際際滷shows by User: officialRishikant / http://www.slideshare.net/images/logo.gif 際際滷shows by User: officialRishikant / Sat, 30 May 2020 17:06:13 GMT 際際滷Share feed for 際際滷shows by User: officialRishikant Introduction of Secure Software Development Lifecycle /slideshow/introduction-of-secure-software-development-lifecycle/234761777 introssdlc-200530170613
DevSecOps]]>

DevSecOps]]>
Sat, 30 May 2020 17:06:13 GMT /slideshow/introduction-of-secure-software-development-lifecycle/234761777 officialRishikant@slideshare.net(officialRishikant) Introduction of Secure Software Development Lifecycle officialRishikant DevSecOps <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/introssdlc-200530170613-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> DevSecOps
Introduction of Secure Software Development Lifecycle from Rishi Kant
]]>
382 0 https://cdn.slidesharecdn.com/ss_thumbnails/introssdlc-200530170613-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cognitive automation with machine learning in cyber security /slideshow/cognitive-automation-with-machine-learning-in-cyber-security-117382177/117382177 cognitiveautomationwithmachinelearningincybersecurity-180929203052
These slides deck is from # HITBGSEC Singapore 2018, It consists of integration of cognitive automation and machine learning in different cyber security processes ]]>

These slides deck is from # HITBGSEC Singapore 2018, It consists of integration of cognitive automation and machine learning in different cyber security processes ]]>
Sat, 29 Sep 2018 20:30:52 GMT /slideshow/cognitive-automation-with-machine-learning-in-cyber-security-117382177/117382177 officialRishikant@slideshare.net(officialRishikant) Cognitive automation with machine learning in cyber security officialRishikant These slides deck is from # HITBGSEC Singapore 2018, It consists of integration of cognitive automation and machine learning in different cyber security processes <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cognitiveautomationwithmachinelearningincybersecurity-180929203052-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> These slides deck is from # HITBGSEC Singapore 2018, It consists of integration of cognitive automation and machine learning in different cyber security processes
Cognitive automation with machine learning in cyber security from Rishi Kant
]]>
333 2 https://cdn.slidesharecdn.com/ss_thumbnails/cognitiveautomationwithmachinelearningincybersecurity-180929203052-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Threat Management /slideshow/cyber-threat-management/116653843 cyberthreat-180926093407
This slides shows how we deals with threat for better risk resilience in a typical organization.]]>

This slides shows how we deals with threat for better risk resilience in a typical organization.]]>
Wed, 26 Sep 2018 09:34:07 GMT /slideshow/cyber-threat-management/116653843 officialRishikant@slideshare.net(officialRishikant) Cyber Threat Management officialRishikant This slides shows how we deals with threat for better risk resilience in a typical organization. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cyberthreat-180926093407-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This slides shows how we deals with threat for better risk resilience in a typical organization.
Cyber Threat Management from Rishi Kant
]]>
645 2 https://cdn.slidesharecdn.com/ss_thumbnails/cyberthreat-180926093407-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Secure SDLC Framework /slideshow/secure-sdlc-framework/114971027 s-sdlcframework-180917102704
These are slides from local security chapters meetup, Here I tried to explain the challenges in appsec and complete framework for different life cycle of secure software development cycle]]>

These are slides from local security chapters meetup, Here I tried to explain the challenges in appsec and complete framework for different life cycle of secure software development cycle]]>
Mon, 17 Sep 2018 10:27:04 GMT /slideshow/secure-sdlc-framework/114971027 officialRishikant@slideshare.net(officialRishikant) Secure SDLC Framework officialRishikant These are slides from local security chapters meetup, Here I tried to explain the challenges in appsec and complete framework for different life cycle of secure software development cycle <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/s-sdlcframework-180917102704-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> These are slides from local security chapters meetup, Here I tried to explain the challenges in appsec and complete framework for different life cycle of secure software development cycle
Secure SDLC Framework from Rishi Kant
]]>
1917 1 https://cdn.slidesharecdn.com/ss_thumbnails/s-sdlcframework-180917102704-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Clickjacking /officialRishikant/clickjacking-114968709 clickjacking-180917100814
A very short summary deck for beginners, its shows up for click jacking and its patching solution]]>

A very short summary deck for beginners, its shows up for click jacking and its patching solution]]>
Mon, 17 Sep 2018 10:08:14 GMT /officialRishikant/clickjacking-114968709 officialRishikant@slideshare.net(officialRishikant) Clickjacking officialRishikant A very short summary deck for beginners, its shows up for click jacking and its patching solution <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/clickjacking-180917100814-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A very short summary deck for beginners, its shows up for click jacking and its patching solution
Clickjacking from Rishi Kant
]]>
118 1 https://cdn.slidesharecdn.com/ss_thumbnails/clickjacking-180917100814-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Machine Learning in Cyber Security /slideshow/machine-learning-in-cyber-security/114967870 mlforcs-rishikant-180917100045
This deck is from Interpol Conference 2017, these slides shows the holistic view of machine learning in cyber security for better organization readiness ]]>

This deck is from Interpol Conference 2017, these slides shows the holistic view of machine learning in cyber security for better organization readiness ]]>
Mon, 17 Sep 2018 10:00:45 GMT /slideshow/machine-learning-in-cyber-security/114967870 officialRishikant@slideshare.net(officialRishikant) Machine Learning in Cyber Security officialRishikant This deck is from Interpol Conference 2017, these slides shows the holistic view of machine learning in cyber security for better organization readiness <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mlforcs-rishikant-180917100045-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This deck is from Interpol Conference 2017, these slides shows the holistic view of machine learning in cyber security for better organization readiness
Machine Learning in Cyber Security from Rishi Kant
]]>
6710 5 https://cdn.slidesharecdn.com/ss_thumbnails/mlforcs-rishikant-180917100045-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
GDPR | Cyber security process resilience /slideshow/gdpr-cyber-security-process-resilience/114967118 cybersecurityprocessresilience-180917095422
This deck is from NW-Conference 2018, Its about the cyber security resilience program align with GDPR or data protection.]]>

This deck is from NW-Conference 2018, Its about the cyber security resilience program align with GDPR or data protection.]]>
Mon, 17 Sep 2018 09:54:22 GMT /slideshow/gdpr-cyber-security-process-resilience/114967118 officialRishikant@slideshare.net(officialRishikant) GDPR | Cyber security process resilience officialRishikant This deck is from NW-Conference 2018, Its about the cyber security resilience program align with GDPR or data protection. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurityprocessresilience-180917095422-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This deck is from NW-Conference 2018, Its about the cyber security resilience program align with GDPR or data protection.
GDPR | Cyber security process resilience from Rishi Kant
]]>
177 1 https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurityprocessresilience-180917095422-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-officialRishikant-48x48.jpg?cb=1700754828 I am a Security professional with 15+ years of corporate experience in the field of Cyber Security, Information Security, Digital Forensics, IT Administration, Secure Software Development, Training, and company operations.I worked in various industry verticals such as Utilities, IT/ITES, E-Commerce, Government, BFSI and law-enforcement agencies. rishikant.in https://cdn.slidesharecdn.com/ss_thumbnails/introssdlc-200530170613-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/introduction-of-secure-software-development-lifecycle/234761777 Introduction of Secure... https://cdn.slidesharecdn.com/ss_thumbnails/cognitiveautomationwithmachinelearningincybersecurity-180929203052-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/cognitive-automation-with-machine-learning-in-cyber-security-117382177/117382177 Cognitive automation w... https://cdn.slidesharecdn.com/ss_thumbnails/cyberthreat-180926093407-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/cyber-threat-management/116653843 Cyber Threat Management