Personal Information
Organização/Local de trabalho
Iran Iran, Islamic Republic of
Cargo
Cyber Security Researcher
Sobre
Experienced Security Researcher with a demonstrated history of working in the information technology and services industry. Skilled in Penetration testing and securiey assessment of it pruducts, malware analysis and botnet detection, network security monitoring, siem , ics/scada security assessment,security standards and frameworks: ISO 27001,ISO 15408, Owasp testing, ptes, issaf, iec 62443, nescor .
Marcadores
آزمایشگاه ارزیابی محصول
ارزیابی مخاطرات امنیت
common criteria
it security evaluation
data fusion
ارزیابی امنیتی محصول
استاندارد iso 15408
استاندارد معیارمشترک
information security
نظام ارزیابی امنیتی
افتا
مدل ادغام داده
web analytics
data analytics
fusion frameworks
log correlation tools
data fusion tools
آگاهی وضعیتی
تحلیل امنیت
تحلیل وب
تحلیل داده
همبستگی لاگ
فیوژن داده ها
log correlation
امنیت زیرساخت های حیاتی
امنیت اسکادا
امنیت سامانه های کنترل صنعت
iso 15408
ارزیابی امنیت محصول
security standars
iso/iec 15408
penetration testing
industrial control system
security
scada security
Ver mais
Apresentações
(8)Gostaram
(66)A Diet of Poisoned Fruit: Designing Implants & OT Payloadsfor ICS Embedded Devices
Marina Krotofil
•
Há 5 anos
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
•
Há 11 anos
Best Practices for Log & Event Management
SolarWinds
•
Há 10 anos
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector 2016
Chris Gates
•
Há 7 anos
Building a Successful Internal Adversarial Simulation Team - Chris Gates & Chris Nickerson
Chris Gates
•
Há 7 anos
Industrial cyber threat landscape
bayshorenet
•
Há 6 anos
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Call....
Shah Sheikh
•
Há 9 anos
[White paper] detecting problems in industrial networks though continuous monitoring
TI Safe
•
Há 10 anos
The Finest Penetration Testing Framework for Software-Defined Networks
Priyanka Aash
•
Há 5 anos
Lowlands Unite NL 2017 - ATA to Z
Tim De Keukelaere
•
Há 7 anos
SOC presentation- Building a Security Operations Center
Michael Nickle
•
Há 12 anos
Operational Security Intelligence
Splunk
•
Há 7 anos
Understanding Cyber Kill Chain and OODA loop
David Sweigert
•
Há 7 anos
Threat Hunting - Moving from the ad hoc to the formal
Priyanka Aash
•
Há 6 anos
Attack Simulation and Hunting
nathi mogomotsi
•
Há 6 anos
Breaking the cyber kill chain!
Nahidul Kibria
•
Há 6 anos
Threat Intelligence Workshop
Priyanka Aash
•
Há 8 anos
Advanced Threat Detection in ICS – SCADA Environments
London School of Cyber Security
•
Há 9 anos
Cybersecurity in the Era of IoT
Amy Daly
•
Há 6 anos
Industrial IoT Security Standards & Frameworks
Priyanka Aash
•
Há 6 anos
Threat Hunting with Splunk
Splunk
•
Há 7 anos
DTS Solution - Hacking ATM Machines - The Italian Job Way
Shah Sheikh
•
Há 7 anos
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 compliance
Shah Sheikh
•
Há 7 anos
Streaming Analytics - Comparison of Open Source Frameworks and Products
Kai Wähner
•
Há 8 anos
Framework and Product Comparison for Big Data Log Analytics and ITOA
Kai Wähner
•
Há 8 anos
ارزیابی امنیتی محصولات فناوری اطلاعات(ISO 15408 Common Criteria)- بخش دوم
Mahdi Sayyad
•
Há 6 anos
Dod IA Pen Testing Brief
David McGuire
•
Há 12 anos
Personal Information
Organização/Local de trabalho
Iran Iran, Islamic Republic of
Cargo
Cyber Security Researcher
Sobre
Experienced Security Researcher with a demonstrated history of working in the information technology and services industry. Skilled in Penetration testing and securiey assessment of it pruducts, malware analysis and botnet detection, network security monitoring, siem , ics/scada security assessment,security standards and frameworks: ISO 27001,ISO 15408, Owasp testing, ptes, issaf, iec 62443, nescor .
Marcadores
آزمایشگاه ارزیابی محصول
ارزیابی مخاطرات امنیت
common criteria
it security evaluation
data fusion
ارزیابی امنیتی محصول
استاندارد iso 15408
استاندارد معیارمشترک
information security
نظام ارزیابی امنیتی
افتا
مدل ادغام داده
web analytics
data analytics
fusion frameworks
log correlation tools
data fusion tools
آگاهی وضعیتی
تحلیل امنیت
تحلیل وب
تحلیل داده
همبستگی لاگ
فیوژن داده ها
log correlation
امنیت زیرساخت های حیاتی
امنیت اسکادا
امنیت سامانه های کنترل صنعت
iso 15408
ارزیابی امنیت محصول
security standars
iso/iec 15408
penetration testing
industrial control system
security
scada security
Ver mais