SlideShare a Scribd company logo
1 of 69
CONFIDENCE
CONFERENCE
Analyzing Security Findigns the Easy Way
6 years later…
SECCUBUS
This work is licensed under a Creative Commons
Attribution-ShareAlike 4.0 International License.
CONFIDENCE
CONFERENCE
Frank Breedijk
• Security Officer at Schuberg Philis
• (Official) Security dude since 2000
• Author of Seccubus
Coordinates:
• fbreedijk@schubergphilis.com
• https://www.linkedin.com/in/seccubus
• @Seccubus on Twitter
Glenn ten Cate
• Mission Critical Engineer Security at Schuberg Philis
• Security Dude
• Author of Security Knowledge Framework
Coordinates:
• gtencate@schubergphilis
• https://nl.linkedin.com/pub/glenn-ten-cate/3b/11a/117
WHO ARE WE?
CONFIDENCE
CONFERENCE
Frustration
Being challanged
To make my life easier
WHY DID I START THE SECCUBUS PROJECT?
Y ? A CC NC ND image by Tehmina Goskar
https://www.flickr.com/photos/13114254@N00/119475590/
CONFIDENCE
CONFERENCE
C. Lueless
Mission:
• Mission: Perform a bi-weekly vulnerability scan of all our
public IP addresses
B. Rightlad
A STORY ABOUT TWO GUYS
These and all non-attributed photos of Frank Breedijk
are taken by Jan Jacob Bos
CONFIDENCE
CONFERENCE
C. LUELESS – TAKES A CLASSIC APPROACH
CONFIDENCE
CONFERENCE
GETTING UP WAY TO EARLY…
CONFIDENCE
CONFERENCE
… STARTING THE SCANNER IN THE
MAINTENANCE WINDOW…
CONFIDENCE
CONFERENCE
… WAITING …
CONFIDENCE
CONFERENCE
… ANALYSIS
CONFIDENCE
CONFERENCE
Scanners are written for consultants, not
operations
Scanners need to make a tradeoff between
false positives and false negatives
Most scanners produce an awfull lot of output
Scanning takes time, tools are poorly
automated
WHAT IS C. LUELESS’ PROBLEM?
CONFIDENCE
CONFERENCE
B. RIGHTLAD CHOOSES SECCUBUS
CONFIDENCE
CONFERENCE
CONFIGURATION IN THE MORNING
CONFIDENCE
CONFERENCE
… GO HOME …
CONFIDENCE
CONFERENCE
… RELAX …
CONFIDENCE
CONFERENCE
… THE SCAN RUNS AT NIGHT …
Image: Orion's Umbra, a CC NC image from
jahdakinebrah's photostream
CONFIDENCE
CONFERENCE
… IN THE MORNING …
CONFIDENCE
CONFERENCE
… ANALYZE AND REMEDIATE
CONFIDENCE
CONFERENCE
WHAT HAPPENED UNDER THE HOOD?
Do-scan
Nessus/sc
an
Nessus
.nessus
files
nessus2ivilIvil file
Load ivil
Database
CONFIDENCE
CONFERENCE
ALLABOUT STATUS
New
Open
No issue
CONFIDENCE
CONFERENCE
Is the work in balance with the profit?
BALANCE
A fine balance a CC NC ND Image by Anish B George
https://www.flickr.com/photos/22199070@N00/3311106984/
CONFIDENCE
CONFERENCE
TWO WEEKS LATER
Image: 1/365, a CC NC ND image from cubedude27's
photostream
CONFIDENCE
CONFERENCE
C. LUELESS – TAKES A CLASSIC APPROACH
CONFIDENCE
CONFERENCE
GETTING UP WAY TO EARLY…
CONFIDENCE
CONFERENCE
… STARTING THE SCANNER IN THE
MAINTENANCE WINDOW…
CONFIDENCE
CONFERENCE
… WAITING …
CONFIDENCE
CONFERENCE
… ANALYSIS
CONFIDENCE
CONFERENCE
WAS IT REALLY WORTH IT?
CONFIDENCE
CONFERENCE
B. RIGHTLAD CHOOSES SECCUBUS
CONFIDENCE
CONFERENCE
… GO HOME …
CONFIDENCE
CONFERENCE
… RELAX …
CONFIDENCE
CONFERENCE
… THE SCAN RUNS AT NIGHT …
Image: Half Moon, a CC NC ND image from
za3tooor's photostream
CONFIDENCE
CONFERENCE
… IN THE MORNING …
CONFIDENCE
CONFERENCE
… ANALYZE AND REMEDIATE
CONFIDENCE
CONFERENCE
ALLABOUT STATUS
New
Open
No issue
ChangedGone
Closed
Masked
CONFIDENCE
CONFERENCE
Don’t bother users with non-actionable findings
OK IS OK…
Woo a CC NC SA image by Rick Harrison
https://www.flickr.com/photos/81851211@N00/2682663297/
CONFIDENCE
CONFERENCE
ANOTHER TWO WEEKS PASS…
Image: Cosas hechas, a CC ND image from srgblog's
photostream
CONFIDENCE
CONFERENCE
C. LUELESS – TAKES A CLASSIC APPROACH
CONFIDENCE
CONFERENCE
GETTING UP WAY TO EARLY…
CONFIDENCE
CONFERENCE
… STARTING THE SCANNER IN THE
MAINTENANCE WINDOW…
CONFIDENCE
CONFERENCE
… WAITING …
CONFIDENCE
CONFERENCE
… ANALYSIS
CONFIDENCE
CONFERENCE
B. RIGHTLAD CHOOSES SECCUBUS
CONFIDENCE
CONFERENCE
… GO HOME …
CONFIDENCE
CONFERENCE
… RELAX …
CONFIDENCE
CONFERENCE
… THE SCAN RUNS AT NIGHT …
Image: Himalayan Moonrise, a CC NC ND image from
swamysk's photostream
CONFIDENCE
CONFERENCE
… IN THE MORNING …
CONFIDENCE
CONFERENCE
… ANALYZE AND REMEDIATE
CONFIDENCE
CONFERENCE
Succubus
In-Seccubus
Seccubus
WHAT IS IN A NAME?
CONFIDENCE
CONFERENCE
Monthly Seccubus runs means:
Scans are scheduled via crontab
Only the findings that need attention get it
Less errors due to less repetitave work.
The amount of effort is proportional to the amount of changes
Risk is proportional to the amount of changes
SO…
CONFIDENCE
CONFERENCE
COMPARE
Image: Apples & Oranges - They Don't Compare, a
CC image from thebusybrain's photostream
CONFIDENCE
CONFERENCE
REDUCE
Image: Slimmer, a CC NC ND image from mkmabus's
photostream
CONFIDENCE
CONFERENCE
6 YEARS AGO…
CONFIDENCE
CONFERENCE
ULTIMATE GOAL
Image: StuttgargoalRobin, a CC image from
dankamminga's photostream
CONFIDENCE
CONFERENCE
Name Seccubus chosen here at Confidence
Added new scanners
Wrote a new GUI
SECCUBUS HAS EVOLVED
Medusa
SSLyze
CONFIDENCE
CONFERENCE
Intermediate Vulnerability Information
Language
Intermediate format that allows tools to
interface and exchange findings
A LITTLE IVIL GOES A LONG WAY
Image: EVIL a CC NC SA image from krazydad's
photostream
CONFIDENCE
CONFERENCE
It does not try to capture everything
It does not try to fit each case
The specification is not 63 pages
Simple to read
Simple to write
Simple to use
Simple License (MIT)
Easy to integrate new tools into Seccubus
IVIL
CONFIDENCE
CONFERENCE
Joined Schuberg Philis 2 years ago
Main focus: Web Application Security
We need to integrate this into our pipeline
ENTER GLENN
Enter here a CC NC ND image by Anne Petersen
https://www.flickr.com/photos/60258967@N00/4183985730/
CONFIDENCE
CONFERENCE
Breaches are moving from layer 3 to
layer 7
There’s only so many security dudes to drive
the tools
Integrate into continuous delivery
WHY?
CONFIDENCE
CONFERENCE
Google’s web application security scanner
Open Source
Noisy
Not very subtile
Not production safe!
FIRST WIN: SKIPFISH
Skip w/ fish a CC NC ND image by AlBakker
https://www.flickr.com/photos/45213160@N00/206944920/
CONFIDENCE
CONFERENCE
Open source
Like Burp but free (as in speech)
Actively developed and maintained
OWASP Flag Ship Project
SECOND WIN: OWASP ZAP
IEEE Scrum a CC NC SA image by Jim Carson
https://www.flickr.com/photos/44124442504@N01/2208956607/
CONFIDENCE
CONFERENCE
Help developers write better code
Enable Security by Design
• Knowledge system for risk analysis
Code Securely
• Code examples
Check code before commit
• OWASP Application Security Verification Standard
Newly adopted as OWASP Project
SECURITY KNOWLEDGE FRAMEWORK
Moving Hacks a CC NC SA image by Brian Sawyer
https://www.flickr.com/photos/45609637@N00/229360390/
CONFIDENCE
CONFERENCE
Coding
• Perl
• Angular
Requirements
• What do you want
Testers
• Challenge the quality of our crack ;)
Documentation
• Help us get new users
Users
SECCUBUS CAN USE YOUR HELP
Image: Hang On, a CC NC ND image from
brraveheart's photostream
CONFIDENCE
CONFERENCE
First public preview of
new interface
SNEAK PREVIEW
"Celebs" a cc by nc sa licensed photo by Nick Sherman:
http://flickr.com/photos/nicksherman/4145966095/
CONFIDENCE
CONFERENCE
New user interface (RSN)
Start/schedule scans from the GUI
Integration with Security Knowledge
Framework
Add user/rights management
Track issues as well as findings
Reporting
More???
ROADMAP
Albany NY 1950 a CC image by david
https://www.flickr.com/photos/23465812@N00/6877290919/
CONFIDENCE
CONFERENCE
www.seccubus.com
QUESTIONS
Image: What now?, a CC ND image from laurenclose's photostream
CONFIDENCE
CONFERENCE
Frank Breedijk
• Security Officer at Schuberg Philis
• (Official) Security dude since 2000
• Author of Seccubus
Coordinates:
• fbreedijk@schubergphilis.com
• https://www.linkedin.com/in/seccubus
• @Seccubus on Twitter
Glenn ten Cate
• Mission Critical Engineer Security at Schuberg Philis
• Security Dude
• Author of Security Knowledge Framework
Coordinates:
• gtencate@schubergphilis
• https://nl.linkedin.com/pub/glenn-ten-cate/3b/11a/117
WHO ARE WE?

More Related Content

Viewers also liked

4Developers 2015: Agile Software Engineering Practices that Helps Deliver Bus...
4Developers 2015: Agile Software Engineering Practices that Helps Deliver Bus...4Developers 2015: Agile Software Engineering Practices that Helps Deliver Bus...
4Developers 2015: Agile Software Engineering Practices that Helps Deliver Bus...PROIDEA
 
DOD 2016 - Rafał Kuć - Building a Resilient Log Aggregation Pipeline Using El...
DOD 2016 - Rafał Kuć - Building a Resilient Log Aggregation Pipeline Using El...DOD 2016 - Rafał Kuć - Building a Resilient Log Aggregation Pipeline Using El...
DOD 2016 - Rafał Kuć - Building a Resilient Log Aggregation Pipeline Using El...PROIDEA
 
PLNOG 17 - Paweł Wachelka - Zastosowanie 802.1x w sieciach kampusowych - nowe...
PLNOG 17 - Paweł Wachelka - Zastosowanie 802.1x w sieciach kampusowych - nowe...PLNOG 17 - Paweł Wachelka - Zastosowanie 802.1x w sieciach kampusowych - nowe...
PLNOG 17 - Paweł Wachelka - Zastosowanie 802.1x w sieciach kampusowych - nowe...PROIDEA
 
DOD 2016 - Diogo Oliveira - The OutSystems R&D Continuous Delivery Journey
DOD 2016 - Diogo Oliveira -  The OutSystems R&D Continuous Delivery JourneyDOD 2016 - Diogo Oliveira -  The OutSystems R&D Continuous Delivery Journey
DOD 2016 - Diogo Oliveira - The OutSystems R&D Continuous Delivery JourneyPROIDEA
 
PLNOG 17 - Elisa Jasinska - Network Automation - Design your Systems
PLNOG 17 - Elisa Jasinska - Network Automation - Design your SystemsPLNOG 17 - Elisa Jasinska - Network Automation - Design your Systems
PLNOG 17 - Elisa Jasinska - Network Automation - Design your SystemsPROIDEA
 
PLNOG 17 - Patryk Wojtachnio - DDoS mitygacja oraz ochrona sieci w środowisku...
PLNOG 17 - Patryk Wojtachnio - DDoS mitygacja oraz ochrona sieci w środowisku...PLNOG 17 - Patryk Wojtachnio - DDoS mitygacja oraz ochrona sieci w środowisku...
PLNOG 17 - Patryk Wojtachnio - DDoS mitygacja oraz ochrona sieci w środowisku...PROIDEA
 
PLNOG 17 - Piotr Strzyżewski - Regulacje RIPE które przekładają sie na realia...
PLNOG 17 - Piotr Strzyżewski - Regulacje RIPE które przekładają sie na realia...PLNOG 17 - Piotr Strzyżewski - Regulacje RIPE które przekładają sie na realia...
PLNOG 17 - Piotr Strzyżewski - Regulacje RIPE które przekładają sie na realia...PROIDEA
 
PLNOG 17 - Robert Rosiak - Zcentralizowane i dystrybuowane CPE - różnice i po...
PLNOG 17 - Robert Rosiak - Zcentralizowane i dystrybuowane CPE - różnice i po...PLNOG 17 - Robert Rosiak - Zcentralizowane i dystrybuowane CPE - różnice i po...
PLNOG 17 - Robert Rosiak - Zcentralizowane i dystrybuowane CPE - różnice i po...PROIDEA
 
JDD 2016 - Christin Gorman - Concurrency in Java
JDD 2016 - Christin Gorman - Concurrency in JavaJDD 2016 - Christin Gorman - Concurrency in Java
JDD 2016 - Christin Gorman - Concurrency in JavaPROIDEA
 
JDD 2016 - Ademar Aguiar - To Document Or Not Document - That Is The Question
JDD 2016 - Ademar Aguiar - To Document Or Not Document - That Is The QuestionJDD 2016 - Ademar Aguiar - To Document Or Not Document - That Is The Question
JDD 2016 - Ademar Aguiar - To Document Or Not Document - That Is The QuestionPROIDEA
 
JDD 2016 - Slawomir Sobotka - Prezentacje I Wystąpienia - Jak Nie Tylko Przet...
JDD 2016 - Slawomir Sobotka - Prezentacje I Wystąpienia - Jak Nie Tylko Przet...JDD 2016 - Slawomir Sobotka - Prezentacje I Wystąpienia - Jak Nie Tylko Przet...
JDD 2016 - Slawomir Sobotka - Prezentacje I Wystąpienia - Jak Nie Tylko Przet...PROIDEA
 
JDD 2016 - Michal Bartyzel, Lukasz Korczynski - Refaktoryzacja Systemu eBanko...
JDD 2016 - Michal Bartyzel, Lukasz Korczynski - Refaktoryzacja Systemu eBanko...JDD 2016 - Michal Bartyzel, Lukasz Korczynski - Refaktoryzacja Systemu eBanko...
JDD 2016 - Michal Bartyzel, Lukasz Korczynski - Refaktoryzacja Systemu eBanko...PROIDEA
 

Viewers also liked (12)

4Developers 2015: Agile Software Engineering Practices that Helps Deliver Bus...
4Developers 2015: Agile Software Engineering Practices that Helps Deliver Bus...4Developers 2015: Agile Software Engineering Practices that Helps Deliver Bus...
4Developers 2015: Agile Software Engineering Practices that Helps Deliver Bus...
 
DOD 2016 - Rafał Kuć - Building a Resilient Log Aggregation Pipeline Using El...
DOD 2016 - Rafał Kuć - Building a Resilient Log Aggregation Pipeline Using El...DOD 2016 - Rafał Kuć - Building a Resilient Log Aggregation Pipeline Using El...
DOD 2016 - Rafał Kuć - Building a Resilient Log Aggregation Pipeline Using El...
 
PLNOG 17 - Paweł Wachelka - Zastosowanie 802.1x w sieciach kampusowych - nowe...
PLNOG 17 - Paweł Wachelka - Zastosowanie 802.1x w sieciach kampusowych - nowe...PLNOG 17 - Paweł Wachelka - Zastosowanie 802.1x w sieciach kampusowych - nowe...
PLNOG 17 - Paweł Wachelka - Zastosowanie 802.1x w sieciach kampusowych - nowe...
 
DOD 2016 - Diogo Oliveira - The OutSystems R&D Continuous Delivery Journey
DOD 2016 - Diogo Oliveira -  The OutSystems R&D Continuous Delivery JourneyDOD 2016 - Diogo Oliveira -  The OutSystems R&D Continuous Delivery Journey
DOD 2016 - Diogo Oliveira - The OutSystems R&D Continuous Delivery Journey
 
PLNOG 17 - Elisa Jasinska - Network Automation - Design your Systems
PLNOG 17 - Elisa Jasinska - Network Automation - Design your SystemsPLNOG 17 - Elisa Jasinska - Network Automation - Design your Systems
PLNOG 17 - Elisa Jasinska - Network Automation - Design your Systems
 
PLNOG 17 - Patryk Wojtachnio - DDoS mitygacja oraz ochrona sieci w środowisku...
PLNOG 17 - Patryk Wojtachnio - DDoS mitygacja oraz ochrona sieci w środowisku...PLNOG 17 - Patryk Wojtachnio - DDoS mitygacja oraz ochrona sieci w środowisku...
PLNOG 17 - Patryk Wojtachnio - DDoS mitygacja oraz ochrona sieci w środowisku...
 
PLNOG 17 - Piotr Strzyżewski - Regulacje RIPE które przekładają sie na realia...
PLNOG 17 - Piotr Strzyżewski - Regulacje RIPE które przekładają sie na realia...PLNOG 17 - Piotr Strzyżewski - Regulacje RIPE które przekładają sie na realia...
PLNOG 17 - Piotr Strzyżewski - Regulacje RIPE które przekładają sie na realia...
 
PLNOG 17 - Robert Rosiak - Zcentralizowane i dystrybuowane CPE - różnice i po...
PLNOG 17 - Robert Rosiak - Zcentralizowane i dystrybuowane CPE - różnice i po...PLNOG 17 - Robert Rosiak - Zcentralizowane i dystrybuowane CPE - różnice i po...
PLNOG 17 - Robert Rosiak - Zcentralizowane i dystrybuowane CPE - różnice i po...
 
JDD 2016 - Christin Gorman - Concurrency in Java
JDD 2016 - Christin Gorman - Concurrency in JavaJDD 2016 - Christin Gorman - Concurrency in Java
JDD 2016 - Christin Gorman - Concurrency in Java
 
JDD 2016 - Ademar Aguiar - To Document Or Not Document - That Is The Question
JDD 2016 - Ademar Aguiar - To Document Or Not Document - That Is The QuestionJDD 2016 - Ademar Aguiar - To Document Or Not Document - That Is The Question
JDD 2016 - Ademar Aguiar - To Document Or Not Document - That Is The Question
 
JDD 2016 - Slawomir Sobotka - Prezentacje I Wystąpienia - Jak Nie Tylko Przet...
JDD 2016 - Slawomir Sobotka - Prezentacje I Wystąpienia - Jak Nie Tylko Przet...JDD 2016 - Slawomir Sobotka - Prezentacje I Wystąpienia - Jak Nie Tylko Przet...
JDD 2016 - Slawomir Sobotka - Prezentacje I Wystąpienia - Jak Nie Tylko Przet...
 
JDD 2016 - Michal Bartyzel, Lukasz Korczynski - Refaktoryzacja Systemu eBanko...
JDD 2016 - Michal Bartyzel, Lukasz Korczynski - Refaktoryzacja Systemu eBanko...JDD 2016 - Michal Bartyzel, Lukasz Korczynski - Refaktoryzacja Systemu eBanko...
JDD 2016 - Michal Bartyzel, Lukasz Korczynski - Refaktoryzacja Systemu eBanko...
 

Similar to CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate

De invloed van "cloud" op het dreigingslanschap
De invloed van "cloud" op het dreigingslanschapDe invloed van "cloud" op het dreigingslanschap
De invloed van "cloud" op het dreigingslanschapFrank Breedijk
 
The Agile Technical Writer: Fact or Fiction?
The Agile Technical Writer: Fact or Fiction?The Agile Technical Writer: Fact or Fiction?
The Agile Technical Writer: Fact or Fiction?Dana West
 
Red team, Blue Team or White Cell
Red team, Blue Team or White CellRed team, Blue Team or White Cell
Red team, Blue Team or White CellFrank Breedijk
 
How to Plan For Product Success by CA Technologies VP of Product
 How to Plan For Product Success by CA Technologies VP of Product How to Plan For Product Success by CA Technologies VP of Product
How to Plan For Product Success by CA Technologies VP of ProductProduct School
 
Objects, responsive and perceptive media
Objects, responsive and perceptive mediaObjects, responsive and perceptive media
Objects, responsive and perceptive mediaIan Forrester
 
Movers n shakers of Enterprise Agility
Movers n shakers of Enterprise AgilityMovers n shakers of Enterprise Agility
Movers n shakers of Enterprise AgilityPrasad Prabhakaran
 
Taking creative control of perceptive media for #Futurezonesummit
Taking creative control of perceptive media for #FuturezonesummitTaking creative control of perceptive media for #Futurezonesummit
Taking creative control of perceptive media for #FuturezonesummitIan Forrester
 
ALA TechSource Workshop: The Paperless Professional
ALA TechSource Workshop: The Paperless Professional ALA TechSource Workshop: The Paperless Professional
ALA TechSource Workshop: The Paperless Professional ALATechSource
 
Success Factors of the Connected Home - Applications
Success Factors of the Connected Home - ApplicationsSuccess Factors of the Connected Home - Applications
Success Factors of the Connected Home - ApplicationsDSP-Partners
 
Digital Ethics or The End of The Age of Legends v5.2
 Digital Ethics or The End of The Age of Legends v5.2 Digital Ethics or The End of The Age of Legends v5.2
Digital Ethics or The End of The Age of Legends v5.2Darren Kuropatwa
 
Libraries & cyber security
Libraries & cyber securityLibraries & cyber security
Libraries & cyber securityKevin Martin
 
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...Clare Nelson, CISSP, CIPP-E
 
Perceptive media 2016 for wcsfp
Perceptive media 2016 for wcsfpPerceptive media 2016 for wcsfp
Perceptive media 2016 for wcsfpIan Forrester
 
Disruptive education technology
Disruptive education technologyDisruptive education technology
Disruptive education technologySusan M. Bearden
 
Taming Information Chaos with the Power of 2.0
Taming Information Chaos with the Power of 2.0Taming Information Chaos with the Power of 2.0
Taming Information Chaos with the Power of 2.0Judy O'Connell
 
Debugging Effectively - SymfonyLive San Francisco 2015
Debugging Effectively - SymfonyLive San Francisco 2015Debugging Effectively - SymfonyLive San Francisco 2015
Debugging Effectively - SymfonyLive San Francisco 2015Colin O'Dell
 
Anti patterns of testing for continuous delivery adoption
Anti patterns of testing for continuous delivery adoptionAnti patterns of testing for continuous delivery adoption
Anti patterns of testing for continuous delivery adoptionDr. Anish Cheriyan (PhD)
 
The new horizon of Object based media
The new horizon of Object based mediaThe new horizon of Object based media
The new horizon of Object based mediaIan Forrester
 

Similar to CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate (20)

De invloed van "cloud" op het dreigingslanschap
De invloed van "cloud" op het dreigingslanschapDe invloed van "cloud" op het dreigingslanschap
De invloed van "cloud" op het dreigingslanschap
 
The Agile Technical Writer: Fact or Fiction?
The Agile Technical Writer: Fact or Fiction?The Agile Technical Writer: Fact or Fiction?
The Agile Technical Writer: Fact or Fiction?
 
DevOps
DevOpsDevOps
DevOps
 
Red team, Blue Team or White Cell
Red team, Blue Team or White CellRed team, Blue Team or White Cell
Red team, Blue Team or White Cell
 
How to Plan For Product Success by CA Technologies VP of Product
 How to Plan For Product Success by CA Technologies VP of Product How to Plan For Product Success by CA Technologies VP of Product
How to Plan For Product Success by CA Technologies VP of Product
 
Objects, responsive and perceptive media
Objects, responsive and perceptive mediaObjects, responsive and perceptive media
Objects, responsive and perceptive media
 
Movers n shakers of Enterprise Agility
Movers n shakers of Enterprise AgilityMovers n shakers of Enterprise Agility
Movers n shakers of Enterprise Agility
 
Taking creative control of perceptive media for #Futurezonesummit
Taking creative control of perceptive media for #FuturezonesummitTaking creative control of perceptive media for #Futurezonesummit
Taking creative control of perceptive media for #Futurezonesummit
 
ALA TechSource Workshop: The Paperless Professional
ALA TechSource Workshop: The Paperless Professional ALA TechSource Workshop: The Paperless Professional
ALA TechSource Workshop: The Paperless Professional
 
Success Factors of the Connected Home - Applications
Success Factors of the Connected Home - ApplicationsSuccess Factors of the Connected Home - Applications
Success Factors of the Connected Home - Applications
 
Digital Ethics or The End of The Age of Legends v5.2
 Digital Ethics or The End of The Age of Legends v5.2 Digital Ethics or The End of The Age of Legends v5.2
Digital Ethics or The End of The Age of Legends v5.2
 
Libraries & cyber security
Libraries & cyber securityLibraries & cyber security
Libraries & cyber security
 
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
 
Perceptive media 2016 for wcsfp
Perceptive media 2016 for wcsfpPerceptive media 2016 for wcsfp
Perceptive media 2016 for wcsfp
 
Disruptive education technology
Disruptive education technologyDisruptive education technology
Disruptive education technology
 
Taming Information Chaos with the Power of 2.0
Taming Information Chaos with the Power of 2.0Taming Information Chaos with the Power of 2.0
Taming Information Chaos with the Power of 2.0
 
Debugging Effectively - SymfonyLive San Francisco 2015
Debugging Effectively - SymfonyLive San Francisco 2015Debugging Effectively - SymfonyLive San Francisco 2015
Debugging Effectively - SymfonyLive San Francisco 2015
 
NM Lab Presentation
NM Lab PresentationNM Lab Presentation
NM Lab Presentation
 
Anti patterns of testing for continuous delivery adoption
Anti patterns of testing for continuous delivery adoptionAnti patterns of testing for continuous delivery adoption
Anti patterns of testing for continuous delivery adoption
 
The new horizon of Object based media
The new horizon of Object based mediaThe new horizon of Object based media
The new horizon of Object based media
 

Recently uploaded

Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Intelisync
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 

Recently uploaded (20)

Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 

CONFidence 2015: Automated Security scanning - Frank Breedijk, Glenn ten Cate