Personal Information
Organización/Lugar de trabajo
Iran Iran, Islamic Republic of
Ocupación
Cyber Security Researcher
Acerca de
Experienced Security Researcher with a demonstrated history of working in the information technology and services industry. Skilled in Penetration testing and securiey assessment of it pruducts, malware analysis and botnet detection, network security monitoring, siem , ics/scada security assessment,security standards and frameworks: ISO 27001,ISO 15408, Owasp testing, ptes, issaf, iec 62443, nescor .
Etiquetas
آزمایشگاه ارزیابی محصول
ارزیابی مخاطرات امنیت
common criteria
it security evaluation
data fusion
ارزیابی امنیتی محصول
استاندارد iso 15408
استاندارد معیارمشترک
information security
نظام ارزیابی امنیتی
افتا
مدل ادغام داده
web analytics
data analytics
fusion frameworks
log correlation tools
data fusion tools
آگاهی وضعیتی
تحلیل امنیت
تحلیل وب
تحلیل داده
همبستگی لاگ
فیوژن داده ها
log correlation
امنیت زیرساخت های حیاتی
امنیت اسکادا
امنیت سامانه های کنترل صنعت
iso 15408
ارزیابی امنیت محصول
security standars
iso/iec 15408
penetration testing
industrial control system
security
scada security
Ver más
Presentaciones
(8)Recomendaciones
(66)A Diet of Poisoned Fruit: Designing Implants & OT Payloadsfor ICS Embedded Devices
Marina Krotofil
•
Hace 5 años
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
•
Hace 10 años
Best Practices for Log & Event Management
SolarWinds
•
Hace 10 años
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector 2016
Chris Gates
•
Hace 7 años
Building a Successful Internal Adversarial Simulation Team - Chris Gates & Chris Nickerson
Chris Gates
•
Hace 7 años
Industrial cyber threat landscape
bayshorenet
•
Hace 6 años
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Call....
Shah Sheikh
•
Hace 9 años
[White paper] detecting problems in industrial networks though continuous monitoring
TI Safe
•
Hace 10 años
The Finest Penetration Testing Framework for Software-Defined Networks
Priyanka Aash
•
Hace 5 años
Lowlands Unite NL 2017 - ATA to Z
Tim De Keukelaere
•
Hace 6 años
SOC presentation- Building a Security Operations Center
Michael Nickle
•
Hace 12 años
Operational Security Intelligence
Splunk
•
Hace 7 años
Understanding Cyber Kill Chain and OODA loop
David Sweigert
•
Hace 7 años
Threat Hunting - Moving from the ad hoc to the formal
Priyanka Aash
•
Hace 6 años
Attack Simulation and Hunting
nathi mogomotsi
•
Hace 6 años
Breaking the cyber kill chain!
Nahidul Kibria
•
Hace 6 años
Threat Intelligence Workshop
Priyanka Aash
•
Hace 8 años
Advanced Threat Detection in ICS – SCADA Environments
London School of Cyber Security
•
Hace 9 años
Cybersecurity in the Era of IoT
Amy Daly
•
Hace 6 años
Industrial IoT Security Standards & Frameworks
Priyanka Aash
•
Hace 6 años
Threat Hunting with Splunk
Splunk
•
Hace 7 años
DTS Solution - Hacking ATM Machines - The Italian Job Way
Shah Sheikh
•
Hace 7 años
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 compliance
Shah Sheikh
•
Hace 7 años
Streaming Analytics - Comparison of Open Source Frameworks and Products
Kai Wähner
•
Hace 8 años
Framework and Product Comparison for Big Data Log Analytics and ITOA
Kai Wähner
•
Hace 8 años
ارزیابی امنیتی محصولات فناوری اطلاعات(ISO 15408 Common Criteria)- بخش دوم
Mahdi Sayyad
•
Hace 6 años
Dod IA Pen Testing Brief
David McGuire
•
Hace 12 años
Personal Information
Organización/Lugar de trabajo
Iran Iran, Islamic Republic of
Ocupación
Cyber Security Researcher
Acerca de
Experienced Security Researcher with a demonstrated history of working in the information technology and services industry. Skilled in Penetration testing and securiey assessment of it pruducts, malware analysis and botnet detection, network security monitoring, siem , ics/scada security assessment,security standards and frameworks: ISO 27001,ISO 15408, Owasp testing, ptes, issaf, iec 62443, nescor .
Etiquetas
آزمایشگاه ارزیابی محصول
ارزیابی مخاطرات امنیت
common criteria
it security evaluation
data fusion
ارزیابی امنیتی محصول
استاندارد iso 15408
استاندارد معیارمشترک
information security
نظام ارزیابی امنیتی
افتا
مدل ادغام داده
web analytics
data analytics
fusion frameworks
log correlation tools
data fusion tools
آگاهی وضعیتی
تحلیل امنیت
تحلیل وب
تحلیل داده
همبستگی لاگ
فیوژن داده ها
log correlation
امنیت زیرساخت های حیاتی
امنیت اسکادا
امنیت سامانه های کنترل صنعت
iso 15408
ارزیابی امنیت محصول
security standars
iso/iec 15408
penetration testing
industrial control system
security
scada security
Ver más