SlideShare ist ein Scribd-Unternehmen logo
1 von 50
Downloaden Sie, um offline zu lesen
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Modern cybersecurity threats, and shiny
new tools to help deal with them
Microsoft Cloud & Datacenter Management MVP, Certified Ethical Hacker
Executive Manager at Avaelgo (IT Advisory, Managed Services, Training)
Contact: tudor.damian@avaelgo.ro / @tudydamian / tudy.tel
Tudor Damian
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Many thanks to our sponsors & partners!
GOLD
SILVER
PARTNERS
PLATINUM
POWERED BY
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
VIDEO – ANATOMY OF AN ATTACK
Source: CISCO
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
CURRENT STATE OF CYBERSECURITY
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
The effects of WannaCry and EternalRocks
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Your systems’ security is as strong as its weakest link
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
• A steady increase in companies targeted by Social Engineering
attacks (60% in 2016, and growing)
• Data theft turning into data manipulation
• Attackers targeting consumer & IoT devices (e.g. Mirai botnet)
• Ransomware on the rise (e.g. WannaCry)
• Breaches getting more complicated and harder to detect
• 70% of companies will experience cyber attacks by 2018 (IDC)
• Through 2020, 99% of vulnerabilities exploited will continue to be
the ones known by IT professionals for at least one year (Gartner)
• Cyber risk insurance is more needed than ever
A changing security landscape
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Myspace Fling LinkedIn Sony VK.com Dropbox Tumblr Yahoo
Equation
Group
Shadow
Brokers
Punycode BadUSB Superfish Heartbleed Shellshock Karmen POODLE FREAK
GHOST DROWN Dirty COW STAGEFRIGHT QuadRooter XCodeGhost Mirai Carbanak Gemalto
SS7 Locky DMA Locker Surprise Ranscam SWIFT Weebly Sundown CrypMIC
TrickBot Angler RIG Neutrino xDedic BlackEnergy ProjectSauron Adwind Danti
SVCMONDR Lazarus FruityArmor ScarCruft Lurk Ammyy Admin Chinastrats Patchwork TeslaCrypt
2016 – the year of hacks and vulnerabilities
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Secure
CheapUsable
Choices in building a system/app - pick any two!
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Attack timeline
24–48 hours
More than 200 days
(varies by industry)
First host
compromised
Domain admin
compromised
Attack
discovered
Sources: HP, Ponemon Institute, Verizon
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
How much time does security get?
An attacker has 24x7x365 to attack you
Attacker Schedule
Time
The defender has 20 (?) man days per year to detect and defend
Who has the edge? ☺
Scheduled
Pen-Test
Scheduled
Pen-Test
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
• CISCO, 2014
– There are more than 1 million unfilled security jobs worldwide
• (ISC)² study, 2015
– A shortfall of 1.5 million security professionals is estimated by 2020
Lack of security professionals worldwide
Sources:
http://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2014_ASR.pdf
http://blog.isc2.org/isc2_blog/2015/04/isc-study-workforce-shortfall-due-to-hiring-difficulties-despite-rising-salaries-increased-budgets-a.html
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
• EU General Data Protection Regulation (GDPR)
– It will come into effect on May 25th 2018
– GDPR clarifies where responsibility for privacy protection lies with any
companies who store, collect, manage and analyze any form of Personally
Identifiable Information (PII)
– Applies to any organization (including those outside the EU) that holds or
processes data from EU residents
– Replaces Data Protection Directive (DPD) 95/46/EC to become the single, all-
encompassing privacy protection regulation in the EU
• Breaches could lead to fines:
– Major breaches - up to €20 million or 4% of global annual turnover
– Less important breaches - up to €10m or 2% of global annual turnover
GDPR is coming!
More: http://www.eugdpr.org/
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
• Adds some more rights for EU citizens:
– Right to be forgotten (ask data controllers to erase all personal data)
– Right to data portability (move data from a service provider to another)
– Right to object to profiling (not to be subject to a decision based solely on
automated processing)
• Where do companies store PII data?
– Customer Relationship solutions (SalesForce, PeopleSoft, Dynamics)
– ERPs (SAP, Oracle, Axapta)
– Enterprise Content Management systems, File Shares
– Emails, Attachments, Office Documents, PDF files, letters, contracts
– SharePoint, Lotus Notes, Dropbox, Box, OneDrive
– Employee HR data
– etc.
More details on GDPR
More: http://www.eugdpr.org/
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
• We have to stop focusing on preventing a data breach and start
assuming the breach has already happened
• Currently: a one-sided, purely preventative strategy
• Future: emphasis on breach detection, incident response, and
effective recovery
– Start thinking about the time when a breach will (almost inevitably) occur in
your infrastructure
– Be prepared for that!
Assume Breach - a change in mindset
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
A healthier security approach
Source: Gartner
PREDICT
• Proactive Exposure
Analysis
• Predict Attacks
• Baseline Systems
PREVENT
• Harden and Isolate
Systems
• Divert Attackers
• Prevent Incidents
DETECT
• Detect Incidents
• Confirm and Prioritize
• Contain Incidents
RESPOND
• Investigate/Forensics
• Design/Model
Change
• Remediate/Make
Change
Continuous
Monitoring
and Analytics
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
WINDOWS 10 & WINDOWS SERVER 2016
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
The Windows 10 Defense Stack
Device Health
attestation
Device Guard
Device Control
Security policies
Built-in 2FA
Account lockdown
Credential Guard
Windows Hello ;)
Device protection
BitLocker
Enterprise Data
Protection
Conditional access
SmartScreen
AppLocker
Device Guard
Windows Defender
Network/Firewall
Windows Defender
Advanced Threat
Protection (WDATP)
Microsoft Advanced
Threat Analytics
(ATA)
Device protection Information
protection
Threat resistance
Breach detection
Investigation & Response
Pre breach Post breach
Identity protection
The Windows 10 defense stack
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Some of the security improvements in W10 / WS2016
Windows Defender
SmartScreen
Credential Guard
Enterprise
Certificate Pinning
Just Enough
Administration
(JEA)
Just-in-time
Administration (JIT)
Device Guard
Structured
Exception Handling
Overwrite
Protection (SEHOP)
Control Flow Guard
(CFG)
Windows Hello In-box Azure MFA
Hypervisor-
protected code
integrity (HVCI)
Shielded VMs
Host Guardian
Service
Device Health
Attestation (DHA)
Network Controller
Distributed Firewall
Network Security
Groups
Virtual Appliances
Virtual Secure
Mode
Virtual TPM
More: https://docs.microsoft.com/en-us/windows/threat-protection/overview-of-threat-mitigations-in-windows-10
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
JEA & JIT
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Challenges in protecting credentials
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Windows Server 2016 approach
• Credential Guard
– Prevents Pass the Hash and
Pass the Ticket attacks by protecting
stored credentials through
Virtualization-based Security
• Just Enough
– Administration Limits administrative
privileges to the bare-minimum
required set of actions (limited in
space)
• Just in Time
– Administration Provide privileged
access through a workflow that is
audited and limited in time
• JEA + JIT
– Limitation in time & capability
More: https://github.com/PowerShell/JEA & https://docs.microsoft.com/en-us/microsoft-identity-manager/pam/privileged-identity-management-for-active-directory-domain-services
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
In box Azure MFA
More: https://docs.microsoft.com/en-us/azure/multi-factor-authentication/multi-factor-authentication
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
PROTECTING VMS
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Hypervisor
Fabric
Guest VM
Protect virtual machines
• Compromised or malicious
fabric administrators can
access guest VMs
• Health of hosts not taken
into account before
running VMs
• Tenant’s VMs are exposed
to storage and network
attacks
• Virtual Machines can’t take
advantage of hardware-
rooted security capabilities
such as TPMs
Fabric
Hypervisor
Guest VM
Healthy host?
Guest VM
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Windows Server 2016 approach
• Shielded VMs
– Use BitLocker to encrypt the disk
and state of virtual machines
protecting secrets from
compromised admins & malware
• Host Guardian Service
– Attests to host health releasing the
keys required to boot or migrate a
Shielded VM only to healthy hosts
• Generation 2 VMs
– Supports virtualized equivalents of
hardware security technologies (e.g.,
TPMs) enabling BitLocker encryption
for Shielded VMs
✓ ✓ 
✓ 
✓ 
✓ 
✓ 
 ✓ ✓
More: https://docs.microsoft.com/en-us/windows-server/virtualization/guarded-fabric-shielded-vm/guarded-fabric-and-shielded-vms-top-node
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Guarded hosts and Shielded VMs attestation
• Admin-trusted attestation
– Intended to support existing host hardware (no TPM
2.0 available)
– Guarded hosts that can run Shielded VMs are
approved by the Host Guardian Service based on
membership in a designated Active Directory
Domain Services (AD DS) security group
• TPM-trusted attestation
– Offers the strongest possible protections
– Requires more configuration steps
– Host hardware and firmware must include TPM 2.0
and UEFI 2.3.1 with secure boot enabled
– Guarded hosts that can run Shielded VMs are
approved based on their TPM identity, measured
boot sequence and code integrity policies
More: https://docs.microsoft.com/en-us/windows-server/virtualization/guarded-fabric-shielded-vm/guarded-fabric-and-shielded-vms-top-node
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
VIRTUAL SECURE MODE
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Virtual Secure Mode Overview
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
DEVICE GUARD &
CREDENTIAL GUARD
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Device Guard & AppLocker
• AppLocker was introduced back in Windows 7 / WS 2008 R2
– Specifies a list of apps allowed to run on a user’s device
– Whitelist can be specific to a group or individual within AD
– Much more efficient than a blacklist
• Device Guard extends AppLocker
– Relies on digital signatures
– Requires apps to be digitally signed
– This includes internal apps
• Device Guard Requirements
– Intel VT-x or AMD-V extensions
– Second Level Address Translation (SLAT)
– Intel VT-d or AMD-IOV
– TPM (optional, required for Credential Manager)
More: https://docs.microsoft.com/en-us/windows/device-security/device-guard/device-guard-deployment-guide
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Device Guard
• Hardware Rooted App Control (runs in VSM)
– Enables a Windows desktop to be locked down to only run trusted apps, just like
many mobile OS’s (e.g.: Windows Phone)
– Untrusted apps and executables such as malware are unable to run
– Resistant to tampering by an administrator or malware
– Requires devices specially configured by either the OEM or IT
• Getting Apps into the Circle of Trust
– Supports all apps including Universal and Desktop (Win32)
– Trusted apps can be created by IHV, ISV, and Organizations using a Microsoft
provided signing service
– Apps must be specially signed using the Microsoft signing service. No additional
modification is required
– Signing service made available to OEM’s, IHV, ISV’s, and Enterprises
More: https://docs.microsoft.com/en-us/windows/device-security/device-guard/device-guard-deployment-guide
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Credential Guard
• Uses virtualization-based security to protect
Kerberos, NTLM, and Credential Manager secrets
More: https://docs.microsoft.com/en-us/windows/access-protection/credential-guard/credential-guard-how-it-works
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Credential Guard Details
• Minimum Requirements
– Windows 10 v1511 or Windows Server 2016
– x64 architecture
– UEFI firmware 2.3.1 or higher and Secure Boot enabled
– TPM version 2.0
• Considerations
– 3rd party Security Support Providers (SSP) secrets are not protected
– NTLM v1 is not supported (considered to be unsecure)
– Kerberos unconstrained delegation & DES encryption aren’t supported
– Digest Auth, Credential delegation and MS-CHAPv2 will prompt for (and
potentially expose) credentials
• MS-CHAPv2 should be phased out (i.e. upgrade your Wi-Fi and/or VPN)
More: https://docs.microsoft.com/en-us/windows/access-protection/credential-guard/credential-guard-how-it-works
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
WINDOWS HELLO
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Windows Hello
• Replaces/extends Windows passwords with
– Fingerprint, iris scan & facial recognition
– MFA via companion devices like phones, wearables,
USBs, smartcards (formerly Microsoft Passport)
Hello ITCamp
******
username
More: https://docs.microsoft.com/en-us/windows/uwp/security/microsoft-passport
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
GROUP MANAGED SERVICE ACCOUNTS
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Group Managed Service Accounts
• The feature builds on Standalone Managed Service accounts
– Introduced in Windows 2008 R2 and Windows 7
– Managed domain accounts
– Automated password management
– Simplified SPN (Service Principal Name) management, including
delegation of management to other Administrator
• Group Managed Service Accounts
– Provides same functionality within the domain but also extends that
functionality over multiple servers
– Leverages the Microsoft Key Distribution Service within the AD domain
– e.g. it can be used when connected to a service hosted on a server farm,
such as a Network Load Balancer – ensures that all instances use the same
principal
More: https://docs.microsoft.com/en-us/windows-server/security/group-managed-service-accounts/group-managed-service-accounts-overview
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
DEVICE HEALTH ATTESTATION (DHA)
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Today, device health is assumed
• Clients are usually granted full access to resources
• Any clients which become “unhealthy” can
proliferate malware
1
Important resources
2
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Device Health Attestation (DHA)
• On-premise or cloud-based service
– Provides remote health attestation for devices
– Can issue health state “claims”
• Blocks unhealthy devices to protect
resources and prevent proliferation
• Intune MDM can provide conditional
access based on device health state claims
• Hardware Requirements
– UEFI 2.3.1 with Secure Boot
– VT-x, AMD-V & SLAT
– x64 processor
– IOMMU (Intel VT-d or AMD-Vi)
– TPM 1.2 or 2.0
More: https://docs.microsoft.com/en-us/windows-server/security/device-health-attestation
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
WINDOWS INFORMATION PROTECTION
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
• Allows companies to transparently keep corporate data secure and
personal data private, while providing data leakage control
• Key features:
– Automatically tag personal and corporate data
– Protect data while it’s at rest on local or removable storage
– Control which apps can access corporate data
– Control which apps can access a virtual private network (VPN) connection
– Prevent users from copying corporate data to public locations
– Help ensure business data is inaccessible when the device is in a locked state
– Ability to wipe corporate data from devices while leaving personal data alone
– Usage of audit reports for tracking issue and remedial actions
Windows Information Protection
More: https://docs.microsoft.com/en-us/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
…AND A FEW OTHERS
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
• SMB hardening for SYSVOL and NETLOGON shares
– Client connections to the ADDS default SYSVOL and NETLOGON shares now require SMB signing and
mutual authentication (such as Kerberos)
• Protected Processes
– Help prevent one process from tampering with another (specially signed) process
• Universal Windows apps protections
– Apps are carefully screened before being made available
– They run in an AppContainer sandbox with limited privileges
• Heap protections
– Improvements in the use of internal data structures which help protect against corruption of memory
used by the heap
• Control Flow Guard (CFG)
– Helps mitigate exploits that are based on flow between code locations in memory
• Structured Exception Handling Overwrite Protection (SEHOP)
– Complements DEP and ASLR
• Kernel pool protections
– Help prevent exploitation of pool memory used by the kernel
Windows 10 mitigations against memory exploits
More: https://docs.microsoft.com/en-us/windows/threat-protection/overview-of-threat-mitigations-in-windows-10
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
• Windows Defender SmartScreen
– Checks the reputation of all downloaded apps
• Code Integrity
– Ensure that only permitted binaries can be executed from the moment the OS is booted
• Enterprise Certificate Pinning
– Protect internal domain names from chaining to fraudulent certificates
• Early Launch Anti Malware (ELAM)
– Blocks driver-based rootkits
• Guarded Fabric
– Shielded VMs, VSM, Hypervisor Code Integrity (HVCI)
• Windows Defender Advanced Threat Protection (WDATP)
• Advanced Threat Analytics (ATA)
Several other improvements
More: https://docs.microsoft.com/en-us/windows/threat-protection/overview-of-threat-mitigations-in-windows-10
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
You might also want to take a look at…
…my ITCamp session from last year ☺
Talking about Guarded Fabric, Microsoft ATA, WDATP & more
@ITCAMPRO #ITCAMP17Community Conference for IT Professionals
Q & A

Weitere ähnliche Inhalte

Was ist angesagt?

Docker adventures in Continuous Delivery - Alex Vranceanu
Docker adventures in Continuous Delivery - Alex VranceanuDocker adventures in Continuous Delivery - Alex Vranceanu
Docker adventures in Continuous Delivery - Alex VranceanuITCamp
 
Scaling face recognition with big data - Bogdan Bocse
 Scaling face recognition with big data - Bogdan Bocse Scaling face recognition with big data - Bogdan Bocse
Scaling face recognition with big data - Bogdan BocseITCamp
 
ITCamp 2017 - Raffaele Rialdi - A Deep Dive Into Bridging Node-js with .NET Core
ITCamp 2017 - Raffaele Rialdi - A Deep Dive Into Bridging Node-js with .NET CoreITCamp 2017 - Raffaele Rialdi - A Deep Dive Into Bridging Node-js with .NET Core
ITCamp 2017 - Raffaele Rialdi - A Deep Dive Into Bridging Node-js with .NET CoreITCamp
 
The Vision of Computer Vision: The bold promise of teaching computers to unde...
The Vision of Computer Vision: The bold promise of teaching computers to unde...The Vision of Computer Vision: The bold promise of teaching computers to unde...
The Vision of Computer Vision: The bold promise of teaching computers to unde...ITCamp
 
ITCamp 2017 - Florin Coros - Decide between In-Process or Inter-Processes Com...
ITCamp 2017 - Florin Coros - Decide between In-Process or Inter-Processes Com...ITCamp 2017 - Florin Coros - Decide between In-Process or Inter-Processes Com...
ITCamp 2017 - Florin Coros - Decide between In-Process or Inter-Processes Com...ITCamp
 
Migrating to Continuous Delivery with TFS 2017 - Liviu Mandras-Iura
 Migrating to Continuous Delivery with TFS 2017 - Liviu Mandras-Iura Migrating to Continuous Delivery with TFS 2017 - Liviu Mandras-Iura
Migrating to Continuous Delivery with TFS 2017 - Liviu Mandras-IuraITCamp
 
How to Start-up a Start-up - Mihail Rotenberg
 How to Start-up a Start-up - Mihail Rotenberg How to Start-up a Start-up - Mihail Rotenberg
How to Start-up a Start-up - Mihail RotenbergITCamp
 
Azure tales: a real world CQRS and ES Deep Dive - Andrea Saltarello
Azure tales: a real world CQRS and ES Deep Dive - Andrea SaltarelloAzure tales: a real world CQRS and ES Deep Dive - Andrea Saltarello
Azure tales: a real world CQRS and ES Deep Dive - Andrea SaltarelloITCamp
 
ITCamp 2017 - Laurent Ellerbach - Bot. You said bot? Let's build a bot then...
ITCamp 2017 - Laurent Ellerbach - Bot. You said bot? Let's build a bot then...ITCamp 2017 - Laurent Ellerbach - Bot. You said bot? Let's build a bot then...
ITCamp 2017 - Laurent Ellerbach - Bot. You said bot? Let's build a bot then...ITCamp
 
Everyone Loves Docker Containers Before They Understand Docker Containers - A...
Everyone Loves Docker Containers Before They Understand Docker Containers - A...Everyone Loves Docker Containers Before They Understand Docker Containers - A...
Everyone Loves Docker Containers Before They Understand Docker Containers - A...ITCamp
 
BUILD with Microsoft - Radu Stefan
 BUILD with Microsoft - Radu Stefan BUILD with Microsoft - Radu Stefan
BUILD with Microsoft - Radu StefanITCamp
 
A new world of possibilities for contextual awareness with beacons - Dan Arde...
A new world of possibilities for contextual awareness with beacons - Dan Arde...A new world of possibilities for contextual awareness with beacons - Dan Arde...
A new world of possibilities for contextual awareness with beacons - Dan Arde...ITCamp
 
The best of Hyper-V 2016 - Thomas Maurer
 The best of Hyper-V 2016 - Thomas Maurer The best of Hyper-V 2016 - Thomas Maurer
The best of Hyper-V 2016 - Thomas MaurerITCamp
 
Windows 10 Creators Update: what’s on tap for business users - Ionut Balan
Windows 10 Creators Update: what’s on tap for business users - Ionut BalanWindows 10 Creators Update: what’s on tap for business users - Ionut Balan
Windows 10 Creators Update: what’s on tap for business users - Ionut BalanITCamp
 
ITCamp 2017 - Raffaele Rialdi - Adopting .NET Core in Mainstream Projects
ITCamp 2017 - Raffaele Rialdi - Adopting .NET Core in Mainstream ProjectsITCamp 2017 - Raffaele Rialdi - Adopting .NET Core in Mainstream Projects
ITCamp 2017 - Raffaele Rialdi - Adopting .NET Core in Mainstream ProjectsITCamp
 
Creating Web and Mobile Apps with Angular 2 - George Saadeh
Creating Web and Mobile Apps with Angular 2 - George SaadehCreating Web and Mobile Apps with Angular 2 - George Saadeh
Creating Web and Mobile Apps with Angular 2 - George SaadehITCamp
 
The Microsoft Cloud and Server Strategy - Ben Armstrong
The Microsoft Cloud and Server Strategy - Ben ArmstrongThe Microsoft Cloud and Server Strategy - Ben Armstrong
The Microsoft Cloud and Server Strategy - Ben ArmstrongITCamp
 
Enacting Scrum - What it takes to maximize the chances for a successful adopt...
Enacting Scrum - What it takes to maximize the chances for a successful adopt...Enacting Scrum - What it takes to maximize the chances for a successful adopt...
Enacting Scrum - What it takes to maximize the chances for a successful adopt...ITCamp
 
Suddenly Reality - Peter Leeson
Suddenly Reality - Peter LeesonSuddenly Reality - Peter Leeson
Suddenly Reality - Peter LeesonITCamp
 
Building and Managing your Virtual Datacenter using PowerShell DSC - Florin L...
Building and Managing your Virtual Datacenter using PowerShell DSC - Florin L...Building and Managing your Virtual Datacenter using PowerShell DSC - Florin L...
Building and Managing your Virtual Datacenter using PowerShell DSC - Florin L...ITCamp
 

Was ist angesagt? (20)

Docker adventures in Continuous Delivery - Alex Vranceanu
Docker adventures in Continuous Delivery - Alex VranceanuDocker adventures in Continuous Delivery - Alex Vranceanu
Docker adventures in Continuous Delivery - Alex Vranceanu
 
Scaling face recognition with big data - Bogdan Bocse
 Scaling face recognition with big data - Bogdan Bocse Scaling face recognition with big data - Bogdan Bocse
Scaling face recognition with big data - Bogdan Bocse
 
ITCamp 2017 - Raffaele Rialdi - A Deep Dive Into Bridging Node-js with .NET Core
ITCamp 2017 - Raffaele Rialdi - A Deep Dive Into Bridging Node-js with .NET CoreITCamp 2017 - Raffaele Rialdi - A Deep Dive Into Bridging Node-js with .NET Core
ITCamp 2017 - Raffaele Rialdi - A Deep Dive Into Bridging Node-js with .NET Core
 
The Vision of Computer Vision: The bold promise of teaching computers to unde...
The Vision of Computer Vision: The bold promise of teaching computers to unde...The Vision of Computer Vision: The bold promise of teaching computers to unde...
The Vision of Computer Vision: The bold promise of teaching computers to unde...
 
ITCamp 2017 - Florin Coros - Decide between In-Process or Inter-Processes Com...
ITCamp 2017 - Florin Coros - Decide between In-Process or Inter-Processes Com...ITCamp 2017 - Florin Coros - Decide between In-Process or Inter-Processes Com...
ITCamp 2017 - Florin Coros - Decide between In-Process or Inter-Processes Com...
 
Migrating to Continuous Delivery with TFS 2017 - Liviu Mandras-Iura
 Migrating to Continuous Delivery with TFS 2017 - Liviu Mandras-Iura Migrating to Continuous Delivery with TFS 2017 - Liviu Mandras-Iura
Migrating to Continuous Delivery with TFS 2017 - Liviu Mandras-Iura
 
How to Start-up a Start-up - Mihail Rotenberg
 How to Start-up a Start-up - Mihail Rotenberg How to Start-up a Start-up - Mihail Rotenberg
How to Start-up a Start-up - Mihail Rotenberg
 
Azure tales: a real world CQRS and ES Deep Dive - Andrea Saltarello
Azure tales: a real world CQRS and ES Deep Dive - Andrea SaltarelloAzure tales: a real world CQRS and ES Deep Dive - Andrea Saltarello
Azure tales: a real world CQRS and ES Deep Dive - Andrea Saltarello
 
ITCamp 2017 - Laurent Ellerbach - Bot. You said bot? Let's build a bot then...
ITCamp 2017 - Laurent Ellerbach - Bot. You said bot? Let's build a bot then...ITCamp 2017 - Laurent Ellerbach - Bot. You said bot? Let's build a bot then...
ITCamp 2017 - Laurent Ellerbach - Bot. You said bot? Let's build a bot then...
 
Everyone Loves Docker Containers Before They Understand Docker Containers - A...
Everyone Loves Docker Containers Before They Understand Docker Containers - A...Everyone Loves Docker Containers Before They Understand Docker Containers - A...
Everyone Loves Docker Containers Before They Understand Docker Containers - A...
 
BUILD with Microsoft - Radu Stefan
 BUILD with Microsoft - Radu Stefan BUILD with Microsoft - Radu Stefan
BUILD with Microsoft - Radu Stefan
 
A new world of possibilities for contextual awareness with beacons - Dan Arde...
A new world of possibilities for contextual awareness with beacons - Dan Arde...A new world of possibilities for contextual awareness with beacons - Dan Arde...
A new world of possibilities for contextual awareness with beacons - Dan Arde...
 
The best of Hyper-V 2016 - Thomas Maurer
 The best of Hyper-V 2016 - Thomas Maurer The best of Hyper-V 2016 - Thomas Maurer
The best of Hyper-V 2016 - Thomas Maurer
 
Windows 10 Creators Update: what’s on tap for business users - Ionut Balan
Windows 10 Creators Update: what’s on tap for business users - Ionut BalanWindows 10 Creators Update: what’s on tap for business users - Ionut Balan
Windows 10 Creators Update: what’s on tap for business users - Ionut Balan
 
ITCamp 2017 - Raffaele Rialdi - Adopting .NET Core in Mainstream Projects
ITCamp 2017 - Raffaele Rialdi - Adopting .NET Core in Mainstream ProjectsITCamp 2017 - Raffaele Rialdi - Adopting .NET Core in Mainstream Projects
ITCamp 2017 - Raffaele Rialdi - Adopting .NET Core in Mainstream Projects
 
Creating Web and Mobile Apps with Angular 2 - George Saadeh
Creating Web and Mobile Apps with Angular 2 - George SaadehCreating Web and Mobile Apps with Angular 2 - George Saadeh
Creating Web and Mobile Apps with Angular 2 - George Saadeh
 
The Microsoft Cloud and Server Strategy - Ben Armstrong
The Microsoft Cloud and Server Strategy - Ben ArmstrongThe Microsoft Cloud and Server Strategy - Ben Armstrong
The Microsoft Cloud and Server Strategy - Ben Armstrong
 
Enacting Scrum - What it takes to maximize the chances for a successful adopt...
Enacting Scrum - What it takes to maximize the chances for a successful adopt...Enacting Scrum - What it takes to maximize the chances for a successful adopt...
Enacting Scrum - What it takes to maximize the chances for a successful adopt...
 
Suddenly Reality - Peter Leeson
Suddenly Reality - Peter LeesonSuddenly Reality - Peter Leeson
Suddenly Reality - Peter Leeson
 
Building and Managing your Virtual Datacenter using PowerShell DSC - Florin L...
Building and Managing your Virtual Datacenter using PowerShell DSC - Florin L...Building and Managing your Virtual Datacenter using PowerShell DSC - Florin L...
Building and Managing your Virtual Datacenter using PowerShell DSC - Florin L...
 

Andere mochten auch

Xamarin Under The Hood - Dan Ardelean
 Xamarin Under The Hood - Dan Ardelean Xamarin Under The Hood - Dan Ardelean
Xamarin Under The Hood - Dan ArdeleanITCamp
 
Provisioning Windows instances at scale on Azure, AWS and OpenStack - Adrian ...
Provisioning Windows instances at scale on Azure, AWS and OpenStack - Adrian ...Provisioning Windows instances at scale on Azure, AWS and OpenStack - Adrian ...
Provisioning Windows instances at scale on Azure, AWS and OpenStack - Adrian ...ITCamp
 
Kubernetes - Cloud Native Application Orchestration - Catalin Jora
Kubernetes - Cloud Native Application Orchestration - Catalin JoraKubernetes - Cloud Native Application Orchestration - Catalin Jora
Kubernetes - Cloud Native Application Orchestration - Catalin JoraITCamp
 
Storage Spaces Direct - the new Microsoft SDS star - Carsten Rachfahl
Storage Spaces Direct - the new Microsoft SDS star - Carsten RachfahlStorage Spaces Direct - the new Microsoft SDS star - Carsten Rachfahl
Storage Spaces Direct - the new Microsoft SDS star - Carsten RachfahlITCamp
 
ITCamp 2017 - Ciprian Sorlea - Fostering Heroes
ITCamp 2017 - Ciprian Sorlea - Fostering HeroesITCamp 2017 - Ciprian Sorlea - Fostering Heroes
ITCamp 2017 - Ciprian Sorlea - Fostering HeroesITCamp
 
7 Habits of Highly Paid Developers - Gaines Kergosien
7 Habits of Highly Paid Developers - Gaines Kergosien7 Habits of Highly Paid Developers - Gaines Kergosien
7 Habits of Highly Paid Developers - Gaines KergosienITCamp
 
Strategies for securing your banks & enterprises (from someone who robs bank...
 Strategies for securing your banks & enterprises (from someone who robs bank... Strategies for securing your banks & enterprises (from someone who robs bank...
Strategies for securing your banks & enterprises (from someone who robs bank...ITCamp
 
Assembly of Japanese bicycle requires peace of mind - Peter Leeson
 Assembly of Japanese bicycle requires peace of mind - Peter Leeson Assembly of Japanese bicycle requires peace of mind - Peter Leeson
Assembly of Japanese bicycle requires peace of mind - Peter LeesonITCamp
 
Building Powerful Applications with AngularJS 2 and TypeScript - David Giard
Building Powerful Applications with AngularJS 2 and TypeScript - David GiardBuilding Powerful Applications with AngularJS 2 and TypeScript - David Giard
Building Powerful Applications with AngularJS 2 and TypeScript - David GiardITCamp
 
The Secret of Engaging Presentations - Boris Hristov
The Secret of Engaging Presentations - Boris HristovThe Secret of Engaging Presentations - Boris Hristov
The Secret of Engaging Presentations - Boris HristovITCamp
 
Big Data Solutions in Azure - David Giard
Big Data Solutions in Azure - David GiardBig Data Solutions in Azure - David Giard
Big Data Solutions in Azure - David GiardITCamp
 
Forget Process, Focus on People - Peter Leeson
Forget Process, Focus on People - Peter LeesonForget Process, Focus on People - Peter Leeson
Forget Process, Focus on People - Peter LeesonITCamp
 

Andere mochten auch (12)

Xamarin Under The Hood - Dan Ardelean
 Xamarin Under The Hood - Dan Ardelean Xamarin Under The Hood - Dan Ardelean
Xamarin Under The Hood - Dan Ardelean
 
Provisioning Windows instances at scale on Azure, AWS and OpenStack - Adrian ...
Provisioning Windows instances at scale on Azure, AWS and OpenStack - Adrian ...Provisioning Windows instances at scale on Azure, AWS and OpenStack - Adrian ...
Provisioning Windows instances at scale on Azure, AWS and OpenStack - Adrian ...
 
Kubernetes - Cloud Native Application Orchestration - Catalin Jora
Kubernetes - Cloud Native Application Orchestration - Catalin JoraKubernetes - Cloud Native Application Orchestration - Catalin Jora
Kubernetes - Cloud Native Application Orchestration - Catalin Jora
 
Storage Spaces Direct - the new Microsoft SDS star - Carsten Rachfahl
Storage Spaces Direct - the new Microsoft SDS star - Carsten RachfahlStorage Spaces Direct - the new Microsoft SDS star - Carsten Rachfahl
Storage Spaces Direct - the new Microsoft SDS star - Carsten Rachfahl
 
ITCamp 2017 - Ciprian Sorlea - Fostering Heroes
ITCamp 2017 - Ciprian Sorlea - Fostering HeroesITCamp 2017 - Ciprian Sorlea - Fostering Heroes
ITCamp 2017 - Ciprian Sorlea - Fostering Heroes
 
7 Habits of Highly Paid Developers - Gaines Kergosien
7 Habits of Highly Paid Developers - Gaines Kergosien7 Habits of Highly Paid Developers - Gaines Kergosien
7 Habits of Highly Paid Developers - Gaines Kergosien
 
Strategies for securing your banks & enterprises (from someone who robs bank...
 Strategies for securing your banks & enterprises (from someone who robs bank... Strategies for securing your banks & enterprises (from someone who robs bank...
Strategies for securing your banks & enterprises (from someone who robs bank...
 
Assembly of Japanese bicycle requires peace of mind - Peter Leeson
 Assembly of Japanese bicycle requires peace of mind - Peter Leeson Assembly of Japanese bicycle requires peace of mind - Peter Leeson
Assembly of Japanese bicycle requires peace of mind - Peter Leeson
 
Building Powerful Applications with AngularJS 2 and TypeScript - David Giard
Building Powerful Applications with AngularJS 2 and TypeScript - David GiardBuilding Powerful Applications with AngularJS 2 and TypeScript - David Giard
Building Powerful Applications with AngularJS 2 and TypeScript - David Giard
 
The Secret of Engaging Presentations - Boris Hristov
The Secret of Engaging Presentations - Boris HristovThe Secret of Engaging Presentations - Boris Hristov
The Secret of Engaging Presentations - Boris Hristov
 
Big Data Solutions in Azure - David Giard
Big Data Solutions in Azure - David GiardBig Data Solutions in Azure - David Giard
Big Data Solutions in Azure - David Giard
 
Forget Process, Focus on People - Peter Leeson
Forget Process, Focus on People - Peter LeesonForget Process, Focus on People - Peter Leeson
Forget Process, Focus on People - Peter Leeson
 

Ähnlich wie Modern cybersecurity threats, and shiny new tools to help deal with them - Tudor Damian

2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor DamianITCamp
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud SecurityTudor Damian
 
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)ITCamp
 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersFeisal Nanji
 
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...ITCamp
 
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.ITCamp
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsLabSharegroup
 
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMElasticsearch
 
CompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsCompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsZeshan Sattar
 
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...NetworkCollaborators
 
Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?MarketingArrowECS_CZ
 
ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!
ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!
ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!ITCamp
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloudUlf Mattsson
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...WSO2
 
Tech Refresh - Ambient Computing and the IT "new normal"
Tech Refresh - Ambient Computing and the IT "new normal"Tech Refresh - Ambient Computing and the IT "new normal"
Tech Refresh - Ambient Computing and the IT "new normal"CompTIA
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsReal-Time Innovations (RTI)
 
ITCamp 2019 - Mihai Tataran - Governing your Cloud Resources
ITCamp 2019 - Mihai Tataran - Governing your Cloud ResourcesITCamp 2019 - Mihai Tataran - Governing your Cloud Resources
ITCamp 2019 - Mihai Tataran - Governing your Cloud ResourcesITCamp
 

Ähnlich wie Modern cybersecurity threats, and shiny new tools to help deal with them - Tudor Damian (20)

2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
 
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care Providers
 
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
 
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
 
CompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsCompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity Apprenticeships
 
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
 
Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?
 
ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!
ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!
ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloud
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
 
Tech Refresh - Ambient Computing and the IT "new normal"
Tech Refresh - Ambient Computing and the IT "new normal"Tech Refresh - Ambient Computing and the IT "new normal"
Tech Refresh - Ambient Computing and the IT "new normal"
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and Solutions
 
SACON Orientation
SACON OrientationSACON Orientation
SACON Orientation
 
ITCamp 2019 - Mihai Tataran - Governing your Cloud Resources
ITCamp 2019 - Mihai Tataran - Governing your Cloud ResourcesITCamp 2019 - Mihai Tataran - Governing your Cloud Resources
ITCamp 2019 - Mihai Tataran - Governing your Cloud Resources
 

Mehr von ITCamp

ITCamp 2019 - Stacey M. Jenkins - Protecting your company's data - By psychol...
ITCamp 2019 - Stacey M. Jenkins - Protecting your company's data - By psychol...ITCamp 2019 - Stacey M. Jenkins - Protecting your company's data - By psychol...
ITCamp 2019 - Stacey M. Jenkins - Protecting your company's data - By psychol...ITCamp
 
ITCamp 2019 - Silviu Niculita - Supercharge your AI efforts with the use of A...
ITCamp 2019 - Silviu Niculita - Supercharge your AI efforts with the use of A...ITCamp 2019 - Silviu Niculita - Supercharge your AI efforts with the use of A...
ITCamp 2019 - Silviu Niculita - Supercharge your AI efforts with the use of A...ITCamp
 
ITCamp 2019 - Peter Leeson - Managing Skills
ITCamp 2019 - Peter Leeson - Managing SkillsITCamp 2019 - Peter Leeson - Managing Skills
ITCamp 2019 - Peter Leeson - Managing SkillsITCamp
 
ITCamp 2019 - Ivana Milicic - Color - The Shadow Ruler of UX
ITCamp 2019 - Ivana Milicic - Color - The Shadow Ruler of UXITCamp 2019 - Ivana Milicic - Color - The Shadow Ruler of UX
ITCamp 2019 - Ivana Milicic - Color - The Shadow Ruler of UXITCamp
 
ITCamp 2019 - Florin Coros - Implementing Clean Architecture
ITCamp 2019 - Florin Coros - Implementing Clean ArchitectureITCamp 2019 - Florin Coros - Implementing Clean Architecture
ITCamp 2019 - Florin Coros - Implementing Clean ArchitectureITCamp
 
ITCamp 2019 - Florin Loghiade - Azure Kubernetes in Production - Field notes...
ITCamp 2019 - Florin Loghiade -  Azure Kubernetes in Production - Field notes...ITCamp 2019 - Florin Loghiade -  Azure Kubernetes in Production - Field notes...
ITCamp 2019 - Florin Loghiade - Azure Kubernetes in Production - Field notes...ITCamp
 
ITCamp 2019 - Florin Flestea - How 3rd Level support experience influenced m...
ITCamp 2019 - Florin Flestea -  How 3rd Level support experience influenced m...ITCamp 2019 - Florin Flestea -  How 3rd Level support experience influenced m...
ITCamp 2019 - Florin Flestea - How 3rd Level support experience influenced m...ITCamp
 
ITCamp 2019 - Emil Craciun - RoboRestaurant of the future powered by serverle...
ITCamp 2019 - Emil Craciun - RoboRestaurant of the future powered by serverle...ITCamp 2019 - Emil Craciun - RoboRestaurant of the future powered by serverle...
ITCamp 2019 - Emil Craciun - RoboRestaurant of the future powered by serverle...ITCamp
 
ITCamp 2019 - Eldert Grootenboer - Cloud Architecture Recipes for The Enterprise
ITCamp 2019 - Eldert Grootenboer - Cloud Architecture Recipes for The EnterpriseITCamp 2019 - Eldert Grootenboer - Cloud Architecture Recipes for The Enterprise
ITCamp 2019 - Eldert Grootenboer - Cloud Architecture Recipes for The EnterpriseITCamp
 
ITCamp 2019 - Cristiana Fernbach - Blockchain Legal Trends
ITCamp 2019 - Cristiana Fernbach - Blockchain Legal TrendsITCamp 2019 - Cristiana Fernbach - Blockchain Legal Trends
ITCamp 2019 - Cristiana Fernbach - Blockchain Legal TrendsITCamp
 
ITCamp 2019 - Andy Cross - Machine Learning with ML.NET and Azure Data Lake
ITCamp 2019 - Andy Cross - Machine Learning with ML.NET and Azure Data LakeITCamp 2019 - Andy Cross - Machine Learning with ML.NET and Azure Data Lake
ITCamp 2019 - Andy Cross - Machine Learning with ML.NET and Azure Data LakeITCamp
 
ITCamp 2019 - Andy Cross - Business Outcomes from AI
ITCamp 2019 - Andy Cross - Business Outcomes from AIITCamp 2019 - Andy Cross - Business Outcomes from AI
ITCamp 2019 - Andy Cross - Business Outcomes from AIITCamp
 
ITCamp 2019 - Andrea Saltarello - Modernise your app. The Cloud Story
ITCamp 2019 - Andrea Saltarello - Modernise your app. The Cloud StoryITCamp 2019 - Andrea Saltarello - Modernise your app. The Cloud Story
ITCamp 2019 - Andrea Saltarello - Modernise your app. The Cloud StoryITCamp
 
ITCamp 2019 - Andrea Saltarello - Implementing bots and Alexa skills using Az...
ITCamp 2019 - Andrea Saltarello - Implementing bots and Alexa skills using Az...ITCamp 2019 - Andrea Saltarello - Implementing bots and Alexa skills using Az...
ITCamp 2019 - Andrea Saltarello - Implementing bots and Alexa skills using Az...ITCamp
 
ITCamp 2019 - Alex Mang - I'm Confused Should I Orchestrate my Containers on ...
ITCamp 2019 - Alex Mang - I'm Confused Should I Orchestrate my Containers on ...ITCamp 2019 - Alex Mang - I'm Confused Should I Orchestrate my Containers on ...
ITCamp 2019 - Alex Mang - I'm Confused Should I Orchestrate my Containers on ...ITCamp
 
ITCamp 2019 - Alex Mang - How Far Can Serverless Actually Go Now
ITCamp 2019 - Alex Mang - How Far Can Serverless Actually Go NowITCamp 2019 - Alex Mang - How Far Can Serverless Actually Go Now
ITCamp 2019 - Alex Mang - How Far Can Serverless Actually Go NowITCamp
 
ITCamp 2019 - Peter Leeson - Vitruvian Quality
ITCamp 2019 - Peter Leeson - Vitruvian QualityITCamp 2019 - Peter Leeson - Vitruvian Quality
ITCamp 2019 - Peter Leeson - Vitruvian QualityITCamp
 
ITCamp 2018 - Ciprian Sorlea - Million Dollars Hello World Application
ITCamp 2018 - Ciprian Sorlea - Million Dollars Hello World ApplicationITCamp 2018 - Ciprian Sorlea - Million Dollars Hello World Application
ITCamp 2018 - Ciprian Sorlea - Million Dollars Hello World ApplicationITCamp
 
ITCamp 2018 - Ciprian Sorlea - Enterprise Architectures with TypeScript And F...
ITCamp 2018 - Ciprian Sorlea - Enterprise Architectures with TypeScript And F...ITCamp 2018 - Ciprian Sorlea - Enterprise Architectures with TypeScript And F...
ITCamp 2018 - Ciprian Sorlea - Enterprise Architectures with TypeScript And F...ITCamp
 
ITCamp 2018 - Mete Atamel Ian Talarico - Google Home meets .NET containers on...
ITCamp 2018 - Mete Atamel Ian Talarico - Google Home meets .NET containers on...ITCamp 2018 - Mete Atamel Ian Talarico - Google Home meets .NET containers on...
ITCamp 2018 - Mete Atamel Ian Talarico - Google Home meets .NET containers on...ITCamp
 

Mehr von ITCamp (20)

ITCamp 2019 - Stacey M. Jenkins - Protecting your company's data - By psychol...
ITCamp 2019 - Stacey M. Jenkins - Protecting your company's data - By psychol...ITCamp 2019 - Stacey M. Jenkins - Protecting your company's data - By psychol...
ITCamp 2019 - Stacey M. Jenkins - Protecting your company's data - By psychol...
 
ITCamp 2019 - Silviu Niculita - Supercharge your AI efforts with the use of A...
ITCamp 2019 - Silviu Niculita - Supercharge your AI efforts with the use of A...ITCamp 2019 - Silviu Niculita - Supercharge your AI efforts with the use of A...
ITCamp 2019 - Silviu Niculita - Supercharge your AI efforts with the use of A...
 
ITCamp 2019 - Peter Leeson - Managing Skills
ITCamp 2019 - Peter Leeson - Managing SkillsITCamp 2019 - Peter Leeson - Managing Skills
ITCamp 2019 - Peter Leeson - Managing Skills
 
ITCamp 2019 - Ivana Milicic - Color - The Shadow Ruler of UX
ITCamp 2019 - Ivana Milicic - Color - The Shadow Ruler of UXITCamp 2019 - Ivana Milicic - Color - The Shadow Ruler of UX
ITCamp 2019 - Ivana Milicic - Color - The Shadow Ruler of UX
 
ITCamp 2019 - Florin Coros - Implementing Clean Architecture
ITCamp 2019 - Florin Coros - Implementing Clean ArchitectureITCamp 2019 - Florin Coros - Implementing Clean Architecture
ITCamp 2019 - Florin Coros - Implementing Clean Architecture
 
ITCamp 2019 - Florin Loghiade - Azure Kubernetes in Production - Field notes...
ITCamp 2019 - Florin Loghiade -  Azure Kubernetes in Production - Field notes...ITCamp 2019 - Florin Loghiade -  Azure Kubernetes in Production - Field notes...
ITCamp 2019 - Florin Loghiade - Azure Kubernetes in Production - Field notes...
 
ITCamp 2019 - Florin Flestea - How 3rd Level support experience influenced m...
ITCamp 2019 - Florin Flestea -  How 3rd Level support experience influenced m...ITCamp 2019 - Florin Flestea -  How 3rd Level support experience influenced m...
ITCamp 2019 - Florin Flestea - How 3rd Level support experience influenced m...
 
ITCamp 2019 - Emil Craciun - RoboRestaurant of the future powered by serverle...
ITCamp 2019 - Emil Craciun - RoboRestaurant of the future powered by serverle...ITCamp 2019 - Emil Craciun - RoboRestaurant of the future powered by serverle...
ITCamp 2019 - Emil Craciun - RoboRestaurant of the future powered by serverle...
 
ITCamp 2019 - Eldert Grootenboer - Cloud Architecture Recipes for The Enterprise
ITCamp 2019 - Eldert Grootenboer - Cloud Architecture Recipes for The EnterpriseITCamp 2019 - Eldert Grootenboer - Cloud Architecture Recipes for The Enterprise
ITCamp 2019 - Eldert Grootenboer - Cloud Architecture Recipes for The Enterprise
 
ITCamp 2019 - Cristiana Fernbach - Blockchain Legal Trends
ITCamp 2019 - Cristiana Fernbach - Blockchain Legal TrendsITCamp 2019 - Cristiana Fernbach - Blockchain Legal Trends
ITCamp 2019 - Cristiana Fernbach - Blockchain Legal Trends
 
ITCamp 2019 - Andy Cross - Machine Learning with ML.NET and Azure Data Lake
ITCamp 2019 - Andy Cross - Machine Learning with ML.NET and Azure Data LakeITCamp 2019 - Andy Cross - Machine Learning with ML.NET and Azure Data Lake
ITCamp 2019 - Andy Cross - Machine Learning with ML.NET and Azure Data Lake
 
ITCamp 2019 - Andy Cross - Business Outcomes from AI
ITCamp 2019 - Andy Cross - Business Outcomes from AIITCamp 2019 - Andy Cross - Business Outcomes from AI
ITCamp 2019 - Andy Cross - Business Outcomes from AI
 
ITCamp 2019 - Andrea Saltarello - Modernise your app. The Cloud Story
ITCamp 2019 - Andrea Saltarello - Modernise your app. The Cloud StoryITCamp 2019 - Andrea Saltarello - Modernise your app. The Cloud Story
ITCamp 2019 - Andrea Saltarello - Modernise your app. The Cloud Story
 
ITCamp 2019 - Andrea Saltarello - Implementing bots and Alexa skills using Az...
ITCamp 2019 - Andrea Saltarello - Implementing bots and Alexa skills using Az...ITCamp 2019 - Andrea Saltarello - Implementing bots and Alexa skills using Az...
ITCamp 2019 - Andrea Saltarello - Implementing bots and Alexa skills using Az...
 
ITCamp 2019 - Alex Mang - I'm Confused Should I Orchestrate my Containers on ...
ITCamp 2019 - Alex Mang - I'm Confused Should I Orchestrate my Containers on ...ITCamp 2019 - Alex Mang - I'm Confused Should I Orchestrate my Containers on ...
ITCamp 2019 - Alex Mang - I'm Confused Should I Orchestrate my Containers on ...
 
ITCamp 2019 - Alex Mang - How Far Can Serverless Actually Go Now
ITCamp 2019 - Alex Mang - How Far Can Serverless Actually Go NowITCamp 2019 - Alex Mang - How Far Can Serverless Actually Go Now
ITCamp 2019 - Alex Mang - How Far Can Serverless Actually Go Now
 
ITCamp 2019 - Peter Leeson - Vitruvian Quality
ITCamp 2019 - Peter Leeson - Vitruvian QualityITCamp 2019 - Peter Leeson - Vitruvian Quality
ITCamp 2019 - Peter Leeson - Vitruvian Quality
 
ITCamp 2018 - Ciprian Sorlea - Million Dollars Hello World Application
ITCamp 2018 - Ciprian Sorlea - Million Dollars Hello World ApplicationITCamp 2018 - Ciprian Sorlea - Million Dollars Hello World Application
ITCamp 2018 - Ciprian Sorlea - Million Dollars Hello World Application
 
ITCamp 2018 - Ciprian Sorlea - Enterprise Architectures with TypeScript And F...
ITCamp 2018 - Ciprian Sorlea - Enterprise Architectures with TypeScript And F...ITCamp 2018 - Ciprian Sorlea - Enterprise Architectures with TypeScript And F...
ITCamp 2018 - Ciprian Sorlea - Enterprise Architectures with TypeScript And F...
 
ITCamp 2018 - Mete Atamel Ian Talarico - Google Home meets .NET containers on...
ITCamp 2018 - Mete Atamel Ian Talarico - Google Home meets .NET containers on...ITCamp 2018 - Mete Atamel Ian Talarico - Google Home meets .NET containers on...
ITCamp 2018 - Mete Atamel Ian Talarico - Google Home meets .NET containers on...
 

Kürzlich hochgeladen

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Modern cybersecurity threats, and shiny new tools to help deal with them - Tudor Damian

  • 1. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals Modern cybersecurity threats, and shiny new tools to help deal with them Microsoft Cloud & Datacenter Management MVP, Certified Ethical Hacker Executive Manager at Avaelgo (IT Advisory, Managed Services, Training) Contact: tudor.damian@avaelgo.ro / @tudydamian / tudy.tel Tudor Damian
  • 2. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals Many thanks to our sponsors & partners! GOLD SILVER PARTNERS PLATINUM POWERED BY
  • 3. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals VIDEO – ANATOMY OF AN ATTACK Source: CISCO
  • 5. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals CURRENT STATE OF CYBERSECURITY
  • 6. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals The effects of WannaCry and EternalRocks
  • 7. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals Your systems’ security is as strong as its weakest link
  • 8. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals • A steady increase in companies targeted by Social Engineering attacks (60% in 2016, and growing) • Data theft turning into data manipulation • Attackers targeting consumer & IoT devices (e.g. Mirai botnet) • Ransomware on the rise (e.g. WannaCry) • Breaches getting more complicated and harder to detect • 70% of companies will experience cyber attacks by 2018 (IDC) • Through 2020, 99% of vulnerabilities exploited will continue to be the ones known by IT professionals for at least one year (Gartner) • Cyber risk insurance is more needed than ever A changing security landscape
  • 9. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals Myspace Fling LinkedIn Sony VK.com Dropbox Tumblr Yahoo Equation Group Shadow Brokers Punycode BadUSB Superfish Heartbleed Shellshock Karmen POODLE FREAK GHOST DROWN Dirty COW STAGEFRIGHT QuadRooter XCodeGhost Mirai Carbanak Gemalto SS7 Locky DMA Locker Surprise Ranscam SWIFT Weebly Sundown CrypMIC TrickBot Angler RIG Neutrino xDedic BlackEnergy ProjectSauron Adwind Danti SVCMONDR Lazarus FruityArmor ScarCruft Lurk Ammyy Admin Chinastrats Patchwork TeslaCrypt 2016 – the year of hacks and vulnerabilities
  • 10. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals Secure CheapUsable Choices in building a system/app - pick any two!
  • 11. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals Attack timeline 24–48 hours More than 200 days (varies by industry) First host compromised Domain admin compromised Attack discovered Sources: HP, Ponemon Institute, Verizon
  • 12. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals How much time does security get? An attacker has 24x7x365 to attack you Attacker Schedule Time The defender has 20 (?) man days per year to detect and defend Who has the edge? ☺ Scheduled Pen-Test Scheduled Pen-Test
  • 13. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals • CISCO, 2014 – There are more than 1 million unfilled security jobs worldwide • (ISC)² study, 2015 – A shortfall of 1.5 million security professionals is estimated by 2020 Lack of security professionals worldwide Sources: http://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2014_ASR.pdf http://blog.isc2.org/isc2_blog/2015/04/isc-study-workforce-shortfall-due-to-hiring-difficulties-despite-rising-salaries-increased-budgets-a.html
  • 14. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals • EU General Data Protection Regulation (GDPR) – It will come into effect on May 25th 2018 – GDPR clarifies where responsibility for privacy protection lies with any companies who store, collect, manage and analyze any form of Personally Identifiable Information (PII) – Applies to any organization (including those outside the EU) that holds or processes data from EU residents – Replaces Data Protection Directive (DPD) 95/46/EC to become the single, all- encompassing privacy protection regulation in the EU • Breaches could lead to fines: – Major breaches - up to €20 million or 4% of global annual turnover – Less important breaches - up to €10m or 2% of global annual turnover GDPR is coming! More: http://www.eugdpr.org/
  • 15. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals • Adds some more rights for EU citizens: – Right to be forgotten (ask data controllers to erase all personal data) – Right to data portability (move data from a service provider to another) – Right to object to profiling (not to be subject to a decision based solely on automated processing) • Where do companies store PII data? – Customer Relationship solutions (SalesForce, PeopleSoft, Dynamics) – ERPs (SAP, Oracle, Axapta) – Enterprise Content Management systems, File Shares – Emails, Attachments, Office Documents, PDF files, letters, contracts – SharePoint, Lotus Notes, Dropbox, Box, OneDrive – Employee HR data – etc. More details on GDPR More: http://www.eugdpr.org/
  • 16. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals • We have to stop focusing on preventing a data breach and start assuming the breach has already happened • Currently: a one-sided, purely preventative strategy • Future: emphasis on breach detection, incident response, and effective recovery – Start thinking about the time when a breach will (almost inevitably) occur in your infrastructure – Be prepared for that! Assume Breach - a change in mindset
  • 17. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals A healthier security approach Source: Gartner PREDICT • Proactive Exposure Analysis • Predict Attacks • Baseline Systems PREVENT • Harden and Isolate Systems • Divert Attackers • Prevent Incidents DETECT • Detect Incidents • Confirm and Prioritize • Contain Incidents RESPOND • Investigate/Forensics • Design/Model Change • Remediate/Make Change Continuous Monitoring and Analytics
  • 18. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals WINDOWS 10 & WINDOWS SERVER 2016
  • 19. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals The Windows 10 Defense Stack Device Health attestation Device Guard Device Control Security policies Built-in 2FA Account lockdown Credential Guard Windows Hello ;) Device protection BitLocker Enterprise Data Protection Conditional access SmartScreen AppLocker Device Guard Windows Defender Network/Firewall Windows Defender Advanced Threat Protection (WDATP) Microsoft Advanced Threat Analytics (ATA) Device protection Information protection Threat resistance Breach detection Investigation & Response Pre breach Post breach Identity protection The Windows 10 defense stack
  • 20. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals Some of the security improvements in W10 / WS2016 Windows Defender SmartScreen Credential Guard Enterprise Certificate Pinning Just Enough Administration (JEA) Just-in-time Administration (JIT) Device Guard Structured Exception Handling Overwrite Protection (SEHOP) Control Flow Guard (CFG) Windows Hello In-box Azure MFA Hypervisor- protected code integrity (HVCI) Shielded VMs Host Guardian Service Device Health Attestation (DHA) Network Controller Distributed Firewall Network Security Groups Virtual Appliances Virtual Secure Mode Virtual TPM More: https://docs.microsoft.com/en-us/windows/threat-protection/overview-of-threat-mitigations-in-windows-10
  • 21. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals JEA & JIT
  • 22. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals Challenges in protecting credentials
  • 23. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals Windows Server 2016 approach • Credential Guard – Prevents Pass the Hash and Pass the Ticket attacks by protecting stored credentials through Virtualization-based Security • Just Enough – Administration Limits administrative privileges to the bare-minimum required set of actions (limited in space) • Just in Time – Administration Provide privileged access through a workflow that is audited and limited in time • JEA + JIT – Limitation in time & capability More: https://github.com/PowerShell/JEA & https://docs.microsoft.com/en-us/microsoft-identity-manager/pam/privileged-identity-management-for-active-directory-domain-services
  • 24. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals In box Azure MFA More: https://docs.microsoft.com/en-us/azure/multi-factor-authentication/multi-factor-authentication
  • 25. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals PROTECTING VMS
  • 26. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals Hypervisor Fabric Guest VM Protect virtual machines • Compromised or malicious fabric administrators can access guest VMs • Health of hosts not taken into account before running VMs • Tenant’s VMs are exposed to storage and network attacks • Virtual Machines can’t take advantage of hardware- rooted security capabilities such as TPMs Fabric Hypervisor Guest VM Healthy host? Guest VM
  • 27. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals Windows Server 2016 approach • Shielded VMs – Use BitLocker to encrypt the disk and state of virtual machines protecting secrets from compromised admins & malware • Host Guardian Service – Attests to host health releasing the keys required to boot or migrate a Shielded VM only to healthy hosts • Generation 2 VMs – Supports virtualized equivalents of hardware security technologies (e.g., TPMs) enabling BitLocker encryption for Shielded VMs ✓ ✓  ✓  ✓  ✓  ✓   ✓ ✓ More: https://docs.microsoft.com/en-us/windows-server/virtualization/guarded-fabric-shielded-vm/guarded-fabric-and-shielded-vms-top-node
  • 28. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals Guarded hosts and Shielded VMs attestation • Admin-trusted attestation – Intended to support existing host hardware (no TPM 2.0 available) – Guarded hosts that can run Shielded VMs are approved by the Host Guardian Service based on membership in a designated Active Directory Domain Services (AD DS) security group • TPM-trusted attestation – Offers the strongest possible protections – Requires more configuration steps – Host hardware and firmware must include TPM 2.0 and UEFI 2.3.1 with secure boot enabled – Guarded hosts that can run Shielded VMs are approved based on their TPM identity, measured boot sequence and code integrity policies More: https://docs.microsoft.com/en-us/windows-server/virtualization/guarded-fabric-shielded-vm/guarded-fabric-and-shielded-vms-top-node
  • 29. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals VIRTUAL SECURE MODE
  • 30. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals Virtual Secure Mode Overview
  • 31. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals DEVICE GUARD & CREDENTIAL GUARD
  • 32. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals Device Guard & AppLocker • AppLocker was introduced back in Windows 7 / WS 2008 R2 – Specifies a list of apps allowed to run on a user’s device – Whitelist can be specific to a group or individual within AD – Much more efficient than a blacklist • Device Guard extends AppLocker – Relies on digital signatures – Requires apps to be digitally signed – This includes internal apps • Device Guard Requirements – Intel VT-x or AMD-V extensions – Second Level Address Translation (SLAT) – Intel VT-d or AMD-IOV – TPM (optional, required for Credential Manager) More: https://docs.microsoft.com/en-us/windows/device-security/device-guard/device-guard-deployment-guide
  • 33. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals Device Guard • Hardware Rooted App Control (runs in VSM) – Enables a Windows desktop to be locked down to only run trusted apps, just like many mobile OS’s (e.g.: Windows Phone) – Untrusted apps and executables such as malware are unable to run – Resistant to tampering by an administrator or malware – Requires devices specially configured by either the OEM or IT • Getting Apps into the Circle of Trust – Supports all apps including Universal and Desktop (Win32) – Trusted apps can be created by IHV, ISV, and Organizations using a Microsoft provided signing service – Apps must be specially signed using the Microsoft signing service. No additional modification is required – Signing service made available to OEM’s, IHV, ISV’s, and Enterprises More: https://docs.microsoft.com/en-us/windows/device-security/device-guard/device-guard-deployment-guide
  • 34. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals Credential Guard • Uses virtualization-based security to protect Kerberos, NTLM, and Credential Manager secrets More: https://docs.microsoft.com/en-us/windows/access-protection/credential-guard/credential-guard-how-it-works
  • 35. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals Credential Guard Details • Minimum Requirements – Windows 10 v1511 or Windows Server 2016 – x64 architecture – UEFI firmware 2.3.1 or higher and Secure Boot enabled – TPM version 2.0 • Considerations – 3rd party Security Support Providers (SSP) secrets are not protected – NTLM v1 is not supported (considered to be unsecure) – Kerberos unconstrained delegation & DES encryption aren’t supported – Digest Auth, Credential delegation and MS-CHAPv2 will prompt for (and potentially expose) credentials • MS-CHAPv2 should be phased out (i.e. upgrade your Wi-Fi and/or VPN) More: https://docs.microsoft.com/en-us/windows/access-protection/credential-guard/credential-guard-how-it-works
  • 36. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals WINDOWS HELLO
  • 38. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals Windows Hello • Replaces/extends Windows passwords with – Fingerprint, iris scan & facial recognition – MFA via companion devices like phones, wearables, USBs, smartcards (formerly Microsoft Passport) Hello ITCamp ****** username More: https://docs.microsoft.com/en-us/windows/uwp/security/microsoft-passport
  • 39. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals GROUP MANAGED SERVICE ACCOUNTS
  • 40. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals Group Managed Service Accounts • The feature builds on Standalone Managed Service accounts – Introduced in Windows 2008 R2 and Windows 7 – Managed domain accounts – Automated password management – Simplified SPN (Service Principal Name) management, including delegation of management to other Administrator • Group Managed Service Accounts – Provides same functionality within the domain but also extends that functionality over multiple servers – Leverages the Microsoft Key Distribution Service within the AD domain – e.g. it can be used when connected to a service hosted on a server farm, such as a Network Load Balancer – ensures that all instances use the same principal More: https://docs.microsoft.com/en-us/windows-server/security/group-managed-service-accounts/group-managed-service-accounts-overview
  • 41. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals DEVICE HEALTH ATTESTATION (DHA)
  • 42. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals Today, device health is assumed • Clients are usually granted full access to resources • Any clients which become “unhealthy” can proliferate malware 1 Important resources 2
  • 43. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals Device Health Attestation (DHA) • On-premise or cloud-based service – Provides remote health attestation for devices – Can issue health state “claims” • Blocks unhealthy devices to protect resources and prevent proliferation • Intune MDM can provide conditional access based on device health state claims • Hardware Requirements – UEFI 2.3.1 with Secure Boot – VT-x, AMD-V & SLAT – x64 processor – IOMMU (Intel VT-d or AMD-Vi) – TPM 1.2 or 2.0 More: https://docs.microsoft.com/en-us/windows-server/security/device-health-attestation
  • 44. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals WINDOWS INFORMATION PROTECTION
  • 45. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals • Allows companies to transparently keep corporate data secure and personal data private, while providing data leakage control • Key features: – Automatically tag personal and corporate data – Protect data while it’s at rest on local or removable storage – Control which apps can access corporate data – Control which apps can access a virtual private network (VPN) connection – Prevent users from copying corporate data to public locations – Help ensure business data is inaccessible when the device is in a locked state – Ability to wipe corporate data from devices while leaving personal data alone – Usage of audit reports for tracking issue and remedial actions Windows Information Protection More: https://docs.microsoft.com/en-us/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip
  • 46. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals …AND A FEW OTHERS
  • 47. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals • SMB hardening for SYSVOL and NETLOGON shares – Client connections to the ADDS default SYSVOL and NETLOGON shares now require SMB signing and mutual authentication (such as Kerberos) • Protected Processes – Help prevent one process from tampering with another (specially signed) process • Universal Windows apps protections – Apps are carefully screened before being made available – They run in an AppContainer sandbox with limited privileges • Heap protections – Improvements in the use of internal data structures which help protect against corruption of memory used by the heap • Control Flow Guard (CFG) – Helps mitigate exploits that are based on flow between code locations in memory • Structured Exception Handling Overwrite Protection (SEHOP) – Complements DEP and ASLR • Kernel pool protections – Help prevent exploitation of pool memory used by the kernel Windows 10 mitigations against memory exploits More: https://docs.microsoft.com/en-us/windows/threat-protection/overview-of-threat-mitigations-in-windows-10
  • 48. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals • Windows Defender SmartScreen – Checks the reputation of all downloaded apps • Code Integrity – Ensure that only permitted binaries can be executed from the moment the OS is booted • Enterprise Certificate Pinning – Protect internal domain names from chaining to fraudulent certificates • Early Launch Anti Malware (ELAM) – Blocks driver-based rootkits • Guarded Fabric – Shielded VMs, VSM, Hypervisor Code Integrity (HVCI) • Windows Defender Advanced Threat Protection (WDATP) • Advanced Threat Analytics (ATA) Several other improvements More: https://docs.microsoft.com/en-us/windows/threat-protection/overview-of-threat-mitigations-in-windows-10
  • 49. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals You might also want to take a look at… …my ITCamp session from last year ☺ Talking about Guarded Fabric, Microsoft ATA, WDATP & more
  • 50. @ITCAMPRO #ITCAMP17Community Conference for IT Professionals Q & A