SlideShare a Scribd company logo
1 of 21
Threat Assessment:
the New Normal
Dr. Curtis A. Carver Jr.
Vice Chancellor and CIO
Board of Regents
University System of Georgia
Agenda
• Emerging Threats
• Emerging
Opportunities
• Business Impact
Virtual Library

3,300 mile Private Cloud

Distance Education

Enterprise Security and ePrivacy

Enterprise Financials

Collaboration

Student Information

Enterprise BI

Software Store

Learning Management

Library Operations
This space for rent by
Chinese National Army.
Please contact Dr. Curt
Carver as we can read all
his email anyway.

PREMISE 1: GROWING THREAT
Emerging Threats
(on a scale of 1 to 10)
10 United States,
United Kingdom,
Russia
7

China

3

Iran
Can You Defend Against
100,000 Professionally
Trained Hackers?
Consider Mandiant Report on AG1
• Believed to be People Liberation Army Unit 61398.
• State sponsored, state funded, state secret.

• Since 2006, they have compromised 141 companies
spanning 20 major industries.
• Maintained access for an average of 356 days. Longest
measured access was 1,764 days.
Focus on Nation States
If a nation state wants
to break into your system,
will they?
Quiz
• Question: What happens if you Google a
system error?
• Answer: Nation states run a site that provides
guidance on answering a system error while
attacking your computer.
PREMISE 2: WHAT IS THE TRUTH?
First Rule of the Internet
Agreement does not scale
Effect of the WWW on the Normal
Curve of Behavior?
It is the best of times,
for morons and geniuses alike.
Quick Recap
We live in a world of growing threats where a
battle for the truth rages conducted by morons
and geniuses alike, operating from safe havens
created by a flattening of the norms of human
behavior which threaten the very existence of
mankind….
[run-on but
very depressing sentence continues]
Emerging Opportunities
Well, we have the geniuses….
6.8 billion people….

5.1 own cell phones….

4.1 own toothbrushes….
Security

Business
Intel

Global
Big Data

Cloud

Privacy

Consumerization

Social

Location

RealTime
Response as important as Prevention
Get Agile

Get Big

Think Social
Think Consumerization

Build Mobile
First
Questions, Comments, a
Conversation
Dr. Curtis A. Carver Jr.
Vice Chancellor and CIO
Board of Regents
University System of Georgia

More Related Content

Viewers also liked

Journal of Physical Security 8(2)
Journal of Physical Security 8(2)Journal of Physical Security 8(2)
Journal of Physical Security 8(2)Roger Johnston
 
Journal of Physical Security 7(2)
Journal of Physical Security 7(2)Journal of Physical Security 7(2)
Journal of Physical Security 7(2)Roger Johnston
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...CSCJournals
 
33 Unconventional Security Devices
33 Unconventional Security Devices33 Unconventional Security Devices
33 Unconventional Security DevicesRoger Johnston
 
Journal of Physical Security 9(1)
Journal of Physical Security 9(1)Journal of Physical Security 9(1)
Journal of Physical Security 9(1)Roger Johnston
 
Journal of Physical Security 6(1)
Journal of Physical Security 6(1)Journal of Physical Security 6(1)
Journal of Physical Security 6(1)Roger Johnston
 
Journal of Physical Security 7(3)
Journal of Physical Security 7(3)Journal of Physical Security 7(3)
Journal of Physical Security 7(3)Roger Johnston
 
The Journal of Physical Security 9(2)
The Journal of Physical Security 9(2)The Journal of Physical Security 9(2)
The Journal of Physical Security 9(2)Roger Johnston
 
Journal of Physical Security 8(1)
Journal of Physical Security 8(1)Journal of Physical Security 8(1)
Journal of Physical Security 8(1)Roger Johnston
 
Threats vs. Vulnerabilities
Threats vs. Vulnerabilities Threats vs. Vulnerabilities
Threats vs. Vulnerabilities Roger Johnston
 
TES-SAVi MBSE for SoSEnI Opportunities
TES-SAVi MBSE for SoSEnI OpportunitiesTES-SAVi MBSE for SoSEnI Opportunities
TES-SAVi MBSE for SoSEnI OpportunitiesStephen Simi
 
Security Measures
Security MeasuresSecurity Measures
Security Measureshanna91
 
Threat Assessment
Threat AssessmentThreat Assessment
Threat Assessmentbradburns
 
Risk Assessment and Threat Modeling
Risk Assessment and Threat ModelingRisk Assessment and Threat Modeling
Risk Assessment and Threat Modelingsedukull
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Securityleminhvuong
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security AssessmentsTom Eston
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentGary Bahadur
 
Threat assessment and the active shooter
Threat assessment and the active shooterThreat assessment and the active shooter
Threat assessment and the active shooterworkthreatgroup
 

Viewers also liked (20)

Journal of Physical Security 8(2)
Journal of Physical Security 8(2)Journal of Physical Security 8(2)
Journal of Physical Security 8(2)
 
Journal of Physical Security 7(2)
Journal of Physical Security 7(2)Journal of Physical Security 7(2)
Journal of Physical Security 7(2)
 
Savi chapter1
Savi chapter1Savi chapter1
Savi chapter1
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
 
33 Unconventional Security Devices
33 Unconventional Security Devices33 Unconventional Security Devices
33 Unconventional Security Devices
 
Journal of Physical Security 9(1)
Journal of Physical Security 9(1)Journal of Physical Security 9(1)
Journal of Physical Security 9(1)
 
Journal of Physical Security 6(1)
Journal of Physical Security 6(1)Journal of Physical Security 6(1)
Journal of Physical Security 6(1)
 
Journal of Physical Security 7(3)
Journal of Physical Security 7(3)Journal of Physical Security 7(3)
Journal of Physical Security 7(3)
 
The Journal of Physical Security 9(2)
The Journal of Physical Security 9(2)The Journal of Physical Security 9(2)
The Journal of Physical Security 9(2)
 
Journal of Physical Security 8(1)
Journal of Physical Security 8(1)Journal of Physical Security 8(1)
Journal of Physical Security 8(1)
 
Threats vs. Vulnerabilities
Threats vs. Vulnerabilities Threats vs. Vulnerabilities
Threats vs. Vulnerabilities
 
TES-SAVi MBSE for SoSEnI Opportunities
TES-SAVi MBSE for SoSEnI OpportunitiesTES-SAVi MBSE for SoSEnI Opportunities
TES-SAVi MBSE for SoSEnI Opportunities
 
Security Measures
Security MeasuresSecurity Measures
Security Measures
 
Threat Assessment
Threat AssessmentThreat Assessment
Threat Assessment
 
Risk Assessment and Threat Modeling
Risk Assessment and Threat ModelingRisk Assessment and Threat Modeling
Risk Assessment and Threat Modeling
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Security
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Threat assessment and the active shooter
Threat assessment and the active shooterThreat assessment and the active shooter
Threat assessment and the active shooter
 

Similar to Threat Assessment: Emerging Risks and Opportunities

Innovation, agility, and a fight for survival a love storyv2
Innovation, agility, and a fight for survival a love storyv2Innovation, agility, and a fight for survival a love storyv2
Innovation, agility, and a fight for survival a love storyv2Curtis A. Carver Jr.
 
Collective Inteligence Part I
Collective Inteligence Part ICollective Inteligence Part I
Collective Inteligence Part IAli Abbasi
 
Working with law enforcement
Working with law enforcementWorking with law enforcement
Working with law enforcementMeg Weber
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1Brett L. Scott
 
Watson - A new era of computing.
Watson - A new era of computing.Watson - A new era of computing.
Watson - A new era of computing.Cesar Maciel
 
Examining the Big Data Frontier
Examining the Big Data FrontierExamining the Big Data Frontier
Examining the Big Data FrontierGovLoop
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
Crowd-Sourced Threat Intelligence
Crowd-Sourced Threat IntelligenceCrowd-Sourced Threat Intelligence
Crowd-Sourced Threat IntelligenceAlienVault
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsFidelis Cybersecurity
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Chuck Brooks
 
CHIME LEAD DC 2014 “Key Attributes for Success, Challenges and Critical Succe...
CHIME LEAD DC 2014 “Key Attributes for Success, Challenges and Critical Succe...CHIME LEAD DC 2014 “Key Attributes for Success, Challenges and Critical Succe...
CHIME LEAD DC 2014 “Key Attributes for Success, Challenges and Critical Succe...Health IT Conference – iHT2
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyStephanie McVitty
 
Applying Noisy Knowledge Graphs to Real Problems
Applying Noisy Knowledge Graphs to Real ProblemsApplying Noisy Knowledge Graphs to Real Problems
Applying Noisy Knowledge Graphs to Real ProblemsDataWorks Summit
 
Internet of Things, You have been Assimilated
Internet of Things, You have been Assimilated Internet of Things, You have been Assimilated
Internet of Things, You have been Assimilated Upstarts.tv
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threatsisc2dfw
 
t Success: An Update to the Georgia Southern IT Community
t Success: An Update to the Georgia Southern IT Communityt Success: An Update to the Georgia Southern IT Community
t Success: An Update to the Georgia Southern IT CommunityCurtis A. Carver Jr.
 

Similar to Threat Assessment: Emerging Risks and Opportunities (20)

Innovation, agility, and a fight for survival a love storyv2
Innovation, agility, and a fight for survival a love storyv2Innovation, agility, and a fight for survival a love storyv2
Innovation, agility, and a fight for survival a love storyv2
 
American College of California Emergency Threats CounterMeasure Paper.pdf
American College of California Emergency Threats CounterMeasure Paper.pdfAmerican College of California Emergency Threats CounterMeasure Paper.pdf
American College of California Emergency Threats CounterMeasure Paper.pdf
 
Collective Inteligence Part I
Collective Inteligence Part ICollective Inteligence Part I
Collective Inteligence Part I
 
Working with law enforcement
Working with law enforcementWorking with law enforcement
Working with law enforcement
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
Do it Best Corp. Techapalooza 2013 Presentation
Do it Best Corp. Techapalooza 2013 PresentationDo it Best Corp. Techapalooza 2013 Presentation
Do it Best Corp. Techapalooza 2013 Presentation
 
Watson - A new era of computing.
Watson - A new era of computing.Watson - A new era of computing.
Watson - A new era of computing.
 
Examining the Big Data Frontier
Examining the Big Data FrontierExamining the Big Data Frontier
Examining the Big Data Frontier
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Crowd-Sourced Threat Intelligence
Crowd-Sourced Threat IntelligenceCrowd-Sourced Threat Intelligence
Crowd-Sourced Threat Intelligence
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
CHIME LEAD DC 2014 “Key Attributes for Success, Challenges and Critical Succe...
CHIME LEAD DC 2014 “Key Attributes for Success, Challenges and Critical Succe...CHIME LEAD DC 2014 “Key Attributes for Success, Challenges and Critical Succe...
CHIME LEAD DC 2014 “Key Attributes for Success, Challenges and Critical Succe...
 
Rock eagle thursday presentation
Rock eagle thursday presentationRock eagle thursday presentation
Rock eagle thursday presentation
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
 
Applying Noisy Knowledge Graphs to Real Problems
Applying Noisy Knowledge Graphs to Real ProblemsApplying Noisy Knowledge Graphs to Real Problems
Applying Noisy Knowledge Graphs to Real Problems
 
Internet of Things, You have been Assimilated
Internet of Things, You have been Assimilated Internet of Things, You have been Assimilated
Internet of Things, You have been Assimilated
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threats
 
t Success: An Update to the Georgia Southern IT Community
t Success: An Update to the Georgia Southern IT Communityt Success: An Update to the Georgia Southern IT Community
t Success: An Update to the Georgia Southern IT Community
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 

More from Curtis A. Carver Jr.

Cutting Edge Developments from Georgia
Cutting Edge Developments from GeorgiaCutting Edge Developments from Georgia
Cutting Edge Developments from GeorgiaCurtis A. Carver Jr.
 
A wireless roadmap for 250,000 users and growth
A wireless roadmap for 250,000 users and growthA wireless roadmap for 250,000 users and growth
A wireless roadmap for 250,000 users and growthCurtis A. Carver Jr.
 
Deploying and utilizing statewide private cloud lessons learned
Deploying and utilizing statewide private cloud   lessons learnedDeploying and utilizing statewide private cloud   lessons learned
Deploying and utilizing statewide private cloud lessons learnedCurtis A. Carver Jr.
 
Non-Technologist’s Guide to Technology Support of Adult Learners
Non-Technologist’s Guide to Technology Support of Adult LearnersNon-Technologist’s Guide to Technology Support of Adult Learners
Non-Technologist’s Guide to Technology Support of Adult LearnersCurtis A. Carver Jr.
 
Four important trends in it and security implications
Four important trends in it and security implicationsFour important trends in it and security implications
Four important trends in it and security implicationsCurtis A. Carver Jr.
 
Mentoring Presentation to Athens Clarke County
Mentoring Presentation to Athens Clarke CountyMentoring Presentation to Athens Clarke County
Mentoring Presentation to Athens Clarke CountyCurtis A. Carver Jr.
 
Thoughts on information to support decision making
Thoughts on information to support decision makingThoughts on information to support decision making
Thoughts on information to support decision makingCurtis A. Carver Jr.
 
Transform today to innovate for tomorrow
Transform today to innovate for tomorrowTransform today to innovate for tomorrow
Transform today to innovate for tomorrowCurtis A. Carver Jr.
 
It innovation in an era of diminshing resourcing
It innovation in an era of diminshing resourcingIt innovation in an era of diminshing resourcing
It innovation in an era of diminshing resourcingCurtis A. Carver Jr.
 
Four important trends in 20 minutes
Four important trends in 20 minutesFour important trends in 20 minutes
Four important trends in 20 minutesCurtis A. Carver Jr.
 
Bring your own device to your local state
Bring your own device to your local stateBring your own device to your local state
Bring your own device to your local stateCurtis A. Carver Jr.
 
Playing the long game changing security culture in usg
Playing the long game changing security culture in usgPlaying the long game changing security culture in usg
Playing the long game changing security culture in usgCurtis A. Carver Jr.
 
“Data security prep for the holidays or how not to go dark on black friday
“Data security prep for the holidays or how not to go dark on black friday“Data security prep for the holidays or how not to go dark on black friday
“Data security prep for the holidays or how not to go dark on black fridayCurtis A. Carver Jr.
 
Transformation and innovation in the new normal a call to action
Transformation and innovation in the new normal   a call to actionTransformation and innovation in the new normal   a call to action
Transformation and innovation in the new normal a call to actionCurtis A. Carver Jr.
 

More from Curtis A. Carver Jr. (19)

100 day letter
100 day letter100 day letter
100 day letter
 
Cutting Edge Developments from Georgia
Cutting Edge Developments from GeorgiaCutting Edge Developments from Georgia
Cutting Edge Developments from Georgia
 
A wireless roadmap for 250,000 users and growth
A wireless roadmap for 250,000 users and growthA wireless roadmap for 250,000 users and growth
A wireless roadmap for 250,000 users and growth
 
Deploying and utilizing statewide private cloud lessons learned
Deploying and utilizing statewide private cloud   lessons learnedDeploying and utilizing statewide private cloud   lessons learned
Deploying and utilizing statewide private cloud lessons learned
 
Non-Technologist’s Guide to Technology Support of Adult Learners
Non-Technologist’s Guide to Technology Support of Adult LearnersNon-Technologist’s Guide to Technology Support of Adult Learners
Non-Technologist’s Guide to Technology Support of Adult Learners
 
Four important trends in it and security implications
Four important trends in it and security implicationsFour important trends in it and security implications
Four important trends in it and security implications
 
Mentoring Presentation to Athens Clarke County
Mentoring Presentation to Athens Clarke CountyMentoring Presentation to Athens Clarke County
Mentoring Presentation to Athens Clarke County
 
Thoughts on information to support decision making
Thoughts on information to support decision makingThoughts on information to support decision making
Thoughts on information to support decision making
 
Transform today to innovate for tomorrow
Transform today to innovate for tomorrowTransform today to innovate for tomorrow
Transform today to innovate for tomorrow
 
System level innovation
System level innovationSystem level innovation
System level innovation
 
It innovation in an era of diminshing resourcing
It innovation in an era of diminshing resourcingIt innovation in an era of diminshing resourcing
It innovation in an era of diminshing resourcing
 
Four important trends in 20 minutes
Four important trends in 20 minutesFour important trends in 20 minutes
Four important trends in 20 minutes
 
Bring your own device to your local state
Bring your own device to your local stateBring your own device to your local state
Bring your own device to your local state
 
Playing the long game changing security culture in usg
Playing the long game changing security culture in usgPlaying the long game changing security culture in usg
Playing the long game changing security culture in usg
 
Galileo at a Crossroads
Galileo at a CrossroadsGalileo at a Crossroads
Galileo at a Crossroads
 
“Data security prep for the holidays or how not to go dark on black friday
“Data security prep for the holidays or how not to go dark on black friday“Data security prep for the holidays or how not to go dark on black friday
“Data security prep for the holidays or how not to go dark on black friday
 
Transformation and innovation in the new normal a call to action
Transformation and innovation in the new normal   a call to actionTransformation and innovation in the new normal   a call to action
Transformation and innovation in the new normal a call to action
 
Is Technology Leading the Change?
Is Technology Leading the Change?Is Technology Leading the Change?
Is Technology Leading the Change?
 
AIIM 2013 conference curt_carver
AIIM 2013 conference curt_carverAIIM 2013 conference curt_carver
AIIM 2013 conference curt_carver
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Threat Assessment: Emerging Risks and Opportunities