SlideShare a Scribd company logo
4IR
Cyber Canaries Get Out of the Mine
philAgcaoili, CISM, CISSP, CRISC
SVP, U.S. Bank
SVP, Product & Security Innovation, ElavonApril 25, 2019
Never mind the gas,
it was automation that got
the canaries in the end.
2
Our Bright Future
3
4
5
What is an Industrial Revolution?
When there are major changes in...
Industry
It’s usually new ways of thinking and doing and new
technologies that cause the change to happen.
TransportationEconomy Society (social structure)
The way we work, buy
and sell things
The way we travel The way we live
Source: Mymoena Ismail, NEMISA
6
Number of Industrial Revolutions so far? 3
And we are now starting number 4.
It is changing...
4th Industrial Revolution
The way we work, buy
and sell things
The way we travel The way we live
Source: Mymoena Ismail, NEMISA
7
HEADING: 2030 COVFEFE
8
Source: Mymoena Ismail, NEMISA
9
HEADING: 2030 COVFEFE
10
Source: Mymoena Ismail, NEMISA
HEADING: 2030 COVFEFE
11
Source: Mymoena Ismail, NEMISA
HEADING: 2030 COVFEFE
Source: Mymoena Ismail, NEMISA
Mobile 5G / Cloud
Automation / AI
Advanced Robotics
IOT / Smart Factories
3D Printing
Energy Storage
12
What is Driving the 4th Industrial Revolution?
The fourth industrial revolution is the current and developing environment in which
disruptive technologies and trends are changing the way we live and work. The
factors include:
• The Internet of Things (IoT),
• Automation of Knowledge Work,
• Cloud Technology,
• 3D Printing,
• Advanced Robotics,
• Virtual Reality (VR),
• Next-Generation Genomics,
• Mobile Internet (5G networks),
• Energy Storage, and
• Artificial Intelligence (AI)
13
14
Source: Andrew McAfee
TEDxBoston 2012
4th Industrial Revolution
This affects social & economic sectors
Physical
Digital
Biological
What’s happening?
Different technologies are coming together
(convergence)
This is bringing different areas together
The way we work, buy
and sell things
The way we travel The way we live
Source: Mymoena Ismail, NEMISA
15
What is Already Happening?
Buying goods online
Paying bills online
Learning online – education
Listening to steaming music
Watching a streaming film
Playing an online game
Source: Mymoena Ismail, NEMISA
16Robotic surgery
What is Already Happening?
Different technologies coming together and
bringing different areas together
New products & services
with increased efficiency
(working better and faster)
for a better life
Order a taxi / ride share (Lyft) Book accommodation
17
What is Being Developed or New on the Market?
2017 PSB 5G Report
87% of respondents anticipate the emergence of new industries.
91% expect the invention of new products as well as services, not in existence as of yet.
85% expect the 5G connection to increase global competition among companies.
82% expect the growth of small businesses and stiffer global competition.
89% of the people surveyed expect greater productivity. 18
What is Being Developed or New on the Market?
Robotics
Drones
Artificial intelligence
Self
driving
cars
Virtual reality
3D printing
Internet of Things (IoT)
Bioengineering
Metadata & analytics
Digital currencies and blockchain
Quantum computing
Source: Mymoena Ismail, NEMISA
19
20
4IR is…
• Entrepreneurial
• Innovative
• Disruptive
• Evolving at an exponential rather than a linear pace
21
4IR Pluses and Minuses
Connection
Efficiency
Inability to change
Improve lives
People not ready and skilled
Not able to capture benefits
New opportunities Inequality may grow
See there are advantages and risks
Source: Mymoena Ismail, NEMISA
22
ALL industries and companies
are being impacted by this
DISRUPTION
23
4IR is Disruptive and Affects Everything
Focus on developing skills
We have to consider:
Based on partnerships across all
stakeholders.
Source: Mymoena Ismail, NEMISA
24
Influence curriculum
Critical thinking
Communication
Collaboration and teamwork
Complex problem solving
Creativity
Emotional intelligence
Global awareness
Financial, economic, business
and entrepreneurial literacy
Civic literacy
Health literacy
Environmental literacy
Computational thinking
Judgement and decision making
Service orientation
Negotiating
Cognitive flexibility
Influence approaches to
teaching & learning
New skills and
competencies required
Critical skills needed
Source: Mymoena Ismail, NEMISA
25
Understanding the systemUnderstanding the system
For over a decade, we have been talking about the
opportunities technology gives us...
A number of things were not known at the time More importantly the societal aspect was largely
missed
Today addressing youth unemployment & harnessing human innovation
forms part of the whole
to unlock effective citizen service delivery,
enhance customer experience
and bring about innovative solutions
for a better life for all
4
4
4
4
Source: Mymoena Ismail, NEMISA
26
The time is now to support
skills development.
27
Some threats and opportunities…
Some Threats and Opportunities…
Increase of mobile and
internet use comes with
own threats  Cybersecurity becomes a
massive global problem.
We need the e-skills to combat this.
Also fundamental to successful digital transformation.
Source: Mymoena Ismail, NEMISA
28
Avoiding Security Exceptionalism
29
4IR:ImpacttoSupplyChain
30
Cybersecurity Topics to Study Now!!!
…Actually 5 years ago
• Focus on getting hands on skills and experience with the 4IR factors
• Cybersecurity Specialization Areas:
• Cloud (AWS, Azure, GCP, etc.)
• Software Development
• Agile and DevOps
• ICT, IOT, and Smart Technology (consumer and industrial)
• Blockchain
• Automation, Data Sciences, Machine Learning, and AI
• Learning to identify Risks and Cyber Consequences of 4IR
• New Vulnerabilities through the 4IR Cybersecurity Supply Chain
31
Refresher:
4IR Factors for Further Cybersecurity Study
• The Internet of Things (IoT),
• Automation of Knowledge Work,
• Cloud Technology,
• 3D Printing,
• Advanced Robotics,
• Virtual Reality (VR),
• Next-Generation Genomics,
• Mobile Internet (5G networks),
• Energy Storage, and
• Artificial Intelligence (AI)
32
Transitioning from Traditional IT to the Future of IT
Enabling capabilities in an agile, rapid, self-service fashion that empowers technology organization to focus on
delivering business capabilities faster
Changing the OrganizationTraditional IT Future of IT
As a Service Provider As a Strategic Differentiator
IT Service Operations
Manual
Processes
Self-service
Portals
Pay-per-
Use
Approval
based
Functional
Silos
SLA-driven
Automated
Processes
Integrated IT
Ops Team
Application Development
Focused on
Technology Delivery
Waterfall
Development
Focused on Business Capability
Delivery
Conventional
Delivery
Agile
Development
Continuous
Delivery
Infrastructure Management
Multiple Physical
Data Centers
Scalable and
Flexible Capacity
Hybrid Cloud
Capabilities
Legacy, On-Premise
Infrastructure
Long Provisioning
Lead Times
Fixed Data Center
Capacity
Software-Defined
Data Centers
Rapid, Automated
Provisioning
Improved time-to-market
Anticipate business needs
Greater IT financial transparency
Increased developer productivity
Attract top technology talent
Lead through innovation
Provide fast and flexible services
Scaling to match varying workloads
Service delivery orchestration
Outcomes Enabled
Cloud Technology
Container
Orchestration
OS
Storage
Network
Hardware
34
Automation
35
Automation
• Low-wage earners will be among the first to see their jobs
disappear, since many of their tasks are routine-based.
• Highly creative or technical positions are most likely to prevail,
along with personal care and domestic service jobs that
require interpersonal skills and emotional intelligence.
• Degrees appear to only be a partial shield against robots.
• Virtually ALL JOBS are going to begin to experience some
pressure from automation.
36
37
What tasks can be automated?
I’m asking you….
38
Software Development
39
The big takeaways for tech leaders:
Python, Ruby, and JavaScript are the most popular programming languages among software engineers.
Engineers who can code in Rust, Go, and Lua can be among the most technically proficient.
— Triplebyte, 2018
Software Development: Beyond “Shifting Left”
Source: Jeff Williams, Contrast Security
Five steps that greatly help:
Make developers responsible for testing
Code review quality checks
Teach testers to code
Use the same tools
Start with testability in mind
The first way of security: Establish security
work flow
41
Source: Jeff Williams, Contrast Security
The second way of security: Ensure instant
security feedback
42
Source: Jeff Williams, Contrast Security
The third way of security:
Build a Security Culture
• Many organizations struggle with a security culture centered on
blame, hiding, and uninformed strategy
• Key to DevSecOps culture
• Ensure that responsibility for security falls squarely on development teams
• Security experts should transform themselves into coaches and toolsmiths
• Focus for security is on teaching and automating as much as possible
• In DevSecOps, organizations strive to practice “security in sunshine”
and celebrate both vulnerabilities and attacks as a sign of good
security process and an opportunity to improve
• We are still in the early days of DevSecOps
43
Source: Jeff Williams, Contrast Security
Data Science and Machine Learning
A place to start: TOOLS for non-programmers
* Programming is an integral part of data science
44
Artificial Intelligence (AI) –
Deep Learning and its applications
• Trend Prediction
• Recognition
• New Knowledge
• Making Sense
• Replace Human
• Information retrieval (search engines)
• Pattern recognition
• Audience targeting
• Sentiment analysis (based on written
text)
• Personalization
• Automation
• Natural Language Processing
• Social media mining
• Organic search and content performance
• Brand and product differentiation
• Language Translation
• Speech Recognition
• Generating Handwriting
• Face Recognition
• Autonomous Driving
• Imitating Famous Painters
• Generating Music
• Generating Photos
*Not to be confused with AGI and ASI
45
AI
46
Source: Kate Crawford and Vladan Joler
47
Source: Kate Crawford and Vladan Joler
48
Source: Kate Crawford and Vladan Joler
49
AWS uses automated reasoning to achieve
security at scale
• Zelkova uses automated reasoning to analyze policies and the future consequences of
policies
• Tools include automated reasoners - Satisfiability Modulo Theories (SMT) solvers
• Zelkova has a deep understanding of the semantics of the IAM policy language and builds
upon a solid mathematical foundation
• S3 uses Zelkova to check each bucket policy and warns you if an unauthorized user is able
to read or write to your bucket
• AWS Config continuously audits AWS resource configurations and now includes Zelkova-
based managed rules such as s3-bucket-public-read-prohibited, s3-bucket-public-write-
prohibited, s3-bucket-server-side-encryption-enabled, s3-bucket-ssl-requests-only,
and lambda-function-public-access-prohibited
• AWS Trusted Advisor helps improve the security of your AWS environment, including
analyzing resource policies
• Amazon Macie uses machine learning to automatically discover, classify, and protect
sensitive data in AWS. It uses Zelkova to determine the accessibility of S3 buckets
• Amazon GuardDuty is a managed threat detection service that uses Zelkova
50
Mathematics for AI: Essential Math Topics
Essential lists of math topics for Machine Learning and Deep Learning:
• Linear Algebra
• Calculus
• Probability
• Optimization
https://towardsdatascience.com/mathematics-for-ai-all-the-essential-math-topics-you-need-ed1d9c910baf
https://www.quora.com/What-math-is-needed-for-artificial-intelligence-machine-learning-research-Is-it-
necessary-to-learn-everything-or-can-you-learn-just-the-specifics-such-as-matrix-multiplication
Example Cyber Activity Modeling:
Satisfiability Modulo Theories (SMT)
Semantic-Based Reasoning to Provide Meaningful Context in Human
Activity Recognizing 51
“Going forward, it will be important to
reinforce data gathering efforts in order
to more closely track the distributional
impacts of the current transformations.
This will make it possible to shape the
digital economy in a way that delivers
broadbased gains.”
Silja Baller, World Economic Forum
4IR Privacy
Considerations:
Data Gathering
and Aggregation
52
Collaboration for impact
4IR has lots of opportunities for innovation.
Innovation Opportunities
You need to have the digital skills (e-skills) to
make use of those opportunities.
You can be part of securing our future.
Source: Mymoena Ismail, NEMISA
53
54
It is not necessary to change.
Survival is not mandatory.
~W. Edwards Deming
55
Phil Agcaoili
Distinguished Fellow and Fellows Chairman, Ponemon Institute
Steering Committee, Financial Services –
Information Sharing & Analysis Center (FS-ISAC)
Payments Processing Information Sharing Council (PPISC)
Contributor, NIST Cybersecurity Framework
Co-Founder & Board Member, Southern CISO Security Council
Founding Member, Cloud Security Alliance (CSA)
Inventor & Co-Author
CSA Cloud Controls Matrix (ISO 27017/27018)
Security, Trust and Assurance Registry (STAR), and
CSA Open Certification Framework (OCF) – AICPA SOC 2
@hacksec
https://www.linkedin.com/in/philA
Thanks
56

More Related Content

What's hot

Industrial revolution 4.0
Industrial revolution 4.0 Industrial revolution 4.0
Industrial revolution 4.0
Aditya Randika
 
Industry 4.0 and sustainable energy
Industry 4.0 and sustainable energyIndustry 4.0 and sustainable energy
Industry 4.0 and sustainable energy
Bayu imadul Bilad
 
Work 4.0 _ The Industry 4.0 Digital Transformation
Work 4.0 _  The Industry 4.0 Digital TransformationWork 4.0 _  The Industry 4.0 Digital Transformation
Work 4.0 _ The Industry 4.0 Digital Transformation
Wg Cdr Jayesh C S PAI
 
4.0 Industry - What everyone must know about it!
4.0 Industry - What everyone must know about it!4.0 Industry - What everyone must know about it!
4.0 Industry - What everyone must know about it!
Roberto de Paula Lico Junior
 
Industry 4.0
Industry 4.0Industry 4.0
Industry 4.0
MdImran131
 
Industry 4.0
Industry 4.0Industry 4.0
Industry 4.0
aiginYarjoo
 
Industry 4.0 vcj
Industry 4.0 vcjIndustry 4.0 vcj
Industry 4.0 vcj
vivek joshi
 
CIM history and 4IR
CIM history and 4IRCIM history and 4IR
Making the next production revolution inclusive open and secure
Making the next production revolution inclusive open and secureMaking the next production revolution inclusive open and secure
Making the next production revolution inclusive open and secure
innovationoecd
 
Health 4.0
Health 4.0Health 4.0
Health 4.0
Napier University
 
101 Use Cases for IoT
101 Use Cases for IoT101 Use Cases for IoT
101 Use Cases for IoT
Cisco Canada
 
Third Industrial Revolution
Third Industrial RevolutionThird Industrial Revolution
Third Industrial Revolution
Robin Teigland
 
Industry 4.0
Industry 4.0Industry 4.0
Industry 4.0
Jagadish Patra
 
Industry 4.0 | Daxue Consulting
Industry 4.0 | Daxue ConsultingIndustry 4.0 | Daxue Consulting
Industry 4.0 | Daxue Consulting
Daxue Consulting
 
Industry 4.0 Changes Everything
Industry 4.0 Changes Everything Industry 4.0 Changes Everything
Industry 4.0 Changes Everything
Imaginet
 
Industry 4.0 @ Jyothi Nivas
Industry 4.0 @ Jyothi NivasIndustry 4.0 @ Jyothi Nivas
Industry 4.0 @ Jyothi Nivas
Aman Jain
 
Blockchain In Industry 4.0
Blockchain In Industry 4.0Blockchain In Industry 4.0
Blockchain In Industry 4.0
Stacey Roberts
 
Advanced manufacturing syposium 2016 siaa colin koh
Advanced manufacturing syposium 2016 siaa colin kohAdvanced manufacturing syposium 2016 siaa colin koh
Advanced manufacturing syposium 2016 siaa colin koh
Colin Koh (許国仁)
 
Understanding industry 4.0 and digital trends driving industry 4.0 revolution
Understanding industry 4.0 and digital trends driving industry 4.0 revolutionUnderstanding industry 4.0 and digital trends driving industry 4.0 revolution
Understanding industry 4.0 and digital trends driving industry 4.0 revolution
Black Turtle Diginovation Pvt Ltd
 
Future of Higher Education June 2019
Future of Higher Education June 2019Future of Higher Education June 2019
Future of Higher Education June 2019
Robin Teigland
 

What's hot (20)

Industrial revolution 4.0
Industrial revolution 4.0 Industrial revolution 4.0
Industrial revolution 4.0
 
Industry 4.0 and sustainable energy
Industry 4.0 and sustainable energyIndustry 4.0 and sustainable energy
Industry 4.0 and sustainable energy
 
Work 4.0 _ The Industry 4.0 Digital Transformation
Work 4.0 _  The Industry 4.0 Digital TransformationWork 4.0 _  The Industry 4.0 Digital Transformation
Work 4.0 _ The Industry 4.0 Digital Transformation
 
4.0 Industry - What everyone must know about it!
4.0 Industry - What everyone must know about it!4.0 Industry - What everyone must know about it!
4.0 Industry - What everyone must know about it!
 
Industry 4.0
Industry 4.0Industry 4.0
Industry 4.0
 
Industry 4.0
Industry 4.0Industry 4.0
Industry 4.0
 
Industry 4.0 vcj
Industry 4.0 vcjIndustry 4.0 vcj
Industry 4.0 vcj
 
CIM history and 4IR
CIM history and 4IRCIM history and 4IR
CIM history and 4IR
 
Making the next production revolution inclusive open and secure
Making the next production revolution inclusive open and secureMaking the next production revolution inclusive open and secure
Making the next production revolution inclusive open and secure
 
Health 4.0
Health 4.0Health 4.0
Health 4.0
 
101 Use Cases for IoT
101 Use Cases for IoT101 Use Cases for IoT
101 Use Cases for IoT
 
Third Industrial Revolution
Third Industrial RevolutionThird Industrial Revolution
Third Industrial Revolution
 
Industry 4.0
Industry 4.0Industry 4.0
Industry 4.0
 
Industry 4.0 | Daxue Consulting
Industry 4.0 | Daxue ConsultingIndustry 4.0 | Daxue Consulting
Industry 4.0 | Daxue Consulting
 
Industry 4.0 Changes Everything
Industry 4.0 Changes Everything Industry 4.0 Changes Everything
Industry 4.0 Changes Everything
 
Industry 4.0 @ Jyothi Nivas
Industry 4.0 @ Jyothi NivasIndustry 4.0 @ Jyothi Nivas
Industry 4.0 @ Jyothi Nivas
 
Blockchain In Industry 4.0
Blockchain In Industry 4.0Blockchain In Industry 4.0
Blockchain In Industry 4.0
 
Advanced manufacturing syposium 2016 siaa colin koh
Advanced manufacturing syposium 2016 siaa colin kohAdvanced manufacturing syposium 2016 siaa colin koh
Advanced manufacturing syposium 2016 siaa colin koh
 
Understanding industry 4.0 and digital trends driving industry 4.0 revolution
Understanding industry 4.0 and digital trends driving industry 4.0 revolutionUnderstanding industry 4.0 and digital trends driving industry 4.0 revolution
Understanding industry 4.0 and digital trends driving industry 4.0 revolution
 
Future of Higher Education June 2019
Future of Higher Education June 2019Future of Higher Education June 2019
Future of Higher Education June 2019
 

Similar to 4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine

Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Rahul Neel Mani
 
Ms think-tank-coffee-table-book
Ms think-tank-coffee-table-bookMs think-tank-coffee-table-book
Ms think-tank-coffee-table-book
Microsoft India
 
RobinTeigland_CHAIR Mar 2019.pptx
RobinTeigland_CHAIR Mar 2019.pptxRobinTeigland_CHAIR Mar 2019.pptx
RobinTeigland_CHAIR Mar 2019.pptx
ssuserbd24b8
 
Into the Future with Artificial Intelligence: Opportunities and Challenges
Into the Future with Artificial Intelligence: Opportunities and ChallengesInto the Future with Artificial Intelligence: Opportunities and Challenges
Into the Future with Artificial Intelligence: Opportunities and Challenges
Robin Teigland
 
Staying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMStaying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBM
Rick Bouter
 
APD Presents Best of the Next
APD Presents Best of the Next APD Presents Best of the Next
APD Presents Best of the Next
dgmAustralia
 
What's on the Technology Horizon for 2023
What's on the Technology Horizon for 2023 What's on the Technology Horizon for 2023
What's on the Technology Horizon for 2023
Brian Pichman
 
which technology is in demand 2023 pdf.pdf
which technology is in demand 2023 pdf.pdfwhich technology is in demand 2023 pdf.pdf
which technology is in demand 2023 pdf.pdf
Hi-Tech Institute
 
Corum group: Paris Presentation
Corum group: Paris PresentationCorum group: Paris Presentation
Corum group: Paris Presentation
Youssef Rahoui
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
Matthew Rosenquist
 
European Service Innovation Centre conference 2014-09-09 Helsinki - approach ...
European Service Innovation Centre conference 2014-09-09 Helsinki - approach ...European Service Innovation Centre conference 2014-09-09 Helsinki - approach ...
European Service Innovation Centre conference 2014-09-09 Helsinki - approach ...
Juha Hulkkonen
 
Technology tech trends 2022 and beyond
Technology tech trends 2022 and beyond Technology tech trends 2022 and beyond
Technology tech trends 2022 and beyond
Brian Pichman
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter Workplace
Chris Pepin
 
Leading in a digital world for MIT Research School Comfer
Leading in a digital world for MIT Research School ComferLeading in a digital world for MIT Research School Comfer
Leading in a digital world for MIT Research School Comfer
Robin Teigland
 
Consumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps controlConsumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps control
AIIM International
 
The 10 best performing cloud solution providers 2018
The 10 best performing cloud solution providers 2018The 10 best performing cloud solution providers 2018
The 10 best performing cloud solution providers 2018
Insights success media and technology pvt ltd
 
Level Up Your Skills to Lead IT Projects Successfully
Level Up Your Skills to Lead IT Projects SuccessfullyLevel Up Your Skills to Lead IT Projects Successfully
Level Up Your Skills to Lead IT Projects Successfully
Kaali Dass PMP, PhD.
 
Top Strategic Technology Trends for 2022.docx
Top Strategic Technology Trends for 2022.docxTop Strategic Technology Trends for 2022.docx
Top Strategic Technology Trends for 2022.docx
Advance Tech
 
Meeting with an entreprenuer
Meeting with an entreprenuerMeeting with an entreprenuer
Meeting with an entreprenuer
Navaneeth Krishnan
 

Similar to 4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine (20)

Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Ms think-tank-coffee-table-book
Ms think-tank-coffee-table-bookMs think-tank-coffee-table-book
Ms think-tank-coffee-table-book
 
RobinTeigland_CHAIR Mar 2019.pptx
RobinTeigland_CHAIR Mar 2019.pptxRobinTeigland_CHAIR Mar 2019.pptx
RobinTeigland_CHAIR Mar 2019.pptx
 
Into the Future with Artificial Intelligence: Opportunities and Challenges
Into the Future with Artificial Intelligence: Opportunities and ChallengesInto the Future with Artificial Intelligence: Opportunities and Challenges
Into the Future with Artificial Intelligence: Opportunities and Challenges
 
Staying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMStaying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBM
 
APD Presents Best of the Next
APD Presents Best of the Next APD Presents Best of the Next
APD Presents Best of the Next
 
What's on the Technology Horizon for 2023
What's on the Technology Horizon for 2023 What's on the Technology Horizon for 2023
What's on the Technology Horizon for 2023
 
which technology is in demand 2023 pdf.pdf
which technology is in demand 2023 pdf.pdfwhich technology is in demand 2023 pdf.pdf
which technology is in demand 2023 pdf.pdf
 
Corum group: Paris Presentation
Corum group: Paris PresentationCorum group: Paris Presentation
Corum group: Paris Presentation
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
European Service Innovation Centre conference 2014-09-09 Helsinki - approach ...
European Service Innovation Centre conference 2014-09-09 Helsinki - approach ...European Service Innovation Centre conference 2014-09-09 Helsinki - approach ...
European Service Innovation Centre conference 2014-09-09 Helsinki - approach ...
 
Technology tech trends 2022 and beyond
Technology tech trends 2022 and beyond Technology tech trends 2022 and beyond
Technology tech trends 2022 and beyond
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter Workplace
 
Leading in a digital world for MIT Research School Comfer
Leading in a digital world for MIT Research School ComferLeading in a digital world for MIT Research School Comfer
Leading in a digital world for MIT Research School Comfer
 
Consumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps controlConsumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps control
 
The 10 best performing cloud solution providers 2018
The 10 best performing cloud solution providers 2018The 10 best performing cloud solution providers 2018
The 10 best performing cloud solution providers 2018
 
Level Up Your Skills to Lead IT Projects Successfully
Level Up Your Skills to Lead IT Projects SuccessfullyLevel Up Your Skills to Lead IT Projects Successfully
Level Up Your Skills to Lead IT Projects Successfully
 
Top Strategic Technology Trends for 2022.docx
Top Strategic Technology Trends for 2022.docxTop Strategic Technology Trends for 2022.docx
Top Strategic Technology Trends for 2022.docx
 
Meeting with an entreprenuer
Meeting with an entreprenuerMeeting with an entreprenuer
Meeting with an entreprenuer
 

More from Phil Agcaoili

2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA
Phil Agcaoili
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
Phil Agcaoili
 
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Phil Agcaoili
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber SecurityPhil Agcaoili
 
OWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter MeetingOWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter Meeting
Phil Agcaoili
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Phil Agcaoili
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Phil Agcaoili
 
Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say? Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say?
Phil Agcaoili
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
Phil Agcaoili
 
2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?
Phil Agcaoili
 
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
Phil Agcaoili
 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Phil Agcaoili
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber Security
Phil Agcaoili
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13Phil Agcaoili
 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber Security
Phil Agcaoili
 
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsCSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
Phil Agcaoili
 
Moneysec - Moneyball for Security
Moneysec - Moneyball for SecurityMoneysec - Moneyball for Security
Moneysec - Moneyball for Security
Phil Agcaoili
 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 February
Phil Agcaoili
 
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Phil Agcaoili
 
2013 Democratization Of Technology How Cloud And Consumerization Change Eve...
2013 Democratization Of Technology   How Cloud And Consumerization Change Eve...2013 Democratization Of Technology   How Cloud And Consumerization Change Eve...
2013 Democratization Of Technology How Cloud And Consumerization Change Eve...
Phil Agcaoili
 

More from Phil Agcaoili (20)

2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
 
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
 
OWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter MeetingOWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter Meeting
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6
 
Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say? Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say?
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
 
2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?
 
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber Security
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13
 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber Security
 
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsCSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
 
Moneysec - Moneyball for Security
Moneysec - Moneyball for SecurityMoneysec - Moneyball for Security
Moneysec - Moneyball for Security
 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 February
 
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
 
2013 Democratization Of Technology How Cloud And Consumerization Change Eve...
2013 Democratization Of Technology   How Cloud And Consumerization Change Eve...2013 Democratization Of Technology   How Cloud And Consumerization Change Eve...
2013 Democratization Of Technology How Cloud And Consumerization Change Eve...
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 

4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine

  • 1. 4IR Cyber Canaries Get Out of the Mine philAgcaoili, CISM, CISSP, CRISC SVP, U.S. Bank SVP, Product & Security Innovation, ElavonApril 25, 2019
  • 2. Never mind the gas, it was automation that got the canaries in the end. 2
  • 4. 4
  • 5. 5
  • 6. What is an Industrial Revolution? When there are major changes in... Industry It’s usually new ways of thinking and doing and new technologies that cause the change to happen. TransportationEconomy Society (social structure) The way we work, buy and sell things The way we travel The way we live Source: Mymoena Ismail, NEMISA 6
  • 7. Number of Industrial Revolutions so far? 3 And we are now starting number 4. It is changing... 4th Industrial Revolution The way we work, buy and sell things The way we travel The way we live Source: Mymoena Ismail, NEMISA 7
  • 8. HEADING: 2030 COVFEFE 8 Source: Mymoena Ismail, NEMISA
  • 9. 9
  • 10. HEADING: 2030 COVFEFE 10 Source: Mymoena Ismail, NEMISA
  • 11. HEADING: 2030 COVFEFE 11 Source: Mymoena Ismail, NEMISA
  • 12. HEADING: 2030 COVFEFE Source: Mymoena Ismail, NEMISA Mobile 5G / Cloud Automation / AI Advanced Robotics IOT / Smart Factories 3D Printing Energy Storage 12
  • 13. What is Driving the 4th Industrial Revolution? The fourth industrial revolution is the current and developing environment in which disruptive technologies and trends are changing the way we live and work. The factors include: • The Internet of Things (IoT), • Automation of Knowledge Work, • Cloud Technology, • 3D Printing, • Advanced Robotics, • Virtual Reality (VR), • Next-Generation Genomics, • Mobile Internet (5G networks), • Energy Storage, and • Artificial Intelligence (AI) 13
  • 15. 4th Industrial Revolution This affects social & economic sectors Physical Digital Biological What’s happening? Different technologies are coming together (convergence) This is bringing different areas together The way we work, buy and sell things The way we travel The way we live Source: Mymoena Ismail, NEMISA 15
  • 16. What is Already Happening? Buying goods online Paying bills online Learning online – education Listening to steaming music Watching a streaming film Playing an online game Source: Mymoena Ismail, NEMISA 16Robotic surgery
  • 17. What is Already Happening? Different technologies coming together and bringing different areas together New products & services with increased efficiency (working better and faster) for a better life Order a taxi / ride share (Lyft) Book accommodation 17
  • 18. What is Being Developed or New on the Market? 2017 PSB 5G Report 87% of respondents anticipate the emergence of new industries. 91% expect the invention of new products as well as services, not in existence as of yet. 85% expect the 5G connection to increase global competition among companies. 82% expect the growth of small businesses and stiffer global competition. 89% of the people surveyed expect greater productivity. 18
  • 19. What is Being Developed or New on the Market? Robotics Drones Artificial intelligence Self driving cars Virtual reality 3D printing Internet of Things (IoT) Bioengineering Metadata & analytics Digital currencies and blockchain Quantum computing Source: Mymoena Ismail, NEMISA 19
  • 20. 20
  • 21. 4IR is… • Entrepreneurial • Innovative • Disruptive • Evolving at an exponential rather than a linear pace 21
  • 22. 4IR Pluses and Minuses Connection Efficiency Inability to change Improve lives People not ready and skilled Not able to capture benefits New opportunities Inequality may grow See there are advantages and risks Source: Mymoena Ismail, NEMISA 22
  • 23. ALL industries and companies are being impacted by this DISRUPTION 23
  • 24. 4IR is Disruptive and Affects Everything Focus on developing skills We have to consider: Based on partnerships across all stakeholders. Source: Mymoena Ismail, NEMISA 24
  • 25. Influence curriculum Critical thinking Communication Collaboration and teamwork Complex problem solving Creativity Emotional intelligence Global awareness Financial, economic, business and entrepreneurial literacy Civic literacy Health literacy Environmental literacy Computational thinking Judgement and decision making Service orientation Negotiating Cognitive flexibility Influence approaches to teaching & learning New skills and competencies required Critical skills needed Source: Mymoena Ismail, NEMISA 25
  • 26. Understanding the systemUnderstanding the system For over a decade, we have been talking about the opportunities technology gives us... A number of things were not known at the time More importantly the societal aspect was largely missed Today addressing youth unemployment & harnessing human innovation forms part of the whole to unlock effective citizen service delivery, enhance customer experience and bring about innovative solutions for a better life for all 4 4 4 4 Source: Mymoena Ismail, NEMISA 26
  • 27. The time is now to support skills development. 27
  • 28. Some threats and opportunities… Some Threats and Opportunities… Increase of mobile and internet use comes with own threats  Cybersecurity becomes a massive global problem. We need the e-skills to combat this. Also fundamental to successful digital transformation. Source: Mymoena Ismail, NEMISA 28
  • 31. Cybersecurity Topics to Study Now!!! …Actually 5 years ago • Focus on getting hands on skills and experience with the 4IR factors • Cybersecurity Specialization Areas: • Cloud (AWS, Azure, GCP, etc.) • Software Development • Agile and DevOps • ICT, IOT, and Smart Technology (consumer and industrial) • Blockchain • Automation, Data Sciences, Machine Learning, and AI • Learning to identify Risks and Cyber Consequences of 4IR • New Vulnerabilities through the 4IR Cybersecurity Supply Chain 31
  • 32. Refresher: 4IR Factors for Further Cybersecurity Study • The Internet of Things (IoT), • Automation of Knowledge Work, • Cloud Technology, • 3D Printing, • Advanced Robotics, • Virtual Reality (VR), • Next-Generation Genomics, • Mobile Internet (5G networks), • Energy Storage, and • Artificial Intelligence (AI) 32
  • 33. Transitioning from Traditional IT to the Future of IT Enabling capabilities in an agile, rapid, self-service fashion that empowers technology organization to focus on delivering business capabilities faster Changing the OrganizationTraditional IT Future of IT As a Service Provider As a Strategic Differentiator IT Service Operations Manual Processes Self-service Portals Pay-per- Use Approval based Functional Silos SLA-driven Automated Processes Integrated IT Ops Team Application Development Focused on Technology Delivery Waterfall Development Focused on Business Capability Delivery Conventional Delivery Agile Development Continuous Delivery Infrastructure Management Multiple Physical Data Centers Scalable and Flexible Capacity Hybrid Cloud Capabilities Legacy, On-Premise Infrastructure Long Provisioning Lead Times Fixed Data Center Capacity Software-Defined Data Centers Rapid, Automated Provisioning Improved time-to-market Anticipate business needs Greater IT financial transparency Increased developer productivity Attract top technology talent Lead through innovation Provide fast and flexible services Scaling to match varying workloads Service delivery orchestration Outcomes Enabled
  • 36. Automation • Low-wage earners will be among the first to see their jobs disappear, since many of their tasks are routine-based. • Highly creative or technical positions are most likely to prevail, along with personal care and domestic service jobs that require interpersonal skills and emotional intelligence. • Degrees appear to only be a partial shield against robots. • Virtually ALL JOBS are going to begin to experience some pressure from automation. 36
  • 37. 37
  • 38. What tasks can be automated? I’m asking you…. 38
  • 39. Software Development 39 The big takeaways for tech leaders: Python, Ruby, and JavaScript are the most popular programming languages among software engineers. Engineers who can code in Rust, Go, and Lua can be among the most technically proficient. — Triplebyte, 2018
  • 40. Software Development: Beyond “Shifting Left” Source: Jeff Williams, Contrast Security Five steps that greatly help: Make developers responsible for testing Code review quality checks Teach testers to code Use the same tools Start with testability in mind
  • 41. The first way of security: Establish security work flow 41 Source: Jeff Williams, Contrast Security
  • 42. The second way of security: Ensure instant security feedback 42 Source: Jeff Williams, Contrast Security
  • 43. The third way of security: Build a Security Culture • Many organizations struggle with a security culture centered on blame, hiding, and uninformed strategy • Key to DevSecOps culture • Ensure that responsibility for security falls squarely on development teams • Security experts should transform themselves into coaches and toolsmiths • Focus for security is on teaching and automating as much as possible • In DevSecOps, organizations strive to practice “security in sunshine” and celebrate both vulnerabilities and attacks as a sign of good security process and an opportunity to improve • We are still in the early days of DevSecOps 43 Source: Jeff Williams, Contrast Security
  • 44. Data Science and Machine Learning A place to start: TOOLS for non-programmers * Programming is an integral part of data science 44
  • 45. Artificial Intelligence (AI) – Deep Learning and its applications • Trend Prediction • Recognition • New Knowledge • Making Sense • Replace Human • Information retrieval (search engines) • Pattern recognition • Audience targeting • Sentiment analysis (based on written text) • Personalization • Automation • Natural Language Processing • Social media mining • Organic search and content performance • Brand and product differentiation • Language Translation • Speech Recognition • Generating Handwriting • Face Recognition • Autonomous Driving • Imitating Famous Painters • Generating Music • Generating Photos *Not to be confused with AGI and ASI 45
  • 46. AI 46
  • 47. Source: Kate Crawford and Vladan Joler 47
  • 48. Source: Kate Crawford and Vladan Joler 48
  • 49. Source: Kate Crawford and Vladan Joler 49
  • 50. AWS uses automated reasoning to achieve security at scale • Zelkova uses automated reasoning to analyze policies and the future consequences of policies • Tools include automated reasoners - Satisfiability Modulo Theories (SMT) solvers • Zelkova has a deep understanding of the semantics of the IAM policy language and builds upon a solid mathematical foundation • S3 uses Zelkova to check each bucket policy and warns you if an unauthorized user is able to read or write to your bucket • AWS Config continuously audits AWS resource configurations and now includes Zelkova- based managed rules such as s3-bucket-public-read-prohibited, s3-bucket-public-write- prohibited, s3-bucket-server-side-encryption-enabled, s3-bucket-ssl-requests-only, and lambda-function-public-access-prohibited • AWS Trusted Advisor helps improve the security of your AWS environment, including analyzing resource policies • Amazon Macie uses machine learning to automatically discover, classify, and protect sensitive data in AWS. It uses Zelkova to determine the accessibility of S3 buckets • Amazon GuardDuty is a managed threat detection service that uses Zelkova 50
  • 51. Mathematics for AI: Essential Math Topics Essential lists of math topics for Machine Learning and Deep Learning: • Linear Algebra • Calculus • Probability • Optimization https://towardsdatascience.com/mathematics-for-ai-all-the-essential-math-topics-you-need-ed1d9c910baf https://www.quora.com/What-math-is-needed-for-artificial-intelligence-machine-learning-research-Is-it- necessary-to-learn-everything-or-can-you-learn-just-the-specifics-such-as-matrix-multiplication Example Cyber Activity Modeling: Satisfiability Modulo Theories (SMT) Semantic-Based Reasoning to Provide Meaningful Context in Human Activity Recognizing 51
  • 52. “Going forward, it will be important to reinforce data gathering efforts in order to more closely track the distributional impacts of the current transformations. This will make it possible to shape the digital economy in a way that delivers broadbased gains.” Silja Baller, World Economic Forum 4IR Privacy Considerations: Data Gathering and Aggregation 52
  • 53. Collaboration for impact 4IR has lots of opportunities for innovation. Innovation Opportunities You need to have the digital skills (e-skills) to make use of those opportunities. You can be part of securing our future. Source: Mymoena Ismail, NEMISA 53
  • 54. 54
  • 55. It is not necessary to change. Survival is not mandatory. ~W. Edwards Deming 55
  • 56. Phil Agcaoili Distinguished Fellow and Fellows Chairman, Ponemon Institute Steering Committee, Financial Services – Information Sharing & Analysis Center (FS-ISAC) Payments Processing Information Sharing Council (PPISC) Contributor, NIST Cybersecurity Framework Co-Founder & Board Member, Southern CISO Security Council Founding Member, Cloud Security Alliance (CSA) Inventor & Co-Author CSA Cloud Controls Matrix (ISO 27017/27018) Security, Trust and Assurance Registry (STAR), and CSA Open Certification Framework (OCF) – AICPA SOC 2 @hacksec https://www.linkedin.com/in/philA Thanks 56

Editor's Notes

  1. FutureCon Message about the future and the basic elements that are already here
  2. Enaex RoboMiner
  3. 1993 – Everyone should include computers (and Internet) in their work and daily life Different – Modems, Internet, slow, apps not smart, nothing inter-connected, computing slow, Windows 95/NT
  4. Electrification / sustainable energy batteries Cars Flying cars AI, ML, Data Sciences, Automation
  5. Change: Waterholes Rest stops Gas stations Charging stops How does this work/compete with Ride Sharing services? Insurance Car ownership Charging at home that’s smart and energy-efficient with solar Cyber consequences of: Always-connected GPS-integrated Summon Autonomous cars, trucks, vans, and buses
  6. https://ripple.com/insights/welcome-to-the-fourth-industrial-revolution/ Cyber-physical production systems (CPPS) is catch-all term for talking about the integration of smart, internet-connected machines and human labor. Factory managers are not simply reimagining the assembly line, but actively creating a network of machines that not only can produce more with fewer errors, but can autonomously alter their production patterns in accordance with external inputs while still retaining a high degree of efficiency.
  7. 5G can provide hundredfold increases in traffic capacity and network efficiency over 4G It has the transformative potential on the future of connectivity worldwide 1 ­– 10 gigabit per second connections made to endpoints located in the field. 1000x (one-thousand fold) bandwidth for a unit area. 1ms (millisecond) end-to-end round-trip delay. 10 – 100x number of devices with connection. Network coverage of 100%. Availability of 99.999%. 90% decrease in energy usage by network. As much as 10-year battery life for low power devices.
  8. Google Wing Google Hyundai VW Amazon Uber
  9. The spectacular growth of IoT, Data Sciences, Machine Learning, Deep Learning,, and AI Deep learning is a version of machine learning that uses artificial intelligence principles, such as pattern recognition or the automation of decision science to deliver actions such as driverless car driving IoT is about sensor data collected from various devices via an HTTP protocol, to be analyzed to automate various processes (warming up your home, turning the lights on and off) and generate alerts as needed  (when an oil well is about to experience big problems)
  10. Overall, the researchers found one-quarter of jobs in the U.S. are at "high-risk" of automation since 70 percent or more of their tasks could be done by machines. Another 36 percent of jobs are at "medium-risk" as a machine could do between 30 and 70 percent of their tasks. Some 40 percent of jobs are at "low-risk", with less than 30 percent of their tasks able to be performed by a robot.
  11. Recruitment will be impacted (office administration) - Algorithms are scanning resumes for desired keywords, and chat boxes arranged interviews with candidates
  12. The basic cycle of DevSecOps is to identify the most critical security challenge, implement a defense strategy, automate security testing for that defense, and then monitor and defend against attacks. Both our security pipeline and the security of our software gets stronger and stronger over time.
  13. The feedback loop shows instant feedback of both vulnerabilities and attacks to the teams that need them through the tools they are already using. A DevSecOps pipeline is the set of tools and processes that continuously performs security work as code is written, integrated, tested, deployed, and operated. Organizations should automate security as much as possible, and provide instant feedback to the team members that need it through the tools that they are already using. Security feedback must be designed for consumption by developers, testers, and executives that do not have extensive security expertise.
  14. Paxata is one of the few organizations which focus on data cleaning and preparation, and not the machine learning or statistical modeling part. It is a Microsoft Excel-like application that is easy to use.  Auto-WEKA is an open-source data mining software that’s an easy GUI based tool for beginners in data science. It is primarily used for educational and academic purposes for now. DataRobot is a highly automated machine learning platform MLBase is an open-source project. The core idea behind it is to provide an easy solution for applying machine learning to large scale problems. RapidMiner covers the entire life-cycle of prediction modeling, starting from data preparation to model building and finally validation and deployment. h2o.ai Driverless AI is an enterprise-class automatic machine learning platform. It’s available as a docker image Very intuitive interface trains on datasets to give excellent results on par with a good solution an experienced data scientist can come up with. Google Cloud AutoML is part of Google’s Machine Learning suite offerings that enables people with limited ML expertise to build high quality models.  Cloud AutoML Vision is built on Google’s transfer learning and neural architecture search technologies. This tool is already being used by a lot of organizations. Amazon Lex provides an easy-to-use console for building your own chatbot in a matter of minutes. Powered by the same deep learning technologies as Alexa It builds a complete Natural Language model You can build conversational interfaces in your applications or website using Lex. All you need to do is supply a few phrases and Amazon Lex does the rest! It has built-in integration with the AWS Azure ML Studio is a simple yet powerful browser based ML platform.
  15. Democratization of AI on how AI is being deployed in some instances above Cloud-based services opens up access to the large data sets and specialized infrastructure needed to support AI and extends the potential of the technology beyond early adopters
  16. The first part of Anatomy shows how an Amazon Echo collects data and feedback from human users.
  17. Shows how the AI system uses interactions with customers to get smarter
  18. internal Amazon service named Zelkova SMT solvers prove and disprove logical formulas