SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
Social Media Security Challenges Aleksandr Yampolskiy, Ph.D. (Gilt Groupe)
Quick Survey ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is Social Media?
Benefits of Social Media Reach out to customers quicker Brand recognition Recruiting
Risks of Social Media Twitter XSS bug Myspace Samy worm Facebook spear-phishing Facebook page of MI6 chief’s wife
Pros/Cons of Social Media ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Our solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sample Threat Matrix For Social Media Data leakage  on Twitter Facebook malware Spear-phishing
Social media security challenges

Weitere ähnliche Inhalte

Was ist angesagt?

Social Media Talk to Shropshire Rural Hub
Social Media Talk to Shropshire Rural HubSocial Media Talk to Shropshire Rural Hub
Social Media Talk to Shropshire Rural HubOutserveWeb
 
The of Social Media - Women in Management
The of Social Media - Women in ManagementThe of Social Media - Women in Management
The of Social Media - Women in ManagementThomas Clifford
 
Privacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaPrivacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaIIIT Hyderabad
 
Social Media for Stourbridge College Business Skills
Social Media for Stourbridge College Business SkillsSocial Media for Stourbridge College Business Skills
Social Media for Stourbridge College Business SkillsOutserveWeb
 
Smr week 23 opsec and safe social networking
Smr week 23   opsec and safe social networkingSmr week 23   opsec and safe social networking
Smr week 23 opsec and safe social networkingFort Rucker FRSA
 
Social Networking For Success Osa
Social Networking For Success   OsaSocial Networking For Success   Osa
Social Networking For Success OsaProtingentDan
 
6 online identity
6 online identity6 online identity
6 online identityCOMP 113
 
MarketStar - Twitter - 3/23/12
MarketStar - Twitter - 3/23/12MarketStar - Twitter - 3/23/12
MarketStar - Twitter - 3/23/12Alex Lawrence
 
Taste of the Cloud Prime Accountants June 2012
Taste of the Cloud Prime Accountants June 2012Taste of the Cloud Prime Accountants June 2012
Taste of the Cloud Prime Accountants June 2012Philip Oakley
 
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...Evan Donovan
 
Ideas and Tactics for CIPCO
Ideas and Tactics for CIPCOIdeas and Tactics for CIPCO
Ideas and Tactics for CIPCOSevans Strategy
 
Twitter Powerpoint
Twitter PowerpointTwitter Powerpoint
Twitter Powerpointszyarto
 
Urban Summit 2012: The Three F’s Every Successful Entrepreneur Should Master
Urban Summit 2012: The Three F’s Every Successful Entrepreneur Should MasterUrban Summit 2012: The Three F’s Every Successful Entrepreneur Should Master
Urban Summit 2012: The Three F’s Every Successful Entrepreneur Should MasterAnvil Media, Inc.
 
Social Media The Nuts And Bolts For Irish College of General Practitioners Wi...
Social Media The Nuts And Bolts For Irish College of General Practitioners Wi...Social Media The Nuts And Bolts For Irish College of General Practitioners Wi...
Social Media The Nuts And Bolts For Irish College of General Practitioners Wi...Spiderworking
 
15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media SafetyChad Warner
 
Internet and PC safety - for CIS PTA - 19 Jan 2011
Internet and PC safety - for CIS PTA - 19 Jan 2011Internet and PC safety - for CIS PTA - 19 Jan 2011
Internet and PC safety - for CIS PTA - 19 Jan 2011PasocoPteLtd
 
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...Helen Levinson
 
Cyberbullying Investigation/Reporting/ Procedures
Cyberbullying Investigation/Reporting/ ProceduresCyberbullying Investigation/Reporting/ Procedures
Cyberbullying Investigation/Reporting/ Procedures Bryan Fendley
 
Social.media.marketing.natural.disasters.final
Social.media.marketing.natural.disasters.finalSocial.media.marketing.natural.disasters.final
Social.media.marketing.natural.disasters.finalDigital Firefly Marketing
 

Was ist angesagt? (20)

Social Media Talk to Shropshire Rural Hub
Social Media Talk to Shropshire Rural HubSocial Media Talk to Shropshire Rural Hub
Social Media Talk to Shropshire Rural Hub
 
The of Social Media - Women in Management
The of Social Media - Women in ManagementThe of Social Media - Women in Management
The of Social Media - Women in Management
 
Privacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaPrivacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social Media
 
Social Media for Stourbridge College Business Skills
Social Media for Stourbridge College Business SkillsSocial Media for Stourbridge College Business Skills
Social Media for Stourbridge College Business Skills
 
Smr week 23 opsec and safe social networking
Smr week 23   opsec and safe social networkingSmr week 23   opsec and safe social networking
Smr week 23 opsec and safe social networking
 
Social Networking For Success Osa
Social Networking For Success   OsaSocial Networking For Success   Osa
Social Networking For Success Osa
 
6 online identity
6 online identity6 online identity
6 online identity
 
MarketStar - Twitter - 3/23/12
MarketStar - Twitter - 3/23/12MarketStar - Twitter - 3/23/12
MarketStar - Twitter - 3/23/12
 
Taste of the Cloud Prime Accountants June 2012
Taste of the Cloud Prime Accountants June 2012Taste of the Cloud Prime Accountants June 2012
Taste of the Cloud Prime Accountants June 2012
 
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...
 
Ideas and Tactics for CIPCO
Ideas and Tactics for CIPCOIdeas and Tactics for CIPCO
Ideas and Tactics for CIPCO
 
Twitter Powerpoint
Twitter PowerpointTwitter Powerpoint
Twitter Powerpoint
 
Urban Summit 2012: The Three F’s Every Successful Entrepreneur Should Master
Urban Summit 2012: The Three F’s Every Successful Entrepreneur Should MasterUrban Summit 2012: The Three F’s Every Successful Entrepreneur Should Master
Urban Summit 2012: The Three F’s Every Successful Entrepreneur Should Master
 
Social Media The Nuts And Bolts For Irish College of General Practitioners Wi...
Social Media The Nuts And Bolts For Irish College of General Practitioners Wi...Social Media The Nuts And Bolts For Irish College of General Practitioners Wi...
Social Media The Nuts And Bolts For Irish College of General Practitioners Wi...
 
15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety
 
Internet and PC safety - for CIS PTA - 19 Jan 2011
Internet and PC safety - for CIS PTA - 19 Jan 2011Internet and PC safety - for CIS PTA - 19 Jan 2011
Internet and PC safety - for CIS PTA - 19 Jan 2011
 
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
 
Cyberbullying Investigation/Reporting/ Procedures
Cyberbullying Investigation/Reporting/ ProceduresCyberbullying Investigation/Reporting/ Procedures
Cyberbullying Investigation/Reporting/ Procedures
 
Learning in a VUCA world
Learning in a VUCA worldLearning in a VUCA world
Learning in a VUCA world
 
Social.media.marketing.natural.disasters.final
Social.media.marketing.natural.disasters.finalSocial.media.marketing.natural.disasters.final
Social.media.marketing.natural.disasters.final
 

Ähnlich wie Social media security challenges

Social Media: Risk or Reward? (Presentation for the IIA/ISACA Chicago
Social Media: Risk or Reward? (Presentation for the IIA/ISACA ChicagoSocial Media: Risk or Reward? (Presentation for the IIA/ISACA Chicago
Social Media: Risk or Reward? (Presentation for the IIA/ISACA ChicagoWise Elephant
 
USDmkt805 - Social Media Marketing Lecture 1 & 2 Slides
USDmkt805 - Social Media Marketing Lecture 1 & 2 SlidesUSDmkt805 - Social Media Marketing Lecture 1 & 2 Slides
USDmkt805 - Social Media Marketing Lecture 1 & 2 Slidesagbegin
 
Breaking into social media marketing
Breaking into social media marketingBreaking into social media marketing
Breaking into social media marketingSarah Maynard
 
Owasp8thdec
Owasp8thdecOwasp8thdec
Owasp8thdectmacuk
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSchleighS
 
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...Raul Colon
 
Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Stites & Harbison
 
FORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challengeFORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challengeFERMA
 
MIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentationMIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentationNathan Wright
 
Social Media Education Workshop for AAMGA University West
Social Media Education Workshop for AAMGA University WestSocial Media Education Workshop for AAMGA University West
Social Media Education Workshop for AAMGA University WestSandra Masters
 
The Legal Implications of Social Media
The Legal Implications of Social MediaThe Legal Implications of Social Media
The Legal Implications of Social MediaESI Attorneys LLC
 
Mapping Organizational Roles and Responsibilities for Social Media Risk
Mapping Organizational Roles and Responsibilities for Social Media RiskMapping Organizational Roles and Responsibilities for Social Media Risk
Mapping Organizational Roles and Responsibilities for Social Media RiskMohamed Mahdy
 
Twitter Ideas for a Small Business
Twitter Ideas for a Small BusinessTwitter Ideas for a Small Business
Twitter Ideas for a Small BusinessJay Massey
 
We Didn't Say That! - Minimizing Risk Via Social Media Policies
We Didn't Say That! - Minimizing Risk Via Social Media PoliciesWe Didn't Say That! - Minimizing Risk Via Social Media Policies
We Didn't Say That! - Minimizing Risk Via Social Media PoliciesDave Tinker, CFRE
 
Minimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesMinimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesDave Tinker, CFRE
 
Social Media Research
Social Media ResearchSocial Media Research
Social Media Researchmabar207
 
Corporate Relations - Social media presentation
Corporate Relations - Social media presentationCorporate Relations - Social media presentation
Corporate Relations - Social media presentationLeedsMet_CR
 

Ähnlich wie Social media security challenges (20)

Social Media: Risk or Reward? (Presentation for the IIA/ISACA Chicago
Social Media: Risk or Reward? (Presentation for the IIA/ISACA ChicagoSocial Media: Risk or Reward? (Presentation for the IIA/ISACA Chicago
Social Media: Risk or Reward? (Presentation for the IIA/ISACA Chicago
 
USDmkt805 - Social Media Marketing Lecture 1 & 2 Slides
USDmkt805 - Social Media Marketing Lecture 1 & 2 SlidesUSDmkt805 - Social Media Marketing Lecture 1 & 2 Slides
USDmkt805 - Social Media Marketing Lecture 1 & 2 Slides
 
Breaking into social media marketing
Breaking into social media marketingBreaking into social media marketing
Breaking into social media marketing
 
Owasp8thdec
Owasp8thdecOwasp8thdec
Owasp8thdec
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
 
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
 
Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?
 
FORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challengeFORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challenge
 
MIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentationMIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentation
 
Social Media Education Workshop for AAMGA University West
Social Media Education Workshop for AAMGA University WestSocial Media Education Workshop for AAMGA University West
Social Media Education Workshop for AAMGA University West
 
The Legal Implications of Social Media
The Legal Implications of Social MediaThe Legal Implications of Social Media
The Legal Implications of Social Media
 
Digital Insights - Social Media Case Studies Dec09 V1.0
Digital Insights - Social Media Case Studies Dec09 V1.0Digital Insights - Social Media Case Studies Dec09 V1.0
Digital Insights - Social Media Case Studies Dec09 V1.0
 
Mapping Organizational Roles and Responsibilities for Social Media Risk
Mapping Organizational Roles and Responsibilities for Social Media RiskMapping Organizational Roles and Responsibilities for Social Media Risk
Mapping Organizational Roles and Responsibilities for Social Media Risk
 
Twitter Ideas for a Small Business
Twitter Ideas for a Small BusinessTwitter Ideas for a Small Business
Twitter Ideas for a Small Business
 
Social Technology Overview with Case Studies
Social Technology Overview with Case StudiesSocial Technology Overview with Case Studies
Social Technology Overview with Case Studies
 
Terenure Digital Insights Social Technology Overview Case Studies
Terenure Digital Insights Social Technology Overview Case StudiesTerenure Digital Insights Social Technology Overview Case Studies
Terenure Digital Insights Social Technology Overview Case Studies
 
We Didn't Say That! - Minimizing Risk Via Social Media Policies
We Didn't Say That! - Minimizing Risk Via Social Media PoliciesWe Didn't Say That! - Minimizing Risk Via Social Media Policies
We Didn't Say That! - Minimizing Risk Via Social Media Policies
 
Minimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesMinimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media Policies
 
Social Media Research
Social Media ResearchSocial Media Research
Social Media Research
 
Corporate Relations - Social media presentation
Corporate Relations - Social media presentationCorporate Relations - Social media presentation
Corporate Relations - Social media presentation
 

Mehr von Aleksandr Yampolskiy

New York REDIS Meetup Welcome Session
New York REDIS Meetup Welcome SessionNew York REDIS Meetup Welcome Session
New York REDIS Meetup Welcome SessionAleksandr Yampolskiy
 
"Managing software development" by Peter Bell
"Managing software development" by Peter Bell"Managing software development" by Peter Bell
"Managing software development" by Peter BellAleksandr Yampolskiy
 
Recruiting Great Engineers in Six Easy Steps
Recruiting Great Engineers in Six Easy StepsRecruiting Great Engineers in Six Easy Steps
Recruiting Great Engineers in Six Easy StepsAleksandr Yampolskiy
 
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing ItYou Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing ItAleksandr Yampolskiy
 
Malware Goes to the Movies - Briefing
Malware Goes to the Movies - BriefingMalware Goes to the Movies - Briefing
Malware Goes to the Movies - BriefingAleksandr Yampolskiy
 
Eight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programsEight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programsAleksandr Yampolskiy
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About itAleksandr Yampolskiy
 
Inoculation strategies for victims of viruses
Inoculation strategies for victims of virusesInoculation strategies for victims of viruses
Inoculation strategies for victims of virusesAleksandr Yampolskiy
 
Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?Aleksandr Yampolskiy
 
Threshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsThreshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsAleksandr Yampolskiy
 
Secure information aggregation in sensor networks
Secure information aggregation in sensor networksSecure information aggregation in sensor networks
Secure information aggregation in sensor networksAleksandr Yampolskiy
 
A verifiable random function with short proofs and keys
A verifiable random function with short proofs and keysA verifiable random function with short proofs and keys
A verifiable random function with short proofs and keysAleksandr Yampolskiy
 
Towards a theory of data entangelement
Towards a theory of data entangelementTowards a theory of data entangelement
Towards a theory of data entangelementAleksandr Yampolskiy
 
Price of anarchy is independent of network topology
Price of anarchy is independent of network topologyPrice of anarchy is independent of network topology
Price of anarchy is independent of network topologyAleksandr Yampolskiy
 

Mehr von Aleksandr Yampolskiy (20)

New York REDIS Meetup Welcome Session
New York REDIS Meetup Welcome SessionNew York REDIS Meetup Welcome Session
New York REDIS Meetup Welcome Session
 
"Managing software development" by Peter Bell
"Managing software development" by Peter Bell"Managing software development" by Peter Bell
"Managing software development" by Peter Bell
 
Recruiting Great Engineers in Six Easy Steps
Recruiting Great Engineers in Six Easy StepsRecruiting Great Engineers in Six Easy Steps
Recruiting Great Engineers in Six Easy Steps
 
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing ItYou Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
 
Malware Goes to the Movies - Briefing
Malware Goes to the Movies - BriefingMalware Goes to the Movies - Briefing
Malware Goes to the Movies - Briefing
 
Privacy and E-Commerce
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-Commerce
 
Eight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programsEight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programs
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About it
 
OWASP Much ado about randomness
OWASP Much ado about randomnessOWASP Much ado about randomness
OWASP Much ado about randomness
 
Malware goes to the movies
Malware goes to the moviesMalware goes to the movies
Malware goes to the movies
 
Inoculation strategies for victims of viruses
Inoculation strategies for victims of virusesInoculation strategies for victims of viruses
Inoculation strategies for victims of viruses
 
Number theory lecture (part 1)
Number theory lecture (part 1)Number theory lecture (part 1)
Number theory lecture (part 1)
 
Number theory lecture (part 2)
Number theory lecture (part 2)Number theory lecture (part 2)
Number theory lecture (part 2)
 
Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?
 
Threshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsThreshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random Permutations
 
Secure information aggregation in sensor networks
Secure information aggregation in sensor networksSecure information aggregation in sensor networks
Secure information aggregation in sensor networks
 
A verifiable random function with short proofs and keys
A verifiable random function with short proofs and keysA verifiable random function with short proofs and keys
A verifiable random function with short proofs and keys
 
Towards a theory of data entangelement
Towards a theory of data entangelementTowards a theory of data entangelement
Towards a theory of data entangelement
 
Price of anarchy is independent of network topology
Price of anarchy is independent of network topologyPrice of anarchy is independent of network topology
Price of anarchy is independent of network topology
 
Business Case Studies
Business Case Studies Business Case Studies
Business Case Studies
 

Kürzlich hochgeladen

UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 

Kürzlich hochgeladen (20)

UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 

Social media security challenges