Latest News

  • Best practices, cutting edge trends and risk factors of Home Automation

    Posted on 30/01/2018

    Automation has moved its paradigm from manufacturing floor to a new vertical. Internet of things (IOT) has made a massive leap over past 5 years as never before. All the tech giants are making proprietary eco systems that can cater the customer to make a "SMART" home. By converting all the things into IOT or cloud based, then the word "Big data Analytics" came to the arena. Lets see the cross sections on these paths to see, Whats latest? Are we in a potential data Risk? and Whats next?

    Read more>>
  • European General Data Protection Regulation (GDPR) and key steps for compliance.

    Posted on 28/12/2017

    With just over five months to go until the General Data Protection Regulation (GDPR) comes into effect, organisations globally need to start thinking about their compliance to the GDPR if they are handling personal data of EU citizens. This session will be an overview of GDPR and how to create/improve your GDPR policies and processes to demonstrate ongoing compliance.

    Read more>>
  • Cloud Security and Implementation best Practices for Enterprises

    Posted on 21/11/2017

    "Cloud Computing" has become the most popular buzz word on today's IT world, which is allowing Enterprises to minimize time to go-live on their products and services to their customers with seamless possibilities. But are we security aware on what we do on cloud ? are we using the tools and features efficiently to make our data on cloud secure?

    Read more>>
  • Application High Availability for Operational Continuity

    Posted on 31/10/2017

    Are you worried how your customers will react if your application is down for 5 minutes? 1 hour? 24 hours? Multiple days? In a digital world, where the web up-time is more critical than ever, the only way to guarantee that your application has the anticipated level of operational continuity is by designing it with High Availability (HA). The appearance attempts to guide the audience to curb system failures by implementing a HA architecture while supporting the desired level of security, scalability & performance.

    Read more>>
  • Get the Premier Cyber Forensics Certification from ISC2

    Posted on 07/09/2017

    The evolving field of cyber forensics requires professionals who understand far more than just hard drive or intrusion analysis.The CCFP(Certified Cyber Forensics Professional) from ISC2 credential indicates expertise in forensics techniques and procedures, standards of practice, and legal and ethical principles to assure accurate, complete, and reliable digital evidence admissible in a court of law. It also indicates the ability to apply forensics to other information security disciplines, such as e-discovery, malware analysis, or incident response. In other words, the CCFP is an objective measure of excellence valued by courts and employers alike.

    Read more>>
  • Application attacks - The deadly invisible onslaught

    Posted on 10/21/2015

    Building secure software is the responsibility of all the stakeholders involved with the software development lifecycle (SDLC). Many times, the processes that are in place to aid in the security of software end up being circumvented, victims of the iron triangle of project scope, schedule and budget. This session is fully focused on addressing key security issues in software development.

    Read more>>
  • Key Security risk: Employee behavior, how to model it to predict Internal security threats

    Posted on 06/02/2015

    In the last years security breaches has significantly impacted financial institution. The Association of Certified Fraud Examiners, estimated as $67 billion the losses incurred by FI. About 70% of this was internal and most remain undetected. How Financial Institution can leverage on their existing information to reduce security breaches. Risk and controls framework coupled with an holistic view of IT and business to identify risk patterns and behaviors.

    Read more>>
  • IT Laws & Legal aspect in Sri Lanka

    Posted on 06/02/2015

    As a future information security professional, you must understand the scope of an organization's legal and ethical responsibilities. The infromation security professional plays an important role in organization's approach to managing liability for privacy and security risks.

    Read more>>
  • Defending The Business Against Modern Cyber Adversaries

    Posted on 10/07/2014

    An Overview of the current Cyber Security Threat Landscape and how evolutions in Cyber Threats have impacted response strategies for Enterprises Globally.

    Read more>>
  • Inaugural (ISC)2 CIO Forum

    The forum brought together a strong gathering of Sri Lankan CIOs from diverse industry verticals, such as government, defense, telecommunications, and banking, for an evening of insightful discussions, along with (ISC)2 Executive Director Hord Tipton.

  • Monthly Chapter Meeting March 2014

    Presentation "Telecommunication Industry of Sri Lanka: Security Perspective" By: Rajitha Udayanga: Head of Network & Data Security, Bharathi Airtel

  • (ISC)2 Colombo Chapter inauguration

    The (ISC)2 Colombo Chapter inauguration event was very successfully held on 21st September 2012.



twitter fb