SlideShare a Scribd company logo
1 of 59
Download to read offline
Welcome to the blue team… 

(How building a better hacker accidentally
built a better defender)
Casey Ellis - NodeSummit 2016
Casey Ellis - CEO
Bugcrowd Inc
W
e’re
hiring!
jobs@
bugcrowd.com
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
About me
@caseyjohnellis
JABAH (Just Another Blonde Aussie Hacker)
Recovering pentester turned solution architect turned sales guy turned
entrepreneur
Wife and two kids now living in San Francisco
Founder and CEO of Bugcrowd
2
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
• I want to change the way you might already think
about connecting companies to researchers.
• Let’s be real.
• I’m not a developer. I’m a 100% breaker/fixer.
Before we begin…
3
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
#buildabetterhacker
4
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
• Who here builds for a living?
• Who here breaks/fixes for a living?
• Who does both?
Who’s who
5
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
We’re different…
6
Builders Breakers
…and that’s good.
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
Say what?
We do completely opposite
things.
7
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
#bettersecurityfeedback
8
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS 9
Developer incentive
Push this feature by this deadline because $REASON.
Security incentive
Make sure dev doesn’t do anything that lets the bad guys in.
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
• Those who think like bad guys *greatly*
overestimate the ability for everyone else to think
like a bad guy.
• This makes them useful and valuable (but doesn’t
make them “better” or “worse)
• Tip: The next time you feel like calling a developer
“dumb”, build and launch a product first.
Side note:
12
The developer problem
All this security stuff is slowing us down
The security problem
Why won’t they take me seriously?
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
• Development contributes to products which make
money.
• Security minimizes risk of loss. No security = More
risk… but *maybe* nothing will happen.
• No dev = no product = no money = no job = no
beuno… So the feature wins.
Side note:
15
The real developer
problem
I don’t believe in the boogeyman
The real security problem
I don’t have the time/energy/people skills/resources
to convince you that the boogeyman is real.
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
• Thanks to every security vendor ever for making this
even harder.
• FUD works as a awareness tool, but FUD fatigue is
very, very real.
Side note:
18
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
#wereinthistogether
19
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
• Developer checklists
• Check-in testing/CI tests
• Security awareness training
• Pentesting/VA/SCA
• Outsourced things
Status quo
20
BLOCKERS
So we do this…
(and let’s be honest, we quite enjoy it too…)
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
It doesn’t work over the
long term.
22
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
The question:
How do we get the
business to believe in the
boogeyman?
23
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
A better question:
How do we create
better security feedback
for the business?
24
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
Picard Management Tip
25
The most efficient way to get something the attention it deserves is to set it on fire.
*not a Pickard quote, but it totally should be.
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
The McAfee Version
26
The most security aware an organization will ever be is straight after a breach.
*not a John McAfee quote, but he’s burning benjamin’s in this pic because it’s true.
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
• Heartland, the leaders in end to end encryption!!!
• Target, with their shiny new CISO!!!
• JP Morgan Chase, with their massive new security
budget!!!
• Etc, etc, et al, QED
Examples?
27
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
That’s nice, but
how do I avoid
the whole
“getting pwned”
bit?
28
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
Bug bounty!!!
29
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
FOREVER!!!
30
Pics by @alliebrosh
http://hyperboleandahalf.blogspot.com/2010/06/this-is-why-ill-never-be-adult.html
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
What’s a bug bounty
program?
31
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS 32
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
It’s not just about being
cheap, or loud…
33
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
…it’s about introducing you
to this guy.
34
Egor Homakov (@homakov)
aka “that guy who totally owned
Github that time”
Good guy who thinks like a bad guy
“I wonder what his next-door
neighbor can do?”
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
#bettersecurityfeedback
35
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
Bug bounties create
controlled incidents…
36
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
… like having your code pwned
by an 18yo kid.
37
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
#storytime
38
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
Eg 1: Mozilla
39
Thanks to @mwcoates
http://www.slideshare.net/michael_coates/bug-bounty-programs-for-the-web
Clearing their
assurance debt
Boogeyman
belief
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
Great success!
40
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
We see this pattern every.
single. time.
41
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
• Extortion attempt from Eastern Europe
• Resolved by creating a “one man bug bounty” (we
didn’t tell him he was the only one though…)
• Bug received in 15 mins
• #welcometotheblueteam
Eg 2: Western Union
42
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
• Infosec team having a *very* hard time getting buy-
in from management and engineering
• Invoke Picard Management Mode
• Received budget for another 3 team members
• #welcometotheblueteam
Eg 3: [REDACTED] social
media
43
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
• Long time customer of [EXPENSIVE WEB APP
SCANNER] getting “clean results”
• Admin of admin’s through a chained attack within 24
hours of launch
• They thought they were doing a great job at writing
secure code…
• #welcometotheblueteam
Eg 4: [REDACTED]
eCommerce provider
44
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
• Loss prevention company, works with BIG NAME
retailers
• Success of software dependent on not being
hacked - they said it couldn’t be
• Took less than 48 hours
• #welcometotheblueteam
Eg 5: Digital Safety (DISA)
45
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
Great success!
46
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
1. Create a pot that benefits your engineering team
(team drinks, party, event, whatever)
2. Bug bounties paid from it.
3. What ever the hackers don’t get, you keep for your
party.
Idea:
Gamified SDLC
47
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
Ready to start?
48
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
Bug bounties are
awesome…
49
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
…but hard.
50
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
Plan ahead
51
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
The Golden Rule:
Touch the code
==
Pay the bug
52
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
The mistake *everyone* makes:
Vulnerability data
People
53
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
Understand the risk.
54
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
Align expectations before
you engage.
55
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
So, do you think the
boogeyman is real?
Let Egor prove it to you.
56
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
• Bug bounties are cost effective, and highly
marketable, but that’s not the full story…
• …they create controlled incidents that powerfully
impact the security awareness of your builders.
• Go start one.
• More tips and tricks at https://blog.bugcrowd.com
Conclusion
57
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS
#questions
58
@CASEYJOHNELLISBUGCROWD.COM NODE SUMMIT 2016 - CASEY ELLIS 59
@caseyjohnellis
https://bugcrowd.com
casey@bugcrowd.com
Greets to the Bugcrowd, the #scotcherati, @alliebrosh, @rallyvc,
@nodesummit, and the herd.
W
e’re
hiring!
jobs@
bugcrowd.com

More Related Content

More from bugcrowd

If You Can't Beat 'Em, Join 'Em
 If You Can't Beat 'Em, Join 'Em If You Can't Beat 'Em, Join 'Em
If You Can't Beat 'Em, Join 'Embugcrowd
 
Writing vuln reports that maximize payouts - Nullcon 2016
Writing vuln reports that maximize payouts - Nullcon 2016Writing vuln reports that maximize payouts - Nullcon 2016
Writing vuln reports that maximize payouts - Nullcon 2016bugcrowd
 
Bug Bounty Hunter Methodology - Nullcon 2016
Bug Bounty Hunter Methodology - Nullcon 2016Bug Bounty Hunter Methodology - Nullcon 2016
Bug Bounty Hunter Methodology - Nullcon 2016bugcrowd
 
Revitalizing Product Securtiy at Zephyr Health
Revitalizing Product Securtiy at Zephyr HealthRevitalizing Product Securtiy at Zephyr Health
Revitalizing Product Securtiy at Zephyr Healthbugcrowd
 
HI THIS IS URGENT PLZ FIX ASAP: Critical Vunlerabilities and Bug Bounty Programs
HI THIS IS URGENT PLZ FIX ASAP: Critical Vunlerabilities and Bug Bounty ProgramsHI THIS IS URGENT PLZ FIX ASAP: Critical Vunlerabilities and Bug Bounty Programs
HI THIS IS URGENT PLZ FIX ASAP: Critical Vunlerabilities and Bug Bounty Programsbugcrowd
 
How Portal Can Change Your Security Forever - Kati Rodzon at BSidesLV
How Portal Can Change Your Security Forever - Kati Rodzon at BSidesLVHow Portal Can Change Your Security Forever - Kati Rodzon at BSidesLV
How Portal Can Change Your Security Forever - Kati Rodzon at BSidesLVbugcrowd
 
How to Shot Web - Jason Haddix at DEFCON 23 - See it Live: Details in Descrip...
How to Shot Web - Jason Haddix at DEFCON 23 - See it Live: Details in Descrip...How to Shot Web - Jason Haddix at DEFCON 23 - See it Live: Details in Descrip...
How to Shot Web - Jason Haddix at DEFCON 23 - See it Live: Details in Descrip...bugcrowd
 
4 Reasons to Crowdsource Your Pen Test
4 Reasons to Crowdsource Your Pen Test4 Reasons to Crowdsource Your Pen Test
4 Reasons to Crowdsource Your Pen Testbugcrowd
 
Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attackerbugcrowd
 
Build or Buy: The Barracuda Bug Bounty Story [Webinar]
Build or Buy: The Barracuda Bug Bounty Story [Webinar]Build or Buy: The Barracuda Bug Bounty Story [Webinar]
Build or Buy: The Barracuda Bug Bounty Story [Webinar]bugcrowd
 
5 Tips to Successfully Running a Bug Bounty Program
5 Tips to Successfully Running a Bug Bounty Program5 Tips to Successfully Running a Bug Bounty Program
5 Tips to Successfully Running a Bug Bounty Programbugcrowd
 
[Webinar] The Art & Value of Bug Bounty Programs
[Webinar] The Art & Value of Bug Bounty Programs[Webinar] The Art & Value of Bug Bounty Programs
[Webinar] The Art & Value of Bug Bounty Programsbugcrowd
 
Key Takeaways from Instructure's Successful Bug Bounty Program
Key Takeaways from Instructure's Successful Bug Bounty ProgramKey Takeaways from Instructure's Successful Bug Bounty Program
Key Takeaways from Instructure's Successful Bug Bounty Programbugcrowd
 
How to run a kick ass bug bounty program - Node Summit 2013
How to run a kick ass bug bounty program - Node Summit 2013How to run a kick ass bug bounty program - Node Summit 2013
How to run a kick ass bug bounty program - Node Summit 2013bugcrowd
 

More from bugcrowd (14)

If You Can't Beat 'Em, Join 'Em
 If You Can't Beat 'Em, Join 'Em If You Can't Beat 'Em, Join 'Em
If You Can't Beat 'Em, Join 'Em
 
Writing vuln reports that maximize payouts - Nullcon 2016
Writing vuln reports that maximize payouts - Nullcon 2016Writing vuln reports that maximize payouts - Nullcon 2016
Writing vuln reports that maximize payouts - Nullcon 2016
 
Bug Bounty Hunter Methodology - Nullcon 2016
Bug Bounty Hunter Methodology - Nullcon 2016Bug Bounty Hunter Methodology - Nullcon 2016
Bug Bounty Hunter Methodology - Nullcon 2016
 
Revitalizing Product Securtiy at Zephyr Health
Revitalizing Product Securtiy at Zephyr HealthRevitalizing Product Securtiy at Zephyr Health
Revitalizing Product Securtiy at Zephyr Health
 
HI THIS IS URGENT PLZ FIX ASAP: Critical Vunlerabilities and Bug Bounty Programs
HI THIS IS URGENT PLZ FIX ASAP: Critical Vunlerabilities and Bug Bounty ProgramsHI THIS IS URGENT PLZ FIX ASAP: Critical Vunlerabilities and Bug Bounty Programs
HI THIS IS URGENT PLZ FIX ASAP: Critical Vunlerabilities and Bug Bounty Programs
 
How Portal Can Change Your Security Forever - Kati Rodzon at BSidesLV
How Portal Can Change Your Security Forever - Kati Rodzon at BSidesLVHow Portal Can Change Your Security Forever - Kati Rodzon at BSidesLV
How Portal Can Change Your Security Forever - Kati Rodzon at BSidesLV
 
How to Shot Web - Jason Haddix at DEFCON 23 - See it Live: Details in Descrip...
How to Shot Web - Jason Haddix at DEFCON 23 - See it Live: Details in Descrip...How to Shot Web - Jason Haddix at DEFCON 23 - See it Live: Details in Descrip...
How to Shot Web - Jason Haddix at DEFCON 23 - See it Live: Details in Descrip...
 
4 Reasons to Crowdsource Your Pen Test
4 Reasons to Crowdsource Your Pen Test4 Reasons to Crowdsource Your Pen Test
4 Reasons to Crowdsource Your Pen Test
 
Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attacker
 
Build or Buy: The Barracuda Bug Bounty Story [Webinar]
Build or Buy: The Barracuda Bug Bounty Story [Webinar]Build or Buy: The Barracuda Bug Bounty Story [Webinar]
Build or Buy: The Barracuda Bug Bounty Story [Webinar]
 
5 Tips to Successfully Running a Bug Bounty Program
5 Tips to Successfully Running a Bug Bounty Program5 Tips to Successfully Running a Bug Bounty Program
5 Tips to Successfully Running a Bug Bounty Program
 
[Webinar] The Art & Value of Bug Bounty Programs
[Webinar] The Art & Value of Bug Bounty Programs[Webinar] The Art & Value of Bug Bounty Programs
[Webinar] The Art & Value of Bug Bounty Programs
 
Key Takeaways from Instructure's Successful Bug Bounty Program
Key Takeaways from Instructure's Successful Bug Bounty ProgramKey Takeaways from Instructure's Successful Bug Bounty Program
Key Takeaways from Instructure's Successful Bug Bounty Program
 
How to run a kick ass bug bounty program - Node Summit 2013
How to run a kick ass bug bounty program - Node Summit 2013How to run a kick ass bug bounty program - Node Summit 2013
How to run a kick ass bug bounty program - Node Summit 2013
 

Recently uploaded

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Node Summit 2016 Presentation by Casey Ellis: Welcome to the blue team...