SlideShare ist ein Scribd-Unternehmen logo
Security Strategy
Enable business
and innovation
“… in a fast, flexible, complex
& ever changing environment”
Monica Verma
Monica Verma 2019
Digital Transformation…
Monica Verma 2019
43%
22%
Monica Verma 2019
Src: The State of DevOps on Financial Services
“Everyone wants to be innovative
and ahead of their competitors,
but very few are willing to change
the way they work”
Monica Verma
Monica Verma 2019
“Security as an enabler
We cannot win this cyberwar
without the security arsenal”
Monica Verma
Monica Verma 2019
Monica Verma
Head of Cloud Security
Monica Verma 2019
Monica Verma 2019
- Restriction
Integrity
(I)
- Obstacle
Confidentiality
(C)
Availability
(A)
Monica Verma 2019
- Restriction
Integrity
(I)
- Obstacle
Confidentiality
(C)
Availability
(A)
Monica Verma 2019
Better the
world
Change
Modernization
A shift
New ideas
Monica Verma 2019
Better the
world
Change
Modernization
A shift
Monica Verma 2019
New ideas
Better the
world
Change
Modernization
A shift
Monica Verma 2019
New ideas
+ Bank
+ Digital
Library
+ Camera
+ Health
+ Payments
+ Social
Effective, productive and innovative, secure and safe
Monica Verma 2019
“Security that enables companies to
do today and tomorrow that they
were not able to do yesterday”
Monica Verma
Monica Verma 2019
“Innovation in Aluminium
Aluminium inspires designers, architects and engineers to
innovate and challenge the status quo. The flexible metal has
endless possibilities to create exciting products that change
the way we live in innovative and sustainable ways.”
Hydro
Monica Verma 2019
Src: hydro.com
Monica Verma 2019
Src: nrk.no, helpnetsecurity.com dated 27.03.2019
“Digital threats will be a part of
everyday for Norwegian
companies in the years to come”
Ole Erik Almlid
CEO, NHO
350
MNOK
Hydro
2019
During the year ended December 31, 2018, the
Company recorded $401.2 million of pre-tax expenses
related to the 2017 cybersecurity incident
and insurance recoveries of $75.0 million for
net expenses of $326.2 million.
Src: equifax.com
Monica Verma 2019
148 mill.
Equifax
2017
2,8 mrd.
NOK
Equifax
siden 2017
2,5 mrd.
NOK
Maersk
2017
“Digital threats will be a part of everyday for
Norwegian companies in the years to come”
Ole Erik Almlid
CEO, NHO
“We are committed to being
an industry leader in
security and technology.”
Equifax, 2018 Annual Report
Monica Verma 2019
Monica Verma 2019
3 mrd.
Yahoo
2013
383 mill.
Marriott
Intl.
2014
148 mill.
Equifax
2017 110 mill.
Target
2013
57 mill.
Uber
2016
~350*
MNOK
Hydro
2019
2,5 mrd.
NOK
Maersk
2017
*as per 27.03.2019
Top 5
threats
acc. to
Global CEO
Survey
Challenge
Monica Verma 2019
Src: pwc.com
77%
CISO face
the dilemma
Monica Verma 2019
Src: bromium.com
77%
CISO face
the dilemma
Monica Verma 2019
Src: bromium.com
Monica Verma 2019
3C’s
Monica Verma 2019
3 C’s
Enable business?
What are brakes for?
To slow down? To stop?
Monica Verma
Monica Verma 2019
“Brakes are for going fast”
They give us the safety and security to be able to drive fast
Monica
Monica Verma 2019
What brakes are to fast speed,
security is to innovation
Monica
Monica Verma 2019
Steer
Pause
Halt
Continue
Speed
Monica
Monica Verma 2019
Monica Verma 2019
Pic source: sportskeeda.com
Seamless
& Integrated
security
& privacy
Monica Verma 2019
Goal
At the speed of
Innovation
Monica Verma 2019
Security
Plan
Code
B
uild Test
Release
D
eploy
O
perate
Monitor
Risk &
Threat
Modeling
Delta Risk
and DPI
Assessment
Test Code
Review
SAST
DAST
Pen-testing
& Intrusion
Detection
Log
& Security
IncidentMonica Verma 2019
Pic source: sportskeeda.com
1. DevSecOps
Plan
Code
B
uild Test
Release
D
eploy
O
perate
Monitor
Risk &
Threat
Modeling
Delta Risk
and DPI
Assessment
Test Code
Review
SAST
DAST
Pen-testing
& Intrusion
DetectionLog
& Security
Incident
Monica Verma 2019
Pic source: sportskeeda.com
2. Automate
Monica Verma 2019
Pic source: sportskeeda.com
2. Automate
§ Continuous Testing (CI/CD)
§ Infrastructure as Code/Security Patterns (Reuse)
§ Continuous Compliance (e.g. Live Dashboards)
DevSecOpsApproval
DPIA
PII
RiskAnalysis&Management
Design
Security/regulatoryrequirements
Service &
Product
Portfolio
3. Integrate
Shift-Left-Left
Monica Verma 2019
DevSecOps
Risk Owners OperationsProduct
SecurityGovernanceand
Risk
Monica Verma 2019
Development
Security ChampionIntegrated Sec.
SHIFT-LEFT
Security Awareness
3. Integrate
Shift-Left-Left
SHIFT-LEFT-LEFT
Security
Steering
Committee
Monica Verma 2019
OperationsCXO Development
Stakeholders
SHIFT-LEFT-LEFT
Product Marketing
Monica Verma 2019
Cloud
Supply
Chain
Security
MODEL
Security
Awareness
RISK-driven
& BC
Anchoring
INTEGRATION
within the
BUSINESS
Cyber Sec
Maturity
Model
(CSMM)
Monica Verma 2019
BUSINESS
Supply Chain
THREAT &
Vulnerability
Governance
& Compliance
Monica Verma 2019
Security
MODEL
Security
Awareness
RISK-driven
& BC
Anchoring
INTEGRATION
within the
BUSINESS
BUSINESS
Supply Chain
THREAT &
Vulnerability
Governance
& Compliance
Category X
Cyber Sec
Maturity
Model
(CSMM)
“Security that enables companies
to do today and tomorrow that
they were not able to do yesterday”
Monica Verma
Monica Verma 2019
Monica Verma 2019
INNOVATION &
DIGITALIZATION
Enabled and
Secured
Pic sourcc: sportskeeda.com

Weitere ähnliche Inhalte

Ähnlich wie DevSecOps Security Enabling Business and Innovation

Security at the Speed of Innovation and Transformation
Security at the Speed of Innovation and TransformationSecurity at the Speed of Innovation and Transformation
Security at the Speed of Innovation and Transformation
Monica Verma
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions Overview
John D. Haden
 
MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018
Match-Maker Ventures
 
MECSCE 2015 - Brochure
MECSCE 2015 - BrochureMECSCE 2015 - Brochure
MECSCE 2015 - Brochure
ME Cyber Security Oman
 
Uncertain Times Can Bring New Opportunities
Uncertain Times Can Bring New OpportunitiesUncertain Times Can Bring New Opportunities
Uncertain Times Can Bring New Opportunities
IEEEP Karachi
 
The 10 Most Influential Women In Cyber Security,2023.pdf
The 10 Most Influential Women In Cyber Security,2023.pdfThe 10 Most Influential Women In Cyber Security,2023.pdf
The 10 Most Influential Women In Cyber Security,2023.pdf
CIO Look Magazine
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014
Chin Wan Lim
 
symc_annual2000
symc_annual2000symc_annual2000
symc_annual2000
finance40
 
The Trailblazing Cybersecurity Leaders to Watch in 2024 (1) (1).pdf
The Trailblazing Cybersecurity Leaders to Watch in 2024 (1) (1).pdfThe Trailblazing Cybersecurity Leaders to Watch in 2024 (1) (1).pdf
The Trailblazing Cybersecurity Leaders to Watch in 2024 (1) (1).pdf
CIO Look Magazine
 
Redefining Boundaries - Total Telecom Festival 1 Dec 2015
Redefining Boundaries -  Total Telecom Festival 1 Dec 2015Redefining Boundaries -  Total Telecom Festival 1 Dec 2015
Redefining Boundaries - Total Telecom Festival 1 Dec 2015
Rob Van Den Dam
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
Dominic Vogel
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
Management Events
 
Fuelling Digital Innovation - Webinar Deck
Fuelling Digital Innovation - Webinar DeckFuelling Digital Innovation - Webinar Deck
Fuelling Digital Innovation - Webinar Deck
The Digital Insurer
 
Top 9 Trends in Cybersecurity for 2024.pptx
Top 9 Trends in Cybersecurity for 2024.pptxTop 9 Trends in Cybersecurity for 2024.pptx
Top 9 Trends in Cybersecurity for 2024.pptx
devvsandy
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
International Federation of Accountants
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
alvin chin
 
10 Most Influential Leaders in Cybersecurity 2022.pdf
10 Most Influential Leaders in Cybersecurity 2022.pdf10 Most Influential Leaders in Cybersecurity 2022.pdf
10 Most Influential Leaders in Cybersecurity 2022.pdf
CIO Look Magazine
 
Redefining Boundaries - Digiworld 2015
Redefining Boundaries - Digiworld 2015 Redefining Boundaries - Digiworld 2015
Redefining Boundaries - Digiworld 2015
Rob Van Den Dam
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
IBM Security
 
Check Point SMB Proposition
Check Point SMB PropositionCheck Point SMB Proposition
Check Point SMB Proposition
Group of company MUK
 

Ähnlich wie DevSecOps Security Enabling Business and Innovation (20)

Security at the Speed of Innovation and Transformation
Security at the Speed of Innovation and TransformationSecurity at the Speed of Innovation and Transformation
Security at the Speed of Innovation and Transformation
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions Overview
 
MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018
 
MECSCE 2015 - Brochure
MECSCE 2015 - BrochureMECSCE 2015 - Brochure
MECSCE 2015 - Brochure
 
Uncertain Times Can Bring New Opportunities
Uncertain Times Can Bring New OpportunitiesUncertain Times Can Bring New Opportunities
Uncertain Times Can Bring New Opportunities
 
The 10 Most Influential Women In Cyber Security,2023.pdf
The 10 Most Influential Women In Cyber Security,2023.pdfThe 10 Most Influential Women In Cyber Security,2023.pdf
The 10 Most Influential Women In Cyber Security,2023.pdf
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014
 
symc_annual2000
symc_annual2000symc_annual2000
symc_annual2000
 
The Trailblazing Cybersecurity Leaders to Watch in 2024 (1) (1).pdf
The Trailblazing Cybersecurity Leaders to Watch in 2024 (1) (1).pdfThe Trailblazing Cybersecurity Leaders to Watch in 2024 (1) (1).pdf
The Trailblazing Cybersecurity Leaders to Watch in 2024 (1) (1).pdf
 
Redefining Boundaries - Total Telecom Festival 1 Dec 2015
Redefining Boundaries -  Total Telecom Festival 1 Dec 2015Redefining Boundaries -  Total Telecom Festival 1 Dec 2015
Redefining Boundaries - Total Telecom Festival 1 Dec 2015
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
Fuelling Digital Innovation - Webinar Deck
Fuelling Digital Innovation - Webinar DeckFuelling Digital Innovation - Webinar Deck
Fuelling Digital Innovation - Webinar Deck
 
Top 9 Trends in Cybersecurity for 2024.pptx
Top 9 Trends in Cybersecurity for 2024.pptxTop 9 Trends in Cybersecurity for 2024.pptx
Top 9 Trends in Cybersecurity for 2024.pptx
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
10 Most Influential Leaders in Cybersecurity 2022.pdf
10 Most Influential Leaders in Cybersecurity 2022.pdf10 Most Influential Leaders in Cybersecurity 2022.pdf
10 Most Influential Leaders in Cybersecurity 2022.pdf
 
Redefining Boundaries - Digiworld 2015
Redefining Boundaries - Digiworld 2015 Redefining Boundaries - Digiworld 2015
Redefining Boundaries - Digiworld 2015
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
 
Check Point SMB Proposition
Check Point SMB PropositionCheck Point SMB Proposition
Check Point SMB Proposition
 

Kürzlich hochgeladen

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 

Kürzlich hochgeladen (20)

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 

DevSecOps Security Enabling Business and Innovation