SlideShare a Scribd company logo
1 of 99
Download to read offline
Data Security in a Mobile World
Agenda
• Welcome and Introductions
– David Riffle, Sr. Director, ASI
• Information Security Threats and Strategies
– Mark Breland, Sr. Product Engineering Exec., ASI
• What You Need to Know about PCI 
Compliance 
– David Johnson, Systems Engineer, Trustwave
Agenda
• Why the Era of CRM is Over
– Brent Sitton, Product Marketing Manager, ASI
– Bruce Ryan, CIO, Florida Bankers Association
– Artesha Moore, CIO, Association for Professionals 
in Infection Control and Epidemiology
• Closing Remarks
…1800 clients across 25 countries 
and 6 continents…
… ASI and iMIS focus on being 
prepared to help minimize the 
risk of a security breach
Many organizations have higher 
data risk due to multiple systems
The era of CRM is 
over.
Data Security used to be a lot more simple…
…than it is today.
Data Security in a Mobile World
Security…
Vulnerabilities, Mitigation, 
and Defensive Measures
Mark Breland
Senior Product Engineering Executive
Agenda
• Security breaches today
• Attack vector mitigation
• Secure web implementation
• Penetration testing
• ASI Corporate Security Initiative
Security Breaches Today
• By the numbers…in the US 2005 to April 2014
– Recorded breaches = 4,455
– Records exposed = 626,327,451
– Cost per record = $188
– Total cost = $117.8B
• Breach attack patterns
– 52% of stolen data due to “hacktivism”
– 40% of breaches incorporated malware
– Malicious or criminal attacks that exploit negligence 
or system glitches
Security Breaches Today
• Primary data breach targets…
– Financial
– Retail
– Government
• 43% of all companies experienced a data breach in the 
last year
– Of these, 27% had no response plan in place
– 80% had root cause in employee negligence
• Membership organizations emerging
– Controversial missions/philosophies
– Play to self‐anointed judgment of “hacktivists”
– Least likely to have protections in place
Security Breaches Today
• Cyber risk and liability
– Target® breach of 2013…40M compromised records, 
potential company liability of $90/exposed record = 
$3.6B
– Target ® directors and officers also facing derivative suits
– Home Depot ® breach of 2014…56M compromised PCI 
records, liability to exceed $3B
– JPMorgan Chase breach of 2014…83M compromised PII 
accounts
– Anthem breach of 2015…80M compromised PHI records
– Data loss not typically covered under corporate 
insurance policies…cyber liability insurance required to 
cover corporate costs of a breach
Security Breaches Today
• Cyber risk and liability
– Brand value drops 17‐31% after a breach
– Data loss not typically covered under corporate 
insurance policies…cyber liability insurance required 
to cover corporate costs of a breach
– Software vendors mostly protected by liability limits 
clauses in their EULAs
– Custom developed software and software 
implementation is another story…
– Any technology company associated with a breach is 
open to litigation
Security Breaches Today
• Why NPOs should be concerned
– Larger budgets/revenues are attractive
– Mission statements draw hostile attention
– Greater need for online service provision
– Growing IT complexity to maintain operating 
efficiency and maximize member benefits
– Increasing reliance on 3rd party cloud/hosting 
service providers
Security Breaches Today
• One breach, 6 investigations…
– Internal investigation
– Shareholders vs. Directors and Officers
– Card brand vs. Company
– Federal Government vs. Company
– State Government vs. Company
– Law Enforcement vs. Attacker
Security Breaches Today
• Weak credentials
– Default credential provisioning
– Susceptible to brute force attacks
• System misconfiguration
– Accidental exposure of administrative consoles
– Stood up systems outside of policy
– Firewall errors/complexity
• Service/Software vulnerability
– Heartbleed, Shellshock
– Third party software
• Web application vulnerability
– Most commonly exploited
– Custom code developed without security
• Social engineering
– Phishing, link clicking
Security Breaches Today
Web security today is both a proactive and 
reactive process…one must be fully prepared in 
both aspects to survive in the current threat 
environment.
Attack Vector Mitigation ‐ Business
• Identify and understand your business risks as 
regards likely channels of attack
• Educate Board and senior management on 
responsibilities and effectively managing cyber 
security risk
• Proactively secure data, systems, policies, and 
procedures in advance…plan, Plan, PLAN
• Gather and share cyber attack intelligence 
internally and among industry peers
Attack Vector Mitigation ‐ Business
• Train staff and elevate cyber security awareness
• Engage outside help when needed
• Ensure compliance with all regulatory and 
certification security requirements
• Respond clearly and deliberately to any critical 
incident…focus on maintaining stakeholder 
confidence
• Benchmark your cyber security program in 
relation to your peers
Secure Web Implementation
Secure Web Implementation
• Protect each site with a valid SSL certificate 
and HTTPS protocol
• Isolate web servers in the DMZ zone
• Protect services in the Trusted zone
• Disallow non‐VPN or non‐direct RDP access to 
any server
Secure Web Implementation
• GreenSQL ‐ a unified, ready‐to‐use database 
security solution for all organizations. Easy to 
install, use and maintain
– Hides and secures databases
– Monitors all incoming and outgoing SQL queries
– Alerts and blocks signature‐based query attacks
– Maintains database security policy in real‐time
– Protects against known and unknown database 
exploits
Secure Web Implementation
– GreenSQL is located between the iMIS application and the 
database, inspecting all access, including queries and 
database responses. This ensures complete coverage for 
securing, monitoring and masking of sensitive information 
stored in databases.
Trusted
Secure Web Implementation
• Recommended GreenSQL deployment
Database 
Server
Green SQL
iMIS 
Application 
Server
Internal iMIS 
Clients 
DMZ
Web 
Servers
Public (web 
browsers)
Registrants 
(web 
browsers)
Firewall
Firewall
Penetration Testing
• Process to identify security vulnerabilities in a 
web application or site by evaluating the system 
or network with various malicious techniques
• Various end targets…
– Full web site (Amazon, Google, iMIS customer)
– Web application product (iMIS 20 out‐of‐the‐box)
• Various forms…
– Social engineering
– Application security
– Physical penetration
Penetration Testing
• Automated testing tools
– Pros – covers a lot of ground very fast, cost efficient, 
consistent and repeatable, best suited for rapidly 
evolving web applications
– Cons – can frequently flag false positives, only as good 
as the latest signature database of known exploits
• Adaptive (manual) testing techniques
– Pros – follows the black hat mindset, uncovers 
application‐specific combinatorial vulnerabilities, 
leverages non‐related tools, much more rigorous
– Cons – labor‐intensive, not easily repeatable, money 
sink
Penetration Testing
• ASI committed to conducting self penetration testing
– iMIS 20‐100/200 and 20‐300 platforms
– Integral to pre‐EA/GA regression testing
– Employ Netsparker tool as a start, will likely expand to 
others
• ASI engaged independent penetration testing services 
in 2014
– Currently GA iMIS 20‐100 and 20‐300 platforms
– Adaptive pen testing techniques and methodology
– No critical vulnerabilities found
– Secure coding practices strongly recommended
ASI Corporate Security Initiative
• Formed mid‐2013 to address the issue of iMIS 
running as a secure web application for the 
benefit of our customers
• Focused on three areas to mitigate our risk 
exposure with the use of the iMIS product
– Web application product development
– Site implementation
– Cloud services
• Phase 1 complete, Phase 2 emphasis on 
establishing a corporate ASI Security Assurance 
Plan with associated policies/procedures
Resources
• Articles
– Verizon 2014 Data Breach Investigations Report ‐
www.verizonenterprise.com/DBIR/2014/
– https://www.owasp.org/index.php/ASP.NET_Misconfigurations
– http://weblogs.asp.net/dotnetstories/archive/2009/10/24/five‐common‐
mistakes‐in‐the‐web‐config‐file.aspx
– http://csae‐trillium.tv/cyber‐security‐canadas‐profit‐organizations‐attack‐
certain‐loss/
• Best Practices
– OWASP ‐ www.owasp.org/index.php/Main_Page
– NIST ‐ www.nist.gov/cyberframework/upload/cybersecurity‐framework‐
021214.pdf
– www.imiscommunity.com/system/files/SecurityWebImplBestPractices.pdf
– www.imiscommunity.com/system/files/SecurityWebDevBestPractices.pdf
Crash Course: PCI v3
David Johnson – System Engineer
Summary
• What is PCI?
• What has changed in PCI‐DSS v3?
• Scope Adjustment + Segment and Pentesting
• Hosted Payment Pages Clarification
• Sampling
• POS Security
• Tips & Tricks
• What’s Next?
Who We Are
WHO WE ARE
Company facts and figures
SERVING
GLOBAL
GROWING
INNOVATING
over  3 MILLION subscribers
with over 1,100 
EMPLOYEES
employees in 26 countries
over 56 patents granted / pending
VULNERABILITY 
MANAGEMENT 
Global Threat Database 
feeding Big Data back‐end
THREAT 
MANAGEMENT
Integrated portfolio of 
technologies delivering 
comprehensive protection
COMPLIANCE 
MANAGEMENT 
Leading provider of cloud 
delivered IT‐GRC services
WHAT IS THE PCI DSS? 
• The Payment Card Industry Data Security Standard (PCI DSS) is a set of 12 
requirements designed to protect cardholder data
• Cardholder data is any personally identifiable data associated with a 
cardholder, including:
– Primary Account Number
– Expiry Date
– Name
• All merchants accepting debit/credit cards must comply with the  PCI 
DSS at all times 
What has changed 
from PCI v2 – v3?...
PCI DSS v3 Changes
Definitions of Change
Change Type Definition Number of Changes
Clarification Clarifies intent of requirement. Ensures that 
concise wording in the standard portrays 
the desired intent of requirements. 
74 changes
Additional 
guidance 
Explanation, definition and/or instruction 
to increase understanding or provide 
further information or guidance on a 
particular topic.  
5 changes 
Evolving 
Requirement 
Changes to ensure that the standards are 
up to date with emerging threats and 
changes in the market. 
19 changes 
PCI DSS Version 3.0
• Specifically, scoping has been clarified to indicate that system components include, “Any component or 
device located within or connected to the [cardholder data environment].”
• The new language also states that the “PCI DSS security requirements apply to all system components 
included in or connected to the cardholder data environment
• Additionally, a new requirement has been added requiring that if segmentation is used, “penetration 
testing procedures are designed to test all segmentation methods to confirm they are operational and 
effective, and isolate all out‐of‐scope systems from in‐scope systems.”
• As further clarity, the standard states that, “To be considered out of scope for PCI DSS, a system 
component must be properly isolated (segmented) from the CDE such that even if the out‐of‐scope 
system component was compromised it could not impact the security of the CDE.”
• The additional focus on connected systems likely expands (potentially greatly) the number of systems 
considered in‐scope for many organizations. For example, in most networks using Windows Activity 
Directory security, a compromise of systems outside the CDE could impact the CDE and then could be 
considered in‐scope for the PCI assessment.
Most Notable Changes (1/4)
A Higher Bar to Achieve “Segmentation”
PCI DSS Version 3.0
• PCI DSS 3.0 offers a new definition of system components: “System components include 
systems that may impact the security of the CDE (for example web redirection servers).”
• Up until now, web servers had been considered out‐of‐scope if they used iFrames, hosted 
payment pages or other redirection technologies to prevent cardholder data from touching 
the merchant’s systems.
• Under the new standard, all of these servers fall in‐scope and, due to the new segmentation 
requirement, likely bring the rest of a company’s network into scope as well.
• The only “out” for companies that lack the ability to ensure the security of web servers 
internally remains fully outsourcing the web infrastructure.
Most Notable Changes (2/4)
Hosted Payment Pages Are No Longer A “silver bullet”
PCI DSS Version 3.0
Most Notable Changes (3/4)
Larger Samples Are Required
• The new standard requires larger samples. Specifically, “Samples of system components must 
include every type and combination that is in use. For example, where applications are 
sampled, the sample must include all versions and platforms for each type of application.”
• For merchants undergoing a third party assessment or Level 1 merchants that self assess, the 
level of effort in the validation process is likely to increase.
PCI DSS Version 3.0
• In response to recent attacks in which POS devices have been physically 
modified to capture card holder data, there is a new set of control 
requirements around physical security for POS devices.
• First, merchants must maintain an inventory of POS devices, which must 
be identified in detail, including the location and serial number of each 
device.
• Additionally, POS devices must be inspected periodically for tampering, 
and employees at POS locations must be trained in how to detect and 
prevent device tampering
Most Notable Changes (4/4)
Greater Security Around POS Physical Controls
PCI DSS Version 3.0
• Annual Pentesting
– Internal & External Network (qualified internal/external resource)
• Segmentation must be verified
– Applications (qualified internal/external resource)
• Vulnerability Scanning
– Internal (ASV or Self)
– External (ASV only)
• Default Passwords – must be changed
• Security Education – pretty much everyone
– Role appropriate.
Additional Major Changes or Key Areas
Tips & Tricks
1. Read the PCI‐DSS v3.
2. Leverage your entire employee base.
3. Read InfoSec News.
4. Keep the conversation going.
5. Be able to show proof.
6. Stay on top of documentation.
7. Standardize and remove risk.
8. Know your compliance anniversary date.
9. Start your assessment early.
10.Establish your current Merchant Level.
What’s Next?
Things to pay attention to in the near future
• InfoSec companies expect an increase in CHD theft ahead of EMV 2015 
integration deadline in the USA.
• Employee and Business process security
• P2PE – it’s new and still in the works
Thank You
• Eric Wassenaar, NFP Account Executive
• ewassenaar@trustwave.com
• (312) 470‐8743
Why the Era of 
CRM is Over
Brent Sitton
Product Marketing Manager
Why the Era of CRM is Over
Complex Integrations
Disparate Products &  
Vendors
High Cost of Ownership
Designed for Staff
+ =A ‘Half-Cycle’ Approach
Disparate Systems = A Risky Approach
Engagement Management System
New Programs and Services
• Survey method
– Misleading Indications
– Qualitative, not Quantitative
• Full Implementation
– Fraught with Risk
Software Project Failure
Standish CHAOS Report on Software Projects
1994 ‐ 16% Successful
2013 – 39% Successful
Just Do It!
Put your products on the web and customers 
will come…
Learning Organization
Learning – Validate your ideas using the 
scientific method
• Hypothesize
• Build Pilot
• Measure
• Learn
Engagement Management
• Integrate Web and Data Quickly
• Flexibility to adapt to deliver new services
• Complete 360° view of your constituents in 
ONE system
• Interact with constituents on Any Device
• Measure member interaction
Pilot Project in iMIS
• Community Service Groups
– Notify targeted group
– Collect information
– Match them to volunteer event
– See the measurable results
Demonstration
Collect New Information
Notify Members
Measure Results
Learning with an EMS
• Integrate Web and Data Quickly
• Flexibility to adapt to deliver new services
• Complete 360° view of your constituent in 
ONE system
• Interact with constituents on Any Device
• Measure  interaction
Learning Organization
iMIS RiSE enables your organization to LEARN 
from customers’ actions and behavior, 
understanding what they VALUE
Ushering in the END
of the CRM era
Associations for 
Professionals in Infection 
Control and Epidemiology
Artesha Moore, CAE
Vice President, Membership, 
Education, and Technology
About APIC
Mission: Create a safer world through 
the prevention of infection.
• Over 15,000 members from variety 
of practice settings within 
healthcare
• 120 domestic and international 
chapters
• 11 special interest groups (similar 
to Technical Councils)
• Over 50% growth in past few years
• Diverse membership with varying 
needs
Challenge
In 2005, APIC wanted to grow, yet, systems were 
not in place
• AMS out of date, inaccurate
• No true web integration
• Culture not supportive
Membership growth is not 
possible without engagement
Growth Leads to Challenges
• Variable practice 
settings with varying 
needs
• High % retiring in 5 
years
• Decreased time and 
increased demands 
impact member 
participation
• Ever‐changing 
regulations and need 
for new guidelines
Member Engagement Means...
• Ease of access to 
features
• Integration of all 
technologies with 
AMS
• Enhancing customer 
experience
Engagement Strategy 
• Strengthen our AMS to enable greater connectivity to 
online resources
• Get an accurate picture of our members using metrics 
and data
• Increase capacity by automating routine tasks
• Work with vendors to integrate 3rd party add‐ons to 
expand program offerings
Change internal culture to embrace 
both IT and member services
Engagement Strategy 
Using data to make 
decisions:
• Identifying key 
members groups
• Tracking member 
activity and 
performance
• Identifying new 
leaders
• Integrating with new 
platforms
Engagement Strategy 
• Open lines of 
communication 
between frontline 
staff, IT and leaders
• Provide training to 
empower staff to act
• Promote innovation at 
all levels
• Connect personal goals 
with organizational 
goals
• Be open to new ideas
Embracing Technology...
• Plan must support 
your strategic plan
• Strong infrastructure 
is essential
• Knowledgeable staff 
to help educate 
members
• Develop partnership 
with vendors
Enhancements Lead to New Possibilities
As APIC's database 
and web resources 
evolved, staff 
focused on more 
ways to get and keep 
members engaged.
Results
Results: New Leaders
• Using customized 
tables to create a 
database within 
existing structure
• Using scoring in social 
media to identify new 
leaders
• Using web analytics to 
understand member 
content needs
Results: Growth
41+% Membership Growth
"The single most important thing to 
remember about any enterprise is 
that there are no results inside its 
walls. The result of a business is a 
satisfied customer." 
Zig Ziglar, Sales and motivational speaker and writer
Contact Information
Artesha Moore, CAE
Vice President, Membership, 
Education, and Technology
APIC
amoore@apic.org
Florida Bankers 
Association
Bruce Ryan
DBA and Web Manager
Florida Bankers Association
Founded in 1888 in support of Florida’s FDIC insured banks 
and financial institutions.
– 22 Staff Members
– Advocacy
– Education
– Membership
– Associate Membership
• Vendors
– Endorsed Partner Program
• Products
– Other Services
• Career Center, Fraudnet, Capwiz and more…
Challenge: Disparate Applications
Schools 
DB
Member 
DB
Accounting 
DB
Reports
Our Goal with iMIS 20
• 100% Retention of 
Members
• Staff Productivity
• More Efficient 
Member and Client 
Experience
Solution: iMIS 20
• CRM & CMS in one 
system
• Events, product sales, 
accounting, etc. 
in one system
• Offline/Online 
transactions in one 
system
• Total web integration
Results iMIS 20
• Time Savings: Supporting 
one application instead of 
5+
• Cost Savings: Paying for 
one application instead of 
5+!
• Reporting: Happy staff!
• Ease of Use: One 
application vs. 5+ (Happy 
staff!!)
• Member Engagement!
Results iMIS 20
Accounting DB
Reports
Wrap Up
David Riffle
Senior Director
Advanced Solutions International, Inc.
• Be Prepared
Lessons Learned 
• Massive change in communication is an 
opportunity to grow and thrive
– Social networking  ‐ You Tube
– Mobility  ‐ Personalization
– Communities of Interests ‐ Data Capture
• C Level Executives must lead this transition
Multiple systems increase the 
complexity of securing data
Engagement Management 
System
Albert Einstein
Insanity: “doing the same thing over 
and over again and expecting different 
results.”
The era of CRM is 
over.
http://bit.ly/ASISuccess
Success Assessment
96
Thanks!
1‐800‐727‐8682
www.advsol.com
www.imis.com/tour
@advsol.com
Wrap Up
David Riffle
Senior Director
Advanced Solutions International, Inc.

More Related Content

What's hot

IBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesIBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesJeff Miller
 
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.IGN MANTRA
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsInfonaligy
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk ManagementHamed Moghaddam
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness trainingSAROJ BEHERA
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security ProgramShauna_Cox
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksIBM Security
 
Risk Management
Risk ManagementRisk Management
Risk Managementijtsrd
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...PECB
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessnewbie2019
 
information security management
information security managementinformation security management
information security managementGurpreetkaur838
 
IT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and ToolsIT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and ToolsAndrew S. Baker (ASB)
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurityIT Governance Ltd
 
Simplifying the data privacy governance quagmire building automated privacy ...
Simplifying the data privacy governance quagmire  building automated privacy ...Simplifying the data privacy governance quagmire  building automated privacy ...
Simplifying the data privacy governance quagmire building automated privacy ...Avinash Ramineni
 
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric VanderburgInformation Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric VanderburgEric Vanderburg
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security Ernest Staats
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security ManagementMark Conway
 
Federal Cybersecurity: The latest challenges, initiatives and best practices
Federal Cybersecurity: The latest challenges, initiatives and best practicesFederal Cybersecurity: The latest challenges, initiatives and best practices
Federal Cybersecurity: The latest challenges, initiatives and best practicesJohn Gilligan
 

What's hot (20)

IBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesIBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn Series
 
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
 
isicg - 3 r's v4
isicg - 3 r's v4isicg - 3 r's v4
isicg - 3 r's v4
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
 
Information Security
Information SecurityInformation Security
Information Security
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness training
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
information security management
information security managementinformation security management
information security management
 
IT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and ToolsIT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and Tools
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Simplifying the data privacy governance quagmire building automated privacy ...
Simplifying the data privacy governance quagmire  building automated privacy ...Simplifying the data privacy governance quagmire  building automated privacy ...
Simplifying the data privacy governance quagmire building automated privacy ...
 
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric VanderburgInformation Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
Federal Cybersecurity: The latest challenges, initiatives and best practices
Federal Cybersecurity: The latest challenges, initiatives and best practicesFederal Cybersecurity: The latest challenges, initiatives and best practices
Federal Cybersecurity: The latest challenges, initiatives and best practices
 

Viewers also liked

Rx15 tpp wed_430_1_henderson_2anderson-emptage
Rx15 tpp wed_430_1_henderson_2anderson-emptageRx15 tpp wed_430_1_henderson_2anderson-emptage
Rx15 tpp wed_430_1_henderson_2anderson-emptageOPUNITE
 
Modul-Networking Training Basic
Modul-Networking Training BasicModul-Networking Training Basic
Modul-Networking Training BasicHamdan Paliwang
 
master_thesis_Ludger_goeminne
master_thesis_Ludger_goeminnemaster_thesis_Ludger_goeminne
master_thesis_Ludger_goeminneLudger Goeminne
 
Some Pry Features
Some Pry FeaturesSome Pry Features
Some Pry FeaturesYann VERY
 
RESUME FOR KAREN GRAY SALES
RESUME FOR KAREN GRAY SALESRESUME FOR KAREN GRAY SALES
RESUME FOR KAREN GRAY SALESKaren Gray
 
Sintesis informativa 02 04 2015
Sintesis informativa 02 04 2015Sintesis informativa 02 04 2015
Sintesis informativa 02 04 2015megaradioexpress
 
Onboarding Webinar: Sparking Employee Performance & Supercharge Busines growth
Onboarding Webinar: Sparking Employee Performance & Supercharge Busines growthOnboarding Webinar: Sparking Employee Performance & Supercharge Busines growth
Onboarding Webinar: Sparking Employee Performance & Supercharge Busines growthWhen I Work
 
Editais de Cultura - Lárcio Benedetti - Aula 2 (Março 2015)
Editais de Cultura - Lárcio Benedetti - Aula 2 (Março 2015)Editais de Cultura - Lárcio Benedetti - Aula 2 (Março 2015)
Editais de Cultura - Lárcio Benedetti - Aula 2 (Março 2015)Cultura e Mercado
 
Big Data for Local Context
Big Data for Local ContextBig Data for Local Context
Big Data for Local ContextGeorge Percivall
 
A Walk Through the Kimball ETL Subsystems with Oracle Data Integration
A Walk Through the Kimball ETL Subsystems with Oracle Data IntegrationA Walk Through the Kimball ETL Subsystems with Oracle Data Integration
A Walk Through the Kimball ETL Subsystems with Oracle Data IntegrationMichael Rainey
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Samarth Godara
 
Strategy workshop for development organization bangla
Strategy workshop for development organization   banglaStrategy workshop for development organization   bangla
Strategy workshop for development organization banglaKazi Monirul Kabir
 
Comida.stemchangers
Comida.stemchangersComida.stemchangers
Comida.stemchangersjnorbik
 

Viewers also liked (19)

Rx15 tpp wed_430_1_henderson_2anderson-emptage
Rx15 tpp wed_430_1_henderson_2anderson-emptageRx15 tpp wed_430_1_henderson_2anderson-emptage
Rx15 tpp wed_430_1_henderson_2anderson-emptage
 
Modul-Networking Training Basic
Modul-Networking Training BasicModul-Networking Training Basic
Modul-Networking Training Basic
 
master_thesis_Ludger_goeminne
master_thesis_Ludger_goeminnemaster_thesis_Ludger_goeminne
master_thesis_Ludger_goeminne
 
FE_HomeboundEduFlyer_1402_v9pdf
FE_HomeboundEduFlyer_1402_v9pdfFE_HomeboundEduFlyer_1402_v9pdf
FE_HomeboundEduFlyer_1402_v9pdf
 
Some Pry Features
Some Pry FeaturesSome Pry Features
Some Pry Features
 
23 apr-june 1997
23 apr-june 199723 apr-june 1997
23 apr-june 1997
 
GeoFORMAT - New RTB technology - The best advertising solution
GeoFORMAT -  New RTB technology - The best advertising solutionGeoFORMAT -  New RTB technology - The best advertising solution
GeoFORMAT - New RTB technology - The best advertising solution
 
RESUME FOR KAREN GRAY SALES
RESUME FOR KAREN GRAY SALESRESUME FOR KAREN GRAY SALES
RESUME FOR KAREN GRAY SALES
 
Sintesis informativa 02 04 2015
Sintesis informativa 02 04 2015Sintesis informativa 02 04 2015
Sintesis informativa 02 04 2015
 
lesson_plan_3
lesson_plan_3lesson_plan_3
lesson_plan_3
 
Content strategy past, present, future
Content strategy past, present, futureContent strategy past, present, future
Content strategy past, present, future
 
Onboarding Webinar: Sparking Employee Performance & Supercharge Busines growth
Onboarding Webinar: Sparking Employee Performance & Supercharge Busines growthOnboarding Webinar: Sparking Employee Performance & Supercharge Busines growth
Onboarding Webinar: Sparking Employee Performance & Supercharge Busines growth
 
Email
EmailEmail
Email
 
Editais de Cultura - Lárcio Benedetti - Aula 2 (Março 2015)
Editais de Cultura - Lárcio Benedetti - Aula 2 (Março 2015)Editais de Cultura - Lárcio Benedetti - Aula 2 (Março 2015)
Editais de Cultura - Lárcio Benedetti - Aula 2 (Março 2015)
 
Big Data for Local Context
Big Data for Local ContextBig Data for Local Context
Big Data for Local Context
 
A Walk Through the Kimball ETL Subsystems with Oracle Data Integration
A Walk Through the Kimball ETL Subsystems with Oracle Data IntegrationA Walk Through the Kimball ETL Subsystems with Oracle Data Integration
A Walk Through the Kimball ETL Subsystems with Oracle Data Integration
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
 
Strategy workshop for development organization bangla
Strategy workshop for development organization   banglaStrategy workshop for development organization   bangla
Strategy workshop for development organization bangla
 
Comida.stemchangers
Comida.stemchangersComida.stemchangers
Comida.stemchangers
 

Similar to CIO Summit: Data Security in a Mobile World

CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldiMIS
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldiMIS
 
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...North Texas Chapter of the ISSA
 
A New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingA New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingSPI Conference
 
How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceSurfWatch Labs
 
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...North Texas Chapter of the ISSA
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtJohn D. Johnson
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesKroll
 
Symantec 2011 State of Security Survey Global Findings
Symantec 2011 State of Security Survey Global FindingsSymantec 2011 State of Security Survey Global Findings
Symantec 2011 State of Security Survey Global FindingsSymantec
 
Business RISKS From IT
Business RISKS From IT Business RISKS From IT
Business RISKS From IT Sanjiv Arora
 
ComResource Business Solutions
ComResource Business SolutionsComResource Business Solutions
ComResource Business SolutionsAnthony Dials
 
How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?PECB
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016Prime Infoserv
 
Implementing a Security Management Framework
Implementing a Security Management FrameworkImplementing a Security Management Framework
Implementing a Security Management FrameworkJoseph Wynn
 
Using Threat Intelligence to Address Your Growing Digital Risk
Using Threat Intelligence to Address Your Growing Digital RiskUsing Threat Intelligence to Address Your Growing Digital Risk
Using Threat Intelligence to Address Your Growing Digital RiskSurfWatch Labs
 

Similar to CIO Summit: Data Security in a Mobile World (20)

CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
A New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingA New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm Approaching
 
How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital Presence
 
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 
Symantec 2011 State of Security Survey Global Findings
Symantec 2011 State of Security Survey Global FindingsSymantec 2011 State of Security Survey Global Findings
Symantec 2011 State of Security Survey Global Findings
 
Business RISKS From IT
Business RISKS From IT Business RISKS From IT
Business RISKS From IT
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
ComResource Business Solutions
ComResource Business SolutionsComResource Business Solutions
ComResource Business Solutions
 
How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
Implementing a Security Management Framework
Implementing a Security Management FrameworkImplementing a Security Management Framework
Implementing a Security Management Framework
 
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
 
Using Threat Intelligence to Address Your Growing Digital Risk
Using Threat Intelligence to Address Your Growing Digital RiskUsing Threat Intelligence to Address Your Growing Digital Risk
Using Threat Intelligence to Address Your Growing Digital Risk
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 

CIO Summit: Data Security in a Mobile World