際際滷shows by User: shomiron / http://www.slideshare.net/images/logo.gif 際際滷shows by User: shomiron / Fri, 23 Jun 2017 05:24:34 GMT 際際滷Share feed for 際際滷shows by User: shomiron Workshop on Data Science at Best Practices Meet 2017, Data Security Council of India /slideshow/workshop-on-data-science-at-best-practices-meet-2017-data-security-council-of-india/77195813 dscidatascienceworkshop-170623052435
This workshop covers parts of data science - Analytics, Machine Learning and an intro to Deep Learning with some use cases in the cyber security space.]]>

This workshop covers parts of data science - Analytics, Machine Learning and an intro to Deep Learning with some use cases in the cyber security space.]]>
Fri, 23 Jun 2017 05:24:34 GMT /slideshow/workshop-on-data-science-at-best-practices-meet-2017-data-security-council-of-india/77195813 shomiron@slideshare.net(shomiron) Workshop on Data Science at Best Practices Meet 2017, Data Security Council of India shomiron This workshop covers parts of data science - Analytics, Machine Learning and an intro to Deep Learning with some use cases in the cyber security space. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dscidatascienceworkshop-170623052435-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This workshop covers parts of data science - Analytics, Machine Learning and an intro to Deep Learning with some use cases in the cyber security space.
Workshop on Data Science at Best Practices Meet 2017, Data Security Council of India from Shomiron Das Gupta
]]>
701 2 https://cdn.slidesharecdn.com/ss_thumbnails/dscidatascienceworkshop-170623052435-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
SACON16 - SOC Architecture /slideshow/sacon16-soc-architecture/75954926 sacon16-socarchitecture-170514043952
Security Operations Center - Architecture. Learn how you can go about building your next generation SOC. The presentation tackles the approach to building a SOC.]]>

Security Operations Center - Architecture. Learn how you can go about building your next generation SOC. The presentation tackles the approach to building a SOC.]]>
Sun, 14 May 2017 04:39:52 GMT /slideshow/sacon16-soc-architecture/75954926 shomiron@slideshare.net(shomiron) SACON16 - SOC Architecture shomiron Security Operations Center - Architecture. Learn how you can go about building your next generation SOC. The presentation tackles the approach to building a SOC. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sacon16-socarchitecture-170514043952-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Security Operations Center - Architecture. Learn how you can go about building your next generation SOC. The presentation tackles the approach to building a SOC.
SACON16 - SOC Architecture from Shomiron Das Gupta
]]>
497 2 https://cdn.slidesharecdn.com/ss_thumbnails/sacon16-socarchitecture-170514043952-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
SACON17 - Detecting Threats with Analytics and Machine Learning /slideshow/sacon17-detecting-threats-with-analytics-and-machine-learning/75954925 sacon17-detectingthreatswithanalyticsandml-170514043948
Introducing Analytics, Anomaly Engines and Machine learning concepts in threat detection technologies.]]>

Introducing Analytics, Anomaly Engines and Machine learning concepts in threat detection technologies.]]>
Sun, 14 May 2017 04:39:48 GMT /slideshow/sacon17-detecting-threats-with-analytics-and-machine-learning/75954925 shomiron@slideshare.net(shomiron) SACON17 - Detecting Threats with Analytics and Machine Learning shomiron Introducing Analytics, Anomaly Engines and Machine learning concepts in threat detection technologies. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sacon17-detectingthreatswithanalyticsandml-170514043948-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Introducing Analytics, Anomaly Engines and Machine learning concepts in threat detection technologies.
SACON17 - Detecting Threats with Analytics and Machine Learning from Shomiron Das Gupta
]]>
322 2 https://cdn.slidesharecdn.com/ss_thumbnails/sacon17-detectingthreatswithanalyticsandml-170514043948-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The Experiences of a Cyber Attack Victim /slideshow/the-experiences-of-a-cyber-attack-victim/38932901 tata-aig-delhi-140910115820-phpapp01
Cyber threats are common, notable large corporations have been witness to these attacks. A lot is know about the victim and the consequences of the threat. However we are still to understand the state of Chaos experienced by the victim of the threat.]]>

Cyber threats are common, notable large corporations have been witness to these attacks. A lot is know about the victim and the consequences of the threat. However we are still to understand the state of Chaos experienced by the victim of the threat.]]>
Wed, 10 Sep 2014 11:58:20 GMT /slideshow/the-experiences-of-a-cyber-attack-victim/38932901 shomiron@slideshare.net(shomiron) The Experiences of a Cyber Attack Victim shomiron Cyber threats are common, notable large corporations have been witness to these attacks. A lot is know about the victim and the consequences of the threat. However we are still to understand the state of Chaos experienced by the victim of the threat. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tata-aig-delhi-140910115820-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyber threats are common, notable large corporations have been witness to these attacks. A lot is know about the victim and the consequences of the threat. However we are still to understand the state of Chaos experienced by the victim of the threat.
The Experiences of a Cyber Attack Victim from Shomiron Das Gupta
]]>
317 1 https://cdn.slidesharecdn.com/ss_thumbnails/tata-aig-delhi-140910115820-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
CNAM-PRODUCT DATASHEET /slideshow/cnamproduct-datasheet/13894430 pds-com-v3-120806223235-phpapp01
]]>

]]>
Mon, 06 Aug 2012 22:32:34 GMT /slideshow/cnamproduct-datasheet/13894430 shomiron@slideshare.net(shomiron) CNAM-PRODUCT DATASHEET shomiron <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/pds-com-v3-120806223235-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
CNAM-PRODUCT DATASHEET from Shomiron Das Gupta
]]>
303 3 https://cdn.slidesharecdn.com/ss_thumbnails/pds-com-v3-120806223235-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
PROFILE - NETMONASTERY /slideshow/profile-netmonastery/13882363 profile-nm-120806010659-phpapp02
NetMonastery NSPL - COMPANY PROFILE]]>

NetMonastery NSPL - COMPANY PROFILE]]>
Mon, 06 Aug 2012 01:06:56 GMT /slideshow/profile-netmonastery/13882363 shomiron@slideshare.net(shomiron) PROFILE - NETMONASTERY shomiron NetMonastery NSPL - COMPANY PROFILE <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/profile-nm-120806010659-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> NetMonastery NSPL - COMPANY PROFILE
PROFILE - NETMONASTERY from Shomiron Das Gupta
]]>
501 2 https://cdn.slidesharecdn.com/ss_thumbnails/profile-nm-120806010659-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-shomiron-48x48.jpg?cb=1523072071 Shomiron is a highly experienced Intrusion Analyst, and has been building threat detection systems for more than a decade. He founded NetMonastery (NM) at the end of 2002, and set out to deliver quality attack detection products and services to its customers. Today NM serves the largest customers in the financial, telecom, media and e-commerce markets, with its geographical reach and presence spanning the globe. From his early years Shomiron has focussed on NM's core values and continues to be hands-on with his technology. Over the years he has worked intensively on, DDoS mitigation, Traffic Anomaly, Collaborative Detection Systems, Trace Tools, BigData, Real-time FishBowling, Multi-lay.. http://www.netmonastery.com https://cdn.slidesharecdn.com/ss_thumbnails/dscidatascienceworkshop-170623052435-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/workshop-on-data-science-at-best-practices-meet-2017-data-security-council-of-india/77195813 Workshop on Data Scien... https://cdn.slidesharecdn.com/ss_thumbnails/sacon16-socarchitecture-170514043952-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/sacon16-soc-architecture/75954926 SACON16 - SOC Architec... https://cdn.slidesharecdn.com/ss_thumbnails/sacon17-detectingthreatswithanalyticsandml-170514043948-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/sacon17-detecting-threats-with-analytics-and-machine-learning/75954925 SACON17 - Detecting Th...