SlideShare a Scribd company logo
1 of 5
Download to read offline
Cybersecurity
I S R A E L
13 - 16 MARCH 2017
ORGANISED BY STUDY TRIP PARTNERSUPPORTED BY
TECHNOLOGY PARTNERS
POST-TRIP REPORT
RETHINK	CYBERSECURITY	STUDY	TRIP	TO	ISRAEL	
CIOAA’s	inaugural	reThink Cybersecurity	study	trip	to	Israel	began	with	its	38	
members’	strong	senior	delegation	from	Singapore	and	the	Philippines	(from	both	the	
government	and	private	sectors)	at	a	picturesque	spot	along	the	beautiful	coastline	of	
Tel	Aviv.	
The	delegation	enjoyed	a	productive	and	insightful	four-day	study	trip	that	gave	the	
participants	exposure	to	the	widely-acknowledged	Israel’s	globally	leading	
cybersecurity	ecosystem.	The	programme featured	visits	that	showcased	the	
government’s	role	in	building	this	industry;	to	the	latest	solutions	from	the	industry’s	
powerhouses	(e.g.,	Check	Point	Software	Technologies	(Check	Point),	Dell	EMC,	
Imperva,	RSA);	and	the	smart	innovations	coming	out	of	fast	rising	startups	from	the	
Startup	Nation.	These	players	from	Israel’s	cybersecurity	ecosystem	shared	insights	on	
how	they	came	together	to	create	such	a	vibrant	industry	in	Israel,	and	the	strategic	
reasons	behind	the	country’s	rise	as	a	high-tech	epicentre built	around	internet	
security,	anti-virus	software	and	other	cyber	defence technologies	and	strategies.	
Delegates	from	Singapore	and	Philippines
On	Conflict	and	Resilience,	and	Non-Stop	Culture	
The	collective	quest	to	find	solutions	to	harden	the	environments	of	organisations and	
nations	was	a	key	concern	of	this	study	trip.	The	context	for	this	quest	is	that	today,	
the	necessity	of	strong	cybersecurity	measures	is	self-evident.	Mass	digitalisation
combined	with	the	expanding	number	of	cyber	attacks	and	the	uptick	in	hackers’	
sophistication	make	it	necessary	for	CIOs	and	CISOs	to	buttress	their	organisations
against	these	constantly	changing	threats.
The	study	trip	commenced	with	a	visit	to	Israel’s	National	Cyber	Bureau	(INCB)	and	
the	Israel	Export	Institute	(IEI),	where	officials	provided	the	delegation	an	overview	of	
Israel’s	cybersecurity	landscape.	
According	to	INCB,	Israel	accounted	for	10	per	cent	of	global	security	technology,	
which	for	its	size	is	an	impressive	feat.	The	session	at	INCB	brought	up	concerns	such	
as	how	much	governments	should	intervene	or	incentivise the	prioritisation of	cyber	
defence,	the	pillars	of	Israel’s	thriving	tech	ecosystem,	and	the	importance	of	
defending	the	continuation	of	normal	life	in	the	face	of	conflict.	
According	to	INCB’s	Head	of	Cyber	Policy	Mr Roi Yarom,	the	core	ingredients	that	
made	Israel	a	cyber	powerhouse	are	the	constant	flow	of	talent	pool	coming	out	of	its	
defence organisations and	the	strong	entrepreneurial	spirit	that	already	exists	in	
Israeli	culture.	
Roi Yarom,	Head	of	Cyber	Policy,	INCB Israel	Export	Institute
A	Rich	Security	Ecosystem
Israel's	information	security	ecosystem	is	a	rich	mix	of	its	own	leading	cyber	
companies;	the	startups	that	aspire	to	grow	to	leading	lights;	and	foreign	MNCs	that	
site	their	cyber	R&D	labs	in	Israel	to	tap	on	the	talent	pool.	
The	second	day	of	the	study	trip	saw	visits	to	the	mature	cyber	companies	such	as	
Check	Point,	Imperva and	Singapore’	leading	tech	powerhouse,	Singapore	
Telecommunications	(Singtel).	
Amichai Shulman,	CTO	and	Co-Founder	,	Imperva Bill	Chang,	CEO,	Singtel Group	Enterprise
Tzachi Blumenstein,	Argus	Cyber	Security
The	visits	to	cyber	companies	led	to	the	sharing	of	great	insights.	For	example,		
FireEye	reminded	the	delegation	the	importance	of	staying	vigilant	against	
increasingly	sophisticated	advanced	threats.	The	key	takeaway	was	that	to	keep	pace	
with	the	scale	and	ferocity	of	such	attacks,	organisations would	need	to	work	together	
to	partner	and	share	best	practices	to	overcome	operational	challenges	and	to	help	
mitigate	such	threats.	The	use	of	data	analytics	would	dramatically	enhance	existing	
cyber	defence strategies.	
Similarly,	the	security	company	executives	made	the	point	that	most	security	
technologies	today	stay	one	step	behind,	looking	for	yesterday’s	signatures,	detection	
instead	of	prevention.	Check	Point	imagines	a	future	in	which	threats	are	prevented	
before	any	attacks	on	network	systems.	“The	difference	between	detection	and	
prevention	is	the	difference	between	0	and	1:	infinity”,	said	Mr Bar-Lev,	the	founder	of	
Check	Point.
Trustwave,	a	specialist	in	managed	security	services,	acquired	by	Singtel in	2015,	
showed	the	delegates	the	critical	vulnerabilities	of	systems	today	with	demos	of	
malicious	advertisements	directing	to	exploit	weaknesses	in	organisations’
information	infrastructure.	
Michelle	Loh,	Federal	Sales	Director,	FireEye Amnon Bar-Lev,	President,	Check	Point	
At	Tel	Aviv	University’s	(TAU)	Blavatnik Interdisciplinary	Cyber	Research	Center,	a	
panel	was	chaired	by	the	father	of	Israel’s	cyber	ecosystem,	Prof	Isaac	Ben-Israel.	“To	
build	a	sustainable	cybersecurity	ecosystem	and	pipeline	of	cyber	defenders,	the	
Singapore	government	will	have	to	make	policy	changes,	“	he	said.	The	panel	covered	
topics	such	as	how	Israel	started	to	funnel	the	top	one	per	cent	of	its	students	to	Stem	
subjects	70	years	ago,	research	on	critical	information	structures,	and	other	ways	
Israel	has	stayed	ahead	through	academia	working	closely	with	industry	(the	
confluence	of	academics	and	industry	figures	to	interchangeably	work	in	industries	
and	the	Universities	is	a	prime	example).	
Prof	Isaac	Ben-Israel,	Head	of	Interdisciplinary	Cyber	Research	Centre
At	JVP,	the	oldest	and	most	well-known	Venture	Capitalist	firm	in	Israel,	the	
delegation	were	introduced	to	a	range	of	innovations	from	the	startups	incubated	by	
JVP’s	Cyber	Lab.	They	include	CoroNet,	a	startup	that	protects	corporates	against	
malicious	attacks	on	the	corporate	networks	via	employees’	wireless	access	habits;	
SCADAFence which	safeguards	industrial	sectors	against	increasing	cyber-attacks;	to	
Morphisec,	whose	endpoint	threat	prevention	tool	that	helps	secure	users’	Virtual	
Desktop	Infrastructure;	and	finally	to	Secret	Double	Octopus,	which	shared	their	
tokenless authentication	software	solution.	
The	study	trip	concluded	with	a	visit	to	RSA’s	Anti-Fraud	Command	Centre	(AFCC),	
where	concerns	such	as	the	socialisation of	cybercrime,	the	digital	human,	and	
business-driven	security	were	discussed.	
The	delegates	returned	very	satisfied	from	the	trip,	full	of	insights	that	they	could	
implement	in	their	own	organizations	as	well	as	having	made	some	lasting	friendships	
among	themselves.
JVP	Cyber	Labs Dell	EMC
RSA

More Related Content

Similar to reThink CyberSecurity Israel post trip report

NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS
 
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Seungjoo Kim
 
Design and Implementation Security Model for Sudanese E-government
Design and Implementation Security Model for Sudanese E-governmentDesign and Implementation Security Model for Sudanese E-government
Design and Implementation Security Model for Sudanese E-governmentEditor IJCATR
 
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021Francesco Flammini
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseDavid Berkelmans
 
Cybersecurity | Cylus: Railway Cybersecurity
Cybersecurity | Cylus: Railway CybersecurityCybersecurity | Cylus: Railway Cybersecurity
Cybersecurity | Cylus: Railway CybersecurityVertex Holdings
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseDavid Berkelmans
 
Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 ) ClubHack
 
Cyber handbook enterprise v1.6
Cyber handbook enterprise v1.6Cyber handbook enterprise v1.6
Cyber handbook enterprise v1.6hymasakhamuri
 
How are Iranian hackers utilizing Dropbox in a cyber-espionage campaign.pptx
How are Iranian hackers utilizing Dropbox in a cyber-espionage campaign.pptxHow are Iranian hackers utilizing Dropbox in a cyber-espionage campaign.pptx
How are Iranian hackers utilizing Dropbox in a cyber-espionage campaign.pptxinfosec train
 
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...Black Duck by Synopsys
 
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Benjamin Ang
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
Ericsson Technology Review - Issue1 2015
Ericsson Technology Review - Issue1 2015Ericsson Technology Review - Issue1 2015
Ericsson Technology Review - Issue1 2015Ericsson
 
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdf
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdfMost Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdf
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdfCIO Look Magazine
 
Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...DETER-Project
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Business Finland
 
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...Invest Northern Ireland
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas mariaidga
 

Similar to reThink CyberSecurity Israel post trip report (20)

NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
 
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
 
Design and Implementation Security Model for Sudanese E-government
Design and Implementation Security Model for Sudanese E-governmentDesign and Implementation Security Model for Sudanese E-government
Design and Implementation Security Model for Sudanese E-government
 
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press release
 
Cybersecurity | Cylus: Railway Cybersecurity
Cybersecurity | Cylus: Railway CybersecurityCybersecurity | Cylus: Railway Cybersecurity
Cybersecurity | Cylus: Railway Cybersecurity
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press release
 
Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 )
 
Cyber handbook enterprise v1.6
Cyber handbook enterprise v1.6Cyber handbook enterprise v1.6
Cyber handbook enterprise v1.6
 
How are Iranian hackers utilizing Dropbox in a cyber-espionage campaign.pptx
How are Iranian hackers utilizing Dropbox in a cyber-espionage campaign.pptxHow are Iranian hackers utilizing Dropbox in a cyber-espionage campaign.pptx
How are Iranian hackers utilizing Dropbox in a cyber-espionage campaign.pptx
 
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
 
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Ericsson Technology Review - Issue1 2015
Ericsson Technology Review - Issue1 2015Ericsson Technology Review - Issue1 2015
Ericsson Technology Review - Issue1 2015
 
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdf
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdfMost Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdf
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdf
 
Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...
 
Expo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_ENExpo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_EN
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
 

More from CIO Academy Asia Community

Digital Leadership : Building an Agile Organisation!
Digital Leadership : Building an Agile Organisation!Digital Leadership : Building an Agile Organisation!
Digital Leadership : Building an Agile Organisation!CIO Academy Asia Community
 
Connecting the Right Dots : Maximising Innovation Value
Connecting the Right Dots :  Maximising Innovation ValueConnecting the Right Dots :  Maximising Innovation Value
Connecting the Right Dots : Maximising Innovation ValueCIO Academy Asia Community
 
Building an Innovation Strategy for your Digital Enterprise
Building an Innovation Strategy for your Digital EnterpriseBuilding an Innovation Strategy for your Digital Enterprise
Building an Innovation Strategy for your Digital EnterpriseCIO Academy Asia Community
 
Business Agility – Staying Ahead in Today's Digital Economy
Business Agility – Staying Ahead in Today's Digital EconomyBusiness Agility – Staying Ahead in Today's Digital Economy
Business Agility – Staying Ahead in Today's Digital EconomyCIO Academy Asia Community
 
IT Value Management workshop: Post Event Report
IT Value Management workshop: Post Event ReportIT Value Management workshop: Post Event Report
IT Value Management workshop: Post Event ReportCIO Academy Asia Community
 
Is Mobile E-commerce the new gold rush? TechMavericks Talkshow Singapore
Is Mobile E-commerce the new gold rush? TechMavericks Talkshow SingaporeIs Mobile E-commerce the new gold rush? TechMavericks Talkshow Singapore
Is Mobile E-commerce the new gold rush? TechMavericks Talkshow SingaporeCIO Academy Asia Community
 

More from CIO Academy Asia Community (11)

Digital Leadership : Building an Agile Organisation!
Digital Leadership : Building an Agile Organisation!Digital Leadership : Building an Agile Organisation!
Digital Leadership : Building an Agile Organisation!
 
reThink CIO Forum Bangkok post event summary
reThink CIO Forum Bangkok post event summaryreThink CIO Forum Bangkok post event summary
reThink CIO Forum Bangkok post event summary
 
Connecting the Right Dots : Maximising Innovation Value
Connecting the Right Dots :  Maximising Innovation ValueConnecting the Right Dots :  Maximising Innovation Value
Connecting the Right Dots : Maximising Innovation Value
 
Building an Innovation Strategy for your Digital Enterprise
Building an Innovation Strategy for your Digital EnterpriseBuilding an Innovation Strategy for your Digital Enterprise
Building an Innovation Strategy for your Digital Enterprise
 
Leading your Digital Transformation Journey
Leading your Digital Transformation JourneyLeading your Digital Transformation Journey
Leading your Digital Transformation Journey
 
Reinventing the DNA of the Future Workplace
Reinventing the DNA of the Future WorkplaceReinventing the DNA of the Future Workplace
Reinventing the DNA of the Future Workplace
 
Business Agility – Staying Ahead in Today's Digital Economy
Business Agility – Staying Ahead in Today's Digital EconomyBusiness Agility – Staying Ahead in Today's Digital Economy
Business Agility – Staying Ahead in Today's Digital Economy
 
IT Value Management workshop: Post Event Report
IT Value Management workshop: Post Event ReportIT Value Management workshop: Post Event Report
IT Value Management workshop: Post Event Report
 
Is Mobile E-commerce the new gold rush? TechMavericks Talkshow Singapore
Is Mobile E-commerce the new gold rush? TechMavericks Talkshow SingaporeIs Mobile E-commerce the new gold rush? TechMavericks Talkshow Singapore
Is Mobile E-commerce the new gold rush? TechMavericks Talkshow Singapore
 
How Cyber Resilient are we?
How Cyber Resilient are we?How Cyber Resilient are we?
How Cyber Resilient are we?
 
Disrupt or Be Disrupted
Disrupt or Be DisruptedDisrupt or Be Disrupted
Disrupt or Be Disrupted
 

Recently uploaded

الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)Wonjun Hwang
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfOverkill Security
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiRaviKumarDaparthi
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 

Recently uploaded (20)

الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 

reThink CyberSecurity Israel post trip report