SlideShare ist ein Scribd-Unternehmen logo
1 von 47
Challenges in
Implementing Cyber
Security
Inderjit Singh
Challenges
Environment
Info Security Model
Risk Management
Survivability
Attack Trends
Opportunity for Intrusion
 Rapid adoption of networks
 Exploitable vulnerabilities in technology
 Lack of awareness about info security
 Shortage of administrators, technical
security staff
 Lack of applicable laws and means of
enforcement
Intruders – Who they are ?
Internal vs external
Hackers, Crackers and
Cyber Criminals
Your own IT staff ?
Info Security Model
Info Security Properties
Info States
Security Measures
Info Security Model
Risk Management
Overview
 Risk
 Risk Constituents
 Risk Impact
 Risk Understanding
 Risk Exposure
 Risk Assessment
 Risk Management
Risk
Risk is the possibility of suffering the loss, destruction,
modification or denial of availability of an asset
Constituent of Risk
Risk
Assets
ThreatsVulnerabilities
Risk Impact
 Loss or compromise of critical information
 Loss or compromise of key technologies
 Loss of nations confidence
 Loss of trust in the network systems
 Loss of life or property
Understanding Risk
 Identifying and prioritising assets
 Relating threats and vulnerabilities
 Performing risk analysis
 Recognised risk must be managed
Risk can be mitigated, but can not be eliminated
Assets
Info assets
Other supporting assets
Critical assets
Info Assets
Info
Systems
Services and applications
People
Other Supporting Assets
Power
Water
Telephones
Physical
Security
Security Requirements
Each asset has different
requirements of
Confidentiality
Integrity
Availability
Safeguards, Vulnerabilities and Threats
Safeguard Vulnerability Threats
Access control
Firewalls
ACLs
Physical security
Encryption Technologies
Redundancy
Software flaws
Buffer Overflow
Default cofiguration
Lack of policies
and procedures
Intrusions
Virus, worms and
Trojan Horses
DoS
Sniffing and Spoofing
Single point of failure
Calculating Risk Exposure
Simple Risk Assessment
Matrix
Risk Management
‘Risk Management is the process
used to identify, analyse and
mitigate the risk and provide
strategies for sustaining the
security requirements of an info
asset’
Risk Management
Managing Risk
OCTAVE
OCTAVE- A Risk Assessment
Method
 Operationally Critical Threat, Asset and Vulnerability
Evaluation (OCTAVE)
 A Risk-based security assessment and planning
technique for security
 Based on capturing organisations own knowledge of
security practices and weaknesses
 Not executed by an outsider, consultant etc.
Founding Philosophy
 You can not mitigate all info
security risks
 You have limited resources
 You can not prevent all determined
incursions
 Enterprise survivability most imp
Threat Profile
Asset
Network
Inside
Outside
Accidental
Deliberate
Interruption
Loss / destruction
Modification
Disclosure
Interruption
Loss / destruction
Modification
Disclosure
Asset Access Actor Motive Outcome
Physical
Phase I - Asset
 What are the critical info assets in
the org ?
 What is the threat to each critical
asset ?
 What is currently being done to
protect this asset ?
 What weaknesses in policy and
practice exist in the org ?
Asset Identification and Criticality
Phase II - Vulnerabilities
 How do people access each critical
asset ?
 What infrastructure component are
related to each asset ?
 What technological weaknesses
expose your critical assets to
threats ?
Vulnerability Evaluation Strategy
Phase III - Threats
 What is the impact due to each threat ?
 What is the highest priority risk ?
 What policies and practices are needed to
address these risks ?
 What technological weaknesses need to
be addressed immediately ?
Risk Impact Evaluation Criteria
The Challenge of
Survivability
Survivability
 The capability of the system to fulfill its
mission, in a timely manner, in the
presence of attacks, failure or accidents
 Survivability provides a new perspective
to security
 From a narrow technical specialty
 Towards a risk management perspective
Info Assurance
 Info operations that protect and defend
info and info systems by ensuring their
availability, integrity and confidentiality.
 This includes providing for restoration of
info systems by incorporating protection,
detection and reaction capability.
Security vs. Survivability
Security Survivability
Focus on protecting Info Focus on continuity of
operations
Systems are bounded Systems are unbounded
Considered an overhead
expense
Considered an investment
Narrow technology based
solution
Part of Risk Management
Protect system component Entire mission sustained
Layered Approach to
Survivability
Criticality of asset to the
mission
Identify risk associated with
the asset
Multiple layers of protections
for survivability
IT Security
 System and network management
 System administration tools
 Monitoring and auditing IT security
 Authentication and authorisation
 Vulnerability management
 Encryption
 Security architecture and design
Anticipate Intrusion and
Failures
 Contingency planning
 Disaster recovery
 Difference between natural disasters and disruptions
due to cyber attacks ?
Protecting Info Assets- CERT
Avoidance
Prevention
Detection
Containment and Response
Recovery
Improvement
SKiP- Security Knowledge in
Practice
Administrative
Responsibilities
 Authorisation
 Authentication
 Accountability
 Monitoring
 Incident Response
 Damage Assessment and Recovery
 Analysis
 System life-cycle management
 Backup
Practice Vigilance
 Test systems before deployment
 Implement monitoring and logging
 Check integrity of files and directories
 Scan for Virus, Trojans and Worms
 Practice readiness to respond
 Keep patches up to date
 Raise user awareness
1.POLICY
Establish process, standards,
and guidelines
2.INVENTORY
Discover all assets
across the network
3.PRIORITIZE
Assign business value to
assets
4.VULNERABILITIES
Determine vulnerabilities
on assets
5.THREATS
View potential
threats
10.COMPLIANCE
Review for policy
compliance
9.MEASURE
Measure impact of security
decisions and actions
8.REMEDIATION
Proactively fix
vulnerabilities
7.SHIELD
Stop intrusion in
real-time
6.RISK
Determine risk level
Other Challenges
 Interoperability
 Time Synchronisation
 Crypto Systems
 Indigenous Operating Systems
 Own Standards
 Open Source
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
OurCrowd
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
PECB
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
Scott Geye
 
Synopsis & toc sectoral capsule on cyber security market in india
Synopsis & toc  sectoral capsule on cyber security market in indiaSynopsis & toc  sectoral capsule on cyber security market in india
Synopsis & toc sectoral capsule on cyber security market in india
Gyan Research And Analytics
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
Charles Lim
 

Was ist angesagt? (20)

The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorcybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sector
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine Learning
 
Synopsis & toc sectoral capsule on cyber security market in india
Synopsis & toc  sectoral capsule on cyber security market in indiaSynopsis & toc  sectoral capsule on cyber security market in india
Synopsis & toc sectoral capsule on cyber security market in india
 
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 minsCyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
IT Security
IT SecurityIT Security
IT Security
 
Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)
 
IT Security - Guidelines
IT Security - GuidelinesIT Security - Guidelines
IT Security - Guidelines
 
Cyber Security for Digital-Era
Cyber Security for Digital-EraCyber Security for Digital-Era
Cyber Security for Digital-Era
 

Andere mochten auch

Blue team pp_(final_4-12-11)[1]
Blue team pp_(final_4-12-11)[1]Blue team pp_(final_4-12-11)[1]
Blue team pp_(final_4-12-11)[1]
Jamie Jackson
 
SIII-2_The Strategy and Challenges of Implementing a Health Information System
SIII-2_The Strategy and Challenges of Implementing a Health Information SystemSIII-2_The Strategy and Challenges of Implementing a Health Information System
SIII-2_The Strategy and Challenges of Implementing a Health Information System
Sampson Jackson
 
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Brent Guglielmino
 

Andere mochten auch (20)

Blue team pp_(final_4-12-11)[1]
Blue team pp_(final_4-12-11)[1]Blue team pp_(final_4-12-11)[1]
Blue team pp_(final_4-12-11)[1]
 
Challenges in implementing property management system -- presented in Aug'15 ...
Challenges in implementing property management system -- presented in Aug'15 ...Challenges in implementing property management system -- presented in Aug'15 ...
Challenges in implementing property management system -- presented in Aug'15 ...
 
SIII-2_The Strategy and Challenges of Implementing a Health Information System
SIII-2_The Strategy and Challenges of Implementing a Health Information SystemSIII-2_The Strategy and Challenges of Implementing a Health Information System
SIII-2_The Strategy and Challenges of Implementing a Health Information System
 
Cyber defense electronic warfare (ew)
Cyber defense electronic warfare (ew)Cyber defense electronic warfare (ew)
Cyber defense electronic warfare (ew)
 
Cyber Criminals And Cyber Defense
Cyber Criminals And Cyber DefenseCyber Criminals And Cyber Defense
Cyber Criminals And Cyber Defense
 
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
 
Challenges in Implementing Performance Management System - Presentation - Kar...
Challenges in Implementing Performance Management System - Presentation - Kar...Challenges in Implementing Performance Management System - Presentation - Kar...
Challenges in Implementing Performance Management System - Presentation - Kar...
 
Knowledge Management at Infosys and Unisys A comparison
Knowledge Management at Infosys and UnisysA comparisonKnowledge Management at Infosys and UnisysA comparison
Knowledge Management at Infosys and Unisys A comparison
 
Cyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analyticsCyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analytics
 
eBusiness Strategy
eBusiness StrategyeBusiness Strategy
eBusiness Strategy
 
Smart grid security
Smart grid securitySmart grid security
Smart grid security
 
NISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best PracticeNISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best Practice
 
NIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - MindmapNIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - Mindmap
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architecture
 
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
 
Platform Strategy and Digital Ecosystems
Platform Strategy and Digital EcosystemsPlatform Strategy and Digital Ecosystems
Platform Strategy and Digital Ecosystems
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
 
CBGTBT - Part 5 - Blockchains 102
CBGTBT - Part 5 - Blockchains 102CBGTBT - Part 5 - Blockchains 102
CBGTBT - Part 5 - Blockchains 102
 
CBGTBT - Part 6 - Transactions 102
CBGTBT - Part 6 - Transactions 102CBGTBT - Part 6 - Transactions 102
CBGTBT - Part 6 - Transactions 102
 

Ähnlich wie Challenges in implementating cyber security

Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
Nicholas Davis
 
Information security background
Information security backgroundInformation security background
Information security background
Nicholas Davis
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
ciso_insights
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information Security
SARJERAO Sarju
 
1 info sec+risk-mgmt
1 info sec+risk-mgmt1 info sec+risk-mgmt
1 info sec+risk-mgmt
madunix
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
dr_edw777
 
gkkSecurity essentials domain 1
gkkSecurity essentials   domain 1gkkSecurity essentials   domain 1
gkkSecurity essentials domain 1
Anne Starr
 
Assuring Reliable and Secure IT Services
Assuring Reliable and Secure IT ServicesAssuring Reliable and Secure IT Services
Assuring Reliable and Secure IT Services
tsaiblake
 
Cybertopic_1security
Cybertopic_1securityCybertopic_1security
Cybertopic_1security
Anne Starr
 

Ähnlich wie Challenges in implementating cyber security (20)

ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
Computer security priciple and practice
Computer security   priciple and practiceComputer security   priciple and practice
Computer security priciple and practice
 
Security architecture principles isys 0575general att
Security architecture principles isys 0575general attSecurity architecture principles isys 0575general att
Security architecture principles isys 0575general att
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Information security background
Information security backgroundInformation security background
Information security background
 
Overview
OverviewOverview
Overview
 
Database development and security certification and accreditation plan pitwg
Database development and security certification and accreditation plan  pitwgDatabase development and security certification and accreditation plan  pitwg
Database development and security certification and accreditation plan pitwg
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdf
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
Sarwono sutikno nisd2013 - transforming cybersecurity
Sarwono sutikno   nisd2013 - transforming cybersecuritySarwono sutikno   nisd2013 - transforming cybersecurity
Sarwono sutikno nisd2013 - transforming cybersecurity
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information Security
 
1 info sec+risk-mgmt
1 info sec+risk-mgmt1 info sec+risk-mgmt
1 info sec+risk-mgmt
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
gkkSecurity essentials domain 1
gkkSecurity essentials   domain 1gkkSecurity essentials   domain 1
gkkSecurity essentials domain 1
 
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
 
Assuring Reliable and Secure IT Services
Assuring Reliable and Secure IT ServicesAssuring Reliable and Secure IT Services
Assuring Reliable and Secure IT Services
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At Microsoft
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
 
Cybertopic_1security
Cybertopic_1securityCybertopic_1security
Cybertopic_1security
 

Mehr von Inderjeet Singh

Mehr von Inderjeet Singh (6)

Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysis
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
 
E governance and digital india by col inderjit singh
E governance  and digital india by col inderjit singhE governance  and digital india by col inderjit singh
E governance and digital india by col inderjit singh
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
 
Fixed Mobile Convergence
Fixed Mobile ConvergenceFixed Mobile Convergence
Fixed Mobile Convergence
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 

Challenges in implementating cyber security