
Webinars
Preventing Human Errors in Cybersecurity
Many CIOs, security architects and information security leaders have asked us, “Is there a way to mitigate insider threat? Why didn’t our cybersecurity awareness training work?” We are answering their questions on this webinar. Join Us | Live ...
Read More
Read More
5 Power Tips to Ensure Cloud Security in 2021
2020 was an unpredictable year for adopters of cloud, so we’re here to help you reimagine the methods of protecting data and applications on the cloud - and align security controls to emerging regulatory requirements in 2021. Companies continued to swarm to the cloud ...
Read More
Read More
The Top 10 Cybersecurity Stories of 2020 | Lessons We Learnt
There is no doubt, as the new year starts, that 2020 has been quite the year of digital menace as cybersecurity is concerned. Let us take a look back at the 10 biggest cyberattacks that took place in ...
Read More
Read More
Preventing a Ransomware Attack Is Within Our Reach
Participants will discover insights on the anatomy of a ransomware attack, how they are impacting businesses of various sizes, and what companies can do to proactively prevent ransomware attacks. According to Cybersecurity Venture report, a ransomware attack is ...
Read More
Read More
Cyber risk is everywhere. Where to look and what to look for?
Across the world, companies are responding to the new normal by going digital and allowing employees to work remotely. This has moved Cybersecurity’s sight outside of the regular, centralized corporate firewall – into the open web, internet, and ...
Read More
Read More
Exploring PCI Software Security Standards Framework
With increasing digital payments and constantly evolving software development processes, methods to secure payment applications must also develop. Keeping in mind, the swift trends in the payment application usage, PCI SSC has introduced PCI Software Security Framework (SSF) ...
Read More
Read More
SISA’s Top 5 Forensic Driven Learnings – Report Launch and Panel Discussion
We invite you to join our panel discussion, “SISA’s Top 5 Forensic Driven Learnings” and the release of SISA Top 5 Learnings by Mrs. Rama Vedhashree, CEO, DSCI, and Mr. Dharshan Shanthamurthy, CEO, SISA. With greater technical evolution, ...
Read More
Read More
The Complete Guide to Strengthen Incident Response Plan: Mitigating the Current Day Threats
The recent shift in working style to remote working has become an opportunity for threat actors to exploit vulnerabilities on the endpoints of remote working agents. Since the start of January 2020, the news of Ransomware attacks and ...
Read More
Read More
Tackling End-Point Security Risks with Risk Assessment
Protecting sensitive data from threat actors has never been an easy task for organizations. Threat actors constantly recon for gaps and vulnerabilities in the security layers of an organization to attack and harvest data. Recent operational transformation of ...
Read More
Read More
CyberSec Code Black – MDR to Rescue
Remote working has become the new normal today. With the immense benefits of remote working, a majority of employees are opting to work from home. Like a coin with two sides, remote working has its pros and quite ...
Read More
Read More
Work-from-Home: Implications & Strategies to Remain Compliant with PCI Standards
The corporate world is transcending the boundaries of the globe and leveraging the benefits of a borderless workforce with remote working. Organizations are allowing their employees to work remotely or work from home by connecting over virtual networks ...
Read More
Read More
The Jack of Payment Card Industry – PCI PIN Security
Today, Point of Sale (POS) devices and ATM terminals are everywhere. Cardholders can enter a 4-digit Personal Identification Number (PIN) to authenticate themselves and withdraw cash or retrieve bank account information. When Cardholders swipe their credit/debit card and ...
Read More
Read More
Evolving Payment Security Standards – Expectation and Implications
Electronic payments have witnessed a significant revolution over the past two decades. PCI SSC has been working diligently to update the security standards that could address payment security trends and fight against cyber threats. The time when PCI-DSS ...
Read More
Read More
PCI Software Security Standards Framework, an evolution away from PA DSS
Description: As the payment landscape is transforming, the best security practices and procedure needs to be followed to be and remain compliant for cardholders data security. The PCI Software Security Standards (S3) Framework is an evolution away from ...
Read More
Read More
Lessons Learned from Data Breaches in 2018
Description: The webinar provides an insight in payment data breaches investigated by SISA in 2018 and details out the common ingress points, lateral movement, and egress of a compromised environment and covers an extensive view on the forensic ...
Read More
Read More
Nine Yards of PCI PIN Security Requirements
Description: PCI PIN Security Requirements provides guidelines on protecting PIN during offline and online transactions in ATM’s and POS terminals. During the course of this webinar we give you a quick overview of PCI PIN Security requirements and ...
Read More
Read More
How to secure Mobile Payment Application
Description: Developing mobile application and bringing new features to your mobile application, improving user experience is important. But what about the security of your mobile application? As mobile application processes more sensitive data, whether it be user preference ...
Read More
Read More
Integrating PCI Compliance with HIPAA
Description: PCI DSS is applicable for anyone who stores, process or transmit sensitive payment card data and have specific sets of requirements. HIPAA has much wider scope and covers all entities which stores or has access to Protected ...
Read More
Read More
Decoding Key Management for PCI DSS
Description: Encryption key management is vital in securing enterprise data storage in any organization. Regulatory Compliance requirements and recent high profile data losses emphasize further the need for an efficient key management process in organizations. This session covers ...
Read More
Read More
Risk Analysis for HIPAA: Tool for Optimal Security
Description: Risk analysis process becomes a critical factor in achieving HIPAA compliance and protecting PHI. Contrary to popular belief, Risk assessment can be used as a tool to reduce compliance cost and optimize security when it’s done the ...
Read More
Read More