SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Downloaden Sie, um offline zu lesen
Time to Inspire
Beveilig data met Windows 10
Danny de Vries
“Cyber security is a
CEO issue.”
-McKinsey
Malicious Attachment Execution
Browser or Doc Exploit Execution
Stolen Credential Use
Internet Service Compromise
Kernel-mode Malware
Kernel Exploits
Pass-the-Hash
Malicious Attachment Delivery
Browser or Doc Exploit Delivery
Phishing Attacks
ESPIONAGE, LOSS OF IPDATA THEFT RANSOMLOST PRODUCTIVITYBUSINESS DISRUPTION
ENTER
ESTABLISH
EXPAND
ENDGAME
NETWORK
DEVICE
USER
Anatomy of an attack
PASS-THE-HASH
Browser or Doc Exploit Execution
Theft of sensitive information, disruption of government.
PHISHING
NETWORK
DEVICE
USER
ENDGAME
Anatomy of an attack
PASS-THE-HASH
Browser or Doc Exploit Execution
Theft of sensitive information, disruption of government.
PHISHING
NETWORK
DEVICE
USER
ENDGAME
Anatomy of an attack
http://natoint.com/900117-spain-forces-conclude-mission-in-central-african-republic/
Browser or Doc Exploit Execution
PHISHING
ENDGAME
PASS-THE-HASH
Browser or Doc Exploit Execution
Theft of sensitive information, disruption of government.
PHISHING
NETWORK
DEVICE
USER
ENDGAME
Anatomy of an attack
PASS-THE-HASH NETWORK
DEVICE
USER
Land on exploit page
Exploit runs
Redirected to legitimate page
Total Elapsed Time: 00:00.1
The Windows 10
Defense Stack
Protect, Detect & Respond
Windows as a Service
Threat protection over
time
Attackers take advantage
of periods between
releases
P R O D U C T
R E L E A S E
CAPABILITY
Windows as a Service
P R O D U C T
R E L E A S E
T H R E A T
S O P H I S T I C A T I O N
CAPABILITY
Game change with
Windows and
Software as a Services
Disrupt and out
innovate our
adversaries by
design
Protection Gap
Windows 7 Security features
Windows 10 Security on
Legacy or Modern Devices
(Upgraded from Windows 7 or 32-bit Windows 8)
Windows 10 Security on
Modern Devices
(Fresh Install or upgraded from 64-bit Windows 8)
Virtualization Based
Security
Traditional Platform Stack
Device Hardware
Kernel
Windows Platform Services
Apps
Virtualization Based Security
Kernel
Windows Platform
Services
Apps
Kernel
System Container
Trustlet#1
Trustlet#2
Trustlet#3
Hypervisor
Device Hardware
Windows Operating System
Hyper-VHyper-V
The Future
Credential Guard
Access to one device can
lead to access to many
1.
Single IT Pro’s machine is
compromised
IT Pro manages
kiosks/shared devices on
network
Attacker steals IT Pro’s
access token
2.
Using IT Pros access
token attacker looks for
kiosk/shared devices and
mines them for tokens
3.
Repeat
Credential Guard
 Pass the Hash (PtH) attacks are
the #1 go-to tool for hackers.
Used in nearly every major
breach and APT type of attack
 Credential Guard uses VBS to
isolate Windows authentication
from Windows operating system
 Protects LSA Service (LSASS) and
derived credentials (NTLM Hash)
 Fundamentally breaks derived
credential theft using MimiKatz,
Demo:
Credential Guard
Introducing
Windows Defender
Application Guard
Application Guard for
Microsoft Edge
Application Guard for
Microsoft Edge
Information Protection
Information Protection Needs
Information Protection Needs
Market Solutions for
Data Loss Prevention
Windows Information
Protection Lifecycle
Demo:
Windows Information
Protection
Did I inspire you?
Follow me on Twitter:
@EBOOZ

Weitere ähnliche Inhalte

Was ist angesagt?

Web Security
Web SecurityWeb Security
Web SecurityADIEFEH
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataInderjeet Singh
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing ThreatNick Miller
 
Malware's Most Wanted: CryptoLocker—The Ransomware Trojan
Malware's Most Wanted: CryptoLocker—The Ransomware TrojanMalware's Most Wanted: CryptoLocker—The Ransomware Trojan
Malware's Most Wanted: CryptoLocker—The Ransomware TrojanCyphort
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareQuick Heal Technologies Ltd.
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomwareJawhar Ali
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomwareSophos Benelux
 
What is wanna cry ransomware attack
What is wanna cry ransomware attackWhat is wanna cry ransomware attack
What is wanna cry ransomware attacki-engage
 
Ransomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationRansomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationHostway|HOSTING
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017chauhananand17
 
WannaCry / Wannacrypt Ransomware
WannaCry / Wannacrypt RansomwareWannaCry / Wannacrypt Ransomware
WannaCry / Wannacrypt RansomwareAyoub Rouzi
 
Wannacry | Technical Insight and Lessons Learned
Wannacry | Technical Insight and Lessons LearnedWannacry | Technical Insight and Lessons Learned
Wannacry | Technical Insight and Lessons LearnedThomas Roccia
 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecRaghunath G
 
How to prevent WannaCry Ransomware
How to prevent WannaCry RansomwareHow to prevent WannaCry Ransomware
How to prevent WannaCry RansomwareSeminar Links
 
What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?lorzinian
 

Was ist angesagt? (20)

Analysing Ransomware
Analysing RansomwareAnalysing Ransomware
Analysing Ransomware
 
Web Security
Web SecurityWeb Security
Web Security
 
Null hyderabad - October Newsbytes
Null hyderabad - October NewsbytesNull hyderabad - October Newsbytes
Null hyderabad - October Newsbytes
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
Week12 final
Week12 finalWeek12 final
Week12 final
 
Malware's Most Wanted: CryptoLocker—The Ransomware Trojan
Malware's Most Wanted: CryptoLocker—The Ransomware TrojanMalware's Most Wanted: CryptoLocker—The Ransomware Trojan
Malware's Most Wanted: CryptoLocker—The Ransomware Trojan
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomware
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
 
What is wanna cry ransomware attack
What is wanna cry ransomware attackWhat is wanna cry ransomware attack
What is wanna cry ransomware attack
 
Ransomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationRansomware: Mitigation Through Preparation
Ransomware: Mitigation Through Preparation
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
 
Wannacry
WannacryWannacry
Wannacry
 
WannaCry / Wannacrypt Ransomware
WannaCry / Wannacrypt RansomwareWannaCry / Wannacrypt Ransomware
WannaCry / Wannacrypt Ransomware
 
Wannacry | Technical Insight and Lessons Learned
Wannacry | Technical Insight and Lessons LearnedWannacry | Technical Insight and Lessons Learned
Wannacry | Technical Insight and Lessons Learned
 
WannaCry? No Thanks!
WannaCry? No Thanks!WannaCry? No Thanks!
WannaCry? No Thanks!
 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_Dec
 
How to prevent WannaCry Ransomware
How to prevent WannaCry RansomwareHow to prevent WannaCry Ransomware
How to prevent WannaCry Ransomware
 
What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?
 

Andere mochten auch

What Is a Qualified Domestic Trust in Connecticut
What Is a Qualified Domestic Trust in ConnecticutWhat Is a Qualified Domestic Trust in Connecticut
What Is a Qualified Domestic Trust in ConnecticutBarry D Horowitz
 
Dylan Collins - LOGIN Conference 2012
Dylan Collins - LOGIN Conference 2012Dylan Collins - LOGIN Conference 2012
Dylan Collins - LOGIN Conference 2012Login Conference LLC
 
New York Probate Process
New York Probate ProcessNew York Probate Process
New York Probate ProcessSaul Kobrick
 
Medi-cal Spend Down: How to Become Eligible for Medi-cal in California
Medi-cal Spend Down: How to Become Eligible for Medi-cal in CaliforniaMedi-cal Spend Down: How to Become Eligible for Medi-cal in California
Medi-cal Spend Down: How to Become Eligible for Medi-cal in CaliforniaScott Schomer
 
America's Health Insurance Plans - Consumer Experience Summit - Measuring Suc...
America's Health Insurance Plans - Consumer Experience Summit - Measuring Suc...America's Health Insurance Plans - Consumer Experience Summit - Measuring Suc...
America's Health Insurance Plans - Consumer Experience Summit - Measuring Suc...Amy Cueva
 
Sitecore - what to look forward to
Sitecore - what to look forward toSitecore - what to look forward to
Sitecore - what to look forward tojinto77
 
Atlanta Hawks - Religion Then Retail 2016
Atlanta Hawks - Religion Then Retail 2016Atlanta Hawks - Religion Then Retail 2016
Atlanta Hawks - Religion Then Retail 2016FortuneCMO, LLC
 
Make or Buy? Serving Great Products at an Affordable Price
Make or Buy? Serving Great Products at an Affordable PriceMake or Buy? Serving Great Products at an Affordable Price
Make or Buy? Serving Great Products at an Affordable PriceProfitable Hospitality
 
Dark Times for Dark Patterns
Dark Times for Dark PatternsDark Times for Dark Patterns
Dark Times for Dark PatternsCristina Viganò
 
Provoke: Inhuman resources: How digital workplaces can create the right ecosy...
Provoke: Inhuman resources: How digital workplaces can create the right ecosy...Provoke: Inhuman resources: How digital workplaces can create the right ecosy...
Provoke: Inhuman resources: How digital workplaces can create the right ecosy...Mando
 
Provoke: Agile Marcoms - Strategies & Technologies
Provoke: Agile  Marcoms - Strategies & TechnologiesProvoke: Agile  Marcoms - Strategies & Technologies
Provoke: Agile Marcoms - Strategies & TechnologiesMando
 
Beyond Social Listening: Insights that Power Decision-Making
Beyond Social Listening: Insights that Power Decision-MakingBeyond Social Listening: Insights that Power Decision-Making
Beyond Social Listening: Insights that Power Decision-Makingtracx
 
Genetic algorithm artificial intelligence presentation
Genetic algorithm   artificial intelligence presentationGenetic algorithm   artificial intelligence presentation
Genetic algorithm artificial intelligence presentationTauhidul Khandaker
 
Make or Buy IT Decision
Make or Buy IT DecisionMake or Buy IT Decision
Make or Buy IT DecisionUmesh Bajaj
 
Understanding the Sitecore Architecture
Understanding the Sitecore ArchitectureUnderstanding the Sitecore Architecture
Understanding the Sitecore ArchitecturePieter Brinkman
 
10 uses cases - Artificial Intelligence and Machine Learning in Construction ...
10 uses cases - Artificial Intelligence and Machine Learning in Construction ...10 uses cases - Artificial Intelligence and Machine Learning in Construction ...
10 uses cases - Artificial Intelligence and Machine Learning in Construction ...Victor John Tan
 

Andere mochten auch (18)

DL 1258 Modificaciones sobre el Impuesto a la Renta
DL 1258 Modificaciones sobre el Impuesto a la RentaDL 1258 Modificaciones sobre el Impuesto a la Renta
DL 1258 Modificaciones sobre el Impuesto a la Renta
 
What Is a Qualified Domestic Trust in Connecticut
What Is a Qualified Domestic Trust in ConnecticutWhat Is a Qualified Domestic Trust in Connecticut
What Is a Qualified Domestic Trust in Connecticut
 
Dylan Collins - LOGIN Conference 2012
Dylan Collins - LOGIN Conference 2012Dylan Collins - LOGIN Conference 2012
Dylan Collins - LOGIN Conference 2012
 
New York Probate Process
New York Probate ProcessNew York Probate Process
New York Probate Process
 
Medi-cal Spend Down: How to Become Eligible for Medi-cal in California
Medi-cal Spend Down: How to Become Eligible for Medi-cal in CaliforniaMedi-cal Spend Down: How to Become Eligible for Medi-cal in California
Medi-cal Spend Down: How to Become Eligible for Medi-cal in California
 
Cero tolerancia a la violencia contra las mujeres
Cero tolerancia a la violencia contra las mujeresCero tolerancia a la violencia contra las mujeres
Cero tolerancia a la violencia contra las mujeres
 
America's Health Insurance Plans - Consumer Experience Summit - Measuring Suc...
America's Health Insurance Plans - Consumer Experience Summit - Measuring Suc...America's Health Insurance Plans - Consumer Experience Summit - Measuring Suc...
America's Health Insurance Plans - Consumer Experience Summit - Measuring Suc...
 
Sitecore - what to look forward to
Sitecore - what to look forward toSitecore - what to look forward to
Sitecore - what to look forward to
 
Atlanta Hawks - Religion Then Retail 2016
Atlanta Hawks - Religion Then Retail 2016Atlanta Hawks - Religion Then Retail 2016
Atlanta Hawks - Religion Then Retail 2016
 
Make or Buy? Serving Great Products at an Affordable Price
Make or Buy? Serving Great Products at an Affordable PriceMake or Buy? Serving Great Products at an Affordable Price
Make or Buy? Serving Great Products at an Affordable Price
 
Dark Times for Dark Patterns
Dark Times for Dark PatternsDark Times for Dark Patterns
Dark Times for Dark Patterns
 
Provoke: Inhuman resources: How digital workplaces can create the right ecosy...
Provoke: Inhuman resources: How digital workplaces can create the right ecosy...Provoke: Inhuman resources: How digital workplaces can create the right ecosy...
Provoke: Inhuman resources: How digital workplaces can create the right ecosy...
 
Provoke: Agile Marcoms - Strategies & Technologies
Provoke: Agile  Marcoms - Strategies & TechnologiesProvoke: Agile  Marcoms - Strategies & Technologies
Provoke: Agile Marcoms - Strategies & Technologies
 
Beyond Social Listening: Insights that Power Decision-Making
Beyond Social Listening: Insights that Power Decision-MakingBeyond Social Listening: Insights that Power Decision-Making
Beyond Social Listening: Insights that Power Decision-Making
 
Genetic algorithm artificial intelligence presentation
Genetic algorithm   artificial intelligence presentationGenetic algorithm   artificial intelligence presentation
Genetic algorithm artificial intelligence presentation
 
Make or Buy IT Decision
Make or Buy IT DecisionMake or Buy IT Decision
Make or Buy IT Decision
 
Understanding the Sitecore Architecture
Understanding the Sitecore ArchitectureUnderstanding the Sitecore Architecture
Understanding the Sitecore Architecture
 
10 uses cases - Artificial Intelligence and Machine Learning in Construction ...
10 uses cases - Artificial Intelligence and Machine Learning in Construction ...10 uses cases - Artificial Intelligence and Machine Learning in Construction ...
10 uses cases - Artificial Intelligence and Machine Learning in Construction ...
 

Ähnlich wie Beveilig je data met windows 10

Smau Milano 2016 - Paola Presutto, Microsoft
Smau Milano 2016 - Paola Presutto, MicrosoftSmau Milano 2016 - Paola Presutto, Microsoft
Smau Milano 2016 - Paola Presutto, MicrosoftSMAU
 
VeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesVeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesTechBiz Forense Digital
 
VeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesVeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesTechBiz Forense Digital
 
Verisign iDefense Security Intelligence Services
Verisign iDefense Security Intelligence ServicesVerisign iDefense Security Intelligence Services
Verisign iDefense Security Intelligence ServicesTechBiz Forense Digital
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network SecurityHarish Chaudhary
 
Volume And Vectors 090416
Volume And Vectors 090416Volume And Vectors 090416
Volume And Vectors 090416Anthony Arrott
 
SplunkLive! Amsterdam 2015 - Analytics based security breakout
SplunkLive! Amsterdam 2015 - Analytics based security breakoutSplunkLive! Amsterdam 2015 - Analytics based security breakout
SplunkLive! Amsterdam 2015 - Analytics based security breakoutSplunk
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII studentsAkiumi Hasegawa
 
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityEryk Budi Pratama
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64Chema Alonso
 

Ähnlich wie Beveilig je data met windows 10 (20)

Smau Milano 2016 - Paola Presutto, Microsoft
Smau Milano 2016 - Paola Presutto, MicrosoftSmau Milano 2016 - Paola Presutto, Microsoft
Smau Milano 2016 - Paola Presutto, Microsoft
 
Hacking and its Defence
Hacking and its DefenceHacking and its Defence
Hacking and its Defence
 
VeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesVeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence Services
 
VeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesVeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence Services
 
Verisign iDefense Security Intelligence Services
Verisign iDefense Security Intelligence ServicesVerisign iDefense Security Intelligence Services
Verisign iDefense Security Intelligence Services
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
 
NetWitness
NetWitnessNetWitness
NetWitness
 
Volume And Vectors 090416
Volume And Vectors 090416Volume And Vectors 090416
Volume And Vectors 090416
 
Network Security
Network SecurityNetwork Security
Network Security
 
Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
 
SplunkLive! Amsterdam 2015 - Analytics based security breakout
SplunkLive! Amsterdam 2015 - Analytics based security breakoutSplunkLive! Amsterdam 2015 - Analytics based security breakout
SplunkLive! Amsterdam 2015 - Analytics based security breakout
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information Security
 
Data security
Data securityData security
Data security
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
 

Mehr von Avanade Nederland

Masters in Microsoft 2018 - Blockchain
Masters in Microsoft 2018 - Blockchain Masters in Microsoft 2018 - Blockchain
Masters in Microsoft 2018 - Blockchain Avanade Nederland
 
5 tips als je nu wilt starten met digital marketing analytics
5 tips als je nu wilt starten met digital marketing analytics5 tips als je nu wilt starten met digital marketing analytics
5 tips als je nu wilt starten met digital marketing analyticsAvanade Nederland
 
Mixed Reality met Microsoft HoloLens
Mixed Reality met Microsoft HoloLensMixed Reality met Microsoft HoloLens
Mixed Reality met Microsoft HoloLensAvanade Nederland
 
Virtual Reality met HTC Vive
Virtual Reality met HTC ViveVirtual Reality met HTC Vive
Virtual Reality met HTC ViveAvanade Nederland
 
Power apps for business applications
Power apps for business applicationsPower apps for business applications
Power apps for business applicationsAvanade Nederland
 
The importance of a design-oriented approach to IT solutions
The importance of a design-oriented approach to IT solutionsThe importance of a design-oriented approach to IT solutions
The importance of a design-oriented approach to IT solutionsAvanade Nederland
 
Creating a workflow with Azure Logic and API Apps
Creating a workflow with Azure Logic and API AppsCreating a workflow with Azure Logic and API Apps
Creating a workflow with Azure Logic and API AppsAvanade Nederland
 
Designing & Orchestrating the Customer Experience
Designing & Orchestrating the Customer ExperienceDesigning & Orchestrating the Customer Experience
Designing & Orchestrating the Customer ExperienceAvanade Nederland
 
Embracing mobile: How can we track customer interaction outside of the PC?
Embracing mobile: How can we track customer interaction outside of the PC?Embracing mobile: How can we track customer interaction outside of the PC?
Embracing mobile: How can we track customer interaction outside of the PC?Avanade Nederland
 
Introduction to ASP.NET Core
Introduction to ASP.NET CoreIntroduction to ASP.NET Core
Introduction to ASP.NET CoreAvanade Nederland
 
Business case voor een digitale werkplek
Business case voor een digitale werkplekBusiness case voor een digitale werkplek
Business case voor een digitale werkplekAvanade Nederland
 
Van intranet naar een digitale werkplek
Van intranet naar een digitale werkplekVan intranet naar een digitale werkplek
Van intranet naar een digitale werkplekAvanade Nederland
 
How Windows 10 is enabling the digital workplace
How Windows 10 is enabling the digital workplaceHow Windows 10 is enabling the digital workplace
How Windows 10 is enabling the digital workplaceAvanade Nederland
 
Unified Service Desk for Contact Centers
Unified Service Desk for Contact CentersUnified Service Desk for Contact Centers
Unified Service Desk for Contact CentersAvanade Nederland
 
Principes van Service Oriented Architecture
Principes van Service Oriented ArchitecturePrincipes van Service Oriented Architecture
Principes van Service Oriented ArchitectureAvanade Nederland
 

Mehr von Avanade Nederland (20)

Masters in Microsoft 2018 - Blockchain
Masters in Microsoft 2018 - Blockchain Masters in Microsoft 2018 - Blockchain
Masters in Microsoft 2018 - Blockchain
 
Geek + E.I. = Success in AI
Geek + E.I. = Success in AIGeek + E.I. = Success in AI
Geek + E.I. = Success in AI
 
5 tips als je nu wilt starten met digital marketing analytics
5 tips als je nu wilt starten met digital marketing analytics5 tips als je nu wilt starten met digital marketing analytics
5 tips als je nu wilt starten met digital marketing analytics
 
IOT & Machine Learning
IOT & Machine LearningIOT & Machine Learning
IOT & Machine Learning
 
Mixed Reality met Microsoft HoloLens
Mixed Reality met Microsoft HoloLensMixed Reality met Microsoft HoloLens
Mixed Reality met Microsoft HoloLens
 
Virtual Reality met HTC Vive
Virtual Reality met HTC ViveVirtual Reality met HTC Vive
Virtual Reality met HTC Vive
 
Power apps for business applications
Power apps for business applicationsPower apps for business applications
Power apps for business applications
 
The importance of a design-oriented approach to IT solutions
The importance of a design-oriented approach to IT solutionsThe importance of a design-oriented approach to IT solutions
The importance of a design-oriented approach to IT solutions
 
Creating a workflow with Azure Logic and API Apps
Creating a workflow with Azure Logic and API AppsCreating a workflow with Azure Logic and API Apps
Creating a workflow with Azure Logic and API Apps
 
Designing & Orchestrating the Customer Experience
Designing & Orchestrating the Customer ExperienceDesigning & Orchestrating the Customer Experience
Designing & Orchestrating the Customer Experience
 
Embracing mobile: How can we track customer interaction outside of the PC?
Embracing mobile: How can we track customer interaction outside of the PC?Embracing mobile: How can we track customer interaction outside of the PC?
Embracing mobile: How can we track customer interaction outside of the PC?
 
Introduction to ASP.NET Core
Introduction to ASP.NET CoreIntroduction to ASP.NET Core
Introduction to ASP.NET Core
 
Avanade Stageopdrachten
Avanade StageopdrachtenAvanade Stageopdrachten
Avanade Stageopdrachten
 
Digitale werklek adoptie
Digitale werklek adoptieDigitale werklek adoptie
Digitale werklek adoptie
 
Digital workplace insights
Digital workplace insightsDigital workplace insights
Digital workplace insights
 
Business case voor een digitale werkplek
Business case voor een digitale werkplekBusiness case voor een digitale werkplek
Business case voor een digitale werkplek
 
Van intranet naar een digitale werkplek
Van intranet naar een digitale werkplekVan intranet naar een digitale werkplek
Van intranet naar een digitale werkplek
 
How Windows 10 is enabling the digital workplace
How Windows 10 is enabling the digital workplaceHow Windows 10 is enabling the digital workplace
How Windows 10 is enabling the digital workplace
 
Unified Service Desk for Contact Centers
Unified Service Desk for Contact CentersUnified Service Desk for Contact Centers
Unified Service Desk for Contact Centers
 
Principes van Service Oriented Architecture
Principes van Service Oriented ArchitecturePrincipes van Service Oriented Architecture
Principes van Service Oriented Architecture
 

Kürzlich hochgeladen

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Kürzlich hochgeladen (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Beveilig je data met windows 10