters
Kid’s Cyber
Safety Initiative
CISO Platform Show
- Podcast
CISO Platform
Courses -
PreLaunch
Thank You
Event Orientation
100+ Speakers, 20+
Workshops, 20K+
Session Attendance
Mindfulness &
Navigating the
troublesome times
Event Orientation
• 20+ Free workshops by trainers from Defcon, Blackhat etc
• 1>Every CISOs First 90 Days On The Job, 2>Security Transition – A New Perspective On Security For The Board By
The CISO, 3>Threat Hunting Workshop, 4>Red and Blue Team Joint Operations Learning the Offensive/Defensive
TTPs & more
•
• Top Keynotes from Global Influencers: Anton Chuvakin (Head Security
Strategy in Google and former Gartner Analyst), Richard Steinnon
(Industry Analyst and Author of Security Yearbook 2021), Maria Lewis
(Head of Cyber Security Investment Banking Practice and co founder
AGC Partners), Dan Cornell (CTO of Denim Group), Chuck Brooks (
Named Top Tech Person To Follow by LinkedIn), and more.
Introduction Pitch
It’s been 10 years since we started "CISO Platform" community with the vision of collaboration &
learning amongst senior security executives. We thank all our members for promoting knowledge and
making the online world safer together. The community today has grown over 40,000+ subscribers
globally.
Our primary goal has been - to create tangible community goods - and as a community, we have
created more than 1000 checklists, frameworks, and security training material that are available
absolutely free for all. We have also conducted 50+ training sessions for school kids as a part of the
"Kid's Cyber Safety" initiative.
With the bigger vision of contributing to the community ecosystem, we are hosting this event with 45
hours of sessions and 100+ speakers.....We are able to do this because of awesome speakers who
have extended their kindness to conduct such sessions for all of you...We profusely thank all the
speakers for their contribution.
We want to welcome you not as a participant but as a community members and encourage you to
participate in our vision and give back to the community. We would encourage you to write blogs and
articles and also establish yourself as a thought-leader in our community.. at www.cisoplatform.com

More Related Content

Similar to CISOPlatform journey.pptx.pdf

Leading with Technology: Social Media Tools and Mobile Apps for 21st Century...
Leading with Technology:  Social Media Tools and Mobile Apps for 21st Century...Leading with Technology:  Social Media Tools and Mobile Apps for 21st Century...
Leading with Technology: Social Media Tools and Mobile Apps for 21st Century...
Cheryl Peltier-Davis
 
INFORMS: IT Committee Report - August 2011
INFORMS: IT Committee Report - August 2011INFORMS: IT Committee Report - August 2011
INFORMS: IT Committee Report - August 2011
Bjarni Kristjánsson
 

Similar to CISOPlatform journey.pptx.pdf (20)

The Digital Footprint MOOC: A Free online course and resources encouraging cr...
The Digital Footprint MOOC: A Free online course and resources encouraging cr...The Digital Footprint MOOC: A Free online course and resources encouraging cr...
The Digital Footprint MOOC: A Free online course and resources encouraging cr...
 
Its all about Jobs
Its all about JobsIts all about Jobs
Its all about Jobs
 
Encode DeFi Club intro event slides
Encode DeFi Club intro event slidesEncode DeFi Club intro event slides
Encode DeFi Club intro event slides
 
20171119 web matsuri_community_ho
20171119 web matsuri_community_ho20171119 web matsuri_community_ho
20171119 web matsuri_community_ho
 
ION Belgrade - Opening Slides
ION Belgrade - Opening SlidesION Belgrade - Opening Slides
ION Belgrade - Opening Slides
 
Msc Malysia Inno Tech
Msc Malysia Inno TechMsc Malysia Inno Tech
Msc Malysia Inno Tech
 
Why join iabc uk professional and corporate members
Why join iabc uk   professional and corporate membersWhy join iabc uk   professional and corporate members
Why join iabc uk professional and corporate members
 
Getting grip on_web_20
Getting grip on_web_20Getting grip on_web_20
Getting grip on_web_20
 
Leading with Technology: Social Media Tools and Mobile Apps for 21st Century...
Leading with Technology:  Social Media Tools and Mobile Apps for 21st Century...Leading with Technology:  Social Media Tools and Mobile Apps for 21st Century...
Leading with Technology: Social Media Tools and Mobile Apps for 21st Century...
 
INFORMS: IT Committee Report - August 2011
INFORMS: IT Committee Report - August 2011INFORMS: IT Committee Report - August 2011
INFORMS: IT Committee Report - August 2011
 
Welcome and introduction
Welcome and introductionWelcome and introduction
Welcome and introduction
 
You Have to Start Somewhere
You Have to Start Somewhere You Have to Start Somewhere
You Have to Start Somewhere
 
091201 Social Media and 3rd Sector
091201 Social Media and 3rd Sector091201 Social Media and 3rd Sector
091201 Social Media and 3rd Sector
 
ION Hangzhou - Opening Remarks
ION Hangzhou - Opening RemarksION Hangzhou - Opening Remarks
ION Hangzhou - Opening Remarks
 
Nonprofit Workforce Transition and Planning in Response to COVID-19
Nonprofit Workforce Transition and Planning in Response to COVID-19Nonprofit Workforce Transition and Planning in Response to COVID-19
Nonprofit Workforce Transition and Planning in Response to COVID-19
 
What is the new social web?
What is the new social web?What is the new social web?
What is the new social web?
 
Social media global_org_cisco_deanna_govoni_041411
Social media global_org_cisco_deanna_govoni_041411Social media global_org_cisco_deanna_govoni_041411
Social media global_org_cisco_deanna_govoni_041411
 
Best training blockchain for colleges- https://diyblockchain.co
Best training blockchain for colleges- https://diyblockchain.coBest training blockchain for colleges- https://diyblockchain.co
Best training blockchain for colleges- https://diyblockchain.co
 
Diyblockchain 9jan2019 https://diyblockchain.co/
Diyblockchain 9jan2019 https://diyblockchain.co/Diyblockchain 9jan2019 https://diyblockchain.co/
Diyblockchain 9jan2019 https://diyblockchain.co/
 
Diyblockchain -best blockchain institute for corporate training -diyblockchai...
Diyblockchain -best blockchain institute for corporate training -diyblockchai...Diyblockchain -best blockchain institute for corporate training -diyblockchai...
Diyblockchain -best blockchain institute for corporate training -diyblockchai...
 

More from Priyanka Aash

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 

CISOPlatform journey.pptx.pdf