SlideShare a Scribd company logo
1 of 21
Download to read offline
SESSION	ID:SESSION	ID:
#RSAC
Michele	Iacovone
Securely	Moving	Data	to	the	Cloud	with	
Confidence	and	Customer	Focus	
CSV-R10F
Senior	Vice	President,	Chief	Information	Security	and	Fraud	Officer	
Intuit
@mikiyako
#RSAC
About	Michele
2
Former	Intuit	Chief	Architect
Previous	roles:	Global	Platforms	for	Dun	&	Bradstreet,	
as	well	as	CTO	for	both	LiveCapital and	Collabria
What	I	do	when	I’m	not
protecting	Intuit’s	data
#RSAC
What	you	will	learn	from	this	presentation
3
Educate ApplyLearn	
I	can	inspire	you	to	
help	your	organization	
move	sensitive	work	
loads	into	the	cloud….
…so	that	you	can	
learn	from	our	
experiences
Guiding	principles	
will	help	you	to	
be	successful!	
+ =
#RSAC
To	improve	our	customers’	financial	lives	so	profoundly…
they	can’t	imagine	going	back	to	the	old	way.
Consumers Small	Businesses Accounting	Professionals
Intuit’s	Mission
Accountants
Payments
Self-Employed
Serving	42	million	customers	across	the	globe!
4
#RSAC
Intuit	at-a-glance
5
Founded
1983
Employees
7,900+
Engineers
3,000+
Customers
42M
FY’16 Revenue
$4.7B
Online & Mobile
Over $3B
Market Cap
$30.03B
#RSAC
Proven	track	record	of	managing	change
Era	of	the	CloudEra	of	Windows Era	of	WebEra	of	DOS
2010+1980s 1990s 2000s
Intuit	Founded
Quicken	
DOS
IPO
Quicken	
Windows
QuickBooks	
DOS
TurboTax	Online
QuickBooks	
Windows
TurboTax	Windows
QuickBooks	
MobileQuickBooks	Online
QuickBooks	
Online	Global
• Employees:	150
• Customers:	1.3M
• Revenue:	$33M
• INTU	+	1,400%,	NASDAQ	+	~500%
• Employees:	4,500	
• Customers:	5.6M	
• Revenue:	$1.04B
• INTU	- 20%,	NASDAQ	- 40%
• Employees:	7900+
• Customers:	42M
• Revenue:	$4.7B
• INTU	+160%,	NASDAQ	90%
INTU	share	price
SnapTax
Competitor	A
Competitor	A Competitor	C
Competitor	A
Competitor	A
Competitor	B
Competitor	D
Competitor	E
#RSAC
Intuit	is	fully	committed	to	winning	in	the	cloud
7
Motivation	to	increase	speed	and	ease	for	our	engineers	
and	operations	teams
As	Intuit	shifted	to	cloud	based	products	– opportunity	
to	leverage	wealth	of	services	in	the	public	cloud
Highly	seasonal	business	– leverage	elasticity
but	cost	was	a	secondary	consideration
As	one	of	the	earliest	companies	of	this	scale
with	sensitive	financial	data	– strong	strategic
partnership	required
#RSAC
Our	Cloud	Security Journey
#RSAC
Our	cloud	security	journey	
9
Consider	security
needs	early	in	your
journey	and	iterate	
quickly	and	often
We	spent	a	lot	of	time	thinking	about	security	
before	we	enabled	and	mobilized	our	teams,	
and	we	left	room	for	learning.
#RSAC
Our	cloud	security	journey	
10
Security	in	the	cloud	
requires	a	trusted	
partnership	with	your	
provider	
We	worked	closely	with	AWS	to	define	
security	services	and	apply	security	
features	across	many	of	their	services.
#RSAC
Our	cloud	security	journey	
11
Speed	•	Security	•	Variability	
Prioritize	the	highest	
risks	and	continuously	
improve	over	time
#RSAC
What	we’ve	learned
#RSAC
What	we’ve	learned	
13
Figure:	Security	Hierarchy	of	Needs
#RSAC
Zoning	and	Containment	
14
Figure:	Security	Hierarchy	of	Needs
Zoning	&	Containment
Understanding	and	controlling	blast	radius	is	a	
significant	principle	to	avoid	issues	like	
CodeSpaces.		
Like	firewall	zoning,	having	controls	to	mitigate	
the	risk	of	a	single	catastrophic	event	is	good	
cloud	security.		
Blast	radius	isn’t	easy,	but	it	is	quite	necessary	
towards	creating	the	constraints	required	for	
security	earlier	in	the	software	development	
lifecycle.
#RSAC
Asset	Management
15
Figure:	Security	Hierarchy	of	Needs
Asset	Management
Tracking	configuration	versioning	within	cloud	
platforms	increases	security	attribution	for	free.		
Understand	the	infrastructure	and	compute	
landscape	when	testing	and	triaging	incidents.		
Attribution	reduces	the	time	required	to	close	
out	mistakes.
Worked	with	AWS	to	enhance	CloudTrail and	
develop	Config to	improve	security	investigations	
and	incident	response.
#RSAC
Logging
16
Figure:	Security	Hierarchy	of	Needs
Logging
Everything	should	be	logged	and	transparent	to	
increase	fast	response.	
Intuit	spearheaded	instrumentation	for	cross-
account	visibility	and	detection	of	potential	
abuse	cases	integrated	with	our	operational	
processes	and	monitoring.
Logs	provide	information	and	data	for	security	to	
increase	knowledge	in	real-time	about	what’s	
happening	in	cloud- based	environments.
#RSAC
Authentication
17
Figure:	Security	Hierarchy	of	Needs
Authentication
Increasing	the	use	of	MFA	helps	to	further	
protect	customer	data	in	the	cloud.		
The	strength	of	authentication	and	identity	
management	is	important	when	sharing.
Securing	cloud	capabilities	and	APIs	are	
increasingly	dependent	on	better	identity	
verification,	authentication	and	authorization	
mechanisms.
#RSAC
Encryption
18
Figure:	Security	Hierarchy	of	Needs
Use	transparent	encryption	everywhere
Fine-grained	application	level	encryption	with	
distributed	key	management	can	provide	data	
control	in	shared	environments	like	the	cloud
Focus	on	your	data	classification	policy	
Key	rotation,	key	audit	and	fine-grained	key	scope	
to	minimize	blast	radius	and	exposure
Encryption
#RSAC
What	we’ve	learned	
19
Figure:	Security	Hierarchy	of	Needs
Fine-grained	application	level	encryption	with	distributed	key	management
Increase	the	use	of	MFA
Everything	should	be	logged	and	transparent	to	increase	fast	response
Tracking	configuration	versioning	within	cloud	platforms	
increases	security	attribution	for	free
Understanding	and	controlling	blast	radius
#RSAC
Security	for	thought	
20
Security	can	drive	innovation	and	needs	a	pervasive	mindset	among	
your	teams	
Security	done	right,	especially	in	the	public	cloud,	can	be	a	
differentiator	
Make	security	a	commitment	before	you	start	your	journey
#RSAC
Questions?

More Related Content

Similar to Securely moving data to the cloud with confidence and customer focus

Cisco - A CIO Perspective:
Cisco - A CIO Perspective: Cisco - A CIO Perspective:
Cisco - A CIO Perspective: njain_seanet
 
People Source Corporate Brochure - Andrew Pryce Jones - National Security (2)
People Source Corporate Brochure - Andrew Pryce Jones - National Security (2)People Source Corporate Brochure - Andrew Pryce Jones - National Security (2)
People Source Corporate Brochure - Andrew Pryce Jones - National Security (2)Andrew Pryce-Jones
 
Digital Employee Experience Breakfast - 9th May Wellington
Digital Employee Experience Breakfast - 9th May WellingtonDigital Employee Experience Breakfast - 9th May Wellington
Digital Employee Experience Breakfast - 9th May WellingtonSquiz
 
The 3-Speed Chief Data Officer
The 3-Speed Chief Data OfficerThe 3-Speed Chief Data Officer
The 3-Speed Chief Data OfficerDenodo
 
Best of 5 Blockchain Companies-2023.pdf
Best of 5 Blockchain Companies-2023.pdfBest of 5 Blockchain Companies-2023.pdf
Best of 5 Blockchain Companies-2023.pdfCIOLOOKIndia
 
Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service in a Financial Institution: Reality or Chimera?Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service in a Financial Institution: Reality or Chimera?Javier Losa
 
User Contribution in Knowledge Management – A Journey to Semantic Technology
User Contribution in Knowledge Management – A Journey to Semantic TechnologyUser Contribution in Knowledge Management – A Journey to Semantic Technology
User Contribution in Knowledge Management – A Journey to Semantic Technologysuyu22
 
Digital Transformation How Digital Disruption is redefining the industries an...
Digital Transformation How Digital Disruption is redefining the industries an...Digital Transformation How Digital Disruption is redefining the industries an...
Digital Transformation How Digital Disruption is redefining the industries an...technology_forum
 
Role of it in marketing of services
Role of it in marketing of servicesRole of it in marketing of services
Role of it in marketing of servicesJinmoyBaishya1
 
About Misha Infotech
About Misha InfotechAbout Misha Infotech
About Misha InfotechAmit K
 
Deep Impact: Explore the Wide- Reaching Impact of a Cyberattack
Deep Impact: Explore the Wide- Reaching Impact of a CyberattackDeep Impact: Explore the Wide- Reaching Impact of a Cyberattack
Deep Impact: Explore the Wide- Reaching Impact of a CyberattackPriyanka Aash
 

Similar to Securely moving data to the cloud with confidence and customer focus (20)

Cisco - A CIO Perspective:
Cisco - A CIO Perspective: Cisco - A CIO Perspective:
Cisco - A CIO Perspective:
 
Talent Digital
Talent DigitalTalent Digital
Talent Digital
 
Talent Digital
Talent DigitalTalent Digital
Talent Digital
 
Frakture Deck v3.1
Frakture Deck v3.1Frakture Deck v3.1
Frakture Deck v3.1
 
The future of intranets
The future of intranetsThe future of intranets
The future of intranets
 
The 10 most innovative it infrastructure solution providers 2018
The 10 most innovative it infrastructure solution providers 2018The 10 most innovative it infrastructure solution providers 2018
The 10 most innovative it infrastructure solution providers 2018
 
People Source Corporate Brochure - Andrew Pryce Jones - National Security (2)
People Source Corporate Brochure - Andrew Pryce Jones - National Security (2)People Source Corporate Brochure - Andrew Pryce Jones - National Security (2)
People Source Corporate Brochure - Andrew Pryce Jones - National Security (2)
 
Abundent brochure
Abundent brochureAbundent brochure
Abundent brochure
 
Digital Employee Experience Breakfast - 9th May Wellington
Digital Employee Experience Breakfast - 9th May WellingtonDigital Employee Experience Breakfast - 9th May Wellington
Digital Employee Experience Breakfast - 9th May Wellington
 
Talent Digital
Talent DigitalTalent Digital
Talent Digital
 
The 3-Speed Chief Data Officer
The 3-Speed Chief Data OfficerThe 3-Speed Chief Data Officer
The 3-Speed Chief Data Officer
 
Best of 5 Blockchain Companies-2023.pdf
Best of 5 Blockchain Companies-2023.pdfBest of 5 Blockchain Companies-2023.pdf
Best of 5 Blockchain Companies-2023.pdf
 
Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service in a Financial Institution: Reality or Chimera?Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service in a Financial Institution: Reality or Chimera?
 
User Contribution in Knowledge Management – A Journey to Semantic Technology
User Contribution in Knowledge Management – A Journey to Semantic TechnologyUser Contribution in Knowledge Management – A Journey to Semantic Technology
User Contribution in Knowledge Management – A Journey to Semantic Technology
 
Digital Transformation How Digital Disruption is redefining the industries an...
Digital Transformation How Digital Disruption is redefining the industries an...Digital Transformation How Digital Disruption is redefining the industries an...
Digital Transformation How Digital Disruption is redefining the industries an...
 
Role of it in marketing of services
Role of it in marketing of servicesRole of it in marketing of services
Role of it in marketing of services
 
About Misha Infotech
About Misha InfotechAbout Misha Infotech
About Misha Infotech
 
TALENT 2015 v1 2
TALENT 2015 v1 2TALENT 2015 v1 2
TALENT 2015 v1 2
 
iBank
iBankiBank
iBank
 
Deep Impact: Explore the Wide- Reaching Impact of a Cyberattack
Deep Impact: Explore the Wide- Reaching Impact of a CyberattackDeep Impact: Explore the Wide- Reaching Impact of a Cyberattack
Deep Impact: Explore the Wide- Reaching Impact of a Cyberattack
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Securely moving data to the cloud with confidence and customer focus