SlideShare uma empresa Scribd logo
1 de 38
Cyber Security Threat Trends and
End Point Defenses
Jeff Brown
WW Head of Personal Systems Professional Services
HP
HP Confidential. For use under Confidential Disclosure Agreement only. © Copyright 2017 HP Development Company, L.P. The information contained herein is subject to change without notice.
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
The Changing Threat Landscape
2018 Trends
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
FY18 Trends
GDPR, Cyber-Physical Threats, Patching/Application testing, Deficit of
Security Professionals, Lack of employee security education …
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
FY18 Trends
GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of
Security Professionals, Lack of employee security education …
1. IOT Vulnerability Continues
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
FY18 Trends
GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of
Security Professionals, Lack of employee security education …
1. IOT Vulnerability Continues
2. AI Expansion – The Good and The Bad
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
FY18 Trends
GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of
Security Professionals, Lack of employee security education …
1. IOT Vulnerability Continues
2. AI Expansion – The Good and The Bad
3. Blockchain Revolution
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
FY18 Trends
GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of
Security Professionals, Lack of employee security education …
1. IOT Vulnerability Continues
2. AI Expansion – The Good and The Bad
3. Blockchain Revolution
4. The rise of Ransomware and Organized Crime
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
Breaches and Perpetrators
120.248
4.753
Source: Verizon DBIR 2017
Incidents
Breaches
Top Five Threat Agents (by
effectiveness)
• Private Criminal Organizations
• Advanced Persistent Threat (APT)
• Information Partners and Vendors
• Disgruntled, Reckless, or Untrained
Employees
• Civil Activists
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
Who are the Hackers?
-The 2018 Black Report
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
Who are the Hackers?
-The 2018 Black Report
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
What does an Attach look like?
-The 2018 Black Report
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
What does an attach look like?
-The 2018 Black Report
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
Is it Static?
-The 2018 Black Report
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
Hackers Advice
-The 2018 Black Report
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
The Changing Threat Landscape
End Point Defenses
HP: Experiences for the Modern Workforce
DESIGN
for the way you work
and live
SECURITY
to work anywhere
COLLABORATION
for connecting & creating
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
EVERY PC & PRINTER DECISION
IS A SECURITY DECISION
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
Detect
Increase protection at all
levels of compute platform
Continuous business
productivity, lower TCO
and seamless recovery
Even when protections
fail (and they will),
proactive detection is
essential
Ultimate Goal – No Downtime!
Protect
Recover
SECURITY THAT’S “BUILT-IN, NOT BOLTED ON”
DESIGNED FOR CYBER-RESILIENCE
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
MANY USERS THINK SECURITY IS DIFFICULT –
When a user finds security difficult, they work around it…
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
The next generation of the
WORLD’S MOST SECURE & MANAGEABLE PCs1
S E C U R I T Y
B U I LT - I N n o t B O LT E D O N
20
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
HP’s 2018 SECURITY STACK
ABOVE
THE OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion Detection
HP BIOSphere Gen410
Comprehensive BIOS management
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
NEW Additions and Updates
HP Client Security Manager Gen4
• HP Multi-Factor Authenticate Gen25
MFA with hardened policies, 3-factor, face log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
21
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
HP’s 2018 SECURITY STACK
ABOVE
THE OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion Detection
HP BIOSphere Gen410
Comprehensive BIOS management
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
NEW Additions and Updates
HP Client Security Manager Gen4
• HP Multi-Factor Authenticate Gen25
MFA with hardened policies, 3-factor, face log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
22
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
IN THE OS
Operating System,
Software, Downloads
ABOVE THE OS
Manageability Infrastructure,
Visual Hackers
OPEN DOORS
Security tools are useless unless policies are
enforced. Manageability is required to make
security effective
!
COMMON TARGET
Unpatched software vulnerabilities are easy to exploit.
Malicious websites, infected downloads
!
IDEAL TARGET
Complex target, but successful attacks mean persistence,
stealth, and access to almost anything they want
!!!BELOW THE OS
Firmware (BIOS, etc.)
HARDWARE
Most Secure. Extremely difficult for hackers and
malware to penetrate.
THREATS TARGET EVERY LEVEL OF THE SYSTEM
23
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
HP ENDPOINT SECURITY STACK 2018
24
ABOVE
THE OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager Gen4
• HP Multi-Factor Authenticate Gen25
MFA with hardened policies, 3-factor, face log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and Updates
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
A SECURE SYSTEM REQUIRES A HARDENED
ROOT OF TRUST
25
To protect against the malware
of the future PCs must have
security rooted in HARDWARE
• Out of reach of malware attacks
• Independent of the BIOS and OS
• Can’t be tampered with
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
HP Endpoint Security Controller
Since 2014, HP has integrated the
HP Endpoint Security Controller
into our HP Elite PCs.
This unique hardware enables solutions that are in turn trustworthy,
such as HP Sure Start2, the World’s First and Only Self-Healing BIOS.
26
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
GROUNDING SECURITY IN HARDWARE
27
to create a cyber resilient system in the face of unexpected attacks.
The HP Endpoint Security Controller
enables solutions that are:
Hardware Enforced Self-Healing Manageable
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
PROTECTING ALL LEVELS OF THE PC
IN THE OS
Operating System,
Software, Downloads
ABOVE THE OS
Manageability
BELOW THE OS
Firmware (BIOS, etc.)
Hardware
ENFORCE COMPLIANCE
HP Management Integration Toolkit6
HP Endpoint Security Controller
TRUSTED BIOS
HP Sure Start Gen42
STRENGTHEN THE OS
HP Sure Run3, HP Sure Click8, HP Sure Recover4
HP MIK ensures the systems continues working as it should
28
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
HP ENDPOINT SECURITY STACK 2018
29
ABOVE
THE OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager Gen4
• HP Multi-Factor Authenticate Gen25
MFA with hardened policies, 3-factor, face log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and Updates
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
DEFEND AGAINST DEVASTATING FIRMWARE ATTACKS
Protect your BIOS with HP Sure Start Gen4 2
HP Sure Start is the industry’s first
and still the only self-healing BIOS.
The BIOS is the first million lines of code that run.
It is the key to your PC’s foundation.
Why should customers care?
Once the BIOS is corrupted, the hackers “own”
your PC: all other protection is useless.
Antivirus, anti-malware, and OS firewalls will not detect an infected BIOS!
30
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
HP ENDPOINT SECURITY STACK 2018
ABOVE
THE OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager Gen4
• HP Multi-Factor Authenticate Gen25
MFA with hardened policies, 3-factor, face log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and Updates
31
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
MINIMIZE DOWNTIME
Recover quickly with HP Sure Recover4
32
HP Sure Recover offers secure,
automated, network-based
software image recovery.
Using the HP Endpoint Security Controller, it can
quickly and securely reimage machines to HP’s
or the company’s latest software image - using
only an internet connection
! 
Because HP Sure Recover4 is based in hardware, you can
reimage a PC, even from a bare hard drive.
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
REIMAGE ON DEMAND OR ON SCHEDULE
RESILIENT BY DEFAULT FOR SMB. CUSTOMIZABLE FOR ENTERPRISE.
User initiated IT scheduled!
FRESH START: IT can schedule routine
reimaging, so malware doesn’t have a
chance to stick around.
• Ideal for Hospitality, Retail,
Healthcare, Education, etc.
ENABLING USERS to quickly reimage
their own machines without IT support
AUTOMATED RECOVERY:
If no OS is found, the PC will
automatically present the user the
option to reimage
FLEXIBLE: Defaults to latest HP image,
or may be configured in firmware to
recover custom enterprise image
33
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
HP ENDPOINT SECURITY STACK 2018
34
ABOVE
THE OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager Gen4
• HP Multi-Factor Authenticate Gen25
MFA with hardened policies, 3-factor, face log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and Updates
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
WORK FREELY IN PUBLIC SPACES
HP Sure View Gen27: the world’s ONLY integrated PC privacy screen12
Now in it’s SECOND GENERATION, HP Sure View Gen2
enables a better visual experience in light OR dark
environments – from the plane to the café
What’s New
• Performs great in BRIGHT and DARK environments
• IPS panel technology
• Improved 120Hz REFRESH RATE, for smooth motion
• Reduced display thickness - ULTRA-THIN DESIGNS
HP Sure View Gen27 protects against
visual hacking with the press of a button.
35
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
Detect
Increase protection at all
levels of compute platform
Continuous business
productivity, lower TCO
and seamless recovery
Even when protections
fail (and they will),
proactive detection is
essential
Ultimate Goal – No Downtime!
Protect
Recover
SECURITY THAT’S “BUILT-IN, NOT BOLTED ON”
DESIGNED FOR CYBER-RESILIENCE
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
EVERY PC & PRINTER DECISION
IS A SECURITY DECISION
THANK YOU
HP Confidential. For use with HP customers under HP CDA only

Mais conteúdo relacionado

Semelhante a Presentación Jeff Brown, HP en VI Summit País Digital 2018

HP Enterprise Software: Making your applications and information work for you
HP Enterprise Software: Making your applications and information work for youHP Enterprise Software: Making your applications and information work for you
HP Enterprise Software: Making your applications and information work for youHP Enterprise Italia
 
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationTop 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationSridhar Karnam
 
Take the Big Data Challenge - Take Advantage of ALL of Your Data 16 Sept 2014
Take the Big Data Challenge - Take Advantage of ALL of Your Data 16 Sept 2014Take the Big Data Challenge - Take Advantage of ALL of Your Data 16 Sept 2014
Take the Big Data Challenge - Take Advantage of ALL of Your Data 16 Sept 2014pietvz
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – DataFujitsu Middle East
 
Making the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data VisibilityMaking the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data Visibilitydianadvo
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoHP Enterprise Italia
 
Retail security-services--client-presentation
Retail security-services--client-presentationRetail security-services--client-presentation
Retail security-services--client-presentationJoseph Schorr
 
5 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 20185 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 2018NowSecure
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir
 
How often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web Day
How often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web DayHow often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web Day
How often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web DayAWS Germany
 
WCIT 2014 Rohit Tandon - Big Data to Drive Business Results: HP HAVEn
WCIT 2014 Rohit Tandon - Big Data to Drive Business Results: HP HAVEnWCIT 2014 Rohit Tandon - Big Data to Drive Business Results: HP HAVEn
WCIT 2014 Rohit Tandon - Big Data to Drive Business Results: HP HAVEnWCIT 2014
 
HP Helion - Copaco Cloud Event 2015 (break-out 4)
HP Helion - Copaco Cloud Event 2015 (break-out 4)HP Helion - Copaco Cloud Event 2015 (break-out 4)
HP Helion - Copaco Cloud Event 2015 (break-out 4)Copaco Nederland
 
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...Primend
 
Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Sridhar Karnam
 
UX STRAT USA 2018 Presentation: Joe Meersman, IBM
UX STRAT USA 2018 Presentation: Joe Meersman, IBMUX STRAT USA 2018 Presentation: Joe Meersman, IBM
UX STRAT USA 2018 Presentation: Joe Meersman, IBMUX STRAT
 
Protect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksProtect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksSAP Customer Experience
 
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial ServicesAn Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial ServicesForcepoint LLC
 
Mobility Why? What does it means to us?
Mobility Why? What does it means to us?Mobility Why? What does it means to us?
Mobility Why? What does it means to us?Pronq by HP
 

Semelhante a Presentación Jeff Brown, HP en VI Summit País Digital 2018 (20)

HP Enterprise Software: Making your applications and information work for you
HP Enterprise Software: Making your applications and information work for youHP Enterprise Software: Making your applications and information work for you
HP Enterprise Software: Making your applications and information work for you
 
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationTop 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integration
 
Take the Big Data Challenge - Take Advantage of ALL of Your Data 16 Sept 2014
Take the Big Data Challenge - Take Advantage of ALL of Your Data 16 Sept 2014Take the Big Data Challenge - Take Advantage of ALL of Your Data 16 Sept 2014
Take the Big Data Challenge - Take Advantage of ALL of Your Data 16 Sept 2014
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – Data
 
Making the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data VisibilityMaking the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data Visibility
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercato
 
Retail security-services--client-presentation
Retail security-services--client-presentationRetail security-services--client-presentation
Retail security-services--client-presentation
 
5 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 20185 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 2018
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
 
How often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web Day
How often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web DayHow often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web Day
How often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web Day
 
WCIT 2014 Rohit Tandon - Big Data to Drive Business Results: HP HAVEn
WCIT 2014 Rohit Tandon - Big Data to Drive Business Results: HP HAVEnWCIT 2014 Rohit Tandon - Big Data to Drive Business Results: HP HAVEn
WCIT 2014 Rohit Tandon - Big Data to Drive Business Results: HP HAVEn
 
HP Helion - Copaco Cloud Event 2015 (break-out 4)
HP Helion - Copaco Cloud Event 2015 (break-out 4)HP Helion - Copaco Cloud Event 2015 (break-out 4)
HP Helion - Copaco Cloud Event 2015 (break-out 4)
 
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
 
Webinar–Open Source Risk in M&A by the Numbers
Webinar–Open Source Risk in M&A by the NumbersWebinar–Open Source Risk in M&A by the Numbers
Webinar–Open Source Risk in M&A by the Numbers
 
Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?
 
UX STRAT USA 2018 Presentation: Joe Meersman, IBM
UX STRAT USA 2018 Presentation: Joe Meersman, IBMUX STRAT USA 2018 Presentation: Joe Meersman, IBM
UX STRAT USA 2018 Presentation: Joe Meersman, IBM
 
Protect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksProtect Your Customers Data from Cyberattacks
Protect Your Customers Data from Cyberattacks
 
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial ServicesAn Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial Services
 
Mobility Why? What does it means to us?
Mobility Why? What does it means to us?Mobility Why? What does it means to us?
Mobility Why? What does it means to us?
 
Making Network Security Relevant
Making Network Security RelevantMaking Network Security Relevant
Making Network Security Relevant
 

Mais de PAÍS DIGITAL

Presentación Marco Nicolini, DUOC-UC en Jornada Pyme País Digital
Presentación Marco Nicolini, DUOC-UC en Jornada Pyme País DigitalPresentación Marco Nicolini, DUOC-UC en Jornada Pyme País Digital
Presentación Marco Nicolini, DUOC-UC en Jornada Pyme País DigitalPAÍS DIGITAL
 
Recomendaciones para Videoconferencias - País Digital
Recomendaciones para Videoconferencias - País Digital Recomendaciones para Videoconferencias - País Digital
Recomendaciones para Videoconferencias - País Digital PAÍS DIGITAL
 
Presentación Ciro Cattuto, ISI Foundation en VI Summit País Digital 2018
Presentación Ciro Cattuto, ISI Foundation en VI Summit País Digital 2018Presentación Ciro Cattuto, ISI Foundation en VI Summit País Digital 2018
Presentación Ciro Cattuto, ISI Foundation en VI Summit País Digital 2018PAÍS DIGITAL
 
Presentación Alberto Rodríguez , World Bank en VI Summit País Diigtal 2018
Presentación Alberto Rodríguez , World Bank en VI Summit País Diigtal 2018Presentación Alberto Rodríguez , World Bank en VI Summit País Diigtal 2018
Presentación Alberto Rodríguez , World Bank en VI Summit País Diigtal 2018PAÍS DIGITAL
 
Presentación Jose Melchert , Google en VI Summit País Digital 2018
Presentación Jose Melchert , Google en VI Summit País Digital 2018Presentación Jose Melchert , Google en VI Summit País Digital 2018
Presentación Jose Melchert , Google en VI Summit País Digital 2018PAÍS DIGITAL
 
Presentación Pamela Gidi, Subsecertaria Telecomunicaciones en VI Summit País ...
Presentación Pamela Gidi, Subsecertaria Telecomunicaciones en VI Summit País ...Presentación Pamela Gidi, Subsecertaria Telecomunicaciones en VI Summit País ...
Presentación Pamela Gidi, Subsecertaria Telecomunicaciones en VI Summit País ...PAÍS DIGITAL
 
Presentación de Priscila Oliva, American Tower Chile en VI Summit País Digital
Presentación de Priscila Oliva,  American Tower Chile en VI Summit País DigitalPresentación de Priscila Oliva,  American Tower Chile en VI Summit País Digital
Presentación de Priscila Oliva, American Tower Chile en VI Summit País DigitalPAÍS DIGITAL
 
Presentación de Esteban Rodríguez, Accenture en VI Summit País Digital
Presentación de Esteban Rodríguez, Accenture en VI Summit País DigitalPresentación de Esteban Rodríguez, Accenture en VI Summit País Digital
Presentación de Esteban Rodríguez, Accenture en VI Summit País DigitalPAÍS DIGITAL
 
Presentación Claudio Perek, IBM en Vi Summit País Digital 2018
Presentación Claudio Perek, IBM en Vi Summit País Digital 2018Presentación Claudio Perek, IBM en Vi Summit País Digital 2018
Presentación Claudio Perek, IBM en Vi Summit País Digital 2018PAÍS DIGITAL
 
Presentación de Gloria Hutt, Ministra Transportes y Telecomunicaciones en Sum...
Presentación de Gloria Hutt, Ministra Transportes y Telecomunicaciones en Sum...Presentación de Gloria Hutt, Ministra Transportes y Telecomunicaciones en Sum...
Presentación de Gloria Hutt, Ministra Transportes y Telecomunicaciones en Sum...PAÍS DIGITAL
 
Presentación Gonzalo Blumel, Ministro Segpres, Summit País Diigtal 2018
Presentación Gonzalo Blumel, Ministro Segpres, Summit País Diigtal 2018Presentación Gonzalo Blumel, Ministro Segpres, Summit País Diigtal 2018
Presentación Gonzalo Blumel, Ministro Segpres, Summit País Diigtal 2018PAÍS DIGITAL
 
Presentación Ines Locatelli, Chatbot for Good - Oracle Chile en Vi Summit Paí...
Presentación Ines Locatelli, Chatbot for Good - Oracle Chile en Vi Summit Paí...Presentación Ines Locatelli, Chatbot for Good - Oracle Chile en Vi Summit Paí...
Presentación Ines Locatelli, Chatbot for Good - Oracle Chile en Vi Summit Paí...PAÍS DIGITAL
 
Presentación Virginia Dias, Sima Robot en el VI Summit País Digital 2018
Presentación Virginia Dias, Sima Robot en el VI Summit País Digital 2018Presentación Virginia Dias, Sima Robot en el VI Summit País Digital 2018
Presentación Virginia Dias, Sima Robot en el VI Summit País Digital 2018PAÍS DIGITAL
 
Presentación Alejandro Herrera, Transbank en VI Summit País Digital 2018
Presentación Alejandro Herrera, Transbank en VI Summit País Digital 2018Presentación Alejandro Herrera, Transbank en VI Summit País Digital 2018
Presentación Alejandro Herrera, Transbank en VI Summit País Digital 2018PAÍS DIGITAL
 
Presentación César Cernuda, Microsoft en el marco del VI Summit País Digital ...
Presentación César Cernuda, Microsoft en el marco del VI Summit País Digital ...Presentación César Cernuda, Microsoft en el marco del VI Summit País Digital ...
Presentación César Cernuda, Microsoft en el marco del VI Summit País Digital ...PAÍS DIGITAL
 
Presentación de Arun Ramachandra, Tata Consultancy Services en VI Summit País...
Presentación de Arun Ramachandra, Tata Consultancy Services en VI Summit País...Presentación de Arun Ramachandra, Tata Consultancy Services en VI Summit País...
Presentación de Arun Ramachandra, Tata Consultancy Services en VI Summit País...PAÍS DIGITAL
 
Presentación Alejandro Gorodetzky y Mariano Duran, Wilobank-Indra Summit País...
Presentación Alejandro Gorodetzky y Mariano Duran, Wilobank-Indra Summit País...Presentación Alejandro Gorodetzky y Mariano Duran, Wilobank-Indra Summit País...
Presentación Alejandro Gorodetzky y Mariano Duran, Wilobank-Indra Summit País...PAÍS DIGITAL
 
Presentación Joseph Lichtenberg, InterSystems en VI Summit País Digital
Presentación Joseph Lichtenberg, InterSystems en VI Summit País DigitalPresentación Joseph Lichtenberg, InterSystems en VI Summit País Digital
Presentación Joseph Lichtenberg, InterSystems en VI Summit País DigitalPAÍS DIGITAL
 
Presentación Elena Gil, Telefónica en VI Summit País Digital
Presentación Elena Gil, Telefónica en VI Summit País DigitalPresentación Elena Gil, Telefónica en VI Summit País Digital
Presentación Elena Gil, Telefónica en VI Summit País DigitalPAÍS DIGITAL
 
Presentación Subsecretario de Economía, Ignacio Guerreo en Simposio Tendencia...
Presentación Subsecretario de Economía, Ignacio Guerreo en Simposio Tendencia...Presentación Subsecretario de Economía, Ignacio Guerreo en Simposio Tendencia...
Presentación Subsecretario de Economía, Ignacio Guerreo en Simposio Tendencia...PAÍS DIGITAL
 

Mais de PAÍS DIGITAL (20)

Presentación Marco Nicolini, DUOC-UC en Jornada Pyme País Digital
Presentación Marco Nicolini, DUOC-UC en Jornada Pyme País DigitalPresentación Marco Nicolini, DUOC-UC en Jornada Pyme País Digital
Presentación Marco Nicolini, DUOC-UC en Jornada Pyme País Digital
 
Recomendaciones para Videoconferencias - País Digital
Recomendaciones para Videoconferencias - País Digital Recomendaciones para Videoconferencias - País Digital
Recomendaciones para Videoconferencias - País Digital
 
Presentación Ciro Cattuto, ISI Foundation en VI Summit País Digital 2018
Presentación Ciro Cattuto, ISI Foundation en VI Summit País Digital 2018Presentación Ciro Cattuto, ISI Foundation en VI Summit País Digital 2018
Presentación Ciro Cattuto, ISI Foundation en VI Summit País Digital 2018
 
Presentación Alberto Rodríguez , World Bank en VI Summit País Diigtal 2018
Presentación Alberto Rodríguez , World Bank en VI Summit País Diigtal 2018Presentación Alberto Rodríguez , World Bank en VI Summit País Diigtal 2018
Presentación Alberto Rodríguez , World Bank en VI Summit País Diigtal 2018
 
Presentación Jose Melchert , Google en VI Summit País Digital 2018
Presentación Jose Melchert , Google en VI Summit País Digital 2018Presentación Jose Melchert , Google en VI Summit País Digital 2018
Presentación Jose Melchert , Google en VI Summit País Digital 2018
 
Presentación Pamela Gidi, Subsecertaria Telecomunicaciones en VI Summit País ...
Presentación Pamela Gidi, Subsecertaria Telecomunicaciones en VI Summit País ...Presentación Pamela Gidi, Subsecertaria Telecomunicaciones en VI Summit País ...
Presentación Pamela Gidi, Subsecertaria Telecomunicaciones en VI Summit País ...
 
Presentación de Priscila Oliva, American Tower Chile en VI Summit País Digital
Presentación de Priscila Oliva,  American Tower Chile en VI Summit País DigitalPresentación de Priscila Oliva,  American Tower Chile en VI Summit País Digital
Presentación de Priscila Oliva, American Tower Chile en VI Summit País Digital
 
Presentación de Esteban Rodríguez, Accenture en VI Summit País Digital
Presentación de Esteban Rodríguez, Accenture en VI Summit País DigitalPresentación de Esteban Rodríguez, Accenture en VI Summit País Digital
Presentación de Esteban Rodríguez, Accenture en VI Summit País Digital
 
Presentación Claudio Perek, IBM en Vi Summit País Digital 2018
Presentación Claudio Perek, IBM en Vi Summit País Digital 2018Presentación Claudio Perek, IBM en Vi Summit País Digital 2018
Presentación Claudio Perek, IBM en Vi Summit País Digital 2018
 
Presentación de Gloria Hutt, Ministra Transportes y Telecomunicaciones en Sum...
Presentación de Gloria Hutt, Ministra Transportes y Telecomunicaciones en Sum...Presentación de Gloria Hutt, Ministra Transportes y Telecomunicaciones en Sum...
Presentación de Gloria Hutt, Ministra Transportes y Telecomunicaciones en Sum...
 
Presentación Gonzalo Blumel, Ministro Segpres, Summit País Diigtal 2018
Presentación Gonzalo Blumel, Ministro Segpres, Summit País Diigtal 2018Presentación Gonzalo Blumel, Ministro Segpres, Summit País Diigtal 2018
Presentación Gonzalo Blumel, Ministro Segpres, Summit País Diigtal 2018
 
Presentación Ines Locatelli, Chatbot for Good - Oracle Chile en Vi Summit Paí...
Presentación Ines Locatelli, Chatbot for Good - Oracle Chile en Vi Summit Paí...Presentación Ines Locatelli, Chatbot for Good - Oracle Chile en Vi Summit Paí...
Presentación Ines Locatelli, Chatbot for Good - Oracle Chile en Vi Summit Paí...
 
Presentación Virginia Dias, Sima Robot en el VI Summit País Digital 2018
Presentación Virginia Dias, Sima Robot en el VI Summit País Digital 2018Presentación Virginia Dias, Sima Robot en el VI Summit País Digital 2018
Presentación Virginia Dias, Sima Robot en el VI Summit País Digital 2018
 
Presentación Alejandro Herrera, Transbank en VI Summit País Digital 2018
Presentación Alejandro Herrera, Transbank en VI Summit País Digital 2018Presentación Alejandro Herrera, Transbank en VI Summit País Digital 2018
Presentación Alejandro Herrera, Transbank en VI Summit País Digital 2018
 
Presentación César Cernuda, Microsoft en el marco del VI Summit País Digital ...
Presentación César Cernuda, Microsoft en el marco del VI Summit País Digital ...Presentación César Cernuda, Microsoft en el marco del VI Summit País Digital ...
Presentación César Cernuda, Microsoft en el marco del VI Summit País Digital ...
 
Presentación de Arun Ramachandra, Tata Consultancy Services en VI Summit País...
Presentación de Arun Ramachandra, Tata Consultancy Services en VI Summit País...Presentación de Arun Ramachandra, Tata Consultancy Services en VI Summit País...
Presentación de Arun Ramachandra, Tata Consultancy Services en VI Summit País...
 
Presentación Alejandro Gorodetzky y Mariano Duran, Wilobank-Indra Summit País...
Presentación Alejandro Gorodetzky y Mariano Duran, Wilobank-Indra Summit País...Presentación Alejandro Gorodetzky y Mariano Duran, Wilobank-Indra Summit País...
Presentación Alejandro Gorodetzky y Mariano Duran, Wilobank-Indra Summit País...
 
Presentación Joseph Lichtenberg, InterSystems en VI Summit País Digital
Presentación Joseph Lichtenberg, InterSystems en VI Summit País DigitalPresentación Joseph Lichtenberg, InterSystems en VI Summit País Digital
Presentación Joseph Lichtenberg, InterSystems en VI Summit País Digital
 
Presentación Elena Gil, Telefónica en VI Summit País Digital
Presentación Elena Gil, Telefónica en VI Summit País DigitalPresentación Elena Gil, Telefónica en VI Summit País Digital
Presentación Elena Gil, Telefónica en VI Summit País Digital
 
Presentación Subsecretario de Economía, Ignacio Guerreo en Simposio Tendencia...
Presentación Subsecretario de Economía, Ignacio Guerreo en Simposio Tendencia...Presentación Subsecretario de Economía, Ignacio Guerreo en Simposio Tendencia...
Presentación Subsecretario de Economía, Ignacio Guerreo en Simposio Tendencia...
 

Último

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Presentación Jeff Brown, HP en VI Summit País Digital 2018

  • 1. Cyber Security Threat Trends and End Point Defenses Jeff Brown WW Head of Personal Systems Professional Services HP HP Confidential. For use under Confidential Disclosure Agreement only. © Copyright 2017 HP Development Company, L.P. The information contained herein is subject to change without notice.
  • 2. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. The Changing Threat Landscape 2018 Trends
  • 3. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. FY18 Trends GDPR, Cyber-Physical Threats, Patching/Application testing, Deficit of Security Professionals, Lack of employee security education …
  • 4. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. FY18 Trends GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of Security Professionals, Lack of employee security education … 1. IOT Vulnerability Continues
  • 5. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. FY18 Trends GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of Security Professionals, Lack of employee security education … 1. IOT Vulnerability Continues 2. AI Expansion – The Good and The Bad
  • 6. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. FY18 Trends GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of Security Professionals, Lack of employee security education … 1. IOT Vulnerability Continues 2. AI Expansion – The Good and The Bad 3. Blockchain Revolution
  • 7. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. FY18 Trends GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of Security Professionals, Lack of employee security education … 1. IOT Vulnerability Continues 2. AI Expansion – The Good and The Bad 3. Blockchain Revolution 4. The rise of Ransomware and Organized Crime
  • 8. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. Breaches and Perpetrators 120.248 4.753 Source: Verizon DBIR 2017 Incidents Breaches Top Five Threat Agents (by effectiveness) • Private Criminal Organizations • Advanced Persistent Threat (APT) • Information Partners and Vendors • Disgruntled, Reckless, or Untrained Employees • Civil Activists
  • 9. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. Who are the Hackers? -The 2018 Black Report
  • 10. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. Who are the Hackers? -The 2018 Black Report
  • 11. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. What does an Attach look like? -The 2018 Black Report
  • 12. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. What does an attach look like? -The 2018 Black Report
  • 13. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. Is it Static? -The 2018 Black Report
  • 14. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. Hackers Advice -The 2018 Black Report
  • 15. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. The Changing Threat Landscape End Point Defenses
  • 16. HP: Experiences for the Modern Workforce DESIGN for the way you work and live SECURITY to work anywhere COLLABORATION for connecting & creating
  • 17. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. EVERY PC & PRINTER DECISION IS A SECURITY DECISION
  • 18. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. Detect Increase protection at all levels of compute platform Continuous business productivity, lower TCO and seamless recovery Even when protections fail (and they will), proactive detection is essential Ultimate Goal – No Downtime! Protect Recover SECURITY THAT’S “BUILT-IN, NOT BOLTED ON” DESIGNED FOR CYBER-RESILIENCE
  • 19. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. MANY USERS THINK SECURITY IS DIFFICULT – When a user finds security difficult, they work around it…
  • 20. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. The next generation of the WORLD’S MOST SECURE & MANAGEABLE PCs1 S E C U R I T Y B U I LT - I N n o t B O LT E D O N 20
  • 21. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. HP’s 2018 SECURITY STACK ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller NEW Additions and Updates HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices 21
  • 22. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. HP’s 2018 SECURITY STACK ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller NEW Additions and Updates HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices 22
  • 23. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. IN THE OS Operating System, Software, Downloads ABOVE THE OS Manageability Infrastructure, Visual Hackers OPEN DOORS Security tools are useless unless policies are enforced. Manageability is required to make security effective ! COMMON TARGET Unpatched software vulnerabilities are easy to exploit. Malicious websites, infected downloads ! IDEAL TARGET Complex target, but successful attacks mean persistence, stealth, and access to almost anything they want !!!BELOW THE OS Firmware (BIOS, etc.) HARDWARE Most Secure. Extremely difficult for hackers and malware to penetrate. THREATS TARGET EVERY LEVEL OF THE SYSTEM 23
  • 24. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. HP ENDPOINT SECURITY STACK 2018 24 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates
  • 25. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. A SECURE SYSTEM REQUIRES A HARDENED ROOT OF TRUST 25 To protect against the malware of the future PCs must have security rooted in HARDWARE • Out of reach of malware attacks • Independent of the BIOS and OS • Can’t be tampered with
  • 26. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. HP Endpoint Security Controller Since 2014, HP has integrated the HP Endpoint Security Controller into our HP Elite PCs. This unique hardware enables solutions that are in turn trustworthy, such as HP Sure Start2, the World’s First and Only Self-Healing BIOS. 26
  • 27. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. GROUNDING SECURITY IN HARDWARE 27 to create a cyber resilient system in the face of unexpected attacks. The HP Endpoint Security Controller enables solutions that are: Hardware Enforced Self-Healing Manageable
  • 28. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. PROTECTING ALL LEVELS OF THE PC IN THE OS Operating System, Software, Downloads ABOVE THE OS Manageability BELOW THE OS Firmware (BIOS, etc.) Hardware ENFORCE COMPLIANCE HP Management Integration Toolkit6 HP Endpoint Security Controller TRUSTED BIOS HP Sure Start Gen42 STRENGTHEN THE OS HP Sure Run3, HP Sure Click8, HP Sure Recover4 HP MIK ensures the systems continues working as it should 28
  • 29. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. HP ENDPOINT SECURITY STACK 2018 29 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates
  • 30. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. DEFEND AGAINST DEVASTATING FIRMWARE ATTACKS Protect your BIOS with HP Sure Start Gen4 2 HP Sure Start is the industry’s first and still the only self-healing BIOS. The BIOS is the first million lines of code that run. It is the key to your PC’s foundation. Why should customers care? Once the BIOS is corrupted, the hackers “own” your PC: all other protection is useless. Antivirus, anti-malware, and OS firewalls will not detect an infected BIOS! 30
  • 31. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. HP ENDPOINT SECURITY STACK 2018 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates 31
  • 32. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. MINIMIZE DOWNTIME Recover quickly with HP Sure Recover4 32 HP Sure Recover offers secure, automated, network-based software image recovery. Using the HP Endpoint Security Controller, it can quickly and securely reimage machines to HP’s or the company’s latest software image - using only an internet connection !  Because HP Sure Recover4 is based in hardware, you can reimage a PC, even from a bare hard drive.
  • 33. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. REIMAGE ON DEMAND OR ON SCHEDULE RESILIENT BY DEFAULT FOR SMB. CUSTOMIZABLE FOR ENTERPRISE. User initiated IT scheduled! FRESH START: IT can schedule routine reimaging, so malware doesn’t have a chance to stick around. • Ideal for Hospitality, Retail, Healthcare, Education, etc. ENABLING USERS to quickly reimage their own machines without IT support AUTOMATED RECOVERY: If no OS is found, the PC will automatically present the user the option to reimage FLEXIBLE: Defaults to latest HP image, or may be configured in firmware to recover custom enterprise image 33
  • 34. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. HP ENDPOINT SECURITY STACK 2018 34 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates
  • 35. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. WORK FREELY IN PUBLIC SPACES HP Sure View Gen27: the world’s ONLY integrated PC privacy screen12 Now in it’s SECOND GENERATION, HP Sure View Gen2 enables a better visual experience in light OR dark environments – from the plane to the café What’s New • Performs great in BRIGHT and DARK environments • IPS panel technology • Improved 120Hz REFRESH RATE, for smooth motion • Reduced display thickness - ULTRA-THIN DESIGNS HP Sure View Gen27 protects against visual hacking with the press of a button. 35
  • 36. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. Detect Increase protection at all levels of compute platform Continuous business productivity, lower TCO and seamless recovery Even when protections fail (and they will), proactive detection is essential Ultimate Goal – No Downtime! Protect Recover SECURITY THAT’S “BUILT-IN, NOT BOLTED ON” DESIGNED FOR CYBER-RESILIENCE
  • 37. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. EVERY PC & PRINTER DECISION IS A SECURITY DECISION
  • 38. THANK YOU HP Confidential. For use with HP customers under HP CDA only