SlideShare a Scribd company logo
1 of 23
Download to read offline
(Consulting) Couch to CISO
  A Security Leader's First 100 Days & Beyond


                Philip J Beyer

          Information Security Officer

           Texas Education Agency


                                   http://lanyrd.com/skymy
Overview
The Premise


Off the Couch


Adopt a Plan


Train Like You Mean It


Enjoy the Race

                           http://lanyrd.com/skymy
The Premise
Consulting

Give advice


Diverse experience


No ownership
Running

Requires commitment


Rewarding


No one can do it for you
Assumptions

Couch to 5k programs are a dime a dozen


Consultant to CISO programs are not


Preparation and planning get your career in
shape
Off the Couch
About Me

Consulting background


Information Security Officer


Runner
How Did I Start?

IT services


Good record of delivery


Received great advice
Where Are You Now?
Skills


           Leadership


           Management


Experience


           Delivery


           Presentation
Adopt a Plan
Your Career Plan

Near-term and long-term goals


Specific activities, not nebulous dreams


BHAG
A Plan Needs Vision

Big Hairy Audacious Goal


Dream big


Doesn't have to be attainable, just real and
motivating
Track Progress

A plan without progress is not a plan


Determine your milestones


Zoom in when necessary
Train Like You Mean It
Mentor

Not a peer


Not your manager


Security (or business) leader
Resumé


Accomplishments... Not skills


Teamwork... Not solo efforts
Build Habits

Manage yourself


Optimize your research


Shorten your summaries


Be a translator (to business language)
Enjoy the Race
The Starting Line


100-Day Plan
Establish Order

Manage your projects


Keep it simple


The Pragmatic CSO
Don't Sprint

3.1 miles (5km) is a long distance


You need to pace yourself


Hands off the keyboard and onto the
whiteboard
• This work is licensed under a Creative Commons
  Attribution-NonCommercial-ShareAlike 3.0
  Unported License

More Related Content

Viewers also liked

Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionRamón Gómez de Olea y Bustinza
 
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossLeadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossShawn Tuma
 
Cyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teamsCyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teamsWynyard Group
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber SecurityLeon Fouche
 
NTXISSACSC2 - Texas CISO Council - Information Security Program Essential Gui...
NTXISSACSC2 - Texas CISO Council - Information Security Program Essential Gui...NTXISSACSC2 - Texas CISO Council - Information Security Program Essential Gui...
NTXISSACSC2 - Texas CISO Council - Information Security Program Essential Gui...North Texas Chapter of the ISSA
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityKaryl Scott
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directorscentralohioissa
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROPriyanka Aash
 
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor AgreementsNTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor AgreementsNorth Texas Chapter of the ISSA
 
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...centralohioissa
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsPaul Feldman
 
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...Tripwire
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesTripwire
 
Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)Maurice Dawson
 
Cyber Security in the Interconnected World
Cyber Security in the Interconnected WorldCyber Security in the Interconnected World
Cyber Security in the Interconnected WorldRussell_Kennedy
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The BoardPaul Melson
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 

Viewers also liked (20)

Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attention
 
Websense
WebsenseWebsense
Websense
 
10 Rules for Vendors - an Overview
10 Rules for Vendors - an Overview10 Rules for Vendors - an Overview
10 Rules for Vendors - an Overview
 
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossLeadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
 
Cyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teamsCyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teams
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
 
NTXISSACSC2 - Texas CISO Council - Information Security Program Essential Gui...
NTXISSACSC2 - Texas CISO Council - Information Security Program Essential Gui...NTXISSACSC2 - Texas CISO Council - Information Security Program Essential Gui...
NTXISSACSC2 - Texas CISO Council - Information Security Program Essential Gui...
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directors
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIRO
 
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor AgreementsNTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
 
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
 
NTXISSACSC4 - A Day in the Life of a CISO
NTXISSACSC4 - A Day in the Life of a CISONTXISSACSC4 - A Day in the Life of a CISO
NTXISSACSC4 - A Day in the Life of a CISO
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of Directors
 
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & Executives
 
Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)
 
Cyber Security in the Interconnected World
Cyber Security in the Interconnected WorldCyber Security in the Interconnected World
Cyber Security in the Interconnected World
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The Board
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 

Similar to Couch to CISO: A Security Leader's First 100 Days & Beyond

Masterclass excellent and effective board member hand out
Masterclass excellent and effective board member hand outMasterclass excellent and effective board member hand out
Masterclass excellent and effective board member hand outPower2Improve
 
Accelerated Pathways To Leadership
Accelerated Pathways To LeadershipAccelerated Pathways To Leadership
Accelerated Pathways To LeadershipKevin Wong
 
A Micro Course On Leadership
A Micro Course On LeadershipA Micro Course On Leadership
A Micro Course On LeadershipBuzzsparx
 
Career Wheels
Career WheelsCareer Wheels
Career Wheels22maggies
 
20 Hacks for Recruiter Productivity: Chrome Extensions, Tools & More…
20 Hacks for Recruiter Productivity: Chrome Extensions, Tools & More…20 Hacks for Recruiter Productivity: Chrome Extensions, Tools & More…
20 Hacks for Recruiter Productivity: Chrome Extensions, Tools & More…RecruitingDaily.com LLC
 
Interviewing And Resume Building
Interviewing And Resume BuildingInterviewing And Resume Building
Interviewing And Resume BuildingBFieggen
 
Coach me if you can
Coach me if you can Coach me if you can
Coach me if you can Luxoft
 
EMBA class presentation: Talent managemrnt
EMBA class presentation: Talent managemrntEMBA class presentation: Talent managemrnt
EMBA class presentation: Talent managemrntMike Rivera
 
IT & Consulting: Sales, Delivery & Strategy
IT & Consulting: Sales, Delivery & StrategyIT & Consulting: Sales, Delivery & Strategy
IT & Consulting: Sales, Delivery & StrategyJeffreydymm
 
Have we crossed the chasm
Have we crossed the chasmHave we crossed the chasm
Have we crossed the chasmDeepak Gururaja
 
pre qualification.pptx
pre qualification.pptxpre qualification.pptx
pre qualification.pptxssuser64c299
 
Executive Business Coaching
Executive Business CoachingExecutive Business Coaching
Executive Business Coachingamitchawla2010
 
Cloverleaf remote skills for success
Cloverleaf remote skills for successCloverleaf remote skills for success
Cloverleaf remote skills for successDarrin Murriner
 
Making sense of agile certifications
Making sense of agile certificationsMaking sense of agile certifications
Making sense of agile certificationsAnjali Leon
 
Board ... CEO ... Staff: Whose Job is it Anyway?
Board ... CEO ... Staff: Whose Job is it Anyway?Board ... CEO ... Staff: Whose Job is it Anyway?
Board ... CEO ... Staff: Whose Job is it Anyway?Bloomerang
 

Similar to Couch to CISO: A Security Leader's First 100 Days & Beyond (20)

Masterclass excellent and effective board member hand out
Masterclass excellent and effective board member hand outMasterclass excellent and effective board member hand out
Masterclass excellent and effective board member hand out
 
Accelerated Pathways To Leadership
Accelerated Pathways To LeadershipAccelerated Pathways To Leadership
Accelerated Pathways To Leadership
 
Pks Management Consultants Presentation
Pks Management Consultants   PresentationPks Management Consultants   Presentation
Pks Management Consultants Presentation
 
A Micro Course On Leadership
A Micro Course On LeadershipA Micro Course On Leadership
A Micro Course On Leadership
 
Career Wheels
Career WheelsCareer Wheels
Career Wheels
 
20 Hacks for Recruiter Productivity: Chrome Extensions, Tools & More…
20 Hacks for Recruiter Productivity: Chrome Extensions, Tools & More…20 Hacks for Recruiter Productivity: Chrome Extensions, Tools & More…
20 Hacks for Recruiter Productivity: Chrome Extensions, Tools & More…
 
Interviewing And Resume Building
Interviewing And Resume BuildingInterviewing And Resume Building
Interviewing And Resume Building
 
Coach Me if You Can
Coach Me if You CanCoach Me if You Can
Coach Me if You Can
 
Coach me if you can
Coach me if you can Coach me if you can
Coach me if you can
 
EMBA class presentation: Talent managemrnt
EMBA class presentation: Talent managemrntEMBA class presentation: Talent managemrnt
EMBA class presentation: Talent managemrnt
 
IT & Consulting: Sales, Delivery & Strategy
IT & Consulting: Sales, Delivery & StrategyIT & Consulting: Sales, Delivery & Strategy
IT & Consulting: Sales, Delivery & Strategy
 
Uxcoach Yshek Iasummit2008
Uxcoach Yshek Iasummit2008Uxcoach Yshek Iasummit2008
Uxcoach Yshek Iasummit2008
 
Confidence Building
Confidence BuildingConfidence Building
Confidence Building
 
Have we crossed the chasm
Have we crossed the chasmHave we crossed the chasm
Have we crossed the chasm
 
pre qualification.pptx
pre qualification.pptxpre qualification.pptx
pre qualification.pptx
 
Executive Business Coaching
Executive Business CoachingExecutive Business Coaching
Executive Business Coaching
 
Team Formation - Rick Rasmussen
Team Formation - Rick RasmussenTeam Formation - Rick Rasmussen
Team Formation - Rick Rasmussen
 
Cloverleaf remote skills for success
Cloverleaf remote skills for successCloverleaf remote skills for success
Cloverleaf remote skills for success
 
Making sense of agile certifications
Making sense of agile certificationsMaking sense of agile certifications
Making sense of agile certifications
 
Board ... CEO ... Staff: Whose Job is it Anyway?
Board ... CEO ... Staff: Whose Job is it Anyway?Board ... CEO ... Staff: Whose Job is it Anyway?
Board ... CEO ... Staff: Whose Job is it Anyway?
 

More from Philip Beyer

Security Management 101: Practical Techniques They Should've Taught You
Security Management 101: Practical Techniques They Should've Taught YouSecurity Management 101: Practical Techniques They Should've Taught You
Security Management 101: Practical Techniques They Should've Taught YouPhilip Beyer
 
It Takes a Village: Effective Collaboration in Security
It Takes a Village: Effective Collaboration in SecurityIt Takes a Village: Effective Collaboration in Security
It Takes a Village: Effective Collaboration in SecurityPhilip Beyer
 
You Caught Me Monologuing: Effective Communications in Security
You Caught Me Monologuing: Effective Communications in SecurityYou Caught Me Monologuing: Effective Communications in Security
You Caught Me Monologuing: Effective Communications in SecurityPhilip Beyer
 
Choose to Lead: The Information Security Profession Needs You!
Choose to Lead: The Information Security Profession Needs You!Choose to Lead: The Information Security Profession Needs You!
Choose to Lead: The Information Security Profession Needs You!Philip Beyer
 
Risk Explained... in 5 Minutes or Less
Risk Explained... in 5 Minutes or LessRisk Explained... in 5 Minutes or Less
Risk Explained... in 5 Minutes or LessPhilip Beyer
 
The Myth of a Perfect Security Program ... The Reality of Eternal Life
The Myth of a Perfect Security Program ... The Reality of Eternal LifeThe Myth of a Perfect Security Program ... The Reality of Eternal Life
The Myth of a Perfect Security Program ... The Reality of Eternal LifePhilip Beyer
 
Secure SDLC in the Real World: Pitfalls Discovered and Treasure Collected Alo...
Secure SDLC in the Real World: Pitfalls Discovered and Treasure Collected Alo...Secure SDLC in the Real World: Pitfalls Discovered and Treasure Collected Alo...
Secure SDLC in the Real World: Pitfalls Discovered and Treasure Collected Alo...Philip Beyer
 
Lean and (Prepared for) Mean: Application Security Program Essentials
Lean and (Prepared for) Mean: Application Security Program EssentialsLean and (Prepared for) Mean: Application Security Program Essentials
Lean and (Prepared for) Mean: Application Security Program EssentialsPhilip Beyer
 

More from Philip Beyer (8)

Security Management 101: Practical Techniques They Should've Taught You
Security Management 101: Practical Techniques They Should've Taught YouSecurity Management 101: Practical Techniques They Should've Taught You
Security Management 101: Practical Techniques They Should've Taught You
 
It Takes a Village: Effective Collaboration in Security
It Takes a Village: Effective Collaboration in SecurityIt Takes a Village: Effective Collaboration in Security
It Takes a Village: Effective Collaboration in Security
 
You Caught Me Monologuing: Effective Communications in Security
You Caught Me Monologuing: Effective Communications in SecurityYou Caught Me Monologuing: Effective Communications in Security
You Caught Me Monologuing: Effective Communications in Security
 
Choose to Lead: The Information Security Profession Needs You!
Choose to Lead: The Information Security Profession Needs You!Choose to Lead: The Information Security Profession Needs You!
Choose to Lead: The Information Security Profession Needs You!
 
Risk Explained... in 5 Minutes or Less
Risk Explained... in 5 Minutes or LessRisk Explained... in 5 Minutes or Less
Risk Explained... in 5 Minutes or Less
 
The Myth of a Perfect Security Program ... The Reality of Eternal Life
The Myth of a Perfect Security Program ... The Reality of Eternal LifeThe Myth of a Perfect Security Program ... The Reality of Eternal Life
The Myth of a Perfect Security Program ... The Reality of Eternal Life
 
Secure SDLC in the Real World: Pitfalls Discovered and Treasure Collected Alo...
Secure SDLC in the Real World: Pitfalls Discovered and Treasure Collected Alo...Secure SDLC in the Real World: Pitfalls Discovered and Treasure Collected Alo...
Secure SDLC in the Real World: Pitfalls Discovered and Treasure Collected Alo...
 
Lean and (Prepared for) Mean: Application Security Program Essentials
Lean and (Prepared for) Mean: Application Security Program EssentialsLean and (Prepared for) Mean: Application Security Program Essentials
Lean and (Prepared for) Mean: Application Security Program Essentials
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 

Couch to CISO: A Security Leader's First 100 Days & Beyond