Discusses how new approaches to managing business risk and software services (like Dev Ops and Platform Engineering/Management) can draw from their forefather concepts: Operations Management and Decision Science.
This document discusses the importance of application logs for security purposes. It notes that while network, system and other logs have improved, application logs are still often lacking crucial context about user actions and application state. To effectively investigate issues, security analysts need a unified view of all log data, including details applications have about user sessions, access and functionality used. The document urges application developers to make more of this type of contextual log data available to defenders to help connect dots between different system components and entities.
The document contains a list of search strings that can be used to find potential vulnerabilities on websites and web applications. Some of the search strings look for pages indicating login portals for administrative access, content management systems, and other common internet-facing applications. Other search strings try to identify specific applications or technologies like vBulletin, ColdFusion, and iSecure. The overall document appears to be sharing ways to search for unprotected administrative or backend interfaces online.
Boomtime: Risk as Economics (Allison Miller, SiRAcon15)Allison Miller
When we talk about Risk, and Information Risk as it applies to InfoSec specifically, we often focus on issues of statistics: data, measurement, and our favorite friend: uncertainty. In this talk we’ll look at models and concepts from economics that can augment our thinking, as we move from positive (i.e. primarily descriptive, “how things are”) to normative (i.e. driving policy , “how things should be”) research within the world of risk.
This document discusses various methods for measuring criminal and illicit activities that cannot be directly observed, such as fraud, cash movement, and cybercrimes. It provides examples of direct measurement techniques including surveys and samples, as well as indirect methods like accounting gaps and system statistics. Specific measurement approaches are examined for crimes like fraud, cash usage, and cybercrimes including spam, botnets, and malware. The document advocates testing simple metrics and aggregating existing data to better estimate underground and illicit activities.
2013.05 Games We Play: Payoffs & Chaos MonkeysAllison Miller
Expansion on application of game theory & behavioral analytics to information security and risk management. New concepts include some ideas from coalitional game theory, i.e. not just individual actors but teams.
2010.08 Applied Threat Modeling: Live (Hutton/Miller)Allison Miller
Alex Hutton & Allison Miller review their research and application of threat modeling. This version was presented at SOURCE Barcelona (2010), a previous version was presented at Black Hat.
2012.12 Games We Play: Defenses & DisincentivesAllison Miller
This document provides an overview of game theory concepts and how they can be applied to information security issues. It discusses how security situations can be framed as games with defensive and offensive players making strategic decisions based on potential costs and benefits. Examples of typical game theory models are explained like the Prisoner's Dilemma. The document also notes that real-world behavior may not always match rational models, and that understanding human biases is important for developing effective defense strategies. Overall, it argues that risk management involves managing decisions in a game-like framework where outcomes depend on the choices of multiple players.
Discusses how new approaches to managing business risk and software services (like Dev Ops and Platform Engineering/Management) can draw from their forefather concepts: Operations Management and Decision Science.
This document discusses the importance of application logs for security purposes. It notes that while network, system and other logs have improved, application logs are still often lacking crucial context about user actions and application state. To effectively investigate issues, security analysts need a unified view of all log data, including details applications have about user sessions, access and functionality used. The document urges application developers to make more of this type of contextual log data available to defenders to help connect dots between different system components and entities.
The document contains a list of search strings that can be used to find potential vulnerabilities on websites and web applications. Some of the search strings look for pages indicating login portals for administrative access, content management systems, and other common internet-facing applications. Other search strings try to identify specific applications or technologies like vBulletin, ColdFusion, and iSecure. The overall document appears to be sharing ways to search for unprotected administrative or backend interfaces online.
Boomtime: Risk as Economics (Allison Miller, SiRAcon15)Allison Miller
When we talk about Risk, and Information Risk as it applies to InfoSec specifically, we often focus on issues of statistics: data, measurement, and our favorite friend: uncertainty. In this talk we’ll look at models and concepts from economics that can augment our thinking, as we move from positive (i.e. primarily descriptive, “how things are”) to normative (i.e. driving policy , “how things should be”) research within the world of risk.
This document discusses various methods for measuring criminal and illicit activities that cannot be directly observed, such as fraud, cash movement, and cybercrimes. It provides examples of direct measurement techniques including surveys and samples, as well as indirect methods like accounting gaps and system statistics. Specific measurement approaches are examined for crimes like fraud, cash usage, and cybercrimes including spam, botnets, and malware. The document advocates testing simple metrics and aggregating existing data to better estimate underground and illicit activities.
2013.05 Games We Play: Payoffs & Chaos MonkeysAllison Miller
Expansion on application of game theory & behavioral analytics to information security and risk management. New concepts include some ideas from coalitional game theory, i.e. not just individual actors but teams.
2010.08 Applied Threat Modeling: Live (Hutton/Miller)Allison Miller
Alex Hutton & Allison Miller review their research and application of threat modeling. This version was presented at SOURCE Barcelona (2010), a previous version was presented at Black Hat.
2012.12 Games We Play: Defenses & DisincentivesAllison Miller
This document provides an overview of game theory concepts and how they can be applied to information security issues. It discusses how security situations can be framed as games with defensive and offensive players making strategic decisions based on potential costs and benefits. Examples of typical game theory models are explained like the Prisoner's Dilemma. The document also notes that real-world behavior may not always match rational models, and that understanding human biases is important for developing effective defense strategies. Overall, it argues that risk management involves managing decisions in a game-like framework where outcomes depend on the choices of multiple players.
As presented at ITExpo 2017 and the April Peerlyst Tel-Aviv security Meetup.
Can your company afford to ignore VoIP security? With the number of attacks on your telephone services and mobile devices your chance of being attacked and financial liability is at an all time high. This session offers an introductory primer to securing your VoIP PBX. This talk will include explanations about common attacks, how they can find you, and common techniques you can use to defend your company.
The top 10 security issues in web applicationsDevnology
The top 10 security issues in web applications are:
1. Injection flaws such as SQL, OS, and LDAP injection.
2. Cross-site scripting (XSS) vulnerabilities that allow attackers to execute scripts in a victim's browser.
3. Broken authentication and session management, such as not logging users out properly or exposing session IDs.
4. Insecure direct object references where users can directly access files without authorization checks.
5. Cross-site request forgery (CSRF) that tricks a user into performing actions they did not intend.
6. Security misconfiguration of web or application servers.
7. Insecure cryptographic storage of passwords or sensitive data.
8
Node is used to build a reverse proxy to provide secure access to internal web resources and sites for mobile clients within a large enterprise. Performance testing shows the proxy can handle over 1000 requests per second with latency under 1 second. Code quality analysis tools like Plato and testing frameworks like Jest are useful for maintaining high quality code. Scalability is achieved through auto-scaling virtual machine instances with a load balancer and configuration management.
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wnedfangjiafu
This document discusses penetration testing approaches from the past compared to today. It notes that in the past, penetration testing was easier because networks had fewer security controls like firewalls and patches. The document then provides tips and techniques for identifying security controls like load balancers, intrusion prevention systems, and web application firewalls that may be in place on modern networks. It also discusses ways to potentially bypass these controls like using encryption, proxies, or virtual private networks.
Cyber Security Workshop @SPIT- 3rd October 2015Nilesh Sapariya
Got Invited for conducting the workshop on ‘Cyber Security’ at top notch engineering college.
Sardar Patel Institute of Technology, Andheri on 3rd October, 2015.
Student feedback:-
https://drive.google.com/file/d/0B_uWWP1uW7TFWVdTanJFdTlqNkE/view?usp=sharing
Appreciation letter:-
https://drive.google.com/file/d/0B_uWWP1uW7TFMkVVUTR4V1JTN2c/view?usp=sharing
This is a multi-faceted workshop that explores new concepts in web security. After a solid grounding in well-known exploits like cross-site scripting (XSS) and cross-site request forgeries (CSRF), I'll demonstrate how traditional exploits are being used together and with other technologies like Ajax to launch sophisticated attacks that penetrate firewalls, target users, and spread like worms. I'll then discuss some ideas for the future, such as evaluating trends to identify suspicious activity and understanding human tendencies and behavior to help provide a better, more secure user experience.
Petr Dvořák: Mobilní webové služby pohledem iPhone developeraWebExpo
Jak nejlépe uchopit komunikaci mezi mobilním zařízením a síťovými službami, jak nastavit spolupráci, pokud server a klient vyvíjí různé, často vzdálené organizace, a proč vůbec psát webové služby, když máme mobilní internet...
This document discusses best practices for developing mobile web services for iPhone applications. It recommends using RESTful APIs with JSON or XML formats over SOAP/XML-RPC due to their simplicity. Proper use of HTTP methods, caching, authentication using OAuth or forms, and error handling are also covered. The document emphasizes that web services should be device-agnostic and public data accessible by any application to be most useful.
Forcepoint analyzed the JAKU botnet and found:
- The botnet primarily targeted victims in Korea, Japan, and China and used SQLite databases to manage over 20,000 infected devices.
- It distributed malware through poisoned BitTorrent files and its command and control infrastructure had resilient channels.
- The malware exfiltrated system information, network information, browser history and files from victims, which were primarily personal computers rather than from corporations.
- Victim locations were mapped and found to be concentrated in urban areas in Korea, Japan, and parts of Asia and Europe. The number of victims grew rapidly over time.
Secure Software: Action, Comedy or Drama? (2017 edition)Peter Sabev
If they made movies about the most important software security issues, they could be put into five titles: Insecure Interface, Insufficient Authentication, Security Misconfiguration, Lack of Transport Encryption and Privacy Concerns. What are the action, comedy and drama parts in software security nowadays? A talk presented on IT-Weekend event in Ruse, Bulgaria (2017)
This document provides an overview of various cybersecurity tools and concepts. It begins by explaining security information and event management (SIEM) tools and what logs they can ingest. It then discusses intrusion detection systems (IDS) versus intrusion prevention systems (IPS) and how they work. Next, it covers endpoint detection and response (EDR) tools, open source alternatives, and how they can provide threat hunting capabilities. The document concludes by discussing the importance of vulnerability assessment and patching systems to reduce risk.
Indicators of compromise: From malware analysis to eradicationMichael Boman
This document discusses detecting and analyzing indicators of compromise from a malware infection. It describes collecting data from firewalls, IDS/IPS, proxies, DNS logs, and system logs to detect suspicious activity. Once a potential malware sample is acquired, static and dynamic analysis techniques are used to analyze its behavior and identify indicators that can be used to detect infected machines, like created files, registry keys, and network traffic. These indicators are expressed using tools like Yara rules and Snort signatures to enable detection of the compromise across an environment.
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...44CON
This document discusses detecting and analyzing indicators of compromise from a malware infection. It describes collecting data from firewalls, IDS/IPS, proxies, DNS logs, and system logs to detect suspicious activity. Once a potential malware sample is acquired, static and dynamic analysis techniques are used to analyze its behavior and identify indicators that can be used to detect infected machines, like created files, registry keys, and network traffic. These indicators are expressed using tools like Yara rules and Snort signatures to enable detection of the compromise across an environment.
This document provides an overview and recommendations for securing Java web applications against the OWASP Top 10 security risks. It discusses each risk like cross-site scripting, injection flaws, malicious file execution, insecure direct object references, cross-site request forgery, information leakage, broken authentication, insecure cryptographic storage, and insecure communications. For each risk, it provides examples of how the risk could occur and recommendations for prevention, such as input validation, output encoding, secure configuration, access control, and use of SSL.
The document provides information on analyzing web application attacks from server logs. It begins with statistics on common targets and attacks. It then explains how to read information from server access logs, including the client IP, request details, and user agent. Tools for log analysis like Splunk and ELK are listed. The document concludes with recommendations for defending websites, such as securing coding practices, using a web application firewall, and conducting penetration testing.
How to prevent cyber terrorism taraganaGilles Sgro
This document discusses a software called Validy SoftNaos that aims to prevent cyberterrorism, software piracy, and data theft through a combination of software transformation and a secure USB token hardware. It works by relocating parts of software code and data to the secure hardware token, requiring the token to be connected for the software to run. This is intended to strengthen software protection without compromising user privacy or control. The document provides technical details on how Validy SoftNaos protects software and ensures integrity through its use of encryption and the secure token. It also outlines how users can install and use the Validy SoftNaos evaluation software.
With more and more sites falling victim to data theft, you've probably read the list of things (not) to do to write secure code. But what else should you do to make sure your code and the rest of your web stack is secure ? In this tutorial we'll go through the basic and more advanced techniques of securing your web and database servers, securing your backend PHP code and your frontend javascript code. We'll also look at how you can build code that detects and blocks intrusion attempts and a bunch of other tips and tricks to make sure your customer data stays secure.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
More Related Content
Similar to 2012.09 A Million Mousetraps: Using Big Data and Little Loops to Build Better Defenses
As presented at ITExpo 2017 and the April Peerlyst Tel-Aviv security Meetup.
Can your company afford to ignore VoIP security? With the number of attacks on your telephone services and mobile devices your chance of being attacked and financial liability is at an all time high. This session offers an introductory primer to securing your VoIP PBX. This talk will include explanations about common attacks, how they can find you, and common techniques you can use to defend your company.
The top 10 security issues in web applicationsDevnology
The top 10 security issues in web applications are:
1. Injection flaws such as SQL, OS, and LDAP injection.
2. Cross-site scripting (XSS) vulnerabilities that allow attackers to execute scripts in a victim's browser.
3. Broken authentication and session management, such as not logging users out properly or exposing session IDs.
4. Insecure direct object references where users can directly access files without authorization checks.
5. Cross-site request forgery (CSRF) that tricks a user into performing actions they did not intend.
6. Security misconfiguration of web or application servers.
7. Insecure cryptographic storage of passwords or sensitive data.
8
Node is used to build a reverse proxy to provide secure access to internal web resources and sites for mobile clients within a large enterprise. Performance testing shows the proxy can handle over 1000 requests per second with latency under 1 second. Code quality analysis tools like Plato and testing frameworks like Jest are useful for maintaining high quality code. Scalability is achieved through auto-scaling virtual machine instances with a load balancer and configuration management.
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wnedfangjiafu
This document discusses penetration testing approaches from the past compared to today. It notes that in the past, penetration testing was easier because networks had fewer security controls like firewalls and patches. The document then provides tips and techniques for identifying security controls like load balancers, intrusion prevention systems, and web application firewalls that may be in place on modern networks. It also discusses ways to potentially bypass these controls like using encryption, proxies, or virtual private networks.
Cyber Security Workshop @SPIT- 3rd October 2015Nilesh Sapariya
Got Invited for conducting the workshop on ‘Cyber Security’ at top notch engineering college.
Sardar Patel Institute of Technology, Andheri on 3rd October, 2015.
Student feedback:-
https://drive.google.com/file/d/0B_uWWP1uW7TFWVdTanJFdTlqNkE/view?usp=sharing
Appreciation letter:-
https://drive.google.com/file/d/0B_uWWP1uW7TFMkVVUTR4V1JTN2c/view?usp=sharing
This is a multi-faceted workshop that explores new concepts in web security. After a solid grounding in well-known exploits like cross-site scripting (XSS) and cross-site request forgeries (CSRF), I'll demonstrate how traditional exploits are being used together and with other technologies like Ajax to launch sophisticated attacks that penetrate firewalls, target users, and spread like worms. I'll then discuss some ideas for the future, such as evaluating trends to identify suspicious activity and understanding human tendencies and behavior to help provide a better, more secure user experience.
Petr Dvořák: Mobilní webové služby pohledem iPhone developeraWebExpo
Jak nejlépe uchopit komunikaci mezi mobilním zařízením a síťovými službami, jak nastavit spolupráci, pokud server a klient vyvíjí různé, často vzdálené organizace, a proč vůbec psát webové služby, když máme mobilní internet...
This document discusses best practices for developing mobile web services for iPhone applications. It recommends using RESTful APIs with JSON or XML formats over SOAP/XML-RPC due to their simplicity. Proper use of HTTP methods, caching, authentication using OAuth or forms, and error handling are also covered. The document emphasizes that web services should be device-agnostic and public data accessible by any application to be most useful.
Forcepoint analyzed the JAKU botnet and found:
- The botnet primarily targeted victims in Korea, Japan, and China and used SQLite databases to manage over 20,000 infected devices.
- It distributed malware through poisoned BitTorrent files and its command and control infrastructure had resilient channels.
- The malware exfiltrated system information, network information, browser history and files from victims, which were primarily personal computers rather than from corporations.
- Victim locations were mapped and found to be concentrated in urban areas in Korea, Japan, and parts of Asia and Europe. The number of victims grew rapidly over time.
Secure Software: Action, Comedy or Drama? (2017 edition)Peter Sabev
If they made movies about the most important software security issues, they could be put into five titles: Insecure Interface, Insufficient Authentication, Security Misconfiguration, Lack of Transport Encryption and Privacy Concerns. What are the action, comedy and drama parts in software security nowadays? A talk presented on IT-Weekend event in Ruse, Bulgaria (2017)
This document provides an overview of various cybersecurity tools and concepts. It begins by explaining security information and event management (SIEM) tools and what logs they can ingest. It then discusses intrusion detection systems (IDS) versus intrusion prevention systems (IPS) and how they work. Next, it covers endpoint detection and response (EDR) tools, open source alternatives, and how they can provide threat hunting capabilities. The document concludes by discussing the importance of vulnerability assessment and patching systems to reduce risk.
Indicators of compromise: From malware analysis to eradicationMichael Boman
This document discusses detecting and analyzing indicators of compromise from a malware infection. It describes collecting data from firewalls, IDS/IPS, proxies, DNS logs, and system logs to detect suspicious activity. Once a potential malware sample is acquired, static and dynamic analysis techniques are used to analyze its behavior and identify indicators that can be used to detect infected machines, like created files, registry keys, and network traffic. These indicators are expressed using tools like Yara rules and Snort signatures to enable detection of the compromise across an environment.
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...44CON
This document discusses detecting and analyzing indicators of compromise from a malware infection. It describes collecting data from firewalls, IDS/IPS, proxies, DNS logs, and system logs to detect suspicious activity. Once a potential malware sample is acquired, static and dynamic analysis techniques are used to analyze its behavior and identify indicators that can be used to detect infected machines, like created files, registry keys, and network traffic. These indicators are expressed using tools like Yara rules and Snort signatures to enable detection of the compromise across an environment.
This document provides an overview and recommendations for securing Java web applications against the OWASP Top 10 security risks. It discusses each risk like cross-site scripting, injection flaws, malicious file execution, insecure direct object references, cross-site request forgery, information leakage, broken authentication, insecure cryptographic storage, and insecure communications. For each risk, it provides examples of how the risk could occur and recommendations for prevention, such as input validation, output encoding, secure configuration, access control, and use of SSL.
The document provides information on analyzing web application attacks from server logs. It begins with statistics on common targets and attacks. It then explains how to read information from server access logs, including the client IP, request details, and user agent. Tools for log analysis like Splunk and ELK are listed. The document concludes with recommendations for defending websites, such as securing coding practices, using a web application firewall, and conducting penetration testing.
How to prevent cyber terrorism taraganaGilles Sgro
This document discusses a software called Validy SoftNaos that aims to prevent cyberterrorism, software piracy, and data theft through a combination of software transformation and a secure USB token hardware. It works by relocating parts of software code and data to the secure hardware token, requiring the token to be connected for the software to run. This is intended to strengthen software protection without compromising user privacy or control. The document provides technical details on how Validy SoftNaos protects software and ensures integrity through its use of encryption and the secure token. It also outlines how users can install and use the Validy SoftNaos evaluation software.
With more and more sites falling victim to data theft, you've probably read the list of things (not) to do to write secure code. But what else should you do to make sure your code and the rest of your web stack is secure ? In this tutorial we'll go through the basic and more advanced techniques of securing your web and database servers, securing your backend PHP code and your frontend javascript code. We'll also look at how you can build code that detects and blocks intrusion attempts and a bunch of other tips and tricks to make sure your customer data stays secure.
Similar to 2012.09 A Million Mousetraps: Using Big Data and Little Loops to Build Better Defenses (20)
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
2. Overview
Protecting customers on an open
platform
Big data + Little loops enable
automation via analytics
Decisions as defenses
Putting your data to work
6. The Better Mousetrap
Automates defensive action x-platform
- Fast
- Accurate
- Cheap
IN REAL TIME
IN TIME TO MINIMIZE LOSS
REASONABLE FALSE
POSITIVES
AS GOOD AS A HUMAN
SPECIALIST
REDUCES MORE LOSS THAN COST CREATED
CHEAPER THAN MANUAL
INTERVENTION
BIG DATA &
LITTLE LOOPS
10. APPLIED RISK ANALYTICS
Use of technology, data, research &
statistics to solve problems
associated with losses or costs due to
security vulnerabilities / gaps in a system
-- resulting in the deployment of optimized
detection, prevention, or response capabilities.
14. Such as...
Metrics Analytics
$ Loss Txns
Purchase trends of high
loss users
# Compromised Accts
IP Sources of bad login
attempts
% of Spam Messages
Delivered
Spam subject lines
generating most clicks
Minutes of downtime Most process-intensive
applications
# Customer Contacts
Generated
Highest-contact
exception flows
17. Applied where?
Where risks manifest in observable
behavior
Where system owners make
decisions
Where controls can be optimized by
better recognizing identity, intent, or
change
19. BIG DATA &
LITTLE LOOPS
Why are you picking
on me?Boo-yah! Still
getting away
with it.
<Sigh>
Nobody
understands me.
20. Such as...
Populations
- Users, Transactions, Messages, Packets, API calls,
Files
Actions
- Allow, Block, Challenge, Review, Retry, Quarantine,
Add privileges, Upgrade privileges, Make Offer
Costs
- Fraud, Data leakage, Customer churn, Customer
contacts, Downstream liability
21. Applying Decisions
Risk management is
decision management
ACTOR
ATTEMPTS
ACTION
SUBMIT
WHAT IS THE
REQUEST
HOW TO
HONOR THE
REQUEST
SHOULD WE
HONOR?
RESULT
ACTION
OCCURS
22. For example:
ACTOR
ATTEMPTS
PAYMENT
p (actor attempting
payment is
accountholder)
Decision
Authorize
Review
Refer
Request
Authentication
Decline
f(variable A + Variable B + ...)
SUBMIT
23. Flavors of Risk Models
I deviate significantly
from a normal (good)
pattern
I summarize a known
bad pattern
fa(x), fb(x), fc(x) fq(x), fr(x), fs(x)
26. Study history...
User IP Country
<> Billing Country
Buying prepaid
mobile phones
Add new shipping
address in cart
However
Buyer =
Phone reseller,
static machine
ID
How much $$ is
at risk?
What is “normal”
for this
customer?
What “bad”
profiles does this
match?
27. SHALL WE PLAY A GAME?
(SINCE WE CAN’T PLAY “CLUE” FOR EVERY LOGIN
TRANSACTION
NEW USER
MESSAGE
FRIEND REQUEST
ATTACHMENT
PACKET
WINK
POKE
CLICK
WE BUILD RISK MODELS)
28. Model Development Process
Target -> Yes/No questions best
Find Data, Variable Creation -> Best part
Data Prep -> Worst part
Model Training -> Pick an algorithm
Assessment -> Catch vs FP rate
Deployment -> Decisioning vs Detection
29. User IP Country
<> Billing Country
Buying prepaid
mobile phones
Add new shipping
address in cart
Buyer =
Phone reseller,
static machine
ID
How much $$ is at risk?
What is “normal” for this customer?
What “bad” profiles does this match?
GEOLOCATE
IP
CONVERT GEO
TO COUNTRY
CODE
FLAG ON
MISMATCH
CART
CATEGORY
MERCH
RISK
LEVEL
DATE ADDED
ADDRESS
TYPE
STRING
MATCHING
CUSTOMER
PROFILE
DEVICE ID
DEVICE
HISTORYTXN-$-AMT
CHURN RISK, CLV,
TXNS, LOGINS,
STOLEN CC,
30. Model Training
Some algorithms:
- Regression: Determines the best equation describe
relationship between control variable and independent
variables
Linear Regression: Best equation is a line
Logistic Regression: Best equation is a curve (exponential
properties)
- Bayesian: Used to estimate regression models, useful
when working w/small data sets
- Neural Nets: Can approximate any type of non-linear
function, often highly predictive, but doesn’t explain the
relationship between control and independent variables
32. P-VALUE OF SIGNIFICANCE,
THROW OUT IF > .05
VARIANCE IN DEPENDENT
VARIABLE EXPLAINED BY
INDEPENDENT VARIABLES
DEPENDENT
VARIABLE
INDEPENDENT
VARIABLES
FACTOR ODDS OF
DEPENDENT GO UP WHEN
INDEPENDENT VAR
INCREMENTED
P-VALUE SHOULD
BE < SIGNIFICANCE
LEVEL (.05)
33.
34. GAIN
More gain/lift = more efficient predictions
Catch as much as possible (as much of the “bads”)
Minimize the overall affected
36. And now an example
Everyone loves a good 419 scam
37. 419 example: the 411
Trigger
- Contact receives 419 from a (free) business email
account, who contacts victim OOB
Backtrack
- Password was changed (user had to go through
reset process)
- Contacts, inbox, outbox deleted
- Nigerian IP login
Elaboration
- “Reply-to”: changed an “i” to an “l” (same ISP)
- Only takes Western Union
38. 419 example: with love, from Abuja
What is the question?
- p(ATO)
- p(Spam:scam)
- p(Fake acct creation)
What are our available answer/action
sets?
What else can we do to detect/mitigate?
39. 419 example: Reducing 911s
Variables
- “New” session variables: New login IP, new login IP country, new
cookie/machine ID
- “Change” account variables: Change password, change secondary
email, change name, change public profile
- “New” activity variables: Send to all contacts, # of accounts in “cc”
or “bcc”, Edit/delete contacts en masse
- Association variables: New recipients, New “reply-to” fields,
“Similar” accounts created/associated (fuzzy=more difficult)
User empowerment
- Stronger password reset options (SMS)
- Transparency: Other current sessions, past session history (IPs,
logins)
- Auto-logout all other sessions upon password reset
- Reporting: Details of elaboration as well as cut and paste messages
40. Recap
Protecting customers requires
understanding not just technology but
also behavior. This requires:
- Activity data
- Clear definitions of “good” vs “bad” results
- Constant feedback
- Analysis
Designing data-driven defenses
- Decisions that can be automated w/data
- Where/what data sets to use
- Business drivers to keep in mind
An example
BIG DATA &
LITTLE LOOPS
p (bad)
f(variable A + Variable B + ...)
41. Prediction is very difficult, especially about the
future
Niels Bohr
Allison Miller
@selenakyle