SlideShare a Scribd company logo
1 of 111
Michael Brunton-Spall Bruntonspall Ltd
The evolving practice of
security
InfoQ.com: News & Community Site
Watch the video with slide
synchronization on InfoQ.com!
https://www.infoq.com/presentations/
security-best-practices
• Over 1,000,000 software developers, architects and CTOs read the site world-
wide every month
• 250,000 senior developers subscribe to our weekly newsletter
• Published in 4 languages (English, Chinese, Japanese and Brazilian
Portuguese)
• Post content from our QCon conferences
• 2 dedicated podcast channels: The InfoQ Podcast, with a focus on
Architecture and The Engineering Culture Podcast, with a focus on building
• 96 deep dives on innovative topics packed as downloadable emags and
minibooks
• Over 40 new content items per week
Purpose of QCon
- to empower software development by facilitating the spread of
knowledge and innovation
Strategy
- practitioner-driven conference designed for YOU: influencers of
change and innovation in your teams
- speakers and topics driving the evolution and innovation
- connecting and catalyzing the influencers and innovators
Highlights
- attended by more than 12,000 delegates since 2007
- held in 9 cities worldwide
Presented at QCon London
www.qconlondon.com
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall
He/His/Him
michael@bruntonspall.com
https://tinyletter.com/cyberweekly
Michael Brunton-Spall Bruntonspall Ltd
Why is security evolving
Where we’ve come from
Where we are going
Michael Brunton-Spall Bruntonspall Ltd
How to rethink security
practices in organisations
Michael Brunton-Spall Bruntonspall Ltd
Some Context
08/05/2019 6
Michael Brunton-Spall Bruntonspall Ltd
2005
08/05/2019 7
Michael Brunton-Spall Bruntonspall Ltd
2010
08/05/2019 8
Michael Brunton-Spall Bruntonspall Ltd
2013
08/05/2019 9
Michael Brunton-Spall Bruntonspall Ltd
20182018
Michael Brunton-Spall Bruntonspall Ltd
Maginot Line
Michael Brunton-Spall Bruntonspall Ltd
1930 France
“We’d really like the
Germans not to invade”
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
In WW1, they came slowly
overland and built trenches
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
The Germans had invented
Blitzkrieg “Lightning Strike”
which simply went around
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
The French were fighting a
war from 1920 against an
adversary using 1939
techniques
Michael Brunton-Spall Bruntonspall Ltd
The evolution of compute
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
From on premise to cloud
Michael Brunton-Spall Bruntonspall Ltd
Physical machine
Michael Brunton-Spall Bruntonspall Ltd
Remote hosted machine
Michael Brunton-Spall Bruntonspall Ltd
Virtual machines in a data
center
Michael Brunton-Spall Bruntonspall Ltd
Virtual machines at scale
Michael Brunton-Spall Bruntonspall Ltd
Side note: Wardley Mapping
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Why Wardley Maps?
Michael Brunton-Spall Bruntonspall Ltd
We can see changing
landscapes
Michael Brunton-Spall Bruntonspall Ltd
We can discuss strategies
Michael Brunton-Spall Bruntonspall Ltd
A map isn’t reality, it’s just an
abstraction
Michael Brunton-Spall Bruntonspall Ltd
Things evolve
Michael Brunton-Spall Bruntonspall Ltd
As servers move from
physical to virtual, single to
multiple, practice evolves
Michael Brunton-Spall Bruntonspall Ltd
Coevolution of product and
practice
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
From pets to cattle
Michael Brunton-Spall Bruntonspall Ltd
How do we administer
servers?
Michael Brunton-Spall Bruntonspall Ltd
Worries about hard drives,
CPU’s, power etc
Michael Brunton-Spall Bruntonspall Ltd
Cloud providers give us
abstractions
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
We stop worrying about
whether a hard drive fails in
a server
Michael Brunton-Spall Bruntonspall Ltd
This results in changing
operations practice
Michael Brunton-Spall Bruntonspall Ltd
DevOps, SRE
Michael Brunton-Spall Bruntonspall Ltd
This results in different
developer consumption of
operations
Michael Brunton-Spall Bruntonspall Ltd
Kubernetes, Serverless
Michael Brunton-Spall Bruntonspall Ltd
What does this mean for
security?
Michael Brunton-Spall Bruntonspall Ltd
How we think about security
has to change
Michael Brunton-Spall Bruntonspall Ltd
Security practices are
evolving
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Traditional security is about
assurance
Michael Brunton-Spall Bruntonspall Ltd
Where will my data sit
Michael Brunton-Spall Bruntonspall Ltd
Where does the data go
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
This works when you have
individual servers
Michael Brunton-Spall Bruntonspall Ltd
This doesn’t work with
modern cloud
Michael Brunton-Spall Bruntonspall Ltd
This doesn’t work the same
with modern cloud
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
“Skate to where the puck is
going, not where it has
been”
Wayne Gretsky
Michael Brunton-Spall Bruntonspall Ltd
Where the puck was
yesterday
Michael Brunton-Spall Bruntonspall Ltd
What are solved problems?
Michael Brunton-Spall Bruntonspall Ltd
Commonly solved the same
way
Michael Brunton-Spall Bruntonspall Ltd
Productionised processes
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
SDLC, Assurance of suppliers,
network assurance,
hardware assurance
Michael Brunton-Spall Bruntonspall Ltd
All cloud customers have
similar concerns in this area
Michael Brunton-Spall Bruntonspall Ltd
Buy don’t Build
Michael Brunton-Spall Bruntonspall Ltd
Compliance via certificates
ISO27001, CSA, ISO27017,
SOC, FISMA, HIPAA …
Michael Brunton-Spall Bruntonspall Ltd
Where the puck is today
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Continuous Integration,
Continuous Deployment,
DevOps
Michael Brunton-Spall Bruntonspall Ltd
Patching
Michael Brunton-Spall Bruntonspall Ltd
How quickly can you patch?
Michael Brunton-Spall Bruntonspall Ltd
DevOps
Michael Brunton-Spall Bruntonspall Ltd
How secure is your code?
Michael Brunton-Spall Bruntonspall Ltd
Code review and Pull
requests
Michael Brunton-Spall Bruntonspall Ltd
Staff identity and single sign
on
Michael Brunton-Spall Bruntonspall Ltd
Zero Trust Networking
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
But where is the puck going?
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Adversary thinking
Michael Brunton-Spall Bruntonspall Ltd
ATT&CK Framework
Michael Brunton-Spall Bruntonspall Ltd
Goals, Restrictions
Michael Brunton-Spall Bruntonspall Ltd
No adversary has unlimited
funds, time and energy
Michael Brunton-Spall Bruntonspall Ltd
Anti Personas
Michael Brunton-Spall Bruntonspall Ltd
Han Solo
Motivation
Han Solo is motivated primarily by money, but
also works with the rebel alliance.
Han is capable of using common tools as well
as modifying existing tools on the fly
Han doesn’t want to be caught and so takes an
effort to avoid head on confrontations
Capabilities
Resources: 2/5
Capability: 4/5
Bravery: 2/5
Criminal connections: 3/5
Connections
Rebel Alliance, Hutts
Michael Brunton-Spall Bruntonspall Ltd
Red Teams
Michael Brunton-Spall Bruntonspall Ltd
Internal pentesting
Michael Brunton-Spall Bruntonspall Ltd
Threat Hunting
Michael Brunton-Spall Bruntonspall Ltd
DevSecOps
Michael Brunton-Spall Bruntonspall Ltd
Security as code
Michael Brunton-Spall Bruntonspall Ltd
Compliance as Code
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Cloud configuration as code
Michael Brunton-Spall Bruntonspall Ltd
Pull requests = audit trail
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall Bruntonspall Ltd
AWS System Manager
Michael Brunton-Spall Bruntonspall Ltd
Azure Policy
Michael Brunton-Spall Bruntonspall Ltd
Final thoughts?
Michael Brunton-Spall Bruntonspall Ltd
How to get value from your
existing security teams?
Michael Brunton-Spall Bruntonspall Ltd
Empathy first
Michael Brunton-Spall Bruntonspall Ltd
“Regardless of what we discover, we
understand and truly believe that
everyone did the best job they could,
given what they knew at the time, their
skills and abilities, the resources available,
and the situation at hand.”
Michael Brunton-Spall Bruntonspall Ltd
Michael Brunton-Spall
michael@bruntonspall.com
https://tinyletter.com/cyberweekly
Watch the video with slide
synchronization on InfoQ.com!
https://www.infoq.com/presentations/
security-best-practices

More Related Content

More from C4Media

Shifting Left with Cloud Native CI/CD
Shifting Left with Cloud Native CI/CDShifting Left with Cloud Native CI/CD
Shifting Left with Cloud Native CI/CDC4Media
 
CI/CD for Machine Learning
CI/CD for Machine LearningCI/CD for Machine Learning
CI/CD for Machine LearningC4Media
 
Fault Tolerance at Speed
Fault Tolerance at SpeedFault Tolerance at Speed
Fault Tolerance at SpeedC4Media
 
Architectures That Scale Deep - Regaining Control in Deep Systems
Architectures That Scale Deep - Regaining Control in Deep SystemsArchitectures That Scale Deep - Regaining Control in Deep Systems
Architectures That Scale Deep - Regaining Control in Deep SystemsC4Media
 
ML in the Browser: Interactive Experiences with Tensorflow.js
ML in the Browser: Interactive Experiences with Tensorflow.jsML in the Browser: Interactive Experiences with Tensorflow.js
ML in the Browser: Interactive Experiences with Tensorflow.jsC4Media
 
Build Your Own WebAssembly Compiler
Build Your Own WebAssembly CompilerBuild Your Own WebAssembly Compiler
Build Your Own WebAssembly CompilerC4Media
 
User & Device Identity for Microservices @ Netflix Scale
User & Device Identity for Microservices @ Netflix ScaleUser & Device Identity for Microservices @ Netflix Scale
User & Device Identity for Microservices @ Netflix ScaleC4Media
 
Scaling Patterns for Netflix's Edge
Scaling Patterns for Netflix's EdgeScaling Patterns for Netflix's Edge
Scaling Patterns for Netflix's EdgeC4Media
 
Make Your Electron App Feel at Home Everywhere
Make Your Electron App Feel at Home EverywhereMake Your Electron App Feel at Home Everywhere
Make Your Electron App Feel at Home EverywhereC4Media
 
The Talk You've Been Await-ing For
The Talk You've Been Await-ing ForThe Talk You've Been Await-ing For
The Talk You've Been Await-ing ForC4Media
 
Future of Data Engineering
Future of Data EngineeringFuture of Data Engineering
Future of Data EngineeringC4Media
 
Automated Testing for Terraform, Docker, Packer, Kubernetes, and More
Automated Testing for Terraform, Docker, Packer, Kubernetes, and MoreAutomated Testing for Terraform, Docker, Packer, Kubernetes, and More
Automated Testing for Terraform, Docker, Packer, Kubernetes, and MoreC4Media
 
Navigating Complexity: High-performance Delivery and Discovery Teams
Navigating Complexity: High-performance Delivery and Discovery TeamsNavigating Complexity: High-performance Delivery and Discovery Teams
Navigating Complexity: High-performance Delivery and Discovery TeamsC4Media
 
High Performance Cooperative Distributed Systems in Adtech
High Performance Cooperative Distributed Systems in AdtechHigh Performance Cooperative Distributed Systems in Adtech
High Performance Cooperative Distributed Systems in AdtechC4Media
 
Rust's Journey to Async/await
Rust's Journey to Async/awaitRust's Journey to Async/await
Rust's Journey to Async/awaitC4Media
 
Opportunities and Pitfalls of Event-Driven Utopia
Opportunities and Pitfalls of Event-Driven UtopiaOpportunities and Pitfalls of Event-Driven Utopia
Opportunities and Pitfalls of Event-Driven UtopiaC4Media
 
Datadog: a Real-Time Metrics Database for One Quadrillion Points/Day
Datadog: a Real-Time Metrics Database for One Quadrillion Points/DayDatadog: a Real-Time Metrics Database for One Quadrillion Points/Day
Datadog: a Real-Time Metrics Database for One Quadrillion Points/DayC4Media
 
Are We Really Cloud-Native?
Are We Really Cloud-Native?Are We Really Cloud-Native?
Are We Really Cloud-Native?C4Media
 
CockroachDB: Architecture of a Geo-Distributed SQL Database
CockroachDB: Architecture of a Geo-Distributed SQL DatabaseCockroachDB: Architecture of a Geo-Distributed SQL Database
CockroachDB: Architecture of a Geo-Distributed SQL DatabaseC4Media
 
A Dive into Streams @LinkedIn with Brooklin
A Dive into Streams @LinkedIn with BrooklinA Dive into Streams @LinkedIn with Brooklin
A Dive into Streams @LinkedIn with BrooklinC4Media
 

More from C4Media (20)

Shifting Left with Cloud Native CI/CD
Shifting Left with Cloud Native CI/CDShifting Left with Cloud Native CI/CD
Shifting Left with Cloud Native CI/CD
 
CI/CD for Machine Learning
CI/CD for Machine LearningCI/CD for Machine Learning
CI/CD for Machine Learning
 
Fault Tolerance at Speed
Fault Tolerance at SpeedFault Tolerance at Speed
Fault Tolerance at Speed
 
Architectures That Scale Deep - Regaining Control in Deep Systems
Architectures That Scale Deep - Regaining Control in Deep SystemsArchitectures That Scale Deep - Regaining Control in Deep Systems
Architectures That Scale Deep - Regaining Control in Deep Systems
 
ML in the Browser: Interactive Experiences with Tensorflow.js
ML in the Browser: Interactive Experiences with Tensorflow.jsML in the Browser: Interactive Experiences with Tensorflow.js
ML in the Browser: Interactive Experiences with Tensorflow.js
 
Build Your Own WebAssembly Compiler
Build Your Own WebAssembly CompilerBuild Your Own WebAssembly Compiler
Build Your Own WebAssembly Compiler
 
User & Device Identity for Microservices @ Netflix Scale
User & Device Identity for Microservices @ Netflix ScaleUser & Device Identity for Microservices @ Netflix Scale
User & Device Identity for Microservices @ Netflix Scale
 
Scaling Patterns for Netflix's Edge
Scaling Patterns for Netflix's EdgeScaling Patterns for Netflix's Edge
Scaling Patterns for Netflix's Edge
 
Make Your Electron App Feel at Home Everywhere
Make Your Electron App Feel at Home EverywhereMake Your Electron App Feel at Home Everywhere
Make Your Electron App Feel at Home Everywhere
 
The Talk You've Been Await-ing For
The Talk You've Been Await-ing ForThe Talk You've Been Await-ing For
The Talk You've Been Await-ing For
 
Future of Data Engineering
Future of Data EngineeringFuture of Data Engineering
Future of Data Engineering
 
Automated Testing for Terraform, Docker, Packer, Kubernetes, and More
Automated Testing for Terraform, Docker, Packer, Kubernetes, and MoreAutomated Testing for Terraform, Docker, Packer, Kubernetes, and More
Automated Testing for Terraform, Docker, Packer, Kubernetes, and More
 
Navigating Complexity: High-performance Delivery and Discovery Teams
Navigating Complexity: High-performance Delivery and Discovery TeamsNavigating Complexity: High-performance Delivery and Discovery Teams
Navigating Complexity: High-performance Delivery and Discovery Teams
 
High Performance Cooperative Distributed Systems in Adtech
High Performance Cooperative Distributed Systems in AdtechHigh Performance Cooperative Distributed Systems in Adtech
High Performance Cooperative Distributed Systems in Adtech
 
Rust's Journey to Async/await
Rust's Journey to Async/awaitRust's Journey to Async/await
Rust's Journey to Async/await
 
Opportunities and Pitfalls of Event-Driven Utopia
Opportunities and Pitfalls of Event-Driven UtopiaOpportunities and Pitfalls of Event-Driven Utopia
Opportunities and Pitfalls of Event-Driven Utopia
 
Datadog: a Real-Time Metrics Database for One Quadrillion Points/Day
Datadog: a Real-Time Metrics Database for One Quadrillion Points/DayDatadog: a Real-Time Metrics Database for One Quadrillion Points/Day
Datadog: a Real-Time Metrics Database for One Quadrillion Points/Day
 
Are We Really Cloud-Native?
Are We Really Cloud-Native?Are We Really Cloud-Native?
Are We Really Cloud-Native?
 
CockroachDB: Architecture of a Geo-Distributed SQL Database
CockroachDB: Architecture of a Geo-Distributed SQL DatabaseCockroachDB: Architecture of a Geo-Distributed SQL Database
CockroachDB: Architecture of a Geo-Distributed SQL Database
 
A Dive into Streams @LinkedIn with Brooklin
A Dive into Streams @LinkedIn with BrooklinA Dive into Streams @LinkedIn with Brooklin
A Dive into Streams @LinkedIn with Brooklin
 

Recently uploaded

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Recently uploaded (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

The Evolving Practice of Security