SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
People = all those who are interested and passionate about InfoSec and all that it covers!
What is ISE
• Virtual meetings for Information Security learning
• Informative sessions using common language
• Duration –one hour (max) who wants to be stuck to a
connection listening to a longer gyaan session !!
• It goes better – the sessions will actually be 15 / 20
min as a presentation or a video broadcast and
then… open discussion / questions
• Frequency at least twice a month late evening
• Schedule calendar published online (barcamp
style)
VisionA platform where people volunteer and share their
knowledge and expertise in Information Security and
related subjects helping people learn through simple
webinars
MissionPeel the hype off information security concepts to
help people understand IS using common terms
and in their own language
Stakeholders
Owner The guy who started this all and is using his free
conferencing account or paying for it!
Managers Guys, gals who have volunteered to help run ISE and
manage the loose ends so everyone benefits and has fun!
Presenters Volunteer experts and professionals who have agreed to
share their knowledge and resources.
Participants You! Anyone from anywhere who wants to get to know
about InfoSec or understand some complex components.
Moderator /
Reviewer
Someone who has been authorized by the community
members and is responsible to see that the content is not
complex or inappropriate
Topics
• Cyber security cases from media
• Report writing for InfoSec leets
• Incident Response (Public
Communication)
• What is Information Security
• Information Security Certifications
(CISA, CISM, CISSP etc)
• BCP/DR
• A look at common infosec
technologies like SIEM, DLP
• Internet of Things
• Shape of things to come
• Analysis of InfoSec events from
public sources
• Risks and Threats
• Nigerian Scam
• Cyberwar and terrorism - a myth
or reality
• Cybercrime and increasing
sophistication
• Cyber Patrolling and Intelligence
gathering
• Threat Intelligence
• Privacy
• Etc…
There can be hundreds of topics and this can go on
all our lives! A short listing is given below and more
topics will be added to the schedule based on
feedback from all stakeholders:
Presentation Guidelines
• Presentations should be short and simple
• Provide practical guidance and knowledge
• Presentation is followed up with 30 – 40 minutes of
discussions, questions and answers
• Discussions may not (necessarily) be on the same
subject !
• The presenter will plan the one hour
• Focus will be on one topic / subject in order not to
confuse the learner
• Presentation will be made in a manner that translation
is easy
Day Dreaming about the future
• ISE becomes the biggest repository of IS
domain knowledge
• using commonly understood language
• Presentations are targeted in different
countries through their local presenters
• Are translated into Indian and Foreign
language by their presenters
License & Copyright
• All the programs are available for non-commercial
use under the Creative Commons license
requiring attribution
• The license holder will be the person who has
created the course content.
• The course creator will be responsible for ensuring
all graphics and content is copyright compliant.
• Any copyright violations may please be informed
and site moderators will ensure the removal asap.
Legal Stuff
• We will ask you to provide your email address, phone number and some more contact and personal
information.
• The information collected will be used to send emails or to connect with you otherwise to send out webinar
schedules, information and updates to help you attend the event or present.
• The information will be used to add you to our mailing list(s) whenever it is set up – these mailing list(s) will only
relate to ISE programs.
• No information will be shared with anyone without your permission nor will it be used to spam you with any
crappy schemes or offers.
• We assume that you accept this policy and that you provide your consent for the collection and use of your
information.
• This policy may be updated by addition / deletion / update of terms and conditions from time to time, to reflect
changes in legislative or data retention / collection / storage environment – and you will be informed about
any changes for your consent and acceptance.
PrivacyPolicy
Disclaimer
• All content on this platform is by way of voluntary contributions and the organizers are
not responsible for the same.
• Every contributor has undertaken to provide correct and appropriate content.
• The information is provided as-is without any warranties and use of the same may be
done by the users at their own risk.
• The presentations are created with the objective of providing information about
Information Security domains and may be accepted in the same spirit.
Useful Links
• Register as a Presenter: http://bit.ly/ISE-participate
• Register as a Participant: http://bit.ly/ISE-presenter
• Schedule Calendar
• Website for ISE
• Missing links will be added as information is online

Contenu connexe

Tendances

2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-securityStephen Cobb
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesStephen Cobb
 
Cyber security; one banker s perspective
Cyber security; one banker s perspectiveCyber security; one banker s perspective
Cyber security; one banker s perspectiveMohammad Ibrahim Fheili
 
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get InterestingIBM Security
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationJacqueline Fick
 
Can Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCDinesh O Bareja
 
What is Importance of Cyber Security
What is Importance of Cyber Security What is Importance of Cyber Security
What is Importance of Cyber Security Wee Tang
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeDeepak Kumar (D3)
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadaysPECB
 
General Aware Ness On Cyber Security & Ethical
General Aware Ness On Cyber Security & EthicalGeneral Aware Ness On Cyber Security & Ethical
General Aware Ness On Cyber Security & Ethicaldiwakar sharma
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime caseOnline
 

Tendances (20)

Security Awareness
Security AwarenessSecurity Awareness
Security Awareness
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and Resources
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security; one banker s perspective
Cyber security; one banker s perspectiveCyber security; one banker s perspective
Cyber security; one banker s perspective
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Introduction to Raspberry Pi
Introduction to Raspberry PiIntroduction to Raspberry Pi
Introduction to Raspberry Pi
 
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
 
Ethics and information security 2
Ethics and information security 2Ethics and information security 2
Ethics and information security 2
 
Can Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRC
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Cyber security
Cyber security Cyber security
Cyber security
 
What is Importance of Cyber Security
What is Importance of Cyber Security What is Importance of Cyber Security
What is Importance of Cyber Security
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from Patents
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
General Aware Ness On Cyber Security & Ethical
General Aware Ness On Cyber Security & EthicalGeneral Aware Ness On Cyber Security & Ethical
General Aware Ness On Cyber Security & Ethical
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime case
 

En vedette

Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India ReadyDinesh O Bareja
 
Community Disaster Incident Response
Community Disaster  Incident ResponseCommunity Disaster  Incident Response
Community Disaster Incident ResponseDinesh O Bareja
 
Mind Your Manners On Linked In
Mind Your Manners On Linked InMind Your Manners On Linked In
Mind Your Manners On Linked InDinesh O Bareja
 
Business - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITBusiness - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITDinesh O Bareja
 
Indian Thoughts in Information Security
Indian Thoughts in Information SecurityIndian Thoughts in Information Security
Indian Thoughts in Information SecurityDinesh O Bareja
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Common Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSCommon Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSDinesh O Bareja
 

En vedette (8)

Compliance Awareness
Compliance AwarenessCompliance Awareness
Compliance Awareness
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India Ready
 
Community Disaster Incident Response
Community Disaster  Incident ResponseCommunity Disaster  Incident Response
Community Disaster Incident Response
 
Mind Your Manners On Linked In
Mind Your Manners On Linked InMind Your Manners On Linked In
Mind Your Manners On Linked In
 
Business - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITBusiness - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of IT
 
Indian Thoughts in Information Security
Indian Thoughts in Information SecurityIndian Thoughts in Information Security
Indian Thoughts in Information Security
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Common Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSCommon Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CS
 

Similaire à ISE - InfoSec Essentials .. an introduction

Project considerations etp
Project considerations etpProject considerations etp
Project considerations etpmissko
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Kimberley Dray
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018hdicapitalarea
 
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck – Class Session 1 – FRSecure CISSP Mentor ProgramSlide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck – Class Session 1 – FRSecure CISSP Mentor ProgramFRSecure
 
Epping forest college interactive exhibition
Epping forest college interactive exhibitionEpping forest college interactive exhibition
Epping forest college interactive exhibitionJisc
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Secure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrongSecure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrongbryns
 
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01TechSoup
 
Role of social media in strengthening the employee community
Role of social media in strengthening the employee communityRole of social media in strengthening the employee community
Role of social media in strengthening the employee communityDr. Mazlan Abbas
 
Accessibility and Inclusion
Accessibility and InclusionAccessibility and Inclusion
Accessibility and InclusionChris Barber
 
AFCPE 2016 Workshop-Webinar Best Practices
AFCPE 2016 Workshop-Webinar Best PracticesAFCPE 2016 Workshop-Webinar Best Practices
AFCPE 2016 Workshop-Webinar Best PracticesBarbara O'Neill
 
Virtual Communities, Real Connections
Virtual Communities, Real ConnectionsVirtual Communities, Real Connections
Virtual Communities, Real ConnectionsLance A. Simon, CVEP
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICTRolly Franco
 
Introduction and panel slides
Introduction and panel slidesIntroduction and panel slides
Introduction and panel slidesJisc
 
IS YOUR TRAINING CONTENT STUCK IN THE PRINTER?
IS YOUR TRAINING CONTENT STUCK IN THE PRINTER?IS YOUR TRAINING CONTENT STUCK IN THE PRINTER?
IS YOUR TRAINING CONTENT STUCK IN THE PRINTER?Human Capital Media
 

Similaire à ISE - InfoSec Essentials .. an introduction (20)

Project considerations etp
Project considerations etpProject considerations etp
Project considerations etp
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018
 
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck – Class Session 1 – FRSecure CISSP Mentor ProgramSlide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
 
Epping forest college interactive exhibition
Epping forest college interactive exhibitionEpping forest college interactive exhibition
Epping forest college interactive exhibition
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Secure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrongSecure Coding - Are we doing it wrong
Secure Coding - Are we doing it wrong
 
Ein incl171212
Ein incl171212Ein incl171212
Ein incl171212
 
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
 
Role of social media in strengthening the employee community
Role of social media in strengthening the employee communityRole of social media in strengthening the employee community
Role of social media in strengthening the employee community
 
Fearless Virtual Facilitation Skills
Fearless Virtual Facilitation SkillsFearless Virtual Facilitation Skills
Fearless Virtual Facilitation Skills
 
Accessibility and Inclusion
Accessibility and InclusionAccessibility and Inclusion
Accessibility and Inclusion
 
Innovations in Technology-enabled Pro Bono
Innovations in Technology-enabled Pro BonoInnovations in Technology-enabled Pro Bono
Innovations in Technology-enabled Pro Bono
 
AFCPE 2016 Workshop-Webinar Best Practices
AFCPE 2016 Workshop-Webinar Best PracticesAFCPE 2016 Workshop-Webinar Best Practices
AFCPE 2016 Workshop-Webinar Best Practices
 
Virtual Communities, Real Connections
Virtual Communities, Real ConnectionsVirtual Communities, Real Connections
Virtual Communities, Real Connections
 
Hamparian - IP Authentication for STEM e-Content Access
Hamparian - IP Authentication for STEM e-Content AccessHamparian - IP Authentication for STEM e-Content Access
Hamparian - IP Authentication for STEM e-Content Access
 
Low and No Cost ICT tools
Low and No Cost ICT tools   Low and No Cost ICT tools
Low and No Cost ICT tools
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICT
 
Introduction and panel slides
Introduction and panel slidesIntroduction and panel slides
Introduction and panel slides
 
IS YOUR TRAINING CONTENT STUCK IN THE PRINTER?
IS YOUR TRAINING CONTENT STUCK IN THE PRINTER?IS YOUR TRAINING CONTENT STUCK IN THE PRINTER?
IS YOUR TRAINING CONTENT STUCK IN THE PRINTER?
 

Plus de Dinesh O Bareja

Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Dinesh O Bareja
 
Finance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITFinance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITDinesh O Bareja
 
Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Dinesh O Bareja
 
India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013Dinesh O Bareja
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in IndiaDinesh O Bareja
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security AwarenessDinesh O Bareja
 

Plus de Dinesh O Bareja (7)

Cybersecurity 2.0
Cybersecurity 2.0Cybersecurity 2.0
Cybersecurity 2.0
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
Finance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITFinance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with IT
 
Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0
 
India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in India
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness
 

Dernier

Graphene Quantum Dots-Based Composites for Biomedical Applications
Graphene Quantum Dots-Based Composites for  Biomedical ApplicationsGraphene Quantum Dots-Based Composites for  Biomedical Applications
Graphene Quantum Dots-Based Composites for Biomedical Applicationsnooralam814309
 
Novo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNovo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNeo4j
 
Extra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfExtra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfInfopole1
 
Keep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES LiveKeep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES LiveIES VE
 
The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)IES VE
 
Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...DianaGray10
 
How to release an Open Source Dataweave Library
How to release an Open Source Dataweave LibraryHow to release an Open Source Dataweave Library
How to release an Open Source Dataweave Libraryshyamraj55
 
Introduction to RAG (Retrieval Augmented Generation) and its application
Introduction to RAG (Retrieval Augmented Generation) and its applicationIntroduction to RAG (Retrieval Augmented Generation) and its application
Introduction to RAG (Retrieval Augmented Generation) and its applicationKnoldus Inc.
 
The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)codyslingerland1
 
AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024Brian Pichman
 
Scenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenariosScenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenariosErol GIRAUDY
 
From the origin to the future of Open Source model and business
From the origin to the future of  Open Source model and businessFrom the origin to the future of  Open Source model and business
From the origin to the future of Open Source model and businessFrancesco Corti
 
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechWebinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechProduct School
 
20140402 - Smart house demo kit
20140402 - Smart house demo kit20140402 - Smart house demo kit
20140402 - Smart house demo kitJamie (Taka) Wang
 
Technical SEO for Improved Accessibility WTS FEST
Technical SEO for Improved Accessibility  WTS FESTTechnical SEO for Improved Accessibility  WTS FEST
Technical SEO for Improved Accessibility WTS FESTBillieHyde
 
UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
Patch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 updatePatch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 updateadam112203
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc
 
LF Energy Webinar - Unveiling OpenEEMeter 4.0
LF Energy Webinar - Unveiling OpenEEMeter 4.0LF Energy Webinar - Unveiling OpenEEMeter 4.0
LF Energy Webinar - Unveiling OpenEEMeter 4.0DanBrown980551
 

Dernier (20)

Graphene Quantum Dots-Based Composites for Biomedical Applications
Graphene Quantum Dots-Based Composites for  Biomedical ApplicationsGraphene Quantum Dots-Based Composites for  Biomedical Applications
Graphene Quantum Dots-Based Composites for Biomedical Applications
 
Novo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNovo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4j
 
Extra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfExtra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdf
 
Keep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES LiveKeep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES Live
 
The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)
 
Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...
 
How to release an Open Source Dataweave Library
How to release an Open Source Dataweave LibraryHow to release an Open Source Dataweave Library
How to release an Open Source Dataweave Library
 
Introduction to RAG (Retrieval Augmented Generation) and its application
Introduction to RAG (Retrieval Augmented Generation) and its applicationIntroduction to RAG (Retrieval Augmented Generation) and its application
Introduction to RAG (Retrieval Augmented Generation) and its application
 
The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)
 
AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024
 
Scenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenariosScenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenarios
 
From the origin to the future of Open Source model and business
From the origin to the future of  Open Source model and businessFrom the origin to the future of  Open Source model and business
From the origin to the future of Open Source model and business
 
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechWebinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
 
20140402 - Smart house demo kit
20140402 - Smart house demo kit20140402 - Smart house demo kit
20140402 - Smart house demo kit
 
Technical SEO for Improved Accessibility WTS FEST
Technical SEO for Improved Accessibility  WTS FESTTechnical SEO for Improved Accessibility  WTS FEST
Technical SEO for Improved Accessibility WTS FEST
 
UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Patch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 updatePatch notes explaining DISARM Version 1.4 update
Patch notes explaining DISARM Version 1.4 update
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
LF Energy Webinar - Unveiling OpenEEMeter 4.0
LF Energy Webinar - Unveiling OpenEEMeter 4.0LF Energy Webinar - Unveiling OpenEEMeter 4.0
LF Energy Webinar - Unveiling OpenEEMeter 4.0
 

ISE - InfoSec Essentials .. an introduction

  • 1. People = all those who are interested and passionate about InfoSec and all that it covers!
  • 2. What is ISE • Virtual meetings for Information Security learning • Informative sessions using common language • Duration –one hour (max) who wants to be stuck to a connection listening to a longer gyaan session !! • It goes better – the sessions will actually be 15 / 20 min as a presentation or a video broadcast and then… open discussion / questions • Frequency at least twice a month late evening • Schedule calendar published online (barcamp style)
  • 3. VisionA platform where people volunteer and share their knowledge and expertise in Information Security and related subjects helping people learn through simple webinars MissionPeel the hype off information security concepts to help people understand IS using common terms and in their own language
  • 4. Stakeholders Owner The guy who started this all and is using his free conferencing account or paying for it! Managers Guys, gals who have volunteered to help run ISE and manage the loose ends so everyone benefits and has fun! Presenters Volunteer experts and professionals who have agreed to share their knowledge and resources. Participants You! Anyone from anywhere who wants to get to know about InfoSec or understand some complex components. Moderator / Reviewer Someone who has been authorized by the community members and is responsible to see that the content is not complex or inappropriate
  • 5. Topics • Cyber security cases from media • Report writing for InfoSec leets • Incident Response (Public Communication) • What is Information Security • Information Security Certifications (CISA, CISM, CISSP etc) • BCP/DR • A look at common infosec technologies like SIEM, DLP • Internet of Things • Shape of things to come • Analysis of InfoSec events from public sources • Risks and Threats • Nigerian Scam • Cyberwar and terrorism - a myth or reality • Cybercrime and increasing sophistication • Cyber Patrolling and Intelligence gathering • Threat Intelligence • Privacy • Etc… There can be hundreds of topics and this can go on all our lives! A short listing is given below and more topics will be added to the schedule based on feedback from all stakeholders:
  • 6. Presentation Guidelines • Presentations should be short and simple • Provide practical guidance and knowledge • Presentation is followed up with 30 – 40 minutes of discussions, questions and answers • Discussions may not (necessarily) be on the same subject ! • The presenter will plan the one hour • Focus will be on one topic / subject in order not to confuse the learner • Presentation will be made in a manner that translation is easy
  • 7. Day Dreaming about the future • ISE becomes the biggest repository of IS domain knowledge • using commonly understood language • Presentations are targeted in different countries through their local presenters • Are translated into Indian and Foreign language by their presenters
  • 8. License & Copyright • All the programs are available for non-commercial use under the Creative Commons license requiring attribution • The license holder will be the person who has created the course content. • The course creator will be responsible for ensuring all graphics and content is copyright compliant. • Any copyright violations may please be informed and site moderators will ensure the removal asap.
  • 9. Legal Stuff • We will ask you to provide your email address, phone number and some more contact and personal information. • The information collected will be used to send emails or to connect with you otherwise to send out webinar schedules, information and updates to help you attend the event or present. • The information will be used to add you to our mailing list(s) whenever it is set up – these mailing list(s) will only relate to ISE programs. • No information will be shared with anyone without your permission nor will it be used to spam you with any crappy schemes or offers. • We assume that you accept this policy and that you provide your consent for the collection and use of your information. • This policy may be updated by addition / deletion / update of terms and conditions from time to time, to reflect changes in legislative or data retention / collection / storage environment – and you will be informed about any changes for your consent and acceptance. PrivacyPolicy Disclaimer • All content on this platform is by way of voluntary contributions and the organizers are not responsible for the same. • Every contributor has undertaken to provide correct and appropriate content. • The information is provided as-is without any warranties and use of the same may be done by the users at their own risk. • The presentations are created with the objective of providing information about Information Security domains and may be accepted in the same spirit.
  • 10. Useful Links • Register as a Presenter: http://bit.ly/ISE-participate • Register as a Participant: http://bit.ly/ISE-presenter • Schedule Calendar • Website for ISE • Missing links will be added as information is online