SlideShare a Scribd company logo
1 of 16
Download to read offline
SESSION	ID:SESSION	ID:
#RSAC
Gretchen	Myers
From	Vision	to	Reality:	Delivering	
Emerging	Cyber	Technologies	
Effectively
TECH-T10
Lead,	Security	Strategy	and	Emerging	Technologies
Chevron	Corporation
©	2017	Chevron. This	document	is	intended	only	for	use	by	Chevron	for	presentation	at	the	RSA®	Conference	February	13-17,	2017.
No	portion	of	this	document	may	be	copied,	displayed,	distributed,	reproduced,	published,	sold,	licensed,	downloaded,	
or	used	to	create	a	derivative	work,	unless	the	use	has	been	specifically	authorized	by	Chevron	in	writing.
The	challenge…
…the	stakes
#RSAC
Evergreen	Strategy	Management
5
Innovation	Queue
Business		Function/	
Technology	Domains
Master	Cybersecurity	Strategy
Life-cycle	&	GovernanceTrack	Component	Stages Roadmap
Review	&	Refreshed	annually	with	portfolio	planning.
External	
•Research
•Vendors
•Universities
•Partnerships
•Analyst	Services
Internal	
•Business	Strategy
•IT	Strategy
•IT	Strategists,	
Technology	Experts	
&	Architecture	
Leaders
Influences
Focus	Areas
Technology	Qualification	Process
#RSAC
TDS Name Description
1 Initiation Basic	principles observed	and	reported
2 Concept
Technology	concept	and/or	application	
formulated
3
Proof of	
Concept
Analytical and	experimental	critical	funcitons
and/or	characteristic	proof	of	concept
4 Integration
Component and/or	bench	configured	sub-
system	validation	in	laboratory	environment
5 Demonstration
Component	and/or bench	configured	sub-
system	validation	in	relevant	‘real	world’	
environment
6 Prototype
System/sub-system	model	or	prototype
demonstration	in	a	relevant	environment
7 Pre-production
System	prototype or	demonstration	in	the	
intended	operating	conditions	and	
environment
8 Production
Acutal system	completed	and	qualified	thorugh
test	and	demonstration	in	realistic operating	
environments
9 Field	Proven
Actual	system(s)	proven	thorugh successful	
field	operations
Chevron’s	Technology	Qualification	Process
#RSAC
Slow	Road:	Cybersecurity	Advanced	Analytics
7
• Chevron	has	encouraged	strategic	
research	in	data	science,	modeling	
and	analytics	for	almost	a	decade
• CISO	recognized	the	need	for	
analyzing	large	volumes	of	data	
effectively	and	approved	a	project	to	
develop	data	science	and	advanced	
analytics	capability
• Last	2	years	have	been	working	on	
transitioning	the	emerging	research	
into	an	operational	environment
#RSAC
Cybersecurity	Data	Science/Big	Data	Platform
exploration
è early	adopters
•no	standards
•proof	of	concept
standardization
è defining/refining
•standards	selection
•targeted	pilots
initial	build
è deployment
•production	platform
•continue	research
research	lab production
2016-17
hadoop	/	cloudera
data	acquisition	and	provisioning
advanced	analytics
visualization
analytics
big	data
#RSAC
Fast	Lane:	Cloud	Security
9
• Cloud	services	are	so	easy	to	use	– a		
credit	card	and	a	click	to	accept	Terms	
and	Conditions	
• Cloud	security	was	identified	as	an	
area	of	focus	in	early	2015
• At	the	same	time,	IT	strategy	began	to	
focus	on	adopting	cloud	services	
creating	a	sense	of	urgency
#RSAC
Discovering	Existing	Usage	and	Risk	Exposure
Executed simultaneous threads of discovery and analysis in 2015/2016
Ø Enterprisewide
view of usage and
risk exposure
Ø Recommended
monitoring
solutions
identify
Cloud
Access
Security
Brokers
compare
test results
and
recommend
best product
analyze
results and
prepare
stakeholder
reports
Understand current usage of
infrastructure and platform
services
Prepare
report on
overall
cloud usage
& projected
risks
#RSAC
Discovery	Results	as	of	December	2016
8356
Discovered Services
7067
Filtered Services
400
Services in Registry
107
Active Services
(In Registry)
Risks	Reviewed	 Service	1 Service	2 Service	3 Service	4 Service	5 Service	6 Service	7 Service	8
Service	Has	Known	
Vulnerabilities	&	Exploits	
3 3 3 3 3 3 3 3
Ownership	of	uploaded	
data
3 0 0 3 0 3 3 3
Timely	Data	Purge	
on	Customer	Departure
0 0 0 2 0 3 3 3
Personal	Info	Shared	with	
3rd	Parties
0 0 0 0 0 0 0 3
Third-party	
Cookies
0 0 0 0 0 0 0 0
Data	Center	
Is	Certified
3 3 0 3 0 3 3 3
Data	Encrypted	
In	transit
3 3 3 3 3 3 3 3
Data	Encrypted	
At	Rest
3 0 0 3 3 3 3 3
Role-based	Authentication	 3 0 0 3 0 3 3 3
Rating Score
Positive 3
Not	Yet	Determined 2
Negative 0
Enterprise	Risk	Analysis	of		Significant	Cloud	Services
#RSAC
Challenges
12
Data	management	and	data	quality	
continue	to	consume	significant	effort	to	
address
Finding	the	right	mix	of	technologists	and	
data	scientists	is	a	challenge	because	few	
individuals	have	the	full	range	of	skills	
including	cybersecurity,	software	
development	and	data	science
If	not	building	completely	within	the	cyber	
function,	then	be	very	clear	on	
dependencies	with	other	parts	of	the	
organization
Fast	Lane
With	a	fast	moving	target,	decisions	
need	to	be	made	quickly,	but	also	
carefully	documented
When	evaluating	vendors,	strategic	
roadmaps	matter	– how	they	align	with	
your	plans,	and	how	much	can	you	rely	
on	the	vendor	to	execute	as	planned
When	evaluating	the	tradeoffs,	
understand	what	you	can	fix	and	what	
you	can’t	– i.e.	embrace	the	serenity	
prayer
Slow	Road
#RSAC
Lessons	Learned
13
Engage	your	critics	- skeptics	can	be	your	best	resource	to	combat	tunnel	vision
Listen	to	the	concerns	and	let	them	ask	the	hard	questions
…	a	common	language	is	crucial	to	working	with	your	extended	community	
…	nothing	undermines	credibility	more	than	misinterpretations	of	results
Embrace	failure	and	capture	the	lessons	learned
Emerging	technology	is	often	too	narrowly	focused	or	too	broadly	applied	to	be	successful	– find	the	
niche	that	works	and	go	from	there
…	investment	in	a	PoC	or	pilot	does	not	mean	you	are	obligated	to	the	vendor	to	buy	their	product
…	implementing	a	solution	does	not	mean	you	have	to	‘justify	the	investment’	with	an	extended	
installation
Frame	the	problem	you	need	to	solve	and	stick	to	it
Short	term	gap	to	fill	or	long	term	vision	to	build?
Update	legacy	technology	or	find	opportunity	to	insert	the	emerging	solution?
#RSAC
Apply	What	You	Have	Learned	Today
14
Next	week:
Identify	internal	or	industry	processes	devoted	to	innovation,	research	and	
development
If	none	exist	for	your	organization	– define	at	least	two	opportunities	to	foster	
innovation	on	your	team
In	the	first	month	following	this	presentation:
Curate	your	favorite	sources	of	information	into	a	library	of	resources	to	facilitate	
identifying	trends,	sharing	thoughts,	and	challenging	assumptions
Develop	a	consistent	language	for	the	“fuzzy	front	end”	across	your	team
Within	six	months:
Define	a	vision	for	innovation	that	accommodates	the	practical	issues	that	face	
your	organization	today
Extend	your	resource	library	and	consistent	language	out	to	your	extended	teams
#RSAC
Questions?
Gretchen	Myers
email:	gmyers@chevron.com

More Related Content

Similar to From vision to reality delivering emerging cyber technologies effectively

Building an Enterprise-scale DevSecOps Infrastructure: Lessons Learned
Building an Enterprise-scale DevSecOps Infrastructure: Lessons LearnedBuilding an Enterprise-scale DevSecOps Infrastructure: Lessons Learned
Building an Enterprise-scale DevSecOps Infrastructure: Lessons LearnedPrateek Mishra
 
Symantec senior level open positions
Symantec senior level open positionsSymantec senior level open positions
Symantec senior level open positionsShyam Vaidyanathan
 
Presidio Networked Solutions Updated 12 15
Presidio Networked Solutions Updated 12 15Presidio Networked Solutions Updated 12 15
Presidio Networked Solutions Updated 12 15jdestefano
 
Andrea J Merenda Resume 2015v2
Andrea J  Merenda Resume 2015v2Andrea J  Merenda Resume 2015v2
Andrea J Merenda Resume 2015v2Andrea Merenda
 
SharePoint Live - Steps to Effective Governance
SharePoint Live - Steps to Effective GovernanceSharePoint Live - Steps to Effective Governance
SharePoint Live - Steps to Effective GovernanceRichard Harbridge
 
Improve Developer Experience with Developer Portal
Improve Developer Experience with Developer PortalImprove Developer Experience with Developer Portal
Improve Developer Experience with Developer PortalKumton Suttiraksiri
 
Engineering Manager, Edge Insights @Netflix
Engineering Manager, Edge Insights @NetflixEngineering Manager, Edge Insights @Netflix
Engineering Manager, Edge Insights @NetflixSangeeta Narayanan
 
Resume of hardik shah
Resume of hardik shahResume of hardik shah
Resume of hardik shahHardik Shah
 
IMPLEMENTATION BEST PRACTICES Sep 22.pdf
IMPLEMENTATION BEST PRACTICES Sep 22.pdfIMPLEMENTATION BEST PRACTICES Sep 22.pdf
IMPLEMENTATION BEST PRACTICES Sep 22.pdfudayabhaskar42
 
Bob panic solution architect - enterprise it systems & security architecture ...
Bob panic solution architect - enterprise it systems & security architecture ...Bob panic solution architect - enterprise it systems & security architecture ...
Bob panic solution architect - enterprise it systems & security architecture ...bob panic
 
Gayatri Supriya Vinjanampati_Resume_MS
Gayatri Supriya Vinjanampati_Resume_MSGayatri Supriya Vinjanampati_Resume_MS
Gayatri Supriya Vinjanampati_Resume_MSGayatri Ramana
 
Achieving DevOps using Open Source Tools in the Enterprise
Achieving DevOps using Open Source Tools in the EnterpriseAchieving DevOps using Open Source Tools in the Enterprise
Achieving DevOps using Open Source Tools in the EnterpriseCollabNet
 
Abhishek-New (1)
Abhishek-New (1)Abhishek-New (1)
Abhishek-New (1)Abhishek Sa
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...CA Technologies
 

Similar to From vision to reality delivering emerging cyber technologies effectively (20)

Building an Enterprise-scale DevSecOps Infrastructure: Lessons Learned
Building an Enterprise-scale DevSecOps Infrastructure: Lessons LearnedBuilding an Enterprise-scale DevSecOps Infrastructure: Lessons Learned
Building an Enterprise-scale DevSecOps Infrastructure: Lessons Learned
 
The DASA DevOps Competence Model: A Need for New Skills
The DASA DevOps Competence Model: A Need for New SkillsThe DASA DevOps Competence Model: A Need for New Skills
The DASA DevOps Competence Model: A Need for New Skills
 
Symantec senior level open positions
Symantec senior level open positionsSymantec senior level open positions
Symantec senior level open positions
 
mohammadshamimkhan
mohammadshamimkhanmohammadshamimkhan
mohammadshamimkhan
 
Presidio Networked Solutions Updated 12 15
Presidio Networked Solutions Updated 12 15Presidio Networked Solutions Updated 12 15
Presidio Networked Solutions Updated 12 15
 
Andrea J Merenda Resume 2015v2
Andrea J  Merenda Resume 2015v2Andrea J  Merenda Resume 2015v2
Andrea J Merenda Resume 2015v2
 
SharePoint Live - Steps to Effective Governance
SharePoint Live - Steps to Effective GovernanceSharePoint Live - Steps to Effective Governance
SharePoint Live - Steps to Effective Governance
 
Akash resume
Akash resumeAkash resume
Akash resume
 
Improve Developer Experience with Developer Portal
Improve Developer Experience with Developer PortalImprove Developer Experience with Developer Portal
Improve Developer Experience with Developer Portal
 
Engineering Manager, Edge Insights @Netflix
Engineering Manager, Edge Insights @NetflixEngineering Manager, Edge Insights @Netflix
Engineering Manager, Edge Insights @Netflix
 
Resume of hardik shah
Resume of hardik shahResume of hardik shah
Resume of hardik shah
 
IMPLEMENTATION BEST PRACTICES Sep 22.pdf
IMPLEMENTATION BEST PRACTICES Sep 22.pdfIMPLEMENTATION BEST PRACTICES Sep 22.pdf
IMPLEMENTATION BEST PRACTICES Sep 22.pdf
 
Bob panic solution architect - enterprise it systems & security architecture ...
Bob panic solution architect - enterprise it systems & security architecture ...Bob panic solution architect - enterprise it systems & security architecture ...
Bob panic solution architect - enterprise it systems & security architecture ...
 
Gayatri Supriya Vinjanampati_Resume_MS
Gayatri Supriya Vinjanampati_Resume_MSGayatri Supriya Vinjanampati_Resume_MS
Gayatri Supriya Vinjanampati_Resume_MS
 
TK Resume
TK ResumeTK Resume
TK Resume
 
Chintakunta
ChintakuntaChintakunta
Chintakunta
 
Irfan Ur Rehman
Irfan Ur RehmanIrfan Ur Rehman
Irfan Ur Rehman
 
Achieving DevOps using Open Source Tools in the Enterprise
Achieving DevOps using Open Source Tools in the EnterpriseAchieving DevOps using Open Source Tools in the Enterprise
Achieving DevOps using Open Source Tools in the Enterprise
 
Abhishek-New (1)
Abhishek-New (1)Abhishek-New (1)
Abhishek-New (1)
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

From vision to reality delivering emerging cyber technologies effectively