Mahdi Sayyad
17
Abonné
Personal Information
Entreprise/Lieu de travail
Iran Iran, Islamic Republic of
Profession
Cyber Security Researcher
À propos
Experienced Security Researcher with a demonstrated history of working in the information technology and services industry. Skilled in Penetration testing and securiey assessment of it pruducts, malware analysis and botnet detection, network security monitoring, siem , ics/scada security assessment,security standards and frameworks: ISO 27001,ISO 15408, Owasp testing, ptes, issaf, iec 62443, nescor .
Mots-clés
آزمایشگاه ارزیابی محصول
ارزیابی مخاطرات امنیت
common criteria
it security evaluation
data fusion
ارزیابی امنیتی محصول
استاندارد iso 15408
استاندارد معیارمشترک
information security
نظام ارزیابی امنیتی
افتا
مدل ادغام داده
web analytics
data analytics
fusion frameworks
log correlation tools
data fusion tools
آگاهی وضعیتی
تحلیل امنیت
تحلیل وب
تحلیل داده
همبستگی لاگ
فیوژن داده ها
log correlation
امنیت زیرساخت های حیاتی
امنیت اسکادا
امنیت سامانه های کنترل صنعت
iso 15408
ارزیابی امنیت محصول
security standars
iso/iec 15408
penetration testing
industrial control system
security
scada security
Tout plus
- Présentations
- Documents
- Infographies
A Beginners Guide to noSQL
Mike Crabb
•
il y a 8 ans
Introduction to Development for the Internet
Mike Crabb
•
il y a 8 ans
Paris ML meetup
Yves Raimond
•
il y a 8 ans
SOC presentation- Building a Security Operations Center
Michael Nickle
•
il y a 12 ans
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
•
il y a 11 ans
Scada Industrial Control Systems Penetration Testing
Yehia Mamdouh
•
il y a 9 ans
When Cyber Security Meets Machine Learning
Lior Rokach
•
il y a 11 ans
Incident Response Triage
Albert Hui
•
il y a 12 ans
Log Monitoring Simplified - Get the best out of Graylog2 & Icinga 2
Icinga
•
il y a 9 ans
What is ISO 27001 ISMS
Business Beam
•
il y a 10 ans
Implementing and Running SIEM: Approaches and Lessons
Anton Chuvakin
•
il y a 14 ans
Streaming Analytics - Comparison of Open Source Frameworks and Products
Kai Wähner
•
il y a 8 ans
NIST 800-92 Log Management Guide in the Real World
Anton Chuvakin
•
il y a 16 ans
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Call....
Shah Sheikh
•
il y a 9 ans
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector 2016
Chris Gates
•
il y a 7 ans
[White paper] detecting problems in industrial networks though continuous monitoring
TI Safe
•
il y a 10 ans
Framework and Product Comparison for Big Data Log Analytics and ITOA
Kai Wähner
•
il y a 8 ans
Threat Hunting with Splunk
Splunk
•
il y a 7 ans
Malware analysis
xabean
•
il y a 11 ans
From Threat Intelligence to Defense Cleverness: A Data Science Approach (#tidatasci)
Alex Pinto
•
il y a 9 ans