SlideShare uma empresa Scribd logo
1 de 44
Baixar para ler offline
ISE Proprietary
H A C K E R S & A T T A C K A N A T O M Y
Ted Harrington, Executive Partner | Ted.Harrington@securityevaluators.com
Why is this important?
ISE Proprietary
Attacks
III. Security vs. Functionality
ISE Confidential - not for distribution
I. Assets vs.Perimeters
About ISE
II. Black Box vs.White Box IV. Build In vs.Bolt On
ISE Proprietary
ISE Proprietary
ISE Proprietary
About ISE
ISE Proprietary
Analysts
• White box
Perspective
• Hackers; Cryptographers; RE
Research
• Routers; NAS; Healthcare
Customers
• Companies w/ valuable assets to protect
Exploits
• iPhone; Android; Ford; Exxon; Diebold
ISE Proprietary
ISE Proprietary
I. SecureAssets, Not Just Perimeters
ISE Proprietary
I. Secure Assets, Not Just Perimeters
Traditional Attacks Traditional Defenses
1
1
ISE Proprietary
I. Secure Assets, Not Just Perimeters
1
2
ISE Proprietary
I. Secure Assets, Not Just Perimeters
1
3
ISE Proprietary
ISE Proprietary
II.Black Box Penetration Tests == Good
ISE Proprietary
II.Black Box Penetration Tests == Good
ISE Proprietary
Whiteboxvulnerability assessment== GOOD!
II. Black Box vs. White Box
ISE Proprietary
• Access Level
• Black Box
• WhiteBox
• Evaluation Types
• PenetrationTest
• Vulnerability Assessment
II. Black Box vs. White Box
ISE Proprietary
Black Box Perspective
II. Black Box vs. White Box
ISE Proprietary
White Box Perspective
II. Black Box vs. White Box
ISE Proprietary
II. Black Box vs. White Box
ISE Proprietary
BlackBox
2mo./200hrs.
4 potentialissues
1confirmed
none
norecommendations
verylow
200+hrs.
WhiteBox
2mo./200hrs.
11confirmed
10confirmed
21+mitigationstrategies
high
~9hrs.
~9hrs.
Time/cost
Severeissues
Otherissues
Results
Completeness/Confidence
Cost/issue
Cost/solution
8
ISE Proprietary
SOHORouters: Outcomes
ISE Proprietary
Goals Results
10 13
Any Remote, Local, Both
>30% 100% Broken
Models
Attacks
Compromise
ISE Proprietary
ISE Proprietary
ISE Proprietary
III. Security vs. Functionality
ISE Proprietary
III. Security vs. Functionality
ISE Proprietary
EMBARRASSINGLY OVERSIMPLIFIED CORPORATE STRUCTURE
SALES IT HR ...
IT FUNCTIONALITY IT SECURITY
III. Security vs. Functionality
ISE Proprietary
EMBARRASSINGLY OVERSIMPLIFIED CORPORATE STRUCTURE
SALES IT HR SECURITY
IT FUNCTIONALITY IT SECURITY
…
III. Security vs. Functionality
ISE Proprietary
CONFLICT IS GOOD!
III. Security vs. Functionality
ISE Proprietary
I. Security SeparatedFrom Functionality
ISE Confidential - not for distribution
I. Security SeparatedFrom Functionality
ISE Confidential - not for distribution
I. Security SeparatedFrom Functionality
ISE Confidential - not for distribution
ISE Proprietary
ISE Proprietary
ISE Confidential - not for distribution
ISE Confidential - not for distribution
IV. “Build It In,” Not “Bolt It On”
ISE Proprietary
IV. “Build It In,” Not “Bolt It On”
ISE Proprietary
IV. “Build It In,” Not “Bolt It On”
ISE Proprietary
REQUIREMENTS
DESIGN
IMPLEMENTATION
TESTING
DEPLOYMENT
MAINTENANCE
Determine business &
user needs
Define architecture
Coding
System testing
Customer roll-out
Resolve bugs
Develop threat model
Design defense in depth
Audit code
White box vulnerability
assessment
Configuration Guidance
Iteration Hardening
IV. “Build It In,” Not “Bolt It On”
ISE Proprietary
BuiltIn
90%
- - -
1x
BoltedOn
100%
- - -
25x: application
300x: infrastructure
Assessment cost
Assessment overhead
Mitigationcost / issue
Get Involved
ISE Proprietary
Ted Harrington
Executive Partner
ted.harrington@securityevaluators.com
ISE Proprietary

Mais conteúdo relacionado

Semelhante a Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE

Sydney Safety Conference Oct 2012
Sydney Safety Conference   Oct 2012Sydney Safety Conference   Oct 2012
Sydney Safety Conference Oct 2012AndrewDouglas2011
 
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...AIIM International
 
Sit in a common area and observe. This may be in your office, a co.docx
Sit in a common area and observe. This may be in your office, a co.docxSit in a common area and observe. This may be in your office, a co.docx
Sit in a common area and observe. This may be in your office, a co.docxjennifer822
 
Security + Cloud: What studios and vendors need to consider when adopting clo...
Security + Cloud: What studios and vendors need to consider when adopting clo...Security + Cloud: What studios and vendors need to consider when adopting clo...
Security + Cloud: What studios and vendors need to consider when adopting clo...ETCenter
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacksAppSense
 
Strategies for Protecting and Leveraging your IP
Strategies for Protecting and Leveraging your IPStrategies for Protecting and Leveraging your IP
Strategies for Protecting and Leveraging your IPLocus Research
 
Secure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working ArchitectSecure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working ArchitectEoin Woods
 
Transforming the CSO Role to Business Enabler
Transforming the CSO Role to Business EnablerTransforming the CSO Role to Business Enabler
Transforming the CSO Role to Business EnablerCloudPassage
 
Top 5 myths of it security in the light of current events tisa pro talk 4 2554
Top 5 myths of it security in the light of current events tisa pro talk 4 2554Top 5 myths of it security in the light of current events tisa pro talk 4 2554
Top 5 myths of it security in the light of current events tisa pro talk 4 2554TISA
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategyJason Clark
 
Andrew Hay - Chris Nickerson - Building Bridges - Forcing Hackers and Busine...
Andrew Hay  - Chris Nickerson - Building Bridges - Forcing Hackers and Busine...Andrew Hay  - Chris Nickerson - Building Bridges - Forcing Hackers and Busine...
Andrew Hay - Chris Nickerson - Building Bridges - Forcing Hackers and Busine...Source Conference
 
Perimeter Defense in a World Without Walls
Perimeter Defense in a World Without WallsPerimeter Defense in a World Without Walls
Perimeter Defense in a World Without WallsDan Houser
 
Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...FaithWestdorp
 
iViZ Security : On Demand Penetration Testing
iViZ Security : On Demand Penetration TestingiViZ Security : On Demand Penetration Testing
iViZ Security : On Demand Penetration TestingiViZ Techno Solutions
 
Data Masking With The Delphix Dynamic Data Platform
Data Masking With The Delphix Dynamic Data PlatformData Masking With The Delphix Dynamic Data Platform
Data Masking With The Delphix Dynamic Data PlatformDelphix
 
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Intel IT Center
 
360° Kubernetes Security: From Source Code to K8s Configuration Security
360° Kubernetes Security: From Source Code to K8s Configuration Security360° Kubernetes Security: From Source Code to K8s Configuration Security
360° Kubernetes Security: From Source Code to K8s Configuration SecurityDevOps.com
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Claus Cramon Houmann
 
NZISF Talk: Six essential security services
NZISF Talk: Six essential security servicesNZISF Talk: Six essential security services
NZISF Talk: Six essential security servicesHinne Hettema
 

Semelhante a Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE (20)

Sydney Safety Conference Oct 2012
Sydney Safety Conference   Oct 2012Sydney Safety Conference   Oct 2012
Sydney Safety Conference Oct 2012
 
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
 
20120402 prd - generic presentation
20120402   prd - generic presentation20120402   prd - generic presentation
20120402 prd - generic presentation
 
Sit in a common area and observe. This may be in your office, a co.docx
Sit in a common area and observe. This may be in your office, a co.docxSit in a common area and observe. This may be in your office, a co.docx
Sit in a common area and observe. This may be in your office, a co.docx
 
Security + Cloud: What studios and vendors need to consider when adopting clo...
Security + Cloud: What studios and vendors need to consider when adopting clo...Security + Cloud: What studios and vendors need to consider when adopting clo...
Security + Cloud: What studios and vendors need to consider when adopting clo...
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacks
 
Strategies for Protecting and Leveraging your IP
Strategies for Protecting and Leveraging your IPStrategies for Protecting and Leveraging your IP
Strategies for Protecting and Leveraging your IP
 
Secure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working ArchitectSecure by Design - Security Design Principles for the Working Architect
Secure by Design - Security Design Principles for the Working Architect
 
Transforming the CSO Role to Business Enabler
Transforming the CSO Role to Business EnablerTransforming the CSO Role to Business Enabler
Transforming the CSO Role to Business Enabler
 
Top 5 myths of it security in the light of current events tisa pro talk 4 2554
Top 5 myths of it security in the light of current events tisa pro talk 4 2554Top 5 myths of it security in the light of current events tisa pro talk 4 2554
Top 5 myths of it security in the light of current events tisa pro talk 4 2554
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
 
Andrew Hay - Chris Nickerson - Building Bridges - Forcing Hackers and Busine...
Andrew Hay  - Chris Nickerson - Building Bridges - Forcing Hackers and Busine...Andrew Hay  - Chris Nickerson - Building Bridges - Forcing Hackers and Busine...
Andrew Hay - Chris Nickerson - Building Bridges - Forcing Hackers and Busine...
 
Perimeter Defense in a World Without Walls
Perimeter Defense in a World Without WallsPerimeter Defense in a World Without Walls
Perimeter Defense in a World Without Walls
 
Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...
 
iViZ Security : On Demand Penetration Testing
iViZ Security : On Demand Penetration TestingiViZ Security : On Demand Penetration Testing
iViZ Security : On Demand Penetration Testing
 
Data Masking With The Delphix Dynamic Data Platform
Data Masking With The Delphix Dynamic Data PlatformData Masking With The Delphix Dynamic Data Platform
Data Masking With The Delphix Dynamic Data Platform
 
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
 
360° Kubernetes Security: From Source Code to K8s Configuration Security
360° Kubernetes Security: From Source Code to K8s Configuration Security360° Kubernetes Security: From Source Code to K8s Configuration Security
360° Kubernetes Security: From Source Code to K8s Configuration Security
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015
 
NZISF Talk: Six essential security services
NZISF Talk: Six essential security servicesNZISF Talk: Six essential security services
NZISF Talk: Six essential security services
 

Mais de ETCenter

Securing Content in the Cloud
Securing Content in the CloudSecuring Content in the Cloud
Securing Content in the CloudETCenter
 
Building Highly Scalable Immersive Media Solutions on AWS
Building Highly Scalable Immersive Media Solutions on AWSBuilding Highly Scalable Immersive Media Solutions on AWS
Building Highly Scalable Immersive Media Solutions on AWSETCenter
 
How broadcasters can get in the VR game with sports
How broadcasters can get in the VR game with sportsHow broadcasters can get in the VR game with sports
How broadcasters can get in the VR game with sportsETCenter
 
Improve Efficiency by Double Digits – Leveraging Artificial Intelligence and ...
Improve Efficiency by Double Digits – Leveraging Artificial Intelligence and ...Improve Efficiency by Double Digits – Leveraging Artificial Intelligence and ...
Improve Efficiency by Double Digits – Leveraging Artificial Intelligence and ...ETCenter
 
Looking beyond the script
Looking beyond the scriptLooking beyond the script
Looking beyond the scriptETCenter
 
Cloud Apps for Media Processing: IMF Packaging-on-Demand
Cloud Apps for Media Processing: IMF Packaging-on-DemandCloud Apps for Media Processing: IMF Packaging-on-Demand
Cloud Apps for Media Processing: IMF Packaging-on-DemandETCenter
 
IP for Sports broadcast
IP for Sports broadcast IP for Sports broadcast
IP for Sports broadcast ETCenter
 
The distributive aspect of cloud on the digital world
The distributive aspect of cloud on the digital worldThe distributive aspect of cloud on the digital world
The distributive aspect of cloud on the digital worldETCenter
 
Cloud Transition Patterns for Media Enterprises
Cloud Transition Patterns for Media EnterprisesCloud Transition Patterns for Media Enterprises
Cloud Transition Patterns for Media EnterprisesETCenter
 
Hacking IoT: the new threat for content assets
Hacking IoT: the new threat for content assetsHacking IoT: the new threat for content assets
Hacking IoT: the new threat for content assetsETCenter
 
BLOCKCHAIN & THE HOLLYWOOD SUPPLY CHAIN
BLOCKCHAIN & THE HOLLYWOOD SUPPLY CHAINBLOCKCHAIN & THE HOLLYWOOD SUPPLY CHAIN
BLOCKCHAIN & THE HOLLYWOOD SUPPLY CHAINETCenter
 
Graymeta C4 use case, Deduplication
Graymeta C4 use case, DeduplicationGraymeta C4 use case, Deduplication
Graymeta C4 use case, DeduplicationETCenter
 
WRAST, Worldwide Repository for Assets. Project Cloud QTR meeting @ Disney/ABC
WRAST, Worldwide Repository for Assets. Project Cloud QTR meeting @ Disney/ABC  WRAST, Worldwide Repository for Assets. Project Cloud QTR meeting @ Disney/ABC
WRAST, Worldwide Repository for Assets. Project Cloud QTR meeting @ Disney/ABC ETCenter
 
Object storage is awesome.. ETC "Project Cloud" QTR meeting @ Disney/ABC
Object storage is awesome..  ETC "Project Cloud" QTR meeting @ Disney/ABC Object storage is awesome..  ETC "Project Cloud" QTR meeting @ Disney/ABC
Object storage is awesome.. ETC "Project Cloud" QTR meeting @ Disney/ABC ETCenter
 
Federated identity, Project Cloud QTR meeting @ Disney/ABC
Federated identity, Project Cloud QTR meeting @ Disney/ABC Federated identity, Project Cloud QTR meeting @ Disney/ABC
Federated identity, Project Cloud QTR meeting @ Disney/ABC ETCenter
 
"The Suitcase" Project Cloud QTR meeting presentation @ Disney/ABC
"The Suitcase"  Project Cloud QTR meeting presentation @ Disney/ABC"The Suitcase"  Project Cloud QTR meeting presentation @ Disney/ABC
"The Suitcase" Project Cloud QTR meeting presentation @ Disney/ABCETCenter
 
Open Source Framework for Deploying Data Science Models and Cloud Based Appli...
Open Source Framework for Deploying Data Science Models and Cloud Based Appli...Open Source Framework for Deploying Data Science Models and Cloud Based Appli...
Open Source Framework for Deploying Data Science Models and Cloud Based Appli...ETCenter
 
Big Data/DIG: Domain-Specific Insight Graphs by Pedro Szekely of ISI/USC
Big Data/DIG: Domain-Specific Insight Graphs by Pedro Szekely of ISI/USCBig Data/DIG: Domain-Specific Insight Graphs by Pedro Szekely of ISI/USC
Big Data/DIG: Domain-Specific Insight Graphs by Pedro Szekely of ISI/USCETCenter
 
An Introduction to Data Gravity by John Tkaczewski of FileCatalyst
An Introduction to Data Gravity by John Tkaczewski of FileCatalystAn Introduction to Data Gravity by John Tkaczewski of FileCatalyst
An Introduction to Data Gravity by John Tkaczewski of FileCatalystETCenter
 
This Is Not Your Parent’s Storage: Transitioning to Cloud Object Storage by I...
This Is Not Your Parent’s Storage: Transitioning to Cloud Object Storage by I...This Is Not Your Parent’s Storage: Transitioning to Cloud Object Storage by I...
This Is Not Your Parent’s Storage: Transitioning to Cloud Object Storage by I...ETCenter
 

Mais de ETCenter (20)

Securing Content in the Cloud
Securing Content in the CloudSecuring Content in the Cloud
Securing Content in the Cloud
 
Building Highly Scalable Immersive Media Solutions on AWS
Building Highly Scalable Immersive Media Solutions on AWSBuilding Highly Scalable Immersive Media Solutions on AWS
Building Highly Scalable Immersive Media Solutions on AWS
 
How broadcasters can get in the VR game with sports
How broadcasters can get in the VR game with sportsHow broadcasters can get in the VR game with sports
How broadcasters can get in the VR game with sports
 
Improve Efficiency by Double Digits – Leveraging Artificial Intelligence and ...
Improve Efficiency by Double Digits – Leveraging Artificial Intelligence and ...Improve Efficiency by Double Digits – Leveraging Artificial Intelligence and ...
Improve Efficiency by Double Digits – Leveraging Artificial Intelligence and ...
 
Looking beyond the script
Looking beyond the scriptLooking beyond the script
Looking beyond the script
 
Cloud Apps for Media Processing: IMF Packaging-on-Demand
Cloud Apps for Media Processing: IMF Packaging-on-DemandCloud Apps for Media Processing: IMF Packaging-on-Demand
Cloud Apps for Media Processing: IMF Packaging-on-Demand
 
IP for Sports broadcast
IP for Sports broadcast IP for Sports broadcast
IP for Sports broadcast
 
The distributive aspect of cloud on the digital world
The distributive aspect of cloud on the digital worldThe distributive aspect of cloud on the digital world
The distributive aspect of cloud on the digital world
 
Cloud Transition Patterns for Media Enterprises
Cloud Transition Patterns for Media EnterprisesCloud Transition Patterns for Media Enterprises
Cloud Transition Patterns for Media Enterprises
 
Hacking IoT: the new threat for content assets
Hacking IoT: the new threat for content assetsHacking IoT: the new threat for content assets
Hacking IoT: the new threat for content assets
 
BLOCKCHAIN & THE HOLLYWOOD SUPPLY CHAIN
BLOCKCHAIN & THE HOLLYWOOD SUPPLY CHAINBLOCKCHAIN & THE HOLLYWOOD SUPPLY CHAIN
BLOCKCHAIN & THE HOLLYWOOD SUPPLY CHAIN
 
Graymeta C4 use case, Deduplication
Graymeta C4 use case, DeduplicationGraymeta C4 use case, Deduplication
Graymeta C4 use case, Deduplication
 
WRAST, Worldwide Repository for Assets. Project Cloud QTR meeting @ Disney/ABC
WRAST, Worldwide Repository for Assets. Project Cloud QTR meeting @ Disney/ABC  WRAST, Worldwide Repository for Assets. Project Cloud QTR meeting @ Disney/ABC
WRAST, Worldwide Repository for Assets. Project Cloud QTR meeting @ Disney/ABC
 
Object storage is awesome.. ETC "Project Cloud" QTR meeting @ Disney/ABC
Object storage is awesome..  ETC "Project Cloud" QTR meeting @ Disney/ABC Object storage is awesome..  ETC "Project Cloud" QTR meeting @ Disney/ABC
Object storage is awesome.. ETC "Project Cloud" QTR meeting @ Disney/ABC
 
Federated identity, Project Cloud QTR meeting @ Disney/ABC
Federated identity, Project Cloud QTR meeting @ Disney/ABC Federated identity, Project Cloud QTR meeting @ Disney/ABC
Federated identity, Project Cloud QTR meeting @ Disney/ABC
 
"The Suitcase" Project Cloud QTR meeting presentation @ Disney/ABC
"The Suitcase"  Project Cloud QTR meeting presentation @ Disney/ABC"The Suitcase"  Project Cloud QTR meeting presentation @ Disney/ABC
"The Suitcase" Project Cloud QTR meeting presentation @ Disney/ABC
 
Open Source Framework for Deploying Data Science Models and Cloud Based Appli...
Open Source Framework for Deploying Data Science Models and Cloud Based Appli...Open Source Framework for Deploying Data Science Models and Cloud Based Appli...
Open Source Framework for Deploying Data Science Models and Cloud Based Appli...
 
Big Data/DIG: Domain-Specific Insight Graphs by Pedro Szekely of ISI/USC
Big Data/DIG: Domain-Specific Insight Graphs by Pedro Szekely of ISI/USCBig Data/DIG: Domain-Specific Insight Graphs by Pedro Szekely of ISI/USC
Big Data/DIG: Domain-Specific Insight Graphs by Pedro Szekely of ISI/USC
 
An Introduction to Data Gravity by John Tkaczewski of FileCatalyst
An Introduction to Data Gravity by John Tkaczewski of FileCatalystAn Introduction to Data Gravity by John Tkaczewski of FileCatalyst
An Introduction to Data Gravity by John Tkaczewski of FileCatalyst
 
This Is Not Your Parent’s Storage: Transitioning to Cloud Object Storage by I...
This Is Not Your Parent’s Storage: Transitioning to Cloud Object Storage by I...This Is Not Your Parent’s Storage: Transitioning to Cloud Object Storage by I...
This Is Not Your Parent’s Storage: Transitioning to Cloud Object Storage by I...
 

Último

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 

Último (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 

Hackers, Attack Anatomy & Security Trends by Ted Harrington of ISE