SlideShare ist ein Scribd-Unternehmen logo
1 von 132
Downloaden Sie, um offline zu lesen
BIG GAME THEORY HUNTING
Kelly Shortridge (@swagitda_)
Black Hat 2017
THE PECULIARITIES OF HUMAN BEHAVIOR IN
THE INFOSEC GAME
I’m Kelly
This is game theory
It’s time for hunting some
game theory
4
5
Do you believe bug-free software is a
reasonable assumption?
6
Do you believe wetware is more
complex than software?
7
Traditional Game Theory relies on the
assumption of bug-free wetware
8
Behavioral Game Theory assumes
there’s no such thing as bug-free
9
“Think how hard physics would be
if particles could think”
—Murray Gell-Mann
10
“Amateurs study cryptography,
professionals study economics”
—Dan Geer quoting Allan Schiffman
11
This is what you’ll learn:
12
1. Why traditional game theory isn’t even a
theory and is unfit for strategy-making
2. A new framework for modeling the infosec
game based on behavioral insights
3. New defensive strategies that exploit your
adversaries’ “thinking” and “learning”
13
Let’s go hunting to find out
why
I. What is Game Theory?
tl;dr – game theory is a mathematical language
used to describe scenarios of conflict and
cooperation
15
Game theory is more about language than
theory
Use it as a engendering tool, not as something
to dictate optimal strategies
16
GT applies whenever actions of players are
interdependent
Strategic scenarios include many types of
games, with different “solutions” for each
17
18
Zero Sum Games
Lou Levit
19
Non-Zero Sum Games
20
Negative Sum Games
21
Positive Sum Games
22
Complete vs. Incomplete Information
23
Perfect vs. Imperfect Information
Paul Green
24
Information Symmetry vs. Asymmetry
Dakota Corbin
Defender Attacker Defender Games
Sequential games in which sets of players are
attackers and defenders
Assumes people are risk-neutral & attackers
want to be maximally harmful
26
First move = defenders choosing a defensive
investment plan
Second move = attackers observe the defensive
preparations & choose an attack plan
27
28
Nash Equilibrium is often used to
“solve” games. This is bad.
Nash Equilibrium = optimal outcome of a non-
cooperative game
Players are making the best decisions for
themselves while taking their opponent’s
decisions into account
29
30
Prisoner’s Dilemma
Player1
Player 2
Confess
Refuse
Confess Refuse
-2, -2 0, -4
-4, 0 -1, -1
Nash Equilibrium is based on a priori reasoning
Assumes rational, all-knowing players
Assumes others’ decisions don’t affect you
31
People have applied Nash
Equilibrium to infosec over the
years…
32
Defender should play extremely fast so the
attacker drops out of the game
Better to invest in security than not invest,
regardless of attacker strategy (wow!)
Just apply tons of mathematical equations!
33
II. New defensive framework
Use GT for its expressive power in describing a
framework for the infosec game
Look at data outside GT, e.g. from experiments
in domains similar to infosec, to select correct
assumptions
35
What game is infosec?
Ruben Bagues
DAD game (continuous defense & attack)
Non-zero-sum
Incomplete, imperfect, asymmetrical information
Sequential / dynamic
37
38
This is a (uniquely?) tricky game
39
Have you heard infosec described as
a “cat and mouse” game before?
40
Traditional Game Theory doesn’t
allow for those…
…or most of the characteristics of the
“infosec game”
Assumes people are rational (they aren’t)
Assumes static vs. dynamic environments
Can’t ever be “one step ahead” of your adversary
Deviations from Nash Equilibrium are common
41
42
“I feel, personally, that the study of
experimental games is the proper route of
travel for finding ‘the ultimate truth’ in
relation to games as played by human
players”
—John Nash
Behavior-based framework
Dayne Topkin
Experimental – how do people actually behave?
People predict their opponent’s moves by either
“thinking” or “learning”
44
45
Thinking = modeling how opponents
are likely to respond
Our brains work like volatile memory
46
Working memory is a hard constraint for human
thinking
Enumerating steps past the next round is hard
Humans kinda suck at recursion
47
48
Learning = predicting how players will
act based on prior games / rounds
Humans learn through “error-reinforcement
learning” (trial & error)
People have “learning rates,” how much
experiences factor into decision making
Dopamine neurons encode errors
49
Veksler & Buchler study
200 consecutive “security games” across 4
strategies
Different learning rates for attackers
Tested # of prevented attacks for each strategy
50
Fixed strategy = prevent 10% - 25% of attacks
Game Theory strategy = prevent 50% of attacks
Random strategy = prevent 49.6% of attacks
Cognitive Modeling strategy = prevent between
61% - 77%
51
52
Don’t be replaced by a random
SecurityStrategyTM algorithm
III. Implementation
53
1. SWOT Analysis
2. Thinking Exploitation
3. Learning Exploitation
4. Minimax
5. Looking Ahead
54
SWOT Analysis
Scott Webb
56
101: Traditional SWOT
Strengths, Weaknesses,
Opportunities, Threats
Model SWOT for yourself in relation to your
adversary
Model SWOT for your adversary in relation to
you
57
“The primary insight of GT is the
importance of focusing on others – of
putting yourself in the shoes of other
players and trying to play out all the
reactions…as far ahead as possible”
– Adam Brandenburger
58
59
Strengths Weaknesses
Opportunities Threats
▪ Inadequate budget
▪ Lack of personnel
▪ Limited employee training
▪ Understanding of target
environment
▪ Motivation to not be
breached
▪ Leverage new tech to allow
for tear up/down
▪ Increased board attention
to get budget
▪ Attackers can use new tech
for scalability
▪ Hard to keep up with pace
of new attack surface
60
201: Perceptual SWOT
For you and your adversary, consider:
How can the strengths be weaknesses?
How can the weaknesses be strengths?
61
62
Threat
Opportunity
Strength
Strength
Weakness
Weakness
Opportunity
Threat
Strength
Strength
Weakness
Weakness
Reality
Perception
Reality
Perception
Self vs. Other
“Core rigidities” = deeply embedded knowledge
sets that create problems
Compliance, fixed security guidelines
Top management can be the wrong people for
an evolving environment
63
Attacker strength = having time to craft an attack
Leverage that “strength” with strategies leading
down rabbit holes and wasting their time
64
Attacker strength = access to known vulns
Confuse them with fake architecture so they
can’t be certain what systems you’re running
65
Thinking Exploitation
Thinking strategy: belief prompting
Increase players thinking by one step
67
“Prompt” the player to consider who their
opponents are & how their opponents will react
Model assumptions around capital, time, tools,
risk aversion
68
Your goal is to ask, “if I do X, how will
that change my opponent’s strategy?”
69
A generic belief prompting guide:
70
How would attackers pre-emptively bypass the
defensive move?
What will the opponent do next in response?
Costs of the opponent’s offensive move?
Probability the opponent will conduct the move?
71
72
Example: A skiddie lands on one of
our servers, what do they do next?
Perform local recon, escalate to whatever privs
they can get
Counter: priv separation, don’t hardcode creds
Leads to: attacker must exploit server, risk =
server crashes
73
Decision Tree Modelling
Jessica Furtney
Model decision trees both for offense & defense
Theorize probabilities of each branch’s outcome
Creates tangible metrics to deter self-
justification
75
“Attackers will take the least cost path
through an attack graph from their start
node to their goal node”
– Dino Dai Zovi, “Attacker Math”
76
77
Reality
Skiddies / Random Criminal Group
Nation State
Priv Separation
Known exploit
GRSecseccomp
Elite
0day
Use DB
on box
Role sep
Win
Tokenization,
segmentation
Absorb into
botnet
Anomaly
detection
1day
Win
0%
60%
50%
50%
98%
2%
5%
10%
50%
40%
25%
30%
100%
0%
60%
40%
70% 0%
0%
65%
10%
25%
1. Which of your assets do attackers want?
2. What’s the easiest way attackers get to those assets?
3. What countermeasures are on that path?
4. What new path will the attacker take given #3?
5. Repeat 1 – 4 until it’s “0day all the way down”
6. Assign rough probabilities
78
79
Whiteboards + camera snaps (or “DO NOT ERASE!!!!”)
Draw.io, Gliffy (plugs into Confluence)
Google Docs (> insert drawing)
PowerPoint (what I used)
Visio (last resort)
80
Decision trees help create a feedback
loop to refine strategy
Decision trees help for auditing after an incident
& easy updating
Serves as a historical record to refine decision-
making process
Mitigates “doubling down” effect by showing
where strategy failed
81
Defender’s advantage = knowing the home turf
Visualize the hardest path for attackers – how
can you force them onto to that path?
Commonalities on trees = which strategies
mitigate the most risk across various attacks
82
Make decision trees the new “nice report”
#WOCinTech
A new request for your pen-testers / red-team
The ask: outline which paths they did or didn’t
take, and why (a decision tree w/ explanations)
Helps you see the attacker perspective of your
defenses & where to improve
84
Learning Exploitation
Information asymmetry exploitation – disrupt
attacker learning process
Learning rate exploitation – introduce
unreliability and pre-empt moves
86
87
Exploit the fact that
you understand the local environment
better than attackers
Falsifying Data
Braydon Anderson
Defenders have info adversaries need to
intercept
Dynamic envs = frequently in learning phase
Hide or falsify data on the legitimate system side
89
Macron Case Study
Soroush Karimi
Allegedly used phishing tarpitting
Signed onto phishing pages & planted bogus
creds and info
Obvious fakes in dumped documents
91
92
#wastehistime2016…but for hackers
93
Goal is to remove the attacker’s scientific
method so they can’t test hypotheses
(Pretend like hashtags are a thing and tweet
#wastehackertime2017 with your own ideas)
94
Create custom email rejection messages
Create honeydoc on the “Avallach Policy”
Have response to suspicious emails be, “This
violates the Avallach policy”
Track when the doc is accessed
95
General strategy: create honeytokens that look
to describe legitimate policies or technologies
that would be useful in attacker recon
Non-Determinism
Candice Seplow
97
Different behaviors at different times
Can’t expect same result every time
98
ASLR is a non-deterministic feature, but highly
deterministic in that it always works the same
I want to amplify and extend it to higher levels
99
Raise costs at the very first step of the attack:
recon
Make the attacker uncertain of your defensive
profile and environment
100#WOCinTech
Attackers now design malware to be VM-aware
101
Good: Make everything look like a malware
analyst’s sandbox
Better: Make everything look like a different
malware analyst’s sandbox each time
Put wolfskins on the sheep
103
Mix & match hollow but sketchy-
looking artifacts on normal, physical
systems
104
RocProtect-v1 –
https://github.com/fr0gger/RocProtect-V1
Emulates virtual artifacts onto physical machine
(see Unprotect Project as well)
105
VMwareServices.exe
VBoxService.exe
Vmwaretray.exe
VMSrvc.exe
vboxtray.exe
ollydbg.exe
wireshark.exe
fiddler.exe
.pipecuckoo
cuckoomon.dll
dbghelp.dll
Mac addresses:
"00:0C:29", "00:1C:14",
"00:50:56", "00:05:69"
106
system32driversVBoxGuest.sys
system32driversVBoxMouse.sys
HKLMSOFTWAREOracleVirtualBox Guest
Additions
C:cuckoo, C:IDA
Program FilesVmware
107
Make the IsDebuggerPresent function call
always return non-zero
Create fake versions of driver objects like
.NTICE and .SyserDbgMsg
Set KdDebuggerEnabled to 0x03
108
Load DLLs from AV engines using a Windows
loader with a forwarder DLL
ex64.sys (Symantec)
McAVSCV.DLL (McAfee)
SAUConfigDLL.dll (Sophos)
cbk7.sys (Carbon Black)
cymemdef.dll (Cylance)
CSAgent.sys (Crowdstrike)
109
Deploy lightest weight hypervisor possible for
added “wolfskin”
https://github.com/asamy/ksm
https://github.com/ionescu007/SimpleVisor
https://github.com/Bareflank/hypervisor
110
Minimax
Mike Wilson
111
Minimax / maximin = minimize the possible loss
for a worst case maximum loss scenario
112
Want to find the minimum of the sum of the
expected cost of protection and expected cost
of non-protection
113
Don’t have a monoculture – diversity is strongly
beneficial for protection
Stochastic decisions may be better than
deterministic
From The Imitation Game: should only act on
Enigma info some of the time, not all
Looking Ahead
115
Fluctuating infrastructure using emerging tech in
“Infrastructure 3.0”
Netflix’s Chaos Monkey
https://github.com/Netflix/SimianArmy/wiki/Cha
os-Monkey
116
Modelling attacker cognition via model tracing
Prerequisite: how to begin observing attacker
cognition
117
Preferences change based on experience
Models incorporate the “post-decision-state”
Higher the attacker’s learning rate, easier to
predict their decisions
118
ΔUA = α (R – UA), where:
▪ UA = expected utility of an offensive action
▪ α = learning rate
▪ R = feedback (success / failure)
119
If α = 0.2, R = 1 for win & -1 for loss, then:
▪ ΔUA = 0.2(1- 0) = 0.2
Attacker is 20% more likely to do this again
From here, you can adjust the learning rate
based on data you see
120
Track utility values for each attacker action
For detected / blocked actions, attacker action &
outcome are known variables (so utility is
calculable)
Highest “U” = action attacker will pursue
IV. Conclusion
121
122
It is no longer time for some
Game Theory
123
In fact, we’ve learned that GT is a
language, not even a theory
124
Start with a SWOT analysis to gain
perspective
125
Use thinking exploitation to improve
threat modelling
126
Use learning exploitation to
beleaguer your adversaries
127
Let’s work together to build strategies
based on this behavioral framework
128
Next step – how to begin model-
tracing attackers
After that – predict attacker behavior
129
Try these at home – make your blue
team empirical
Worst case, random strategies beat
fixed ones & are just as good as GT
130
“Good enough is good
enough. Good enough always
beats perfect.”
—Dan Geer
Suggested reading
▪ David Laibson’s Behavioral Game Theory lectures @ Harvard
▪ “Game Theory: A Language of Competition and Cooperation,” Adam Brandenburger
▪ “Advances in Understanding Strategic Behavior,” Camerer, Ho, Chong
▪ “Know Your Enemy: Applying Cognitive Modeling in the Security Domain,” Veksler, Buchler
▪ “Know Your Adversary: Insights for a Better Adversarial Behavioral Model,” Abbasi, et al.
▪ “Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous
Efforts,” Payappalli, Zhuang, Jose
▪ “Improving Learning and Adaptation in Security Games by Exploiting Information Asymmetry,”
He, Dai, Ning
▪ “Behavioral theories and the neurophysiology of reward,” Schultz
▪ “Evolutionary Security,” and “Measuring Security,” Dan Geer
131
132
@swagitda_
/in/kellyshortridge
kelly@greywire.net

Weitere ähnliche Inhalte

Ähnlich wie Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game

Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015Malachi Jones
 
Project:Filter Design and Experimentation
Project:Filter Design and ExperimentationProject:Filter Design and Experimentation
Project:Filter Design and ExperimentationAbertay University
 
Game Balance 3: Interesting Strategies
Game Balance 3: Interesting StrategiesGame Balance 3: Interesting Strategies
Game Balance 3: Interesting StrategiesMarc Miquel
 
Adecision actionmodelforsoccer-120514174628-phpapp02
Adecision actionmodelforsoccer-120514174628-phpapp02Adecision actionmodelforsoccer-120514174628-phpapp02
Adecision actionmodelforsoccer-120514174628-phpapp02Sotiris Silaidopoulos
 
Adecision actionmodelforsoccer-120514174628-phpapp02
Adecision actionmodelforsoccer-120514174628-phpapp02Adecision actionmodelforsoccer-120514174628-phpapp02
Adecision actionmodelforsoccer-120514174628-phpapp02Sotiris Silaidopoulos
 
A decision action model for soccer
A decision action model for soccerA decision action model for soccer
A decision action model for soccerLarry Paul
 
From Human Intelligence to Machine Intelligence
From Human Intelligence to Machine IntelligenceFrom Human Intelligence to Machine Intelligence
From Human Intelligence to Machine IntelligenceNUS-ISS
 
Autenrieth&wechselberger ract15
Autenrieth&wechselberger ract15Autenrieth&wechselberger ract15
Autenrieth&wechselberger ract15Kelvin Autenrieth
 
10-15 research project preview
10-15 research project preview10-15 research project preview
10-15 research project previewAlan Nochenson
 
Planning and Integrating Deception into Computer Security Defenses
Planning and Integrating Deception into Computer Security DefensesPlanning and Integrating Deception into Computer Security Defenses
Planning and Integrating Deception into Computer Security DefensesMohammed Almeshekah
 
huntpedia.pdf
huntpedia.pdfhuntpedia.pdf
huntpedia.pdfCecilSu
 
Game theory for a better world
Game theory for a better worldGame theory for a better world
Game theory for a better worldGendry Morales
 
Game theory in network security
Game theory in network securityGame theory in network security
Game theory in network securityRahmaSallam
 
Priiva consulting corporation_presentation midi_reg r14 sept 2010
Priiva consulting corporation_presentation midi_reg r14 sept 2010Priiva consulting corporation_presentation midi_reg r14 sept 2010
Priiva consulting corporation_presentation midi_reg r14 sept 2010Bill Forquer
 
Final_Presentation
Final_PresentationFinal_Presentation
Final_PresentationJoe Totherow
 
Gamification - ASTD RTA
Gamification - ASTD RTAGamification - ASTD RTA
Gamification - ASTD RTAtrickyraymer
 
Leap from Doing Agile to Being Agile_AAC2019
Leap from Doing Agile to Being Agile_AAC2019Leap from Doing Agile to Being Agile_AAC2019
Leap from Doing Agile to Being Agile_AAC2019Agile Austria Conference
 

Ähnlich wie Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game (20)

Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015
 
Project:Filter Design and Experimentation
Project:Filter Design and ExperimentationProject:Filter Design and Experimentation
Project:Filter Design and Experimentation
 
Game Balance 3: Interesting Strategies
Game Balance 3: Interesting StrategiesGame Balance 3: Interesting Strategies
Game Balance 3: Interesting Strategies
 
Adecision actionmodelforsoccer-120514174628-phpapp02
Adecision actionmodelforsoccer-120514174628-phpapp02Adecision actionmodelforsoccer-120514174628-phpapp02
Adecision actionmodelforsoccer-120514174628-phpapp02
 
Adecision actionmodelforsoccer-120514174628-phpapp02
Adecision actionmodelforsoccer-120514174628-phpapp02Adecision actionmodelforsoccer-120514174628-phpapp02
Adecision actionmodelforsoccer-120514174628-phpapp02
 
A decision action model for soccer
A decision action model for soccerA decision action model for soccer
A decision action model for soccer
 
gt_2007
gt_2007gt_2007
gt_2007
 
From Human Intelligence to Machine Intelligence
From Human Intelligence to Machine IntelligenceFrom Human Intelligence to Machine Intelligence
From Human Intelligence to Machine Intelligence
 
Autenrieth&wechselberger ract15
Autenrieth&wechselberger ract15Autenrieth&wechselberger ract15
Autenrieth&wechselberger ract15
 
10-15 research project preview
10-15 research project preview10-15 research project preview
10-15 research project preview
 
Planning and Integrating Deception into Computer Security Defenses
Planning and Integrating Deception into Computer Security DefensesPlanning and Integrating Deception into Computer Security Defenses
Planning and Integrating Deception into Computer Security Defenses
 
Truth and Consequences
Truth and ConsequencesTruth and Consequences
Truth and Consequences
 
Security for Thinkers
Security for ThinkersSecurity for Thinkers
Security for Thinkers
 
huntpedia.pdf
huntpedia.pdfhuntpedia.pdf
huntpedia.pdf
 
Game theory for a better world
Game theory for a better worldGame theory for a better world
Game theory for a better world
 
Game theory in network security
Game theory in network securityGame theory in network security
Game theory in network security
 
Priiva consulting corporation_presentation midi_reg r14 sept 2010
Priiva consulting corporation_presentation midi_reg r14 sept 2010Priiva consulting corporation_presentation midi_reg r14 sept 2010
Priiva consulting corporation_presentation midi_reg r14 sept 2010
 
Final_Presentation
Final_PresentationFinal_Presentation
Final_Presentation
 
Gamification - ASTD RTA
Gamification - ASTD RTAGamification - ASTD RTA
Gamification - ASTD RTA
 
Leap from Doing Agile to Being Agile_AAC2019
Leap from Doing Agile to Being Agile_AAC2019Leap from Doing Agile to Being Agile_AAC2019
Leap from Doing Agile to Being Agile_AAC2019
 

Mehr von Kelly Shortridge

The Red Pill of Resilience
The Red Pill of ResilienceThe Red Pill of Resilience
The Red Pill of ResilienceKelly Shortridge
 
Know Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-MakingKnow Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-MakingKelly Shortridge
 
How to Become an InfoSec Autodidact
How to Become an InfoSec AutodidactHow to Become an InfoSec Autodidact
How to Become an InfoSec AutodidactKelly Shortridge
 
The Art of Explanation: Behavioral models of infosec
The Art of Explanation: Behavioral models of infosecThe Art of Explanation: Behavioral models of infosec
The Art of Explanation: Behavioral models of infosecKelly Shortridge
 
Privacy vs. Security: A False Trade-Off?
Privacy vs. Security: A False Trade-Off? Privacy vs. Security: A False Trade-Off?
Privacy vs. Security: A False Trade-Off? Kelly Shortridge
 
DIY Education in Cyber Security
DIY Education in Cyber SecurityDIY Education in Cyber Security
DIY Education in Cyber SecurityKelly Shortridge
 
Cyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped OutCyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped OutKelly Shortridge
 

Mehr von Kelly Shortridge (7)

The Red Pill of Resilience
The Red Pill of ResilienceThe Red Pill of Resilience
The Red Pill of Resilience
 
Know Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-MakingKnow Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-Making
 
How to Become an InfoSec Autodidact
How to Become an InfoSec AutodidactHow to Become an InfoSec Autodidact
How to Become an InfoSec Autodidact
 
The Art of Explanation: Behavioral models of infosec
The Art of Explanation: Behavioral models of infosecThe Art of Explanation: Behavioral models of infosec
The Art of Explanation: Behavioral models of infosec
 
Privacy vs. Security: A False Trade-Off?
Privacy vs. Security: A False Trade-Off? Privacy vs. Security: A False Trade-Off?
Privacy vs. Security: A False Trade-Off?
 
DIY Education in Cyber Security
DIY Education in Cyber SecurityDIY Education in Cyber Security
DIY Education in Cyber Security
 
Cyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped OutCyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped Out
 

Kürzlich hochgeladen

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game