SlideShare ist ein Scribd-Unternehmen logo
1 von 35
7 Important
Cybersecurity Trends
David Stelzl, Consultant and Trainer
Stelzl Visionary Learning Concepts
Digital
Money
David Stelzl
www.stelzlsecurity.com
The Smart Business Leader’s Guide to
Stopping the Hacker!
NEWS
TRENDS
The Digitalization Mega Trend is Here
IoT is Happening In Every Company
Big Data, Cloud, Mobility…
80% of Businesses will be in the Cloud Soon…
People Want to be…Connected and Digital
TRENDS
WE are at WAR!…
“Yet because this war lacks attention grabbing
explosions and body bags, The American People
remain largely unaware of the dangers”...WSJ
Unfortunately No One Is Listening!!!
#1 - Seven Powerful
Trends That Will CRUSH
Your Business…
Data@Risk
It’s in the Book…
David Stelzl
dstelzl@stelzl.us
www.stelzlsecurity.com
Impact
Likelihood
RISK
The One Thing You NEED to KNOW
Trends
Easy
Surreptitious
Unstoppable
Bots
Phishing
Social
Engineering
TRENDS
Copyright 2003 – 2018, David Stelzl www.stelzl.us training@stelzl.us
TRENDS
Issue #1
ISSUE #1
False Security
Firewalls and Passwords
Copyright 2003 – 2018, David Stelzl www.stelzl.us training@stelzl.us
TRENDS #1
Issue #2
ISSUE #2
Social Engineering
Copyright 2003 – 2018, David Stelzl www.stelzl.us training@stelzl.us
TRENDS #2
Issue #3
ISSUE #3
BYOD
Be Your Own IT…
Copyright 2003 – 2018, David Stelzl www.stelzl.us training@stelzl.us
TRENDS #3
Issue #4
ISSUE #4
Social Media Mindset
“$350 billion, making it the sixth most valuable company in
America…”...CNN
Copyright 2003 – 2018, David Stelzl www.stelzl.us training@stelzl.us
TRENDS #4
Issue #5
ISSUE #5
Insider Threats
“75% of employess admit to stealing from
their employers...” WSJ
Copyright 2003 – 2018, David Stelzl www.stelzl.us training@stelzl.us
TRENDS #5
Issue #6
ISSUE #6
Nation States
Sponsored…
Copyright 2003 – 2018, David Stelzl www.stelzl.us training@stelzl.us
TRENDS #6
Issue #7
ISSUE #7
”No terrorist organization in history has launched as dynamic and ultimately effective global
influence operation online as ISIS.” - WSJ
Copyright 2003 – 2018, David Stelzl www.stelzl.us training@stelzl.us
TRENDS #7
Fact
FACT
Two Completely Separate Issues!
Copyright 2003 – 2018, David Stelzl www.stelzl.us training@stelzl.us
TRENDS
BOTTOM LINE
No One Has it Covered…
The FBI Tells Us – It Takes Almost 200 Days for Companies
To Detect An Intruder...
Most Won’t Know Until It Is Too Late!
#2 – ONE BIG
MISTAKE You Must
Correct Before You
Get Hit
ROOT PROBLEM
The “House Principle”
How Does Security Work?
We are spending more than ever on
Security – How are the getting in?
ROOT PROBLEM
“Physical Security Works”
Doors
Windows
Locks
Fence
Alarm
Motion
Crime W
Monitoring
Dog
Gun
Police
Insurance
Protect Detect Respond
ROOT PROBLEM
Traditional Network
Security Is
FAILING
ROOT PROBLEM
Traditional Network Security
The Cloud Principle…
• Nearly every company has Malware
• 250,000 Zombies Created Daily
• Cybercrime is a Trillion Dollar Industry
Protect Detect Respond
Administrative Security Policy DRP
Technical Intelligence
Physical
Locks on
Data Center
ROOT PROBLEM
“The Coverage Model”
THE FUTURE
The Future of Security
- Security Intelligence…
• Predictive
• Real Time
• Response
#3 Seven Mindsets
You Need to
Establish Now!!!
To Begin Creating a Security
Culture inside Your Company
MINDSET #1
Your Data is
Money!
MINDSET #2
Compliance
Is NOT
Security!
BUREAUCRACY
MINDSET #3
Security is an
Enabler!
MINDSET #4
Your Data
is a
Secret!
MINDSET #5
Any Determined
Individual
Can Get In!
MINDSET #6
Expect to Find
Them
Already In!
MINDSET #7
Be Alert -
Ready to
Respond!
David Stelzl, CISSP
www.stelzlsecurity.com
Digital Money
Questions?
Thank you for joining us

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowShawn Tuma
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Secure printing in an unsecure world
Secure printing in an unsecure worldSecure printing in an unsecure world
Secure printing in an unsecure worldHP
 
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Jeremiah Grossman
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...PECB
 
When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?Edge Pereira
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of SecurityKarina Elise
 
The Role of Product Managers in Securing the Internet of Things by Daniel Eli...
The Role of Product Managers in Securing the Internet of Things by Daniel Eli...The Role of Product Managers in Securing the Internet of Things by Daniel Eli...
The Role of Product Managers in Securing the Internet of Things by Daniel Eli...Product School
 
Antifragile Cyber Defense
Antifragile Cyber DefenseAntifragile Cyber Defense
Antifragile Cyber DefenseCybereason
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
EVCOM Clarion Awards Appsecco presentation
EVCOM Clarion Awards Appsecco presentationEVCOM Clarion Awards Appsecco presentation
EVCOM Clarion Awards Appsecco presentationGwilym Lewis
 
5 Reasons to Give Your Corporate Desktops a Facelift
5 Reasons to Give Your Corporate Desktops a Facelift5 Reasons to Give Your Corporate Desktops a Facelift
5 Reasons to Give Your Corporate Desktops a FaceliftDizzion, Inc.
 
The Modern Business Has No Perimeter - ZoneFox
The Modern Business Has No Perimeter - ZoneFoxThe Modern Business Has No Perimeter - ZoneFox
The Modern Business Has No Perimeter - ZoneFoxZoneFox
 
Privacy on the Series of Tubes of Things
Privacy on the Series of Tubes of ThingsPrivacy on the Series of Tubes of Things
Privacy on the Series of Tubes of ThingsEFF-Austin
 
How to communicate effectively in a cyber attack
How to communicate effectively in a cyber attackHow to communicate effectively in a cyber attack
How to communicate effectively in a cyber attackBen Overlander
 
S3lab - Security and Smartness for the Society
S3lab - Security and Smartness for the SocietyS3lab - Security and Smartness for the Society
S3lab - Security and Smartness for the SocietyIgor Santos
 

Was ist angesagt? (20)

Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to Know
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Toxic playground deck 1
Toxic playground deck 1Toxic playground deck 1
Toxic playground deck 1
 
Secure printing in an unsecure world
Secure printing in an unsecure worldSecure printing in an unsecure world
Secure printing in an unsecure world
 
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
 
When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of Security
 
The Role of Product Managers in Securing the Internet of Things by Daniel Eli...
The Role of Product Managers in Securing the Internet of Things by Daniel Eli...The Role of Product Managers in Securing the Internet of Things by Daniel Eli...
The Role of Product Managers in Securing the Internet of Things by Daniel Eli...
 
Toward a responsible IoT
Toward a responsible IoTToward a responsible IoT
Toward a responsible IoT
 
Antifragile Cyber Defense
Antifragile Cyber DefenseAntifragile Cyber Defense
Antifragile Cyber Defense
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
EVCOM Clarion Awards Appsecco presentation
EVCOM Clarion Awards Appsecco presentationEVCOM Clarion Awards Appsecco presentation
EVCOM Clarion Awards Appsecco presentation
 
Bill gates ppt
Bill gates pptBill gates ppt
Bill gates ppt
 
Comm pp
Comm ppComm pp
Comm pp
 
5 Reasons to Give Your Corporate Desktops a Facelift
5 Reasons to Give Your Corporate Desktops a Facelift5 Reasons to Give Your Corporate Desktops a Facelift
5 Reasons to Give Your Corporate Desktops a Facelift
 
The Modern Business Has No Perimeter - ZoneFox
The Modern Business Has No Perimeter - ZoneFoxThe Modern Business Has No Perimeter - ZoneFox
The Modern Business Has No Perimeter - ZoneFox
 
Privacy on the Series of Tubes of Things
Privacy on the Series of Tubes of ThingsPrivacy on the Series of Tubes of Things
Privacy on the Series of Tubes of Things
 
How to communicate effectively in a cyber attack
How to communicate effectively in a cyber attackHow to communicate effectively in a cyber attack
How to communicate effectively in a cyber attack
 
S3lab - Security and Smartness for the Society
S3lab - Security and Smartness for the SocietyS3lab - Security and Smartness for the Society
S3lab - Security and Smartness for the Society
 

Ähnlich wie 7 Important Cybersecurity Trends

article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverseMext Metaverse
 
Final Presentation.pptx
Final Presentation.pptxFinal Presentation.pptx
Final Presentation.pptxBetaBeta9
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018joshquarrie
 
Netop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictionscentralohioissa
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
Computerworld Conference (2002)
Computerworld Conference (2002)Computerworld Conference (2002)
Computerworld Conference (2002)Skeeve Stevens
 
Information Technology Security for Small Business (.docx
 Information Technology Security  for Small Business (.docx Information Technology Security  for Small Business (.docx
Information Technology Security for Small Business (.docxMARRY7
 
Cyber Security Lessons from the NSA
Cyber Security Lessons from the NSACyber Security Lessons from the NSA
Cyber Security Lessons from the NSACipherCloud
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentationwhmillerjr
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...Declan Winston Ramsaran
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Michele Chubirka
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-bBbAOC
 
A Look Into Cyber Security
A Look Into Cyber SecurityA Look Into Cyber Security
A Look Into Cyber SecurityGTreasury
 
IoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionIoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionDr Laurent Guiraud
 
Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Grant Barker
 

Ähnlich wie 7 Important Cybersecurity Trends (20)

article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
 
Final Presentation.pptx
Final Presentation.pptxFinal Presentation.pptx
Final Presentation.pptx
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
Netop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop Remote Control Embedded Devices
Netop Remote Control Embedded Devices
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictions
 
Risky Business
Risky BusinessRisky Business
Risky Business
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Computerworld Conference (2002)
Computerworld Conference (2002)Computerworld Conference (2002)
Computerworld Conference (2002)
 
Information Technology Security for Small Business (.docx
 Information Technology Security  for Small Business (.docx Information Technology Security  for Small Business (.docx
Information Technology Security for Small Business (.docx
 
Cyber Security Lessons from the NSA
Cyber Security Lessons from the NSACyber Security Lessons from the NSA
Cyber Security Lessons from the NSA
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
 
10myths
10myths10myths
10myths
 
Security
SecuritySecurity
Security
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
 
A Look Into Cyber Security
A Look Into Cyber SecurityA Look Into Cyber Security
A Look Into Cyber Security
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
IoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionIoT, Security & the Path to a Solution
IoT, Security & the Path to a Solution
 
Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Cyber security for ia and risk 150601
Cyber security for ia and risk 150601
 

Mehr von Marco

Collaborative Spaces: Audio Visual Trends
Collaborative Spaces: Audio Visual TrendsCollaborative Spaces: Audio Visual Trends
Collaborative Spaces: Audio Visual TrendsMarco
 
Cloud-Ready Services for your Print Environment
Cloud-Ready Services for your Print EnvironmentCloud-Ready Services for your Print Environment
Cloud-Ready Services for your Print EnvironmentMarco
 
Digital Revolution in Communications
Digital Revolution in CommunicationsDigital Revolution in Communications
Digital Revolution in CommunicationsMarco
 
Collaborative Spaces: Audio Visual Trends
Collaborative Spaces: Audio Visual TrendsCollaborative Spaces: Audio Visual Trends
Collaborative Spaces: Audio Visual TrendsMarco
 
The Next Wave of Collaboration
The Next Wave of CollaborationThe Next Wave of Collaboration
The Next Wave of CollaborationMarco
 
The Future of Information Management
The Future of Information ManagementThe Future of Information Management
The Future of Information ManagementMarco
 
Using Video for More than Just Security
Using Video for More than Just SecurityUsing Video for More than Just Security
Using Video for More than Just SecurityMarco
 
Hot Trends in Production and Industrial Print
Hot Trends in Production and Industrial PrintHot Trends in Production and Industrial Print
Hot Trends in Production and Industrial PrintMarco
 
Digital Transformation Drives WAN Evolution
Digital Transformation Drives WAN EvolutionDigital Transformation Drives WAN Evolution
Digital Transformation Drives WAN EvolutionMarco
 
Protecting your Data…Anywhere and Everywhere
Protecting your Data…Anywhere and Everywhere Protecting your Data…Anywhere and Everywhere
Protecting your Data…Anywhere and Everywhere Marco
 
Hang on - Change is Here
Hang on - Change is HereHang on - Change is Here
Hang on - Change is HereMarco
 
How Sourcewell Contracts Make Finding a Phone System for Your Needs and Budge...
How Sourcewell Contracts Make Finding a Phone System for Your Needs and Budge...How Sourcewell Contracts Make Finding a Phone System for Your Needs and Budge...
How Sourcewell Contracts Make Finding a Phone System for Your Needs and Budge...Marco
 
12 Managed Services Myths
12 Managed Services Myths12 Managed Services Myths
12 Managed Services MythsMarco
 
2016 Forecasts: What's Ahead in Business Technology
2016 Forecasts: What's Ahead in Business Technology2016 Forecasts: What's Ahead in Business Technology
2016 Forecasts: What's Ahead in Business TechnologyMarco
 

Mehr von Marco (14)

Collaborative Spaces: Audio Visual Trends
Collaborative Spaces: Audio Visual TrendsCollaborative Spaces: Audio Visual Trends
Collaborative Spaces: Audio Visual Trends
 
Cloud-Ready Services for your Print Environment
Cloud-Ready Services for your Print EnvironmentCloud-Ready Services for your Print Environment
Cloud-Ready Services for your Print Environment
 
Digital Revolution in Communications
Digital Revolution in CommunicationsDigital Revolution in Communications
Digital Revolution in Communications
 
Collaborative Spaces: Audio Visual Trends
Collaborative Spaces: Audio Visual TrendsCollaborative Spaces: Audio Visual Trends
Collaborative Spaces: Audio Visual Trends
 
The Next Wave of Collaboration
The Next Wave of CollaborationThe Next Wave of Collaboration
The Next Wave of Collaboration
 
The Future of Information Management
The Future of Information ManagementThe Future of Information Management
The Future of Information Management
 
Using Video for More than Just Security
Using Video for More than Just SecurityUsing Video for More than Just Security
Using Video for More than Just Security
 
Hot Trends in Production and Industrial Print
Hot Trends in Production and Industrial PrintHot Trends in Production and Industrial Print
Hot Trends in Production and Industrial Print
 
Digital Transformation Drives WAN Evolution
Digital Transformation Drives WAN EvolutionDigital Transformation Drives WAN Evolution
Digital Transformation Drives WAN Evolution
 
Protecting your Data…Anywhere and Everywhere
Protecting your Data…Anywhere and Everywhere Protecting your Data…Anywhere and Everywhere
Protecting your Data…Anywhere and Everywhere
 
Hang on - Change is Here
Hang on - Change is HereHang on - Change is Here
Hang on - Change is Here
 
How Sourcewell Contracts Make Finding a Phone System for Your Needs and Budge...
How Sourcewell Contracts Make Finding a Phone System for Your Needs and Budge...How Sourcewell Contracts Make Finding a Phone System for Your Needs and Budge...
How Sourcewell Contracts Make Finding a Phone System for Your Needs and Budge...
 
12 Managed Services Myths
12 Managed Services Myths12 Managed Services Myths
12 Managed Services Myths
 
2016 Forecasts: What's Ahead in Business Technology
2016 Forecasts: What's Ahead in Business Technology2016 Forecasts: What's Ahead in Business Technology
2016 Forecasts: What's Ahead in Business Technology
 

Kürzlich hochgeladen

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Kürzlich hochgeladen (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

7 Important Cybersecurity Trends