SlideShare ist ein Scribd-Unternehmen logo
1 von 100
Downloaden Sie, um offline zu lesen
@DinisCruz
security
Dinis Cruz
presentation to Babylon Health
When applied to the CISO position
Dinis Cruz v0.6 (DRAFT) Sep 2019
@DinisCruz
security
Babylon Health Security
Dinis Cruz Interim CISO Candidate Sep 2019 v0.6
@DinisCruz
security
This presentation was created by
Dinis Cruz , who is an candidate to the
Babylon Health CISO position*!
DISCLAIMER!
* Dinis is currently NOT an Babylon Health employee/contractor
** Dinis does NOT have Internal knowledge of existing Babylon Health security team structure,
objectives or activities
?
WHY?
This is a good medium to present Dinis’
thinking, approach and values**
@DinisCruz
security
Babylon’s Security team
mission is to put an
safe, accessible and
affordable health service in the
hands of every person on
earth.
@DinisCruz
security
must enable and empower these amazing
professionals to fulfill their potential
… while enhancing the patient’s data:
Confidentiality
Integrity
Availability
@DinisCruz
security
?
WHY is
Babylon Security
important?
@DinisCruz
security
Is the guardian of
Babylon’s
Customers and
employees:
@DinisCruz
security
@DinisCruz
Babylon Health Security commitments
@DinisCruz
security
@DinisCruz
Babylon Health Security page
@DinisCruz
security
@DinisCruz
Security drives business change and digital transformation
@DinisCruz
security
@DinisCruz
Required compliance to multiple standards
@DinisCruz
security
@DinisCruz
https://www.serveit.com/recruitment-sourcing-guide-gdpr/
https://www.serveit.com/gdpr-for-developers-data-subject-rights/
GDPR principles, processing and customers rights
@DinisCruz
security
@DinisCruz
GDPR - Personal Data Journey (Privacy Impact Assessments)
https://2018.open-security-summit.org/tracks/gdpr/working-sessions/creating-standard-for-gdpr-patterns/
@DinisCruz
security
@DinisCruz
Desired Threat Level capability
Detect and Contain
Must be able to:
Neutralise
Break economic model
https://www.canso.org/sites/default/files/CANSO%20Cyber%20Security%20and%20Risk%20Assessment%20Guide.pdf
@DinisCruz
security
@DinisCruz
Health care security stats
@DinisCruz
security
@DinisCruz
Healthcare record’s value and incident’s patterns
@DinisCruz
security
Strategy
@DinisCruz@DinisCruz
security
By combining the ever-growing
power of AI with the best
Security expertise of humans,
Babylon Health Security Team
can deliver a safe ecosystem for
customer’s health Data,
including personalised Security
assessments, treatment advice
and appointments with a
Security Professional 24/7.
AI
+
Security
Professionals
@DinisCruz
security
@DinisCruz
Aligned with best practices
Start here
https://www.ncsc.gov.uk/collection/board-toolkit
@DinisCruz
securitystrategy
@DinisCruz
security
@DinisCruz
How to prevent and contain malicious activities
https://www.ncsc.gov.uk/collection/board-toolkit
@DinisCruz
security
@DinisCruz
10 Steps to Cyber Security
https://www.ncsc.gov.uk/collection/board-toolkit
@DinisCruz
security
@DinisCruz
Effective Cyber Security
https://www.canso.org/sites/default/files/CANSO%20Cyber%20Security%20and%20Risk%20Assessment%20Guide.pdfhttps://onlinedegrees.kent.edu/ischool/health-informatics/community/healthcare-data-security/CybersecurityHealthcare.pdf
@DinisCruz
security
@DinisCruz
Strong driver for Information Governance
https://www.bdo.com/blogs/nonprofit-standard/may-2018/the-integration-of-data-privacy https://activenavigation.com//wp-content/uploads/2015/10/File-Analysis-and-Your-Information-Governance-Maturity-Oct-2015.pdf
@DinisCruz
security
@DinisCruz
NIST (Cyber Security Framework)
https://www.canso.org/sites/default/files/CANSO%20Cyber%20Security%20and%20Risk%20Assessment%20Guide.pdf
@DinisCruz
security
@DinisCruz
Map functions to standards and policies
https://insights.sei.cmu.edu/sei_blog/2016/02/structuring-the-chief-information-security-officer-ciso-organization.html
@DinisCruz
security
@DinisCruz
Hippocratic Oath for Security and IT Engineers
https://queue.acm.org/detail.cfm?id=1016991
@DinisCruz
security
@DinisCruz
#DataSavesLives
https://understandingpatientdata.org.uk
@DinisCruz
security
=
+
@DinisCruz@DinisCruz
security
Babylon Security objectives and
mission are completely aligned with
NHS and NHSx
Tight collaboration with NHSx Cyber
Security team is a win-win scenario for
both parties and the wider health care
industry
Learn, integrate
and improve
NHSx
Cyber Security
https://coinzodiac.com/cryptocurrency-arms-race/reinvent-wheel/
Do NOT reinvent the wheel
@DinisCruz
security
@DinisCruz
Be a player
Supports
Integrates
Contributes
Babylon should be here
Private sector players
@DinisCruz
security
@DinisCruz
NHSx focus = Babylon Health Security focus
https://www.slideshare.net/InnovationNWC/dr-masood-nazir-eco-19-care-closer-to-home
@DinisCruz
security
People
Process
Technology
@DinisCruz@DinisCruz
security
1. Babylon Security provides a comprehensive
service, available to all*
2. Access to Babylon Security services is based
on need, not an individual’s business unit
3. Babylon Security aspires to the highest
standards of excellence and professionalism
4. The patient will be at the heart of everything
Babylon Security does
5. Babylon Security works across organisational
boundaries
6. Babylon Security is committed to providing
best value for money
7. Babylon Security is accountable to the
patients, management and shareholders
*All = Babylon Health Company and selected partners
Principles
inspired by:
@DinisCruz
security
@DinisCruz
Following best practices and ideas
1. Ensuring every Babylon Health customer and
employee data is protected
2. Establishing shared architecture and
standards
3. Implementing services to meet needs
4. Supporting stakeholders to get the best out of
technology, data and information
5. Making better use of cyber health and care
information
https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/443353/HSCIC-Strategy-2015-2020-FINAL-310315.pdf
@DinisCruz
security
https://digital.nhs.uk/binaries/content/assets/legacy/pdf/8/9/copconfidentialinformation.pdf
@DinisCruz
securityhttps://www.gov.uk/government/publications/the-future-of-healthcare-our-vision-for-digital-data-and-technology-in-health-and-care/the-future-of-healthca
re-our-vision-for-digital-data-and-technology-in-health-and-care
@DinisCruz
security
@DinisCruz
security
@DinisCruz
Babylon Health is very synergetic with GP Connect
@DinisCruz
security
@DinisCruz
NHS Code of Conduct
@DinisCruz
security
@DinisCruz
OWASP ASVS Application Security Verification Standard (in Healthcare)
@DinisCruz
security
?
HOW
Babylon Security
Operates and behaves
@DinisCruz
security
@DinisCruz
Team’s capabilities exposed as services
@DinisCruz
security
@DinisCruz
Graph project’s to outcomes and threats
Each yellow
box is a Jira
ticket
@DinisCruz
security
@DinisCruz
Create schema that represents the business
@DinisCruz
security
@DinisCruz
Scale using Workflows
RISK Workflow VULN Workflow
@DinisCruz
security
@DinisCruz
Lots of workflows
@DinisCruz
security
@DinisCruz
Hyperlinked RISKs
https://www.canso.org/sites/default/files/CANSO%20Cyber%20Security%20and%20Risk%20Assessment%20Guide.pdf
@DinisCruz
security
@DinisCruz
Modern approach to managing security RISKs
https://www.soa.org/globalassets/assets/Files/Research/Projects/research-new-approach.pdf
@DinisCruz
security
Embrace Open Source and CC (Creative Commons)
@DinisCruz
security
=
Linked
Security Policies
Evidence based
Security decisions
@DinisCruz
security
@DinisCruz
Hyperlinked policies in Jira
Policy’s pdfs
do not scale
because it is not
possible to link real-world
data to the respective policy
@DinisCruz
security
@DinisCruz
Convert policy into an graph
@DinisCruz
security
Policies Links to Facts Links to Vulns Links to Risks
@DinisCruz
security
@DinisCruz
Context specific Jira projects (for example FACTs)
@DinisCruz
security
? WHO is
Babylon Security ?
@DinisCruz
security
@DinisCruz
Current Security team
@DinisCruz
security
@DinisCruz
Creating Security Champions
https://www.owasp.org/index.php/Security_Champions
https://safecode.org/putting-a-face-to-software-security-champions/
@DinisCruz
security
@DinisCruz
Security Champions
https://www.slideshare.net/DinisCruz/security-champions-v10
@DinisCruz
security
@DinisCruz
Security Digital Twins
Leverage existing Babylon
Health technology and create
Security digital twins for:
● Security Activities
● Application Security
● Network Security
● Intrusion Detection
● Risks
● Stakeholders (users, customers)
@DinisCruz
security
} Babylon Security
Data Science Tech Stack
@DinisCruz
security
@DinisCruz
Serverless stack
@DinisCruz
security
@DinisCruz
Scalable data creation workflow
@DinisCruz
security
@DinisCruz
JIRA
@DinisCruz
security
@DinisCruz
Elastic (ELK)
@DinisCruz
security
@DinisCruz
Slack
@DinisCruz
security
@DinisCruz
Jupyter notebooks
@DinisCruz
security
@DinisCruz
Other Key Components
@DinisCruz
security
*Graphs and Maps
@DinisCruz
security
@DinisCruz
Wardley Maps
https://leadingedgeforum.com/researchers/simon-wardley/
@DinisCruz
security
@DinisCruz
https://wardle.org/strategy/2018/07/19/mapping.html
This is a graph (position doesn’t matter)
This is a map (position represents evolution)
Using Wardley Maps on Healthcare
@DinisCruz
security
@DinisCruz
Maps help to visualise strategy (and bias)
@DinisCruz
security
@DinisCruz
https://medium.com/@erik_schon/the-art-of-strategy-811c00a96fad
Metadata use in Maps is very powerful
@DinisCruz
security
@DinisCruz
Advanced Wardley Mapping
@DinisCruz
security
@DinisCruz
Cynefin Framework
https://academic.oup.com/heapro/article/28/1/73/576131
@DinisCruz
security
Why Dinis Cruz ?
for Babylon CISO
@DinisCruz
@DinisCruz
@DinisCruz
@DinisCruz
@DinisCruz
Created OWASP Summit* event.
Motivated 100+ Security professionals to collaborate together, and
release knowledge/code under Open Source (or Creative Commons)
* now called Open Security Summit
@DinisCruz
Published
Books
@DinisCruz
https://cyberleadersnetwork.org/dinis-cruz-ciso-of-photobox-on-how-to
-identify-communicate-and-resolve-cyber-security-risks/
https://www.youtube.com/watch?v=A7hccDXlDwI
https://www.youtube.com/watch?v=6XmCQhn57gk
Video interviews
and presentations
@DinisCruz
LinkedIn, GitHub,
Twitter, Blog, Email
http://www.linkedin.com/in/diniscruz
https://twitter.com/DinisCruz
http://github.com/diniscruz http://blog.diniscruz.com/
dinis.cruz@owasp.org
@DinisCruz
security
Thank you - Any Questions?
Dinis Cruz Interim CISO Candidate Sep 2019
@DinisCruz
security
@DinisCruz
security
Misc Slides
(to be added to next version of this
deck)
@DinisCruz
security
Security Ecosystem
Safe Secure
EffectivePeople
Mentor
Community
ResilientCompliant
CommercialTransformative
FoundationsInnovative Enabler ScalableOpen
@DinisCruz
security
@DinisCruz
Handle incidents (should be seen as opportunities)
@DinisCruz@DinisCruz
security
The Security team must do the same
Babylon thinks in graphs
@DinisCruz
security
@DinisCruz
Board/C-Level view of Cyber Security
https://www.ncsc.gov.uk/collection/board-toolkit
@DinisCruz
security
Open Source as a key strategy
@DinisCruz
security
@DinisCruz
Behaviours
@DinisCruz
security
Add how this applies
to security
@DinisCruz
security
@DinisCruz
Security Team values
@DinisCruz
security
Wardley maps
@DinisCruz
@DinisCruz
https://www.isaca.org/Journal/archives/2017/Volume-3/PublishingImages/17v3-Security-Assurance-2L.jpg
@DinisCruz
security
NIST and CIS Controls
https://www.nist.gov/news-events/news/2018/05/mep-centers-aid-manufacturers-cybersecurity
@DinisCruz
security
Design elements

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
PECB
 

Was ist angesagt? (20)

Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond ChapterNIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleWalk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
 
Application Assessment Techniques
Application Assessment TechniquesApplication Assessment Techniques
Application Assessment Techniques
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity Framework
 
Cybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoDCybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoD
 
OWASP based Threat Modeling Framework
OWASP based Threat Modeling FrameworkOWASP based Threat Modeling Framework
OWASP based Threat Modeling Framework
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber Resilience
 
CISSP 8 Domains.pdf
CISSP 8 Domains.pdfCISSP 8 Domains.pdf
CISSP 8 Domains.pdf
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
Shift Left Security
Shift Left SecurityShift Left Security
Shift Left Security
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
 
Creating a graph based security organisation - Apr 2019 (OWASP London chapter...
Creating a graph based security organisation - Apr 2019 (OWASP London chapter...Creating a graph based security organisation - Apr 2019 (OWASP London chapter...
Creating a graph based security organisation - Apr 2019 (OWASP London chapter...
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Modelling Security Architecture
Modelling Security ArchitectureModelling Security Architecture
Modelling Security Architecture
 
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopCybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy Workshop
 
Enterprise Security Architecture Design
Enterprise Security Architecture DesignEnterprise Security Architecture Design
Enterprise Security Architecture Design
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 

Ähnlich wie CISO Application presentation - Babylon health security

Winning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsWinning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud Environments
Carl De Groote
 
BCAWARE_ProgramBook_FINAL_Proof
BCAWARE_ProgramBook_FINAL_ProofBCAWARE_ProgramBook_FINAL_Proof
BCAWARE_ProgramBook_FINAL_Proof
Dominic Vogel
 

Ähnlich wie CISO Application presentation - Babylon health security (20)

Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Modern security using graphs, automation and data science
Modern security using graphs, automation and data scienceModern security using graphs, automation and data science
Modern security using graphs, automation and data science
 
The benefits of police and industry investigation - NPCC Conference
The benefits of police and industry investigation - NPCC ConferenceThe benefits of police and industry investigation - NPCC Conference
The benefits of police and industry investigation - NPCC Conference
 
India's Leading Cyber Security Companies_compressed.pdf
India's Leading Cyber Security Companies_compressed.pdfIndia's Leading Cyber Security Companies_compressed.pdf
India's Leading Cyber Security Companies_compressed.pdf
 
Event report 2014 published
Event report 2014 publishedEvent report 2014 published
Event report 2014 published
 
Novum insights client deck november 2016
Novum insights client deck november 2016Novum insights client deck november 2016
Novum insights client deck november 2016
 
Keith prabhu cloud security-public
Keith prabhu cloud security-publicKeith prabhu cloud security-public
Keith prabhu cloud security-public
 
The Emerging IT Landscape and the IT GRC and Security Professional
The Emerging IT Landscape and the IT GRC and Security Professional  The Emerging IT Landscape and the IT GRC and Security Professional
The Emerging IT Landscape and the IT GRC and Security Professional
 
Serverless Security Workflows - cyber talks - 19th nov 2019
Serverless  Security Workflows - cyber talks - 19th nov 2019Serverless  Security Workflows - cyber talks - 19th nov 2019
Serverless Security Workflows - cyber talks - 19th nov 2019
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
ScotSecure 2020
ScotSecure 2020ScotSecure 2020
ScotSecure 2020
 
Encuesta Mundial de Ciberseguridad de la Información 2017
Encuesta Mundial de Ciberseguridad de la Información 2017Encuesta Mundial de Ciberseguridad de la Información 2017
Encuesta Mundial de Ciberseguridad de la Información 2017
 
Winning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsWinning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud Environments
 
ISACA_Bringing out the hidden security Ninjas
ISACA_Bringing out the hidden security NinjasISACA_Bringing out the hidden security Ninjas
ISACA_Bringing out the hidden security Ninjas
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 
Digital Competence for Energy Operations
Digital Competence for Energy OperationsDigital Competence for Energy Operations
Digital Competence for Energy Operations
 
India's Leading Cyber Security Company2022.pdf
India's Leading Cyber Security Company2022.pdfIndia's Leading Cyber Security Company2022.pdf
India's Leading Cyber Security Company2022.pdf
 
Implementing a Security Management Framework
Implementing a Security Management FrameworkImplementing a Security Management Framework
Implementing a Security Management Framework
 
BCAWARE_ProgramBook_FINAL_Proof
BCAWARE_ProgramBook_FINAL_ProofBCAWARE_ProgramBook_FINAL_Proof
BCAWARE_ProgramBook_FINAL_Proof
 
Cisco's MultiCloud Strategy
Cisco's MultiCloud StrategyCisco's MultiCloud Strategy
Cisco's MultiCloud Strategy
 

Mehr von Dinis Cruz

Mehr von Dinis Cruz (20)

Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Map camp  - Why context is your crown jewels (Wardley Maps and Threat Modeling)Map camp  - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
 
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted Files
 
Glasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidentsGlasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidents
 
Using Wardley Maps to Understand Security's Landscape and Strategy
Using Wardley Maps to Understand Security's Landscape and StrategyUsing Wardley Maps to Understand Security's Landscape and Strategy
Using Wardley Maps to Understand Security's Landscape and Strategy
 
Making fact based decisions and 4 board decisions (Oct 2019)
Making fact based decisions and 4 board decisions (Oct 2019)Making fact based decisions and 4 board decisions (Oct 2019)
Making fact based decisions and 4 board decisions (Oct 2019)
 
Using OWASP Security Bot (OSBot) to make Fact Based Security Decisions
Using OWASP Security Bot (OSBot) to make Fact Based Security DecisionsUsing OWASP Security Bot (OSBot) to make Fact Based Security Decisions
Using OWASP Security Bot (OSBot) to make Fact Based Security Decisions
 
GSBot Commands (Slack Bot used to access Jira data)
GSBot Commands (Slack Bot used to access Jira data)GSBot Commands (Slack Bot used to access Jira data)
GSBot Commands (Slack Bot used to access Jira data)
 
(OLD VERSION) Dinis Cruz (CV) - CISO and Transformation Agent v0.6
(OLD VERSION) Dinis Cruz (CV) - CISO and Transformation Agent v0.6 (OLD VERSION) Dinis Cruz (CV) - CISO and Transformation Agent v0.6
(OLD VERSION) Dinis Cruz (CV) - CISO and Transformation Agent v0.6
 
OSBot - Data transformation workflow (from GSheet to Jupyter)
OSBot - Data transformation workflow (from GSheet to Jupyter)OSBot - Data transformation workflow (from GSheet to Jupyter)
OSBot - Data transformation workflow (from GSheet to Jupyter)
 
Jira schemas - Open Security Summit (Working Session 21th May 2019)
Jira schemas  - Open Security Summit (Working Session 21th May 2019)Jira schemas  - Open Security Summit (Working Session 21th May 2019)
Jira schemas - Open Security Summit (Working Session 21th May 2019)
 
Template for "Sharing anonymised risk theme dashboards v0.8"
Template for "Sharing anonymised risk theme dashboards v0.8"Template for "Sharing anonymised risk theme dashboards v0.8"
Template for "Sharing anonymised risk theme dashboards v0.8"
 
Owasp and summits (may 2019)
Owasp and summits (may 2019)Owasp and summits (may 2019)
Owasp and summits (may 2019)
 
Open security summit 2019 owasp london 25th feb
Open security summit 2019   owasp london 25th febOpen security summit 2019   owasp london 25th feb
Open security summit 2019 owasp london 25th feb
 
Owasp summit 2019 - OWASP London 25th feb
Owasp summit 2019  - OWASP London 25th febOwasp summit 2019  - OWASP London 25th feb
Owasp summit 2019 - OWASP London 25th feb
 
Evolving challenges for modern enterprise architectures in the age of APIs
Evolving challenges for modern enterprise architectures in the age of APIsEvolving challenges for modern enterprise architectures in the age of APIs
Evolving challenges for modern enterprise architectures in the age of APIs
 
How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)
 
Thinking in graphs v1.0
Thinking in graphs v1.0Thinking in graphs v1.0
Thinking in graphs v1.0
 
Open Security Summit - April 2018
Open Security Summit - April 2018 Open Security Summit - April 2018
Open Security Summit - April 2018
 
Using security to drive chaos engineering - April 2018
Using security to drive chaos engineering - April 2018Using security to drive chaos engineering - April 2018
Using security to drive chaos engineering - April 2018
 
Using security to drive chaos engineering
Using security to drive chaos engineeringUsing security to drive chaos engineering
Using security to drive chaos engineering
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

CISO Application presentation - Babylon health security