Talk to Our Experts  

Information Risk Management Blog

Chandra Prakash Suryawanshi

Chandra Prakash Suryawanshi
Chandra Prakash has over 16 years of experience in the Information Security and Risk Management industry. He has worked extensively with customers across APAC and Middle East in helping them with their information security challenges. He has an MBA in Information Science from Hartford University, USA and is certified CISSP, CISA, SANS GSEC, ISO 27001 LI and BS 25999 LA professional.

Recent Posts

SIEM is Dead -Long Live SIEM

[fa icon="calendar'] Sep 6, 2017 6:12:11 AM / by Chandra Prakash Suryawanshi posted in SIEM

[fa icon="comment"] 3 Comments

I was surprised to see the report from Mandiant that states the following facts -

Read More [fa icon="long-arrow-right"]

SAMPLE RFP Questions: SOC Build/Optimization Services

[fa icon="calendar'] Sep 6, 2017 6:02:47 AM / by Chandra Prakash Suryawanshi posted in Managed SOC

[fa icon="comment"] 0 Comments

  • Provide a brief overview and history of your organization, highlighting specific experience in projects of this type. Key individual expertise should be set forth in detail.
  • Describe the organizational structure of your company and provide the following information:
  • A corporate organizational chart, including subsidiaries, affiliates, list of the board of directors, list of key personnel

b. The total number of W-2 employees

Read More [fa icon="long-arrow-right"]

How to Make SIEM to Mitigate Advanced Threats ?

[fa icon="calendar'] Jun 7, 2016 8:05:23 AM / by Chandra Prakash Suryawanshi posted in SIEM, Managed SOC, Advanced Persistent Threat (APT), SOC, Qradar, RSA, Splunk

[fa icon="comment"] 3 Comments

I was not surprised to see a report from Mandiant that said the following -

  • 100% of the breaches had updated Anti-Virus software
  • 63% of the breaches were reported by third parties
  • It took 243 days to detect an attack

It is very clear that existing monitoring capabilities are no match for the changing threat landscape. The traditional technologies lack the sophisticated capabilities and visibility required to detect and protect against such advanced attacks.

So what is the problem ? and what are the options ?

Read More [fa icon="long-arrow-right"]

Other Popular Posts


Case Studies