The Billion Dollar Product - Online Privacy (v2.2)

Rui Miguel Feio
Rui Miguel FeioSenior Technical Lead at RSM Partners
Delivering	the	best	in	z	services,	so2ware,	hardware	and	training.	Delivering	the	best	in	z	services,	so2ware,	hardware	and	training.	
World	Class	z	Specialists	
The	Billion	Dollar	
Product	–	Online	Privacy	
Rui	Miguel	Feio	–	Security	Lead
Agenda	
•  Introduc:on	
•  Free	online	services	
•  Nothing	in	life	is	for	free	
•  Paid	online	web	services	
•  How	do	they	do	it?	
•  Risks	
•  Security	(or	lack	of	it)	
•  The	mainframe	
•  Conclusion	
•  Ques:ons
Introduc:on	
–  Security	lead	at	RSM	Partners	
–  Been	working	with	mainframes	for	the	past	17	years	
–  Started	as	an	MVS	Systems	Programmer	with	IBM	
–  Specialises	in	mainframe	security	
–  Experience	in	non-mainframe	plaTorms	as	well	
–  Been	given	presenta:ons	all	over	the	world
Free	Online	Services
Free	online	services
It’s	free	in	return	for…	
•  Placing	cookies	on	your	devices	to	track	you	and	your	online	
ac:vi:es	
•  Collec:ng	‘some’	of	your	personal	data	
•  Including	ads	in	the	web	sites	you	use
Is	this	fair?	
•  YES!!	The	services	are	for	free!!!	
•  Who	cares?...	I	don’t	have	anything	to	hide!	
•  Saw	a	great	quote	the	other	day…	
	
“My	biggest	fear	is	when	I	die	...	
...Is	that	my	wife	sells	my	motorbikes	for	what	I	told	her	I	paid	for	
them!!!”	
•  See	we	all	have	something	to	hide	J
Nothing	in	life	is	for	free
“[…]	a	person	has	no	legi:mate	expecta:on	
of	privacy	in	informa:on	he	voluntarily	turns	
over	to	third	par:es”		
	
Google’s	legal	team
Privacy	Policy	&	Terms	and	Condi:ons	
•  How	many	of	you	ever	read	them?		
•  Typically	these	are	extensive	and	difficult	to	decipher	
•  They	are	legally	binding	business	proposi:ons	between	you	and	the	
online	service	provider	
•  Ok,	but	who	cares…?	
•  It’s	a	free	service!!...	Really?
Let	me	ask	you	something…	
•  How	much	do	you	value	your	privacy?	
•  How	about	your	friends	and	family’s	privacy?	
•  What	do	you	think	could	happen	if	your	data	was	misused?		
•  Have	you	ever	searched	or	visited	an	online	website	that	you	would	
rather	like	to	keep	a	‘secret’?	
•  I	know	I	have	J
Interes:ng	facts	
•  On	a	daily	basis	Google	processes	around	24	Petabytes	of	data	
•  This	data	is	then	stored	and	sold	for	adver:sement	
•  The	use	of	Cookies:	
–  Fingerprints	that	allow	you	to	be	traced	and	catalogued	
•  What	you	see	online	is	customised	for	you	based	on	your	‘online	
profile’
Value	of	a	Company	
•  Why	do	you	think	Facebook	or	Google	are	worth	billions	of	dollars?	
•  A	study	published	by	the	Wall	Street	Journal	on	Facebook:	
–  Each	long-term	user	is	worth	$80.95	
–  Each	friendship	is	worth	$0.62	
–  Your	profile	page	is	worth	$1,800	
–  A	business	page	and	associated	ad	revenues	are	worth	$3.1	
million
Let	me	see	if	I	got	this	right…	
•  You	use	these	‘free’	online	web	services	
•  You	create	your	own	social	network	
•  You	invite	others	to	join	the	‘free’	online	service	
•  You	add	content:	
–  Ideas	and	thoughts	
–  Status	updates	
–  Photos,	videos,	…	
–  Links	to	other	users	and	pages	
–  Interact	with	other	people	
–  Search	
–  …
So…	
•  How	much	do	you	get	paid	for	all	this?		
•  All	of	this	effort	is	worth	a	lot	of	money	for	the	‘free’	online	service	
provider	and	you	get	nothing?	
•  Hmmm…	you	are	indeed	a	great	value	for	the	‘free’	online	service!
Interes:ng	facts	
•  People	who	use	‘free’	online	services	have	become	the	largest	
unpaid	workforce	in	history!	
•  The	data	that	you	have	freely	provided	can	be	used	by	the	‘free’	
online	service	companies	to	be	sold	to	third	par:es	
•  You	just	don’t	get	any	money…	and	you	have	no	say	either!
Paid	online	web	services
Paid	online	services	–	are	they	any	
different?	
•  Not	really…	
•  Many	of	the	paid	online	services	use	the	data	you	provide	as	means	
to	capitalise	and	make	more	money:	
–  Customised	services	or	products	
–  Ads	
–  Data	sold	to	third	par:es
How	do	they	do	it?
How	does	it	work?	
•  The	online	service	providers	profile	you	as	do	many	other	
organisa:ons:	
–  Reads,	scans,	and	searches	your	data,	messages	and	web	
searches	
–  Analyses	your	data	and	your	online	trends	
–  Tracks	you	(cookies,	smart	phones,	…)	
–  Creates	an	‘online’	profile	of	You!!
How	does	it	work?	
•  The	online	service	providers	mone:ses	YOU!	
•  Tries	to	sell	you	products	and	services	based	on	your	‘online’	profile	
•  Displays	data	on	your	screen	according	to	your	‘online’	profile	
•  Sells	you	and	your	data	to	third	par:es
Who	would	want	your	data?	
•  Everyone!	Every	single	company	wants	it!	
•  Why?		
–  Because	now	they	have	a	way	of	profiling	you	
–  They	know	who	you	are,	what	you	like,	what	you	don’t	like,	
what	you	do,	whom	you	do	it	with,	who	are	your	friends,	what	
your	habits	are…	
–  An	insurance	company	knows	your	habits,	and	can	now	decide	
if	you	are	‘worthy	to	be	insured’	
–  A	financial	bank	can	decide	if	it	will	lend	you	money	or	not	
–  They	know	you	from	your	‘online’	profile!
Risks
Oh,	oh,	we’re	in	trouble!...	
•  Who	are	the	third	par:es	that	are	geung	your	data?	
–  Other	companies	
–  Data	Brokers	
•  Lack	of	legisla:on	
•  How	secure	are	the	IT	infrastructure	of	the	companies	that	now	
have	your	data	and	your	‘online’	profile?
Danger!	Danger!	
•  Websites,	smart	phones,	tablets,	smart	watches,	GPS	devices,	…	
•  How	is	your	data	being	used?	
•  For	what	purposes	is	your	data	being	used?	
•  How	secure	are	these	websites	and	devices?
Interes:ng	facts	
•  82%	of	Android	apps	track	and	collect	your	online	ac:vi:es	
•  Data	brokers	get	informa:on	from	your	ISP,	online	ac:vity,	credit	
card	companies,	mobile	phone	companies,	banks,	etc.	
•  Data	brokers	aim	to	provide	‘behavioural	targe:ng’
Interes:ng	facts	
•  Data	broker	company	Acxiom	Corpora:on:	
–  Has	more	than	23,000	servers		
–  These	servers	collect,	collate	and	analyse	more	than	50	trillion	
unique	data	transac:ons	per	year	
–  96%	of	American	households	are	in	its	DBs	
–  Has	more	than	700	million	user	profiles	from	around	the	world	
–  Each	profile	has	more	than	1,500	specific	traits	
•  One	quote	stated	‘This	is	the	age	of	the	stalker	economy’…	
•  Well	is	it???
Security	(or	lack	of	it)
Interes:ng	facts	
•  Worldwide	spending	on	security	so2ware	totalled	nearly	$20	billion	
in	2012	
•  Worldwide	spending	on	security	so2ware	es:mated	to	reach	$94	
billion	by	2017	
•  An	average	of	62%	of	the	intrusions	against	businesses	were	only	
detected	a2er	2	months	
•  The	average	:me	from	the	ini:al	breach	un:l	discovery	of	the	
intrusion	is	210	days	
•  Companies	face	nearly	$154	in	costs	per	record	stolen
Costs	of	data	breach	for	a	business	
•  Detec:ng	the	breach	
•  Containing	the	awacks	
•  Inves:ga:ng	the	awacks	
•  Iden:fying	the	awackers	
•  Remedia:ng	the	IT	infrastructure	
•  Sales	decline	
•  Credit	card	replacement	fees	
•  Consumer	credit-monitoring	services	
•  Insurance	premiums	
•  Drop	in	stock	market	share	price	
•  Company’s	image
Oh,	oh,	we’ve	been	hacked!	
•  Mossack	Fonseca	(Panama	Papers)	–	11	million	records	(2016)	
•  21st	Century	Oncology	–	2.2	million	records	(2016)	
•  Verizon	–	1.5	million	records	(2016)	
•  US	Voters	database	-	191	million	records	(2015)	
•  VTech		-	12	million	records	(2015)	
•  Ashley	Madison	–	37	million	records	(2015)	
•  Mspy	kids	&	partner	tracking	service	–	400,000	records	(2015)	
•  Home	Depot	–	56	million	records	(2015)	
•  Anthem	health	insurance	–	80	million	records	(2015)	
•  JP	Morgan	Chase	–	76	million	records	(2014)	
•  And	so	many	more…
World’s	biggest	data	breaches	
hHp://www.informaKonisbeauKful.net/visualizaKons/worlds-biggest-data-breaches-hacks/
World’s	biggest	data	breaches	
hHp://www.informaKonisbeauKful.net/visualizaKons/worlds-biggest-data-breaches-hacks/
Cost	of	data	breach	for	You	
•  The	hacker	can	now	poten:ally	have:	
–  Your	online	login	creden:als	
–  Detailed	informa:on	about	you	
–  Your	credit	card	informa:on	
•  The	hacker	can	now:	
–  Sell	your	data	(yes,	even	to	companies)	
–  Test	your	login	creden:als	in	other	sites	and	servers	
–  Manipulate	your	data	
–  Steal	you	iden:ty	
–  Black	mail	you!
So,	let	me	ask	you	again…	
•  How	much	do	you	value	your	privacy?	
•  How	about	your	friends	and	family’s	privacy?	
•  What	do	you	think	it	could	happen	if	your	data	was	misused?		
•  Are	you	sure	you	have	nothing	to	hide?
The	Mainframe
Ah,	we’re	safe!	No	one	hacks	the	
mainframe!!	
•  Are	you	sure	about	that?	
–  IT	firm	Logica	–	more	than	10,000	social	security	numbers	(2012)	
–  Swedish	Nordea	bank	–	personal	data,	money	(2013)	
–  Internal	hack	in	one	major	UK	Bank	(2013)	-	£2million	in	losses	
•  But	the	mainframe	is	the	most	secure	plaTorm	in	the	world!	
–  No,	the	mainframe	is	the	most	securable	plaTorm	in	the	world	
–  Requires	effort,	investment	and	resources	
–  People	need	to	be	trained	to	be	kept	up	to	date	with	the	new	security	
threats	and	trends
From	my	experience	with	mainframe	
clients…	
•  The	mainframe	is	part	of	an	ecosystem	of	mul:ple	plaTorms.		
–  If	one	of	them	gets	compromised	how	will	it	affect	the	mainframe?	
•  Hackers	are	geung	really	interested	on	the	mainframe	
•  It’s	just	a	mawer	of	:me	un:l	a	mainframe	is	seriously	
compromised	
•  Oh	my,	a	lot	of	work	needs	to	be	done!
Our	experience	with	mainframe	
clients…	
•  Management	s:ll	sees	the	mainframe	as	un-hackable	which	leads	
to	a	lack	of	investment	or	interest	in	mainframe	security	
•  While	performing	mainframe	audits	and	penetra:on	tests	for	
various	clients	we	see	the	same	common	security	problems	over	
and	over	again	
•  Was	sat	with	a	client	the	other	day	and	they	stated:	
“The	mainframe	is	the	only	system	that	has	complete	view	of	our	
clients,	it’s	our	system	of	record…	But...	
...	We	don’t	protect	it	properly”
Conclusion
Conclusion	
•  ‘Free’	online	services	can	be	useful	
•  Use	them,	but	don’t	abuse	them!	
•  Think:	“Do	I	really	need	to	use	this	service?”	
•  Be	careful	about	the	data	you	provide!	
•  Others	can	pick	your	digital	footprint	and	interpret	it	without	your	
knowledge	and	in	ways	that	can	cause	you	harm.	
•  Governments	need	to	implement	appropriate	legisla:on	around	data	and	
privacy!	
•  Private	data	is	worth	billions!
Conclusion	
•  If	you	are	really	concerned	about	your	online	privacy	take	a	look	at:	
–  TOR	
–  DISCONNECT	ME
TOR	(The	Onion	Router)	
•  The	most	popular	browser	is	TOR	
•  TOR	is	not	necessarily	just	for	the	Dark	Web	
•  TOR	is	all	about	online	privacy	
•  It	can	be	downloaded	at	TORPROJECT.ORG	
•  Several	Downloads	available
Disconnect	Statement:	
The	Tor	Project	is	a	non-profit	dedicated	to	research,	development,	and	educa:on	
about	online	anonymity	and	privacy.		
	
This	mission	is	in	alignment	with	Disconnect’s	own	mission	to	make	privacy	the	default	
online,	and	our	partnership	with	Tor	marks	a	major	milestone	in	achieving	our	mutual	
goals.
And	Finally….....
Ques:ons
Rui	Miguel	Feio,	RSM	Partners		
ruif@rsmpartners.com	
mobile:	+44	(0)	7570	911459	
linkedin:	www.linkedin.com/in/rfeio	
www.rsmpartners.com	
Contact
1 of 47

Recommended

(2017) Cybercrime, Inc. (v3.2) by
(2017) Cybercrime, Inc. (v3.2)(2017) Cybercrime, Inc. (v3.2)
(2017) Cybercrime, Inc. (v3.2)Rui Miguel Feio
422 views47 slides
2017 - Data Privacy and GDPR (v1.1) by
2017 - Data Privacy and GDPR (v1.1)2017 - Data Privacy and GDPR (v1.1)
2017 - Data Privacy and GDPR (v1.1)Rui Miguel Feio
460 views31 slides
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3) by
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)Rui Miguel Feio
634 views35 slides
Mainframe Security - It's not just about your ESM v2.2 by
Mainframe Security - It's not just about your ESM v2.2Mainframe Security - It's not just about your ESM v2.2
Mainframe Security - It's not just about your ESM v2.2Rui Miguel Feio
798 views46 slides
Password Manager by
Password ManagerPassword Manager
Password ManagerEmpowerID
7.1K views9 slides
Data by
DataData
DataFernando Zacheo
242 views6 slides

More Related Content

Viewers also liked

AMOR Y AMISTAD by
AMOR Y AMISTADAMOR Y AMISTAD
AMOR Y AMISTADcamilaandrearuizargumedo
162 views1 slide
High performance-learning-how-to-become-a-world-class-school by
High performance-learning-how-to-become-a-world-class-schoolHigh performance-learning-how-to-become-a-world-class-school
High performance-learning-how-to-become-a-world-class-schoolOscar Hernandez
1.5K views34 slides
Fadi Hajjar CV by
Fadi Hajjar CVFadi Hajjar CV
Fadi Hajjar CVFadi Hajjar
855 views7 slides
Testrevista2 by
Testrevista2Testrevista2
Testrevista2Alexis Corleone
391 views8 slides
Federation Services by
Federation ServicesFederation Services
Federation ServicesEmpowerID
18.9K views27 slides
AimWood- HOTEL FURNITURE CATALOGUE (1) by
AimWood- HOTEL FURNITURE CATALOGUE (1)AimWood- HOTEL FURNITURE CATALOGUE (1)
AimWood- HOTEL FURNITURE CATALOGUE (1)Manoj Dubey
1.2K views32 slides

Viewers also liked(14)

High performance-learning-how-to-become-a-world-class-school by Oscar Hernandez
High performance-learning-how-to-become-a-world-class-schoolHigh performance-learning-how-to-become-a-world-class-school
High performance-learning-how-to-become-a-world-class-school
Oscar Hernandez1.5K views
Federation Services by EmpowerID
Federation ServicesFederation Services
Federation Services
EmpowerID18.9K views
AimWood- HOTEL FURNITURE CATALOGUE (1) by Manoj Dubey
AimWood- HOTEL FURNITURE CATALOGUE (1)AimWood- HOTEL FURNITURE CATALOGUE (1)
AimWood- HOTEL FURNITURE CATALOGUE (1)
Manoj Dubey1.2K views
Rms705 b 1-conformite_environnementale_en by e-genieclimatique
Rms705 b 1-conformite_environnementale_enRms705 b 1-conformite_environnementale_en
Rms705 b 1-conformite_environnementale_en
e-genieclimatique512 views
Video: How to Align Performance to Organizational Goals and Strategy by Victor Holman
Video:  How to Align Performance to Organizational Goals and StrategyVideo:  How to Align Performance to Organizational Goals and Strategy
Video: How to Align Performance to Organizational Goals and Strategy
Victor Holman4.2K views
2017 - Cibersecurity v1.0 (English version) by Rui Miguel Feio
2017 - Cibersecurity v1.0 (English version)2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)
Rui Miguel Feio802 views
Perbedaan kuantitatif dan kualitatif by Adi Nursyamsu
Perbedaan kuantitatif dan kualitatifPerbedaan kuantitatif dan kualitatif
Perbedaan kuantitatif dan kualitatif
Adi Nursyamsu32.3K views
Public and semi public spa ce by tivar rose
Public and semi public spa cePublic and semi public spa ce
Public and semi public spa ce
tivar rose13.1K views
Examen matemáticas 4º primaria by Hacer Educación
Examen matemáticas 4º primaria Examen matemáticas 4º primaria
Examen matemáticas 4º primaria
Hacer Educación13.5K views

Similar to The Billion Dollar Product - Online Privacy (v2.2)

Network and Endpoint Security v1.0 (2017) by
Network and Endpoint Security v1.0 (2017)Network and Endpoint Security v1.0 (2017)
Network and Endpoint Security v1.0 (2017)Rui Miguel Feio
1.5K views32 slides
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2 by
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.22017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2Rui Miguel Feio
2K views48 slides
Cyber security and the mainframe (v1.3) by
Cyber security and the mainframe (v1.3)Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)Rui Miguel Feio
939 views36 slides
IOT & BYOD – The New Security Risks (v1.1) by
IOT & BYOD – The New Security Risks (v1.1)IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)Rui Miguel Feio
815 views43 slides
Cyber Crime - The New World Order (v1.0 - 2016) by
Cyber Crime - The New World Order (v1.0 - 2016)Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Rui Miguel Feio
728 views43 slides
Security Audit on the Mainframe (v1.0 - 2016) by
Security Audit on the Mainframe (v1.0 - 2016)Security Audit on the Mainframe (v1.0 - 2016)
Security Audit on the Mainframe (v1.0 - 2016)Rui Miguel Feio
869 views36 slides

Similar to The Billion Dollar Product - Online Privacy (v2.2)(20)

Network and Endpoint Security v1.0 (2017) by Rui Miguel Feio
Network and Endpoint Security v1.0 (2017)Network and Endpoint Security v1.0 (2017)
Network and Endpoint Security v1.0 (2017)
Rui Miguel Feio1.5K views
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2 by Rui Miguel Feio
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.22017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
Rui Miguel Feio2K views
Cyber security and the mainframe (v1.3) by Rui Miguel Feio
Cyber security and the mainframe (v1.3)Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)
Rui Miguel Feio939 views
IOT & BYOD – The New Security Risks (v1.1) by Rui Miguel Feio
IOT & BYOD – The New Security Risks (v1.1)IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)
Rui Miguel Feio815 views
Cyber Crime - The New World Order (v1.0 - 2016) by Rui Miguel Feio
Cyber Crime - The New World Order (v1.0 - 2016)Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)
Rui Miguel Feio728 views
Security Audit on the Mainframe (v1.0 - 2016) by Rui Miguel Feio
Security Audit on the Mainframe (v1.0 - 2016)Security Audit on the Mainframe (v1.0 - 2016)
Security Audit on the Mainframe (v1.0 - 2016)
Rui Miguel Feio869 views
Practical SME Security on a Shoestring by NCC Group
Practical SME Security on a ShoestringPractical SME Security on a Shoestring
Practical SME Security on a Shoestring
NCC Group886 views
Assessing IBM i Security Risks: A Conversation with Dan Riehl by Precisely
Assessing IBM i Security Risks: A Conversation with Dan RiehlAssessing IBM i Security Risks: A Conversation with Dan Riehl
Assessing IBM i Security Risks: A Conversation with Dan Riehl
Precisely67 views
How to Protect Your Mainframe from Hackers (v1.0) by Rui Miguel Feio
How to Protect Your Mainframe from Hackers (v1.0)How to Protect Your Mainframe from Hackers (v1.0)
How to Protect Your Mainframe from Hackers (v1.0)
Rui Miguel Feio1K views
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01 by TechSoup
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
TechSoup 1.2K views
(2017) GDPR – What Does It Mean For The Mainframe v0.2 by Rui Miguel Feio
(2017) GDPR – What Does It Mean For The Mainframe v0.2(2017) GDPR – What Does It Mean For The Mainframe v0.2
(2017) GDPR – What Does It Mean For The Mainframe v0.2
Rui Miguel Feio748 views
Protecting Your IP: Data Security for Software Technology by Shawn Tuma
Protecting Your IP: Data Security for Software TechnologyProtecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software Technology
Shawn Tuma305 views
Digital workplace security for gen z by Rasool Irfan
Digital workplace security for gen zDigital workplace security for gen z
Digital workplace security for gen z
Rasool Irfan210 views
Today's Cyber Challenges: Methodology to Secure Your Business by JoAnna Cheshire
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
JoAnna Cheshire158 views
Dev Ops & Secops & Bears, oh my! by Dwolla
Dev Ops & Secops & Bears, oh my!Dev Ops & Secops & Bears, oh my!
Dev Ops & Secops & Bears, oh my!
Dwolla114 views
IBM Security 2017 Lunch and Learn Series by Jeff Miller
IBM Security 2017 Lunch and Learn SeriesIBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn Series
Jeff Miller982 views
The Thing That Should Not Be by morisson
The Thing That Should Not BeThe Thing That Should Not Be
The Thing That Should Not Be
morisson597 views
Czech Tech Pitch Day - Babel / OKsystem (Martin Kudrnac) by Jan Fried
Czech Tech Pitch Day - Babel / OKsystem (Martin Kudrnac)Czech Tech Pitch Day - Babel / OKsystem (Martin Kudrnac)
Czech Tech Pitch Day - Babel / OKsystem (Martin Kudrnac)
Jan Fried794 views
Learnings from 7 Years of Integrating Mission-Critical IBM Z® and IBM i with ... by Precisely
Learnings from 7 Years of Integrating Mission-Critical IBM Z® and IBM i with ...Learnings from 7 Years of Integrating Mission-Critical IBM Z® and IBM i with ...
Learnings from 7 Years of Integrating Mission-Critical IBM Z® and IBM i with ...
Precisely89 views

More from Rui Miguel Feio

(2019) Hack All the Way Through From Fridge to Mainframe (v0.2) by
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)Rui Miguel Feio
621 views45 slides
RACF - The Basics (v1.2) by
RACF - The Basics (v1.2)RACF - The Basics (v1.2)
RACF - The Basics (v1.2)Rui Miguel Feio
7.5K views53 slides
2017 - Ciberseguranca v1.0 (versao em Portugues) by
2017 - Ciberseguranca v1.0 (versao em Portugues)2017 - Ciberseguranca v1.0 (versao em Portugues)
2017 - Ciberseguranca v1.0 (versao em Portugues)Rui Miguel Feio
507 views48 slides
Tackling the cyber security threat (2016 - v1.0) by
Tackling the cyber security threat (2016 - v1.0)Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)Rui Miguel Feio
474 views11 slides
How to Improve RACF Performance (v0.2 - 2016) by
How to Improve RACF Performance (v0.2 - 2016)How to Improve RACF Performance (v0.2 - 2016)
How to Improve RACF Performance (v0.2 - 2016)Rui Miguel Feio
1.3K views32 slides
Cybercrime Inc. v2.2 by
Cybercrime Inc. v2.2Cybercrime Inc. v2.2
Cybercrime Inc. v2.2Rui Miguel Feio
358 views61 slides

More from Rui Miguel Feio(8)

(2019) Hack All the Way Through From Fridge to Mainframe (v0.2) by Rui Miguel Feio
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
Rui Miguel Feio621 views
2017 - Ciberseguranca v1.0 (versao em Portugues) by Rui Miguel Feio
2017 - Ciberseguranca v1.0 (versao em Portugues)2017 - Ciberseguranca v1.0 (versao em Portugues)
2017 - Ciberseguranca v1.0 (versao em Portugues)
Rui Miguel Feio507 views
Tackling the cyber security threat (2016 - v1.0) by Rui Miguel Feio
Tackling the cyber security threat (2016 - v1.0)Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)
Rui Miguel Feio474 views
How to Improve RACF Performance (v0.2 - 2016) by Rui Miguel Feio
How to Improve RACF Performance (v0.2 - 2016)How to Improve RACF Performance (v0.2 - 2016)
How to Improve RACF Performance (v0.2 - 2016)
Rui Miguel Feio1.3K views
Challenges of Outsourcing the Mainframe (v1.2) by Rui Miguel Feio
Challenges of Outsourcing the Mainframe (v1.2)Challenges of Outsourcing the Mainframe (v1.2)
Challenges of Outsourcing the Mainframe (v1.2)
Rui Miguel Feio538 views
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5) by Rui Miguel Feio
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Rui Miguel Feio1.3K views

Recently uploaded

hamro digital logics.pptx by
hamro digital logics.pptxhamro digital logics.pptx
hamro digital logics.pptxtupeshghimire
10 views36 slides
The Dark Web : Hidden Services by
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
16 views24 slides
Marketing and Community Building in Web3 by
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3Federico Ast
15 views64 slides
ATPMOUSE_융합2조.pptx by
ATPMOUSE_융합2조.pptxATPMOUSE_융합2조.pptx
ATPMOUSE_융합2조.pptxkts120898
35 views70 slides
Affiliate Marketing by
Affiliate MarketingAffiliate Marketing
Affiliate MarketingNavin Dhanuka
18 views30 slides
How to think like a threat actor for Kubernetes.pptx by
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptxLibbySchulze1
7 views33 slides

Recently uploaded(6)

The Dark Web : Hidden Services by Anshu Singh
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
Anshu Singh16 views
Marketing and Community Building in Web3 by Federico Ast
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3
Federico Ast15 views
ATPMOUSE_융합2조.pptx by kts120898
ATPMOUSE_융합2조.pptxATPMOUSE_융합2조.pptx
ATPMOUSE_융합2조.pptx
kts12089835 views
How to think like a threat actor for Kubernetes.pptx by LibbySchulze1
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptx
LibbySchulze17 views

The Billion Dollar Product - Online Privacy (v2.2)