Personal Information
Organization / Workplace
Bengaluru Area, India India
Occupation
Founder @ CISOPlatform,Worlds only exclusive social network for Senior Information Security Executives
Website
About
Very passionate about Entrepreneurship,Painting and knowing the unknown.
Key Skills:
Business development,Brand development,Competitive Market Analysis,Strategy and Execution,Digital Marketing, Social Media Marketing
Strategic Consulting- including business plan & sales strategy, Aggressive development for the entire business from scratch
Contact Details
Tags
cyber security
information security
ciso platform annual summit
information technology
ciso
defcon
security
cisoplatform
sacon
hacking and attack techniques
information
cisco
emerging areas
technology
architecture
cloud security
mobile security
incident response + soc
.
security awareness and human element
hacking
privacy
framework
software/application security and devops
data
threat intelligence
hardware security
grc
security architecture
chief information security officer
threat hunting
3rdpartyrisk
ai
infosec
cio
network
vulnerabilities & exploits
data protection
zero trust
firecompass
iot
workshop
iot security
malware
incident response
application security
informationsecurity
security trends
api
aws
internet of things
regulations
soc
deception technologies
deception in security
wireless attack
forensic
mac/ios security
webinar
docker
gdpr
kubernetes
cloud
cisoplatform summit and sacon
android security
artificial intelligence
owasp
threat
threat protection
management
risk
breach
reverse engineering
mitigations
devops
supply chain
learning
red team
big data
case study
network security
vendorrisk
deception
shadowit
yara rules
blockchain
blue team
program
mapping project
appsec
infrastructure
personal
protocol
python
windows loader
dpdp
hardware attacks
saas
ransomware
devsecops
machine learning
informationtechnology
shadow it
informatica
threat modelling
data security
crypto
cpas
ci
wifi mana
end-to-end secure communication
weaponizing unicode
homographs beyond idns
cellular networks
authentication security
sap
usb
wifi mitm
jailbreaking the 3ds
macos firewalls
tineola
embedded devices
exhibitor taxonomy
(source: rsa usa 2016-san francisco)
vpn networks
compression oracle attacks
game hackers
instrumenting android emulators
iam
google play store
enterprise security
computer security
alexanderpolyakov
tracking malware developers
matlab
erp
rce on pie binaries
residual certificates
pre-owned domains
def
top100ciso
branding
professional
prof. indranil sengupta
deserialization gadget chains
phy layer vulnerabilities
iit
rf fuzzing tools
criminal justice system
reaping and breaking keys
2013
breaking parser logic
malware analysis
automated disassembly
man-in-the-disk
hacking plcs
hacking ble bicycle locks
incidentresponse
multi-container applications
backdooring
breaking signatures
csirt
internetofthings
breaking smart speakers
embedded supply chain
attacking apple kernel drivers
digital leviathan
operating system
infosec media
nation-state big brothers
lost and found certificates
tls
secure communication
browser security
soc architecture
advance soc
automatic yara rules generation
nist cyber security framework
replay attacks on ethereum smart contracts
hardware backdoors in x86 cpus
ciso platform security maturity model
x86 cpus
ble devices security
smart city security
smart city attacks
drones
anti-drone systems
nano drones
genesis scripting engine
application threat modelling
technical architecture of rasp technology
cybersecurity portfolio
cybersecurity portfolio management
injecting security into web apps with runtime patc
google’s beyondcorp approach to security
automotive security
connected vehicle security issues
industrial iot
industrial iot security standards & frameworks
kill chain
forensics
securityprogram
darkweb
threat detection
windows security
windows defender antivirus
802.1x-2010
authentication
wingos
extreme networks
healthcare
risk management
exploiting vulnerabilities
mobile point of sales systems
ssrf
ransparent session hijacking
edge side include injection
compromising online accounts
cracking voicemail systems
barcode security
barcode scanners
uefi exploitation
firmware security
ios 11 sandbox
windows reverse engineering
scripting engine
sabsa
zachman framework
reverseengineering
privilege pitfalls
internet
samsung gear smart watch
smart watch vulnerabilities
security in medical
security in pharma
soviet russia smartcard
hacking the brain
pwn an sdn controller
change management
evolution
bypassing port-security
macsec
ioc
ttp
dwell time
mitre attack
enumeration
cycle
building
data inventory
discovery
dat mapping
oss
lifecycle
dev
(sacon 2020) adventures in sdn security
practical exploitation of iot networks and ecosyst
offense
destress
covid19
next generation threat
risk mitigation strategies with better context.
cyber terrorism
bec
mobile network
radio signals
ml
sol
personal data
future
work
scalability
security control
organization
economy
market
drives
government
steganography
monetization
api architecture
world
life
digital transormation
digital
developing
transformation
hunting
hypothesis
generation process
ciso priorities
security challenges
data resilience
api governance
new age threats
log4j
lessons
attacks
web3
security incidents
vectors
gen ai
deepfake
bank security
bfsi
risk quantification
governance
compliance
identity
security decision
cybersecurity
genai
neural network
fire compass
sim architecture
security vulnerabilities
web hacking
wapt
ethical hacking
ethical hacking steps
types of ethical hacking
security governance
third party
vendor supply chain
api security
zta
cwp
non human
identity threats
cnap
application
third party supply chain
device compromise
mfa
it managers
head it
mfa bypass
new threats
sase
vendorriskassessment
nasa
databreach
digitalfootprint
osint
kids cyber safety
savetheworld
chennaichapter
international
source
windows
system
trust
networks
vendor
5g
surf
share
change
empowerment
payments
financial
india
global
qualcomm basebands
active directory administrator insecurities
what the fax
macos kernel graphics driver
exploit of nxp socs vulnerability
ms17-010
eternal exploits
cloud pentest
azure
gcp
cyber range
hidden internet
surface web
architecture setup
breachdisclosure
containersecurity
bestofsecurity
bos
paas
murraygoldschmidt
thirdparty
checklist
thirdpartyrisk
vendorriskmanagement
data collection
data destruction
structure
law
landscape
protection
sme
challenges
data privacy
policy
industry
transportation
transport
iso 27701
iso
dp regulation
privacy principles
international standards
certification
pims
standard
hackathon
mobile apps
website
machine
tech
wireless
operations
control
systems
industrial
enterprise
open source
intelligence
workflow
automation
processor
siem
pcr
vlan
blitz
waf
redash
pam
program data
processing
ecosystem
data usage
database
See more
Users following Priyanka Aash