SlideShare uma empresa Scribd logo
1 de 21
Baixar para ler offline
•
–
–
–
•
–
–
•
–
–
•
–
–
•
–
–
•
–
–
•
•
•
–
•
–
•
–
–
•
–
–
•
•
–
–
–
•
–
–
–
•
–
–
–
–
–
–
•
–
•
•
–
–
•
–
–
•
–
–
•
–
–
•
•
•
•
–
–
•
•
–
•
•
–
•
–
–
•
–
–
•
•
–
–
–
•
•
•
–
•
•
•
–
•
•
•
•
–
–
•
•
•
•
•
•
•
•
•
•
•
Robots are among us, but who takes responsibility?

Mais conteúdo relacionado

Mais procurados

Cradle 2 Cradle Promotions
Cradle 2 Cradle PromotionsCradle 2 Cradle Promotions
Cradle 2 Cradle Promotions
clm0395
 
Oa3602 01-introduction
Oa3602 01-introductionOa3602 01-introduction
Oa3602 01-introduction
timothychung
 
1450 ben hurley ndrc the challenges we face 150528 v0.5
1450 ben hurley ndrc the challenges we face 150528 v0.51450 ben hurley ndrc the challenges we face 150528 v0.5
1450 ben hurley ndrc the challenges we face 150528 v0.5
investnethealthcare
 
Us elections and political processes
Us elections and political processesUs elections and political processes
Us elections and political processes
Robert Deng
 
What Can't We Teach through Learning by Doing? Aditya Dev Sood (CKS)
What Can't We Teach through Learning by Doing? Aditya Dev Sood (CKS)What Can't We Teach through Learning by Doing? Aditya Dev Sood (CKS)
What Can't We Teach through Learning by Doing? Aditya Dev Sood (CKS)
Social Innovation Exchange
 
Onboarding Program Guidance
Onboarding Program GuidanceOnboarding Program Guidance
Onboarding Program Guidance
Oday Talal
 
くだらないことをやりたい
くだらないことをやりたいくだらないことをやりたい
くだらないことをやりたい
Julian Hartmann
 
Katalog - 120 vteřIn pro inovativní firmy - 9.12.2010
Katalog - 120 vteřIn pro inovativní firmy - 9.12.2010Katalog - 120 vteřIn pro inovativní firmy - 9.12.2010
Katalog - 120 vteřIn pro inovativní firmy - 9.12.2010
jindrichweiss
 
Global Revolution: Role of Communication in 21st Century Uprisings and Protests
Global Revolution: Role of Communication in 21st Century Uprisings and Protests Global Revolution: Role of Communication in 21st Century Uprisings and Protests
Global Revolution: Role of Communication in 21st Century Uprisings and Protests
visualbowler
 
أنواع الدلالات 2
أنواع الدلالات 2أنواع الدلالات 2
أنواع الدلالات 2
Fakhri Cool
 

Mais procurados (20)

Cradle 2 Cradle Promotions
Cradle 2 Cradle PromotionsCradle 2 Cradle Promotions
Cradle 2 Cradle Promotions
 
Oa3602 01-introduction
Oa3602 01-introductionOa3602 01-introduction
Oa3602 01-introduction
 
1450 ben hurley ndrc the challenges we face 150528 v0.5
1450 ben hurley ndrc the challenges we face 150528 v0.51450 ben hurley ndrc the challenges we face 150528 v0.5
1450 ben hurley ndrc the challenges we face 150528 v0.5
 
Taller Primavera AMPap 2015 - Experiencia en África
Taller Primavera AMPap 2015 - Experiencia en ÁfricaTaller Primavera AMPap 2015 - Experiencia en África
Taller Primavera AMPap 2015 - Experiencia en África
 
Vispa
VispaVispa
Vispa
 
Konference PM - prezentace Miss Academia
Konference PM - prezentace Miss AcademiaKonference PM - prezentace Miss Academia
Konference PM - prezentace Miss Academia
 
Us elections and political processes
Us elections and political processesUs elections and political processes
Us elections and political processes
 
What Can't We Teach through Learning by Doing? Aditya Dev Sood (CKS)
What Can't We Teach through Learning by Doing? Aditya Dev Sood (CKS)What Can't We Teach through Learning by Doing? Aditya Dev Sood (CKS)
What Can't We Teach through Learning by Doing? Aditya Dev Sood (CKS)
 
Operational
OperationalOperational
Operational
 
Senalizacion de-senderos
Senalizacion de-senderosSenalizacion de-senderos
Senalizacion de-senderos
 
Onboarding Program Guidance
Onboarding Program GuidanceOnboarding Program Guidance
Onboarding Program Guidance
 
TEPfaktor - teambuilding na klíč 2016
TEPfaktor - teambuilding na klíč 2016TEPfaktor - teambuilding na klíč 2016
TEPfaktor - teambuilding na klíč 2016
 
くだらないことをやりたい
くだらないことをやりたいくだらないことをやりたい
くだらないことをやりたい
 
Katalog - 120 vteřIn pro inovativní firmy - 9.12.2010
Katalog - 120 vteřIn pro inovativní firmy - 9.12.2010Katalog - 120 vteřIn pro inovativní firmy - 9.12.2010
Katalog - 120 vteřIn pro inovativní firmy - 9.12.2010
 
01s0401 go,互联网时代的c语言 许式伟
01s0401 go,互联网时代的c语言   许式伟01s0401 go,互联网时代的c语言   许式伟
01s0401 go,互联网时代的c语言 许式伟
 
Global Revolution: Role of Communication in 21st Century Uprisings and Protests
Global Revolution: Role of Communication in 21st Century Uprisings and Protests Global Revolution: Role of Communication in 21st Century Uprisings and Protests
Global Revolution: Role of Communication in 21st Century Uprisings and Protests
 
Help, my security officer doesn’t trust me v0.4
Help, my security officer doesn’t trust me v0.4Help, my security officer doesn’t trust me v0.4
Help, my security officer doesn’t trust me v0.4
 
Final Plan Primero Yacuiba
Final Plan Primero YacuibaFinal Plan Primero Yacuiba
Final Plan Primero Yacuiba
 
أنواع الدلالات 2
أنواع الدلالات 2أنواع الدلالات 2
أنواع الدلالات 2
 
MailChimp v praxi - Miss Academia
MailChimp v praxi - Miss AcademiaMailChimp v praxi - Miss Academia
MailChimp v praxi - Miss Academia
 

Destaque

Destaque (12)

The Case For Continuous Security
The Case For Continuous SecurityThe Case For Continuous Security
The Case For Continuous Security
 
Cylance Protect-Next-Generation Antivirus-Overview
Cylance Protect-Next-Generation Antivirus-OverviewCylance Protect-Next-Generation Antivirus-Overview
Cylance Protect-Next-Generation Antivirus-Overview
 
Cylance Information Security: Compromise Assessment Datasheet
Cylance Information Security: Compromise Assessment DatasheetCylance Information Security: Compromise Assessment Datasheet
Cylance Information Security: Compromise Assessment Datasheet
 
Exploring the Capabilities and Economics of Cybercrime
Exploring the Capabilities and Economics of CybercrimeExploring the Capabilities and Economics of Cybercrime
Exploring the Capabilities and Economics of Cybercrime
 
You're Off the Hook: Blinding Security Software
You're Off the Hook: Blinding Security SoftwareYou're Off the Hook: Blinding Security Software
You're Off the Hook: Blinding Security Software
 
How to Close the SecOps Gap
How to Close the SecOps GapHow to Close the SecOps Gap
How to Close the SecOps Gap
 
Embracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your DecisionEmbracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your Decision
 
10 Hot Digital UK Start-ups To Watch In 2017
10 Hot Digital UK Start-ups To Watch In 201710 Hot Digital UK Start-ups To Watch In 2017
10 Hot Digital UK Start-ups To Watch In 2017
 
Corporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomwareCorporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomware
 
end-to-end service management with ServiceNow (English)
end-to-end service management with ServiceNow (English)end-to-end service management with ServiceNow (English)
end-to-end service management with ServiceNow (English)
 
Applying eTOM (enhanced Telecom Operations Map) Framework to Non-Telecommunic...
Applying eTOM (enhanced Telecom Operations Map) Framework to Non-Telecommunic...Applying eTOM (enhanced Telecom Operations Map) Framework to Non-Telecommunic...
Applying eTOM (enhanced Telecom Operations Map) Framework to Non-Telecommunic...
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 

Mais de Cyber Security Alliance

Killing any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented featureKilling any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented feature
Cyber Security Alliance
 

Mais de Cyber Security Alliance (20)

Bug Bounty @ Swisscom
Bug Bounty @ SwisscomBug Bounty @ Swisscom
Bug Bounty @ Swisscom
 
iOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce itiOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce it
 
Why huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacksWhy huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacks
 
Blockchain for Beginners
Blockchain for Beginners Blockchain for Beginners
Blockchain for Beginners
 
Le pentest pour les nuls #cybsec16
Le pentest pour les nuls #cybsec16Le pentest pour les nuls #cybsec16
Le pentest pour les nuls #cybsec16
 
Introducing Man in the Contacts attack to trick encrypted messaging apps
Introducing Man in the Contacts attack to trick encrypted messaging appsIntroducing Man in the Contacts attack to trick encrypted messaging apps
Introducing Man in the Contacts attack to trick encrypted messaging apps
 
Understanding the fundamentals of attacks
Understanding the fundamentals of attacksUnderstanding the fundamentals of attacks
Understanding the fundamentals of attacks
 
Rump : iOS patch diffing
Rump : iOS patch diffingRump : iOS patch diffing
Rump : iOS patch diffing
 
An easy way into your sap systems v3.0
An easy way into your sap systems v3.0An easy way into your sap systems v3.0
An easy way into your sap systems v3.0
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande Modem
 
Easy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 fEasy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 f
 
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
 
Offline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setupOffline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setup
 
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
 
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
Warning Ahead: SecurityStorms are Brewing in Your JavaScriptWarning Ahead: SecurityStorms are Brewing in Your JavaScript
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
 
Killing any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented featureKilling any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented feature
 
Rump attaque usb_caralinda_fabrice
Rump attaque usb_caralinda_fabriceRump attaque usb_caralinda_fabrice
Rump attaque usb_caralinda_fabrice
 
Operation emmental appsec
Operation emmental appsecOperation emmental appsec
Operation emmental appsec
 
Hacking the swisscom modem
Hacking the swisscom modemHacking the swisscom modem
Hacking the swisscom modem
 
Colt sp sec2014_appsec-nf-vfinal
Colt sp sec2014_appsec-nf-vfinalColt sp sec2014_appsec-nf-vfinal
Colt sp sec2014_appsec-nf-vfinal