SlideShare a Scribd company logo
1 of 94
15 years
through
Infosec

#Hack
C

on 201
4,
Oslo

Saumil Shah

CEO Net Square

net-square

HackCon '14
Introduction

@therealsaumil
saumilshah

educating, entertaining and
exasperating audiences since 1999
net-square

HackCon '14
volution
The E
f Targets
o

net-square

HackCon '14
How Have Targets Shifted?

Servers

Applications

Desktops

Browsers

Identities
net-square

HackCon '14
The Game Changers
Perimeter
Security

Web Apps

Broadband
Networks

WiFi

Social
Networks

Cellular
Data

net-square

HackCon '14
Target Top Spot – Retail, Manufacturing, IT
Shifted away from financial organizations to its users.
Myth: Insiders cause the maximum damage.
Attribution to external attackers: 92% (5 yr avg: >70%)
2008: Servers 94%, Users 17%
2012: Servers: 54%, Users 71%
Shift in attacker profile.
Organized crime, state sponsored "threat actors".
Effectiveness of breach detection
IT Audits, Fraud detection, IDS, Logs, MSS < 1%
net-square

HackCon '14
"A wall is only as good as those who
defend
defend
 it"
Genghis Khan

net-square

HackCon '14
The user's going to pick dancing pigs
over security every time.

Bruce Schneier
net-square

HackCon '14
Technology in the hands of users

net-square

HackCon '14
Intelligence Driven Defence

From reactive to proactive
net-square

HackCon '14
volution
The E
f Exploits
o

net-square

HackCon '14
The Advance of Exploits

net-square

HackCon '14
It was different 12 years ago!
Individual effort.
1 week dev time.
3-6 months shelf life.
Hundreds of public
domain exploits.
"We did it for the
fame. lols."

net-square

HackCon '14
Today...
Team effort.
2-12 month dev time.
24h to 10d shelf life.
Public domain
exploits nearly zero.
Cost,value of exploits
has significantly risen.
WEAPONIZATION.

net-square

HackCon '14
"For a few hundred K,
could you put together
a team that would
break-in just about
anywhere?"

Haroon Meer
net-square

CCDCOE Conference on
Cyber Conflict - 2010
HackCon '14
$100k – 500k
net-square

HackCon '14
Attacking is (much) cheaper
than defence.
Attacker toolchains
are far more complex
than the public
demonstrations
we have seen so far.
net-square

HackCon '14
Exploit Buyers
.gov

Exploits
corporate
espionage

net-square

organized
crime

HackCon '14
Vulnerability

$

Source

"Some exploits"

250,000

A "real good"
exploit

> 100,000

Chrome

60,000

Google

Vista

50,000

Raimund Genes,
Trend Micro

Weaponized
exploit

30,000

David Maynor,
Secureworks

iDefense
purchases

10,000

David Maynor,
Secureworks

WMF

4,000

Google

3,133.7

Google

Mozilla

3,000

Mozilla

Excel

1,200

Ebay auction site

Govt. official
referring to what
"some people" pay.
SNOsoft Research
Team

Alexander Gostev,
Kaspersky

credit: Forbes 23.3.2012 Shopping for Zero Days
Charlie Miller, the 0-day market

net-square

HackCon '14
The more sophisticated the technology,
the more vulnerable it is to primitive attack.
People often overlook the obvious.
Doctor Who, "Pirate Planet"

net-square

XKCD 358 "Security"

HackCon '14
t Secure
Wha
ns to me
mea

net-square

HackCon '14
Confidentiality
Integrity
Availability?

Invulnerable?

Up-to-date?

Accountable?

net-square

HackCon '14
Found a huge J2EE bug in 2002
BEA: Configuration mistake
Sun: You can't do that!
Allaire: Thanks, here is a t-shirt
IBM: Fix in 7 days, gave credit
net-square

HackCon '14
net-square

HackCon '14
OSX goto fail patch time: 93 hrs

net-square

HackCon '14
What defenders are up to
• 
• 
• 
• 
• 

• 
• 
• 
• 
• 

net-square

HIGH EXPOSURE
Rigorous Internal Testing
Proactive Exploit Mitigation Technology
Quick Turnaround Times (24 hours)
Mature Bug Bounties

HIGH EXPOSURE
Good Efforts but no Transparency
Don't have Resources Focus
Slow Turnaround Times (4 days - 1 month)
Learning the hard way

HackCon '14
Bug Bounties: high stakes game
Chris Evans – Pwnium: Element 1337
net-square

HackCon '14
What "SECURE" means to me

Resilience

Fitness

Max time to fix: 72 hrs
net-square

HackCon '14
andards,
On St
liance &
Comp
fication
Certi
net-square

HackCon '14
net-square

HackCon '14
Compliance != Security

net-square

HackCon '14
net-square

HackCon '14
Peter Gibbons,
Office Space

"My only real motivation is not to be
hassled, that and the fear of losing
my job. But you know, Bob, that will
only make someone work just hard
enough not to get fired."

net-square

HackCon '14
Certifications... oh, the irony!

net-square

HackCon '14
EC Council gets record pwnage

GOING ONCE
GOING TWICE
net-square

GONE !
HackCon '14
Who are you more scared of?

Attackers or Auditors?
net-square

HackCon '14
Threat Model

APT Testing

Social Media
Threats

"Every Day is
a 0-day"

Red Teams

Reactive to
PROACTIVE

net-square

HackCon '14
BSIMM

net-square

HackCon '14
cessity is
Ne
ther of
the Mo
nvention
I
net-square

HackCon '14
Firewalls

One-way Hacking

IDS/IPS

Packet Fragmentation

Antivirus

Obfuscation

WAF

Character Encoding

Endpoint Security

DNS Exfiltration

ASLR, DEP

Return Oriented
Programming

Sandbox

Jailbreak

net-square

HackCon '14
My attempts at writing books

net-square

HackCon '14
I'm Flattered J

net-square

HackCon '14
Inside Out Attacks - 1999

net-square

HackCon '14
One Way Attacks - 2001
Web application discovery
Finding the entry point
(command execution as nobody
or web user)

Uploader

Web Shell

Upload attack
tools

Pilfer web
application

Privilege escalation
SQL command prompt
GAME OVER!
net-square

HackCon '14
HTTP Page Signatures - 2002
200:A302E6F1DC10112A5AF8624E5EA11B367F93DD04

Accurately identify HTTP responses
Minimize false positives in error detection
Content Independent
Computation time: O(n)
Comparison time: O(k)

net-square

HackCon '14
HTTP Fingerprinting - 2003

net-square

HackCon '14
Teflon - 2008
My humble attempt
at browser security.
"Anti-stick for your
browser's attack surface".
FAILED RESEARCH.
net-square

HackCon '14
Abusing URL Shorteners - 2010

Alpha
Encoded
Exploit
net-square

Tiny
URL

ZOMFG
HackCon '14
G

r e

e t

net-square

i

n

g s

P

r

o

f

e

s s

o

r

F

a l

k e

n

HackCon '14
I'm an evil Javascript

I'm an innocent image
net-square

HackCon '14
Cross Container Scripting - 2012
XCS

<img src="itsatrap.gif">
<script src="itsatrap.gif">
</script>

net-square

HackCon '14
Alpha encoded exploit code

<script src="1.gif">
</script>

IMAJS CANVAS "loader" script

net-square

<img src="2.png"
id="decodeme">

HackCon '14
Theory Becomes Practice - 2014

net-square

Hiding In Plain Sight

HackCon '14
Infosec
ferences
Con

net-square

HackCon '14
1999: Blackhat and Defcon
Blackhat – 15 years in a row
RSA 2002 – the only commercial con
HITB, Cansecwest, HackLU, NullCON,
Hackcon, ITWeb, IT Underground, IT
Defense, DeepSec, NoSuchCon,
REcon, SeacureIT, 44CON, SyScan...

net-square

HackCon '14
1 conference every 3 days...
200
150
100
50

net-square

http://cc.thinkst.com

2013

2012

2011

2010

2009

2008

2007

2006

2005

2004

2003

2002

2001

2000

1999

1998

1997

0

HackCon '14
...and 5000 talks for 2013!
5000
4000
3000
2000
1000

net-square

http://cc.thinkst.com

2013

2012

2011

2010

2009

2008

2007

2006

2005

2004

2003

2002

2001

2000

1999

1998

1997

0

HackCon '14
Hacker Cons

Where else will
you find a more
diverse, open,
global, talented
and energetic
crowd?
net-square

HackCon '14
Hackerspaces

"There are many men in
London, who, some from
shyness, some from
misanthropy, have no
wish for the company of
their fellows.
Yet they are not averse to
comfortable chairs and
the latest periodicals."

net-square

HackCon '14
My type of hacker cons
Smaller events
Single/Dual track
Meet the speakers
Meet the audience
Learn something new!

net-square

HackCon '14
Researchers

Wants
"Mr. Right Now"

Mr. Right

net-square

Industry

Mind the Researcher/Industry Gap

HackCon '14
ackers :
H
are we?
who

net-square

HackCon '14
WE ARE HACKERS

WE PUSH THE
ENVELOPE

WE THRIVE ON
FACTS AND LOGIC..

..AND LATERAL
THINKING

WE QUESTION AND
CHALLENGE AND

WORK ON LIMITED
RESOURCES
net-square

HackCon '14
My Hacker Hero
DELETES
SOLAR SYSTEM
FROM BRAIN

CAN RECOGNISE
243 TYPES OF
TOBACCO ASH

net-square

HackCon '14
Rebels?
Heretics?
Anarchists?
Free-thinkers?
net-square

HackCon '14
"The time to think of your
ethical boundaries is BEFORE
you are put in a
difficult situation."

Alex Stamos
The White Hat's Dilemma
Defcon 21

net-square

HackCon '14
You find a critical remote exploit in a very
widespread product. Do you:
A) Publicly announce the flaw immediately
B) Build a whole Black Hat talk around it
C) Perform responsible disclosure with deadlines
D) Use it to sell "consulting" to the vendor
E) Weaponize and sell directly to your government
F) Weaponize and sell to a trader
G) Use it yourself for fun and/or profit
READ HIS TALK AND ANSWER ALL HIS QUESTIONS!
net-square

Alex Stamos – The White Hat's Dilemma, DC21

HackCon '14
And
ho am I ?
w
saumil
ttys001 Mar 5 17:20!
saumil@gayatri:~$ _!

net-square

HackCon '14
I stood on the
shoulders of giants
net-square

HackCon '14
Stranger Than Fiction!

Big Fish (2003)
net-square

HackCon '14
Security
On
oducts
Pr

net-square

HackCon '14
My Product building journey
Web app scanners
Network scanner
Windows Desktop Scanner
Share Inspector
Accounts Inspector
Browser plug-in for app testing
ServerDefender
Hardened Browser from Chromium code base
net-square

HackCon '14
Everyone builds the "Homer Car"

net-square

HackCon '14
Why Johnny Can't Pentest

net-square

http://www.cs.ucsb.edu/~vigna/publications/
2010_doupe_cova_vigna_dimva10.pdf

HackCon '14
unts and
On St
tionalism
Sensa

net-square

HackCon '14
net-square

HackCon '14
net-square

HackCon '14
"If you can bear to hear the truth you've spoken
Twisted by knaves to make a trap for fools"


Rudyard Kipling

net-square

HackCon '14
Media training is an OPSEC skill
Vet your journo.
"Off the record".
Answer in writing.
Putting words in
your mouth.
Stay on target.
Watch your mouth.
The Grugq

grugq.tumblr.com
net-square

HackCon '14
"Preventing Security Theatre
is OUR responsibility"
Andrea Barisani
IT Security community
loses reputation

No Such Con #1
Keynote

Remediation NOT given
to original researchers

net-square

HackCon '14
wget - Deadly Hacker Tool?

net-square

HackCon '14
e Future
Th

net-square

HackCon '14
2010

DEP
bypassing
ROP code

Man in the
Browser

Political
Cyber
warfare
net-square

HackCon '14
2011

Browser Attacks
PDF Attacks
Web App Attacks
Social Engineering
net-square

HackCon '14
2012

Full ASLR by 2014
Mobile Attacks
Real Time Analytics
Blurred boundaries
IPv6
net-square

HackCon '14
2013

net-square

HackCon '14
future
is already here >

the
net-square

HackCon '14
Today: Realtime
acquistion, storage,
analysis and correlation
of ALL data.
Tomorrow: Predictions
net-square

HackCon '14
net-square

HackCon '14
Will the Internet
remain a level
playing field?
net-square

HackCon '14
net-square

HackCon '14
Special Thanks
Haroon Meer & Marco Slaviero
Andrea Barisani
Roelof Temmingh
Alex Stamos
The Grugq
Hackcon crew & our fantastic community!

net-square

HackCon '14
Further Reading
Con Collector
http://cc.thinkst.com/
The White Hat's Dilemma
http://tinyurl.com/whitehatdilemma
Realtime
http://www.realtime-film.com/
Media training – OPSEC for hackers
http://tinyurl.com/opsecmedia1
http://tinyurl.com/opsecmedia2
net-square

HackCon '14
#Hack
C

nk You...
Tha
uestions?
Q

on 201
4,
Oslo

saumil@net-square.com
@therealsaumil
net-square

HackCon '14

More Related Content

What's hot

Building a low cost hack lab
Building a low cost hack labBuilding a low cost hack lab
Building a low cost hack labJoe McCray
 
Big Bang Theory: The Evolution of Pentesting High Security Environments
Big Bang Theory: The Evolution of Pentesting High Security EnvironmentsBig Bang Theory: The Evolution of Pentesting High Security Environments
Big Bang Theory: The Evolution of Pentesting High Security EnvironmentsJoe McCray
 
Cumulonimbus fortification-secure-your-data-in-the-cloud
Cumulonimbus fortification-secure-your-data-in-the-cloudCumulonimbus fortification-secure-your-data-in-the-cloud
Cumulonimbus fortification-secure-your-data-in-the-cloudDavid Busby, CISSP
 
Getting ready for a Capture The Flag Hacking Competition
Getting ready for a Capture The Flag Hacking CompetitionGetting ready for a Capture The Flag Hacking Competition
Getting ready for a Capture The Flag Hacking CompetitionJoe McCray
 
Building & Hacking Modern iOS Apps
Building & Hacking Modern iOS AppsBuilding & Hacking Modern iOS Apps
Building & Hacking Modern iOS AppsSecuRing
 
Security its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutSecurity its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutDavid Busby, CISSP
 
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsWebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsSecuRing
 
Security its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutSecurity its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutDavid Busby, CISSP
 
So you wanna be a pentester - free webinar to show you how
So you wanna be a pentester - free webinar to show you howSo you wanna be a pentester - free webinar to show you how
So you wanna be a pentester - free webinar to show you howJoe McCray
 
Wannacry | Technical Insight and Lessons Learned
Wannacry | Technical Insight and Lessons LearnedWannacry | Technical Insight and Lessons Learned
Wannacry | Technical Insight and Lessons LearnedThomas Roccia
 
Keep Calm and Stegosploit - 44CON 2015
Keep Calm and Stegosploit - 44CON 2015Keep Calm and Stegosploit - 44CON 2015
Keep Calm and Stegosploit - 44CON 2015Saumil Shah
 
Innovative Exploit Delivery
Innovative Exploit DeliveryInnovative Exploit Delivery
Innovative Exploit DeliverySaumil Shah
 
OWASP, PHP, life and universe
OWASP, PHP, life and universeOWASP, PHP, life and universe
OWASP, PHP, life and universeSebastien Gioria
 
Security and why you need to review yours.
Security and why you need to review yours.Security and why you need to review yours.
Security and why you need to review yours.David Busby, CISSP
 
Protecting Data in Untrusted Locations
Protecting Data in Untrusted LocationsProtecting Data in Untrusted Locations
Protecting Data in Untrusted LocationsJan Schaumann
 
GreyNoise - Lowering Signal To Noise
GreyNoise - Lowering Signal To NoiseGreyNoise - Lowering Signal To Noise
GreyNoise - Lowering Signal To NoiseAndrew Morris
 
CLUSIR INFONORD OWASP iot 2014
CLUSIR INFONORD OWASP iot 2014CLUSIR INFONORD OWASP iot 2014
CLUSIR INFONORD OWASP iot 2014Sebastien Gioria
 
Attacking AWS: the full cyber kill chain
Attacking AWS: the full cyber kill chainAttacking AWS: the full cyber kill chain
Attacking AWS: the full cyber kill chainSecuRing
 
Secure Coding For Java - Une introduction
Secure Coding For Java - Une introductionSecure Coding For Java - Une introduction
Secure Coding For Java - Une introductionSebastien Gioria
 

What's hot (20)

Building a low cost hack lab
Building a low cost hack labBuilding a low cost hack lab
Building a low cost hack lab
 
Big Bang Theory: The Evolution of Pentesting High Security Environments
Big Bang Theory: The Evolution of Pentesting High Security EnvironmentsBig Bang Theory: The Evolution of Pentesting High Security Environments
Big Bang Theory: The Evolution of Pentesting High Security Environments
 
Defense at Scale
Defense at ScaleDefense at Scale
Defense at Scale
 
Cumulonimbus fortification-secure-your-data-in-the-cloud
Cumulonimbus fortification-secure-your-data-in-the-cloudCumulonimbus fortification-secure-your-data-in-the-cloud
Cumulonimbus fortification-secure-your-data-in-the-cloud
 
Getting ready for a Capture The Flag Hacking Competition
Getting ready for a Capture The Flag Hacking CompetitionGetting ready for a Capture The Flag Hacking Competition
Getting ready for a Capture The Flag Hacking Competition
 
Building & Hacking Modern iOS Apps
Building & Hacking Modern iOS AppsBuilding & Hacking Modern iOS Apps
Building & Hacking Modern iOS Apps
 
Security its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutSecurity its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-about
 
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsWebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
 
Security its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutSecurity its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-about
 
So you wanna be a pentester - free webinar to show you how
So you wanna be a pentester - free webinar to show you howSo you wanna be a pentester - free webinar to show you how
So you wanna be a pentester - free webinar to show you how
 
Wannacry | Technical Insight and Lessons Learned
Wannacry | Technical Insight and Lessons LearnedWannacry | Technical Insight and Lessons Learned
Wannacry | Technical Insight and Lessons Learned
 
Keep Calm and Stegosploit - 44CON 2015
Keep Calm and Stegosploit - 44CON 2015Keep Calm and Stegosploit - 44CON 2015
Keep Calm and Stegosploit - 44CON 2015
 
Innovative Exploit Delivery
Innovative Exploit DeliveryInnovative Exploit Delivery
Innovative Exploit Delivery
 
OWASP, PHP, life and universe
OWASP, PHP, life and universeOWASP, PHP, life and universe
OWASP, PHP, life and universe
 
Security and why you need to review yours.
Security and why you need to review yours.Security and why you need to review yours.
Security and why you need to review yours.
 
Protecting Data in Untrusted Locations
Protecting Data in Untrusted LocationsProtecting Data in Untrusted Locations
Protecting Data in Untrusted Locations
 
GreyNoise - Lowering Signal To Noise
GreyNoise - Lowering Signal To NoiseGreyNoise - Lowering Signal To Noise
GreyNoise - Lowering Signal To Noise
 
CLUSIR INFONORD OWASP iot 2014
CLUSIR INFONORD OWASP iot 2014CLUSIR INFONORD OWASP iot 2014
CLUSIR INFONORD OWASP iot 2014
 
Attacking AWS: the full cyber kill chain
Attacking AWS: the full cyber kill chainAttacking AWS: the full cyber kill chain
Attacking AWS: the full cyber kill chain
 
Secure Coding For Java - Une introduction
Secure Coding For Java - Une introductionSecure Coding For Java - Une introduction
Secure Coding For Java - Une introduction
 

Viewers also liked

Ville de Clermont - Sur La Brêche - Printemps 2013
Ville de Clermont - Sur La Brêche - Printemps 2013Ville de Clermont - Sur La Brêche - Printemps 2013
Ville de Clermont - Sur La Brêche - Printemps 2013Communication Clermont
 
Revista contexto lirico si(2)
Revista contexto lirico si(2)Revista contexto lirico si(2)
Revista contexto lirico si(2)lausmarcela
 
Boletín Circulo del Ocio Mayo 2011
Boletín Circulo del Ocio Mayo 2011Boletín Circulo del Ocio Mayo 2011
Boletín Circulo del Ocio Mayo 2011Circulo del Ocio
 
GenExis 3.0 Skolotājiem
GenExis 3.0 SkolotājiemGenExis 3.0 Skolotājiem
GenExis 3.0 SkolotājiemValerii Nikitin
 
Memòria Fundació Tot Raval 2014_versió reduïda
Memòria Fundació Tot Raval 2014_versió reduïdaMemòria Fundació Tot Raval 2014_versió reduïda
Memòria Fundació Tot Raval 2014_versió reduïdatotraval34
 
Body language brain art
Body language brain artBody language brain art
Body language brain artNitesh Goyal
 
El comercio electrónico y la televisión: “t-commerce”, “m-commerce” y web social
El comercio electrónico y la televisión: “t-commerce”, “m-commerce” y web socialEl comercio electrónico y la televisión: “t-commerce”, “m-commerce” y web social
El comercio electrónico y la televisión: “t-commerce”, “m-commerce” y web socialMiguel Angel Exposito
 
Sahara Glass Handles Catalogue
Sahara Glass Handles Catalogue Sahara Glass Handles Catalogue
Sahara Glass Handles Catalogue saharaartwork
 

Viewers also liked (20)

APIs: The Ugly
APIs: The UglyAPIs: The Ugly
APIs: The Ugly
 
The sand
The sandThe sand
The sand
 
Ville de Clermont - Sur La Brêche - Printemps 2013
Ville de Clermont - Sur La Brêche - Printemps 2013Ville de Clermont - Sur La Brêche - Printemps 2013
Ville de Clermont - Sur La Brêche - Printemps 2013
 
Revista contexto lirico si(2)
Revista contexto lirico si(2)Revista contexto lirico si(2)
Revista contexto lirico si(2)
 
Boletín Circulo del Ocio Mayo 2011
Boletín Circulo del Ocio Mayo 2011Boletín Circulo del Ocio Mayo 2011
Boletín Circulo del Ocio Mayo 2011
 
Daimlerblog Workshop
Daimlerblog WorkshopDaimlerblog Workshop
Daimlerblog Workshop
 
GenExis 3.0 Skolotājiem
GenExis 3.0 SkolotājiemGenExis 3.0 Skolotājiem
GenExis 3.0 Skolotājiem
 
Mergejliin holboodyn chuulgan
Mergejliin holboodyn chuulganMergejliin holboodyn chuulgan
Mergejliin holboodyn chuulgan
 
Memòria Fundació Tot Raval 2014_versió reduïda
Memòria Fundació Tot Raval 2014_versió reduïdaMemòria Fundació Tot Raval 2014_versió reduïda
Memòria Fundació Tot Raval 2014_versió reduïda
 
Opinião 17 dez 1
Opinião 17 dez 1Opinião 17 dez 1
Opinião 17 dez 1
 
Body language brain art
Body language brain artBody language brain art
Body language brain art
 
Bitacoras proyecto
Bitacoras proyectoBitacoras proyecto
Bitacoras proyecto
 
El comercio electrónico y la televisión: “t-commerce”, “m-commerce” y web social
El comercio electrónico y la televisión: “t-commerce”, “m-commerce” y web socialEl comercio electrónico y la televisión: “t-commerce”, “m-commerce” y web social
El comercio electrónico y la televisión: “t-commerce”, “m-commerce” y web social
 
Sahara Glass Handles Catalogue
Sahara Glass Handles Catalogue Sahara Glass Handles Catalogue
Sahara Glass Handles Catalogue
 
Architekt en 240406
Architekt en 240406Architekt en 240406
Architekt en 240406
 
Ist IoT „smarter“? Von Smart Factories, Smart Products und Smart Services
Ist IoT „smarter“? Von Smart Factories, Smart Products und Smart ServicesIst IoT „smarter“? Von Smart Factories, Smart Products und Smart Services
Ist IoT „smarter“? Von Smart Factories, Smart Products und Smart Services
 
Precios cremas
Precios cremasPrecios cremas
Precios cremas
 
Escuela gestalt
Escuela gestaltEscuela gestalt
Escuela gestalt
 
Vitreous
VitreousVitreous
Vitreous
 
Sockects
SockectsSockects
Sockects
 

Similar to 15 years through Infosec

CrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec
 
The difference between a duck
The difference between a duckThe difference between a duck
The difference between a duckSensePost
 
Hacking Exposed: The Mac Attack
Hacking Exposed: The Mac AttackHacking Exposed: The Mac Attack
Hacking Exposed: The Mac AttackPriyanka Aash
 
Hacking Exposed: The Mac Attack
Hacking Exposed: The Mac AttackHacking Exposed: The Mac Attack
Hacking Exposed: The Mac AttackPriyanka Aash
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesMaxime ALAY-EDDINE
 
Keynote fx try harder 2 be yourself
Keynote fx   try harder 2 be yourselfKeynote fx   try harder 2 be yourself
Keynote fx try harder 2 be yourselfDefconRussia
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...EC-Council
 
The hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignmentsThe hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignmentsn|u - The Open Security Community
 
How to get along with HATEOAS without letting the bad guys steal your lunch?
How to get along with HATEOAS without letting the bad guys steal your lunch?How to get along with HATEOAS without letting the bad guys steal your lunch?
How to get along with HATEOAS without letting the bad guys steal your lunch?Graham Charters
 
Blue team reboot - HackFest
Blue team reboot - HackFest Blue team reboot - HackFest
Blue team reboot - HackFest Haydn Johnson
 
Webinar: Vawtrak v2 the next big Banking Trojan
Webinar: Vawtrak v2 the next big Banking TrojanWebinar: Vawtrak v2 the next big Banking Trojan
Webinar: Vawtrak v2 the next big Banking TrojanBlueliv
 
Software management, the seasonal return of DDoS - This Week in Security.pdf
Software management, the seasonal return of DDoS - This Week in Security.pdfSoftware management, the seasonal return of DDoS - This Week in Security.pdf
Software management, the seasonal return of DDoS - This Week in Security.pdfLior Rotkovitch
 
Ce hv8 module 17 evading ids, firewalls, and honeypots
Ce hv8 module 17 evading ids, firewalls, and honeypotsCe hv8 module 17 evading ids, firewalls, and honeypots
Ce hv8 module 17 evading ids, firewalls, and honeypotsMehrdad Jingoism
 
SecTor '09 - When Web 2.0 Attacks!
SecTor '09 - When Web 2.0 Attacks!SecTor '09 - When Web 2.0 Attacks!
SecTor '09 - When Web 2.0 Attacks!Rafal Los
 
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...Cyber Security Alliance
 
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)Priyanka Aash
 
The Revolution of Crypto Funding - Building towards a Scamless Future
The Revolution of Crypto Funding - Building towards a Scamless FutureThe Revolution of Crypto Funding - Building towards a Scamless Future
The Revolution of Crypto Funding - Building towards a Scamless FutureRuben Merre
 
Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)Marco Balduzzi
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep WebTrend Micro
 

Similar to 15 years through Infosec (20)

CrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising Deck
 
The difference between a duck
The difference between a duckThe difference between a duck
The difference between a duck
 
Hacking Exposed: The Mac Attack
Hacking Exposed: The Mac AttackHacking Exposed: The Mac Attack
Hacking Exposed: The Mac Attack
 
Hacking Exposed: The Mac Attack
Hacking Exposed: The Mac AttackHacking Exposed: The Mac Attack
Hacking Exposed: The Mac Attack
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best Practices
 
Keynote fx try harder 2 be yourself
Keynote fx   try harder 2 be yourselfKeynote fx   try harder 2 be yourself
Keynote fx try harder 2 be yourself
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
 
The hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignmentsThe hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignments
 
How to get along with HATEOAS without letting the bad guys steal your lunch?
How to get along with HATEOAS without letting the bad guys steal your lunch?How to get along with HATEOAS without letting the bad guys steal your lunch?
How to get along with HATEOAS without letting the bad guys steal your lunch?
 
Blue team reboot - HackFest
Blue team reboot - HackFest Blue team reboot - HackFest
Blue team reboot - HackFest
 
Webinar: Vawtrak v2 the next big Banking Trojan
Webinar: Vawtrak v2 the next big Banking TrojanWebinar: Vawtrak v2 the next big Banking Trojan
Webinar: Vawtrak v2 the next big Banking Trojan
 
Software management, the seasonal return of DDoS - This Week in Security.pdf
Software management, the seasonal return of DDoS - This Week in Security.pdfSoftware management, the seasonal return of DDoS - This Week in Security.pdf
Software management, the seasonal return of DDoS - This Week in Security.pdf
 
Ce hv8 module 17 evading ids, firewalls, and honeypots
Ce hv8 module 17 evading ids, firewalls, and honeypotsCe hv8 module 17 evading ids, firewalls, and honeypots
Ce hv8 module 17 evading ids, firewalls, and honeypots
 
Exp w22 exp-w22
Exp w22 exp-w22Exp w22 exp-w22
Exp w22 exp-w22
 
SecTor '09 - When Web 2.0 Attacks!
SecTor '09 - When Web 2.0 Attacks!SecTor '09 - When Web 2.0 Attacks!
SecTor '09 - When Web 2.0 Attacks!
 
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
 
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
 
The Revolution of Crypto Funding - Building towards a Scamless Future
The Revolution of Crypto Funding - Building towards a Scamless FutureThe Revolution of Crypto Funding - Building towards a Scamless Future
The Revolution of Crypto Funding - Building towards a Scamless Future
 
Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep Web
 

More from Saumil Shah

The Hand That Strikes, Also Blocks
The Hand That Strikes, Also BlocksThe Hand That Strikes, Also Blocks
The Hand That Strikes, Also BlocksSaumil Shah
 
Debugging with EMUX - RIngzer0 BACK2WORKSHOPS
Debugging with EMUX - RIngzer0 BACK2WORKSHOPSDebugging with EMUX - RIngzer0 BACK2WORKSHOPS
Debugging with EMUX - RIngzer0 BACK2WORKSHOPSSaumil Shah
 
Unveiling EMUX - ARM and MIPS IoT Emulation Framework
Unveiling EMUX - ARM and MIPS IoT Emulation FrameworkUnveiling EMUX - ARM and MIPS IoT Emulation Framework
Unveiling EMUX - ARM and MIPS IoT Emulation FrameworkSaumil Shah
 
Announcing ARMX Docker - DC11332
Announcing ARMX Docker - DC11332Announcing ARMX Docker - DC11332
Announcing ARMX Docker - DC11332Saumil Shah
 
Precise Presentations
Precise PresentationsPrecise Presentations
Precise PresentationsSaumil Shah
 
Effective Webinars: Presentation Skills for a Virtual Audience
Effective Webinars: Presentation Skills for a Virtual AudienceEffective Webinars: Presentation Skills for a Virtual Audience
Effective Webinars: Presentation Skills for a Virtual AudienceSaumil Shah
 
INSIDE ARM-X Cansecwest 2020
INSIDE ARM-X Cansecwest 2020INSIDE ARM-X Cansecwest 2020
INSIDE ARM-X Cansecwest 2020Saumil Shah
 
Cyberspace And Security - India's Decade Ahead
Cyberspace And Security - India's Decade AheadCyberspace And Security - India's Decade Ahead
Cyberspace And Security - India's Decade AheadSaumil Shah
 
Cybersecurity And Sovereignty - A Look At Society's Transformation In Cyberspace
Cybersecurity And Sovereignty - A Look At Society's Transformation In CyberspaceCybersecurity And Sovereignty - A Look At Society's Transformation In Cyberspace
Cybersecurity And Sovereignty - A Look At Society's Transformation In CyberspaceSaumil Shah
 
NSConclave2020 The Decade Behind And The Decade Ahead
NSConclave2020 The Decade Behind And The Decade AheadNSConclave2020 The Decade Behind And The Decade Ahead
NSConclave2020 The Decade Behind And The Decade AheadSaumil Shah
 
Cybersecurity In India - The Decade Ahead
Cybersecurity In India - The Decade AheadCybersecurity In India - The Decade Ahead
Cybersecurity In India - The Decade AheadSaumil Shah
 
INSIDE ARM-X - Countermeasure 2019
INSIDE ARM-X - Countermeasure 2019INSIDE ARM-X - Countermeasure 2019
INSIDE ARM-X - Countermeasure 2019Saumil Shah
 
Introducing ARM-X
Introducing ARM-XIntroducing ARM-X
Introducing ARM-XSaumil Shah
 
The Road To Defendable Systems - Emirates NBD
The Road To Defendable Systems - Emirates NBDThe Road To Defendable Systems - Emirates NBD
The Road To Defendable Systems - Emirates NBDSaumil Shah
 
The CISO's Dilemma 44CON 2019
The CISO's Dilemma 44CON 2019The CISO's Dilemma 44CON 2019
The CISO's Dilemma 44CON 2019Saumil Shah
 
The CISO's Dilemma HITBGSEC2019
The CISO's Dilemma HITBGSEC2019The CISO's Dilemma HITBGSEC2019
The CISO's Dilemma HITBGSEC2019Saumil Shah
 
Schrödinger's ARM Assembly
Schrödinger's ARM AssemblySchrödinger's ARM Assembly
Schrödinger's ARM AssemblySaumil Shah
 
ARM Polyglot Shellcode - HITB2019AMS
ARM Polyglot Shellcode - HITB2019AMSARM Polyglot Shellcode - HITB2019AMS
ARM Polyglot Shellcode - HITB2019AMSSaumil Shah
 
What Makes a Compelling Photograph
What Makes a Compelling PhotographWhat Makes a Compelling Photograph
What Makes a Compelling PhotographSaumil Shah
 
Make ARM Shellcode Great Again - HITB2018PEK
Make ARM Shellcode Great Again - HITB2018PEKMake ARM Shellcode Great Again - HITB2018PEK
Make ARM Shellcode Great Again - HITB2018PEKSaumil Shah
 

More from Saumil Shah (20)

The Hand That Strikes, Also Blocks
The Hand That Strikes, Also BlocksThe Hand That Strikes, Also Blocks
The Hand That Strikes, Also Blocks
 
Debugging with EMUX - RIngzer0 BACK2WORKSHOPS
Debugging with EMUX - RIngzer0 BACK2WORKSHOPSDebugging with EMUX - RIngzer0 BACK2WORKSHOPS
Debugging with EMUX - RIngzer0 BACK2WORKSHOPS
 
Unveiling EMUX - ARM and MIPS IoT Emulation Framework
Unveiling EMUX - ARM and MIPS IoT Emulation FrameworkUnveiling EMUX - ARM and MIPS IoT Emulation Framework
Unveiling EMUX - ARM and MIPS IoT Emulation Framework
 
Announcing ARMX Docker - DC11332
Announcing ARMX Docker - DC11332Announcing ARMX Docker - DC11332
Announcing ARMX Docker - DC11332
 
Precise Presentations
Precise PresentationsPrecise Presentations
Precise Presentations
 
Effective Webinars: Presentation Skills for a Virtual Audience
Effective Webinars: Presentation Skills for a Virtual AudienceEffective Webinars: Presentation Skills for a Virtual Audience
Effective Webinars: Presentation Skills for a Virtual Audience
 
INSIDE ARM-X Cansecwest 2020
INSIDE ARM-X Cansecwest 2020INSIDE ARM-X Cansecwest 2020
INSIDE ARM-X Cansecwest 2020
 
Cyberspace And Security - India's Decade Ahead
Cyberspace And Security - India's Decade AheadCyberspace And Security - India's Decade Ahead
Cyberspace And Security - India's Decade Ahead
 
Cybersecurity And Sovereignty - A Look At Society's Transformation In Cyberspace
Cybersecurity And Sovereignty - A Look At Society's Transformation In CyberspaceCybersecurity And Sovereignty - A Look At Society's Transformation In Cyberspace
Cybersecurity And Sovereignty - A Look At Society's Transformation In Cyberspace
 
NSConclave2020 The Decade Behind And The Decade Ahead
NSConclave2020 The Decade Behind And The Decade AheadNSConclave2020 The Decade Behind And The Decade Ahead
NSConclave2020 The Decade Behind And The Decade Ahead
 
Cybersecurity In India - The Decade Ahead
Cybersecurity In India - The Decade AheadCybersecurity In India - The Decade Ahead
Cybersecurity In India - The Decade Ahead
 
INSIDE ARM-X - Countermeasure 2019
INSIDE ARM-X - Countermeasure 2019INSIDE ARM-X - Countermeasure 2019
INSIDE ARM-X - Countermeasure 2019
 
Introducing ARM-X
Introducing ARM-XIntroducing ARM-X
Introducing ARM-X
 
The Road To Defendable Systems - Emirates NBD
The Road To Defendable Systems - Emirates NBDThe Road To Defendable Systems - Emirates NBD
The Road To Defendable Systems - Emirates NBD
 
The CISO's Dilemma 44CON 2019
The CISO's Dilemma 44CON 2019The CISO's Dilemma 44CON 2019
The CISO's Dilemma 44CON 2019
 
The CISO's Dilemma HITBGSEC2019
The CISO's Dilemma HITBGSEC2019The CISO's Dilemma HITBGSEC2019
The CISO's Dilemma HITBGSEC2019
 
Schrödinger's ARM Assembly
Schrödinger's ARM AssemblySchrödinger's ARM Assembly
Schrödinger's ARM Assembly
 
ARM Polyglot Shellcode - HITB2019AMS
ARM Polyglot Shellcode - HITB2019AMSARM Polyglot Shellcode - HITB2019AMS
ARM Polyglot Shellcode - HITB2019AMS
 
What Makes a Compelling Photograph
What Makes a Compelling PhotographWhat Makes a Compelling Photograph
What Makes a Compelling Photograph
 
Make ARM Shellcode Great Again - HITB2018PEK
Make ARM Shellcode Great Again - HITB2018PEKMake ARM Shellcode Great Again - HITB2018PEK
Make ARM Shellcode Great Again - HITB2018PEK
 

Recently uploaded

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Recently uploaded (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

15 years through Infosec