SlideShare a Scribd company logo
Cybersecurity	
Breaches	Explained	
Bryce	Austin	
XXXXXXXXXXX,	2018	
www.tcestrategy.com	
Twitter:	@brycea		
LinkedIn:	linkedin.com/in/bryceaustin/
2	
Prices falling for Cybercriminal Supplies
Fred Williams | November 27, 2013 | Protecting Yourself
$4
https://krebsonsecurity.com/2013/12/sources-target-investigating-data-breach/
It	was	time	to	question	
my	assumptions
Risk	Responses	
	
•  Quantify	existing	risk	and	accept	it	
•  Mitigate	existing	risk	to	an	acceptable	level	
•  Transfer	risk	to	a	3rd	party
Questions	to	ask	before	a	
cybersecurity	incident
•  Who	has	the	authority	to	declare	a	
cybersecurity	incident?	
•  How	large	a	check	can	that	person	write	to	
begin	remediation?	
•  Who	decides	if/when	to	reach	out	to	law	
enforcement	for	assistance?	
•  Who	can	speak	to	the	media	on	behalf	of	
your	company?
Nation States
Summary of Actors
Agenda driven. Sophisticated and well-funded. Least likely to perform
untargeted attacks. Highly likelihood for advanced persistent threats.
Risks include IP theft, compromised systems. Likely possesses zero-day
vulnerabilities.
Organized
Crime
Financially driven. Moderate-to-high sophistication. May possess zero-
day exploits, likely botnets. Tactics include phishing (including spear
phishing), ransomware.
Hacktivists
Agenda driven. Low-to-moderate sophistication. Reliance on botnets,
known vulnerabilities exploited in unpatched systems. Tactics include
business disruption, leaking data.
Employees
Motives and capacities vary widely. May be intentional or
unintentional. Appropriate policies and controls will limit damages.
Responses can be rapid and comprehensive.
Individual
Hackers
Ego driven. Threat profile comparable to low/moderate-capacity
Hacktivist/Organized Crime categories. Diminishing demographic.
Capability
Retail	Breaches	
What	Happened?
Methodology:		
•  Phishing	
•  Hopping	
•  Scraping	
•  Aggregating	
•  Exfiltrating
Cyber	Kill-Chain	
	
stop	any	step	=	stop	the	breach
Phishing	
Attribution:	
DJandYW.com
Hopping	
Attribution:	
Iain	A	Wanless
Scraping	
Attribution:	
Mark	Warner
Aggregating	
Attribution:	
KamiPhuc
Exfiltrating	
Attribution:	
Robert	Meeks
Target	Response	to	USA	Congress	
	
•  Network	Segmentation	
•  Whitelisting	
•  Two-Factor	Authentication	
•  Chip	and	Pin	Technology	
https://corporate.target.com/_media/TargetCorp/global/PDF/Target-SJC-032614.pdf
What	do	we	know?
Target’s	credit	card	
system	was	the	target	
	
Likely	an	Organized	Crime	attack
Yahoo!	
What	Happened?
Which	time?
“The	hackers	first	breached	
Yahoo’s	network	in	early	2014	by	
unknown	means”	
http://bgr.com/2017/03/16/yahoo-mail-hack-explained/
“US	officials	revealed	that	Russian	
spies	were	interested	in	gaining	access	
Russian	and	US	government	officials,	
Russian	journalists,	and	employees	of	
financial	businesses”	
http://bgr.com/2017/03/16/yahoo-mail-hack-explained/
What	do	we	know?
Yahoo	users	were	
the	target	
	
Likely	a	Nation	State	attack
Sony	
What	Happened?
Which	time?
November	2014	
“Guardians	of	Peace”
Sony	was	“hacked,	
doxed,	and	shut	down.”	
https://www.riskbasedsecurity.com/2014/12/a-
breakdown-and-analysis-of-the-december-2014-sony-hack/
“September	11	may	
happen	again	if	you	don’t	
comply	with	the	rules”	
https://www.riskbasedsecurity.com/2014/12/a-
breakdown-and-analysis-of-the-december-2014-sony-hack/
“sony12345”	
password	for	critical	internal	and	
forward	facing	services	
	 https://www.riskbasedsecurity.com/2014/12/a-
breakdown-and-analysis-of-the-december-2014-sony-hack/
What	do	we	know?
Sony	was	the	target	
	
•  They	were	harmed	financially	
•  They	were	publicly	humiliated	
•  They	have	yet	to	fully	recover
Equifax	
What	Happened?
Breach	timeline:		
1)  May	13:	Breach	began	
2)  July	29:	Breach	was	discovered	internally	
3)  Aug	1	&	2:	Three	execs	sell	$1.78MM	in	shares	
4)  Sept.	7th:	Breach	was	announced	to	public
Breach	timeline,	cont’d:		
5)  Sept	7th:	Website	launched	to	check	if	you	are	impacted,	
www.equifaxsecurity2017.com	
								A)	Signing	up	excluded	class	action	participation	
								B)	Site	functionality	was	an	opportunity	for	improvement
https://
krebsonsecurity.com/
2017/09/equifax-
breach-response-turns-
dumpster-fire/
Breach	timeline,	cont’d:		
5)  Sept	7th:	Website	launched	to	check	if	you	are	impacted,	
							www.equifaxsecurity2017.com	
								A)	Signing	up	excludes	class	action	participation	
								B)	Site	functionality	was	an	opportunity	for	improvement	
6)			Sept	12th:	Congress	makes	calls	for	Equifax	to	testify
Breach	timeline,	cont’d:		
7)	Sept	13th:	South	American	Equifax	site	guarded	with	
							username:	Admin,	password:	Admin	
8)	Sept	13th:	Root	Cause:	Failure	to	patch	Apache	Struts	
9)	Sept	14th:	Equifax	CIO	and	CISO	retire	
10)	Sept	20th:	Equifax	Twitter	feed	sends	people	to	fake	site	
	www.securityequifax2017.com	
11)	Sept	26th:	Equifax	CEO	retires
What	do	we	know?
American	taxpayers	
were	the	target	
	
Likely	a	Nation	State	attack
How	did	Equifax	let	
this	happen?
Shifting	gears…	
	
The	Importance	of		
	
Early	Detection
What	do	we	know?
Proactive	
detection	beats	a	
great	response,	
every	time
Bryce	Austin	
CEO,	TCE	Strategy	
	
	Twitter:	@brycea		
LinkedIn:	linkedin.com/in/bryceaustin/

More Related Content

What's hot

Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management  --  NEMAMarriage of Cyber Security with Emergency Management  --  NEMA
Marriage of Cyber Security with Emergency Management -- NEMA
David Sweigert
 
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
Dottie Schindlinger
 
Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]
Tracey Ong
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
Lumension
 
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, DohaGCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
Syed Peer
 
INCIDENT HANDLING IN ORGANISATIONS
INCIDENT HANDLING IN ORGANISATIONSINCIDENT HANDLING IN ORGANISATIONS
INCIDENT HANDLING IN ORGANISATIONS
Sylvain Martinez
 
MASC RMA Cyber presentation by Belton Zeigler
MASC RMA Cyber presentation by Belton ZeiglerMASC RMA Cyber presentation by Belton Zeigler
MASC RMA Cyber presentation by Belton Zeigler
Womble Bond Dickinson (US) LLP
 
NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency Management
David Sweigert
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
Casey Ellis
 
A Guide to Disaster Preparedness for Businesses
A Guide to Disaster Preparedness for BusinessesA Guide to Disaster Preparedness for Businesses
A Guide to Disaster Preparedness for Businesses
Advanced Imaging Solutions & Pinnacle
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
Next Dimension Inc.
 
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)
BeyondTrust
 
Cyber Resilience: A New Perspective on Security
Cyber Resilience: A New Perspective on SecurityCyber Resilience: A New Perspective on Security
Cyber Resilience: A New Perspective on Security
Ina Luft
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)
Digicomp Academy AG
 
Protecting Essential Information
Protecting Essential InformationProtecting Essential Information
Protecting Essential Information
Kim Jensen
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Pukhraj Singh
 
Global Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDosGlobal Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDos
Haltdos
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security culture
Craig McGill
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Ernst & Young
 
Cybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceCybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & Compliance
Shawn Tuma
 

What's hot (20)

Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management  --  NEMAMarriage of Cyber Security with Emergency Management  --  NEMA
Marriage of Cyber Security with Emergency Management -- NEMA
 
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
 
Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
 
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, DohaGCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
 
INCIDENT HANDLING IN ORGANISATIONS
INCIDENT HANDLING IN ORGANISATIONSINCIDENT HANDLING IN ORGANISATIONS
INCIDENT HANDLING IN ORGANISATIONS
 
MASC RMA Cyber presentation by Belton Zeigler
MASC RMA Cyber presentation by Belton ZeiglerMASC RMA Cyber presentation by Belton Zeigler
MASC RMA Cyber presentation by Belton Zeigler
 
NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency Management
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
A Guide to Disaster Preparedness for Businesses
A Guide to Disaster Preparedness for BusinessesA Guide to Disaster Preparedness for Businesses
A Guide to Disaster Preparedness for Businesses
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)
 
Cyber Resilience: A New Perspective on Security
Cyber Resilience: A New Perspective on SecurityCyber Resilience: A New Perspective on Security
Cyber Resilience: A New Perspective on Security
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)
 
Protecting Essential Information
Protecting Essential InformationProtecting Essential Information
Protecting Essential Information
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj Singh
 
Global Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDosGlobal Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDos
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security culture
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Cybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceCybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & Compliance
 

Similar to [AIIM18] When the C-Suite won't Talk About Cybersecurity: What I know about the Target and Equifax breaches - Bryce Austin

No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law Please
William McBorrough
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
BakerTillyConsulting
 
Know Your Adversary: Analyzing the Human Element in Evolving Cyber Threats
Know Your Adversary: Analyzing the Human Element in Evolving Cyber ThreatsKnow Your Adversary: Analyzing the Human Element in Evolving Cyber Threats
Know Your Adversary: Analyzing the Human Element in Evolving Cyber Threats
SurfWatch Labs
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
seadeloitte
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Jay Kesan
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
Guise Bule
 
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat LandscapeExposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
cyberprosocial
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
NishantSisodiya
 
Forrester no more chewy centers- the zero trust model
Forrester   no more chewy centers- the zero trust modelForrester   no more chewy centers- the zero trust model
Forrester no more chewy centers- the zero trust model
Cristian Garcia G.
 
Running Head CYBERSECURITY1CYBERSECURITY 15.docx
Running Head CYBERSECURITY1CYBERSECURITY 15.docxRunning Head CYBERSECURITY1CYBERSECURITY 15.docx
Running Head CYBERSECURITY1CYBERSECURITY 15.docx
todd271
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
CBIZ, Inc.
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
CMR WORLD TECH
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
galagirishp
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
EMC
 
Who is the next target and how is big data related ulf mattsson
Who is the next target and how is big data related   ulf mattssonWho is the next target and how is big data related   ulf mattsson
Who is the next target and how is big data related ulf mattssonUlf Mattsson
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Casey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
bugcrowd
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Randall Chase
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
Ethan S. Burger
 
Can We Avert A Cyber-Insurance Market Crisis?
Can We Avert A Cyber-Insurance Market Crisis?Can We Avert A Cyber-Insurance Market Crisis?
Can We Avert A Cyber-Insurance Market Crisis?
Ethan S. Burger
 

Similar to [AIIM18] When the C-Suite won't Talk About Cybersecurity: What I know about the Target and Equifax breaches - Bryce Austin (20)

No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law Please
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
 
Know Your Adversary: Analyzing the Human Element in Evolving Cyber Threats
Know Your Adversary: Analyzing the Human Element in Evolving Cyber ThreatsKnow Your Adversary: Analyzing the Human Element in Evolving Cyber Threats
Know Your Adversary: Analyzing the Human Element in Evolving Cyber Threats
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
 
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat LandscapeExposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Forrester no more chewy centers- the zero trust model
Forrester   no more chewy centers- the zero trust modelForrester   no more chewy centers- the zero trust model
Forrester no more chewy centers- the zero trust model
 
Running Head CYBERSECURITY1CYBERSECURITY 15.docx
Running Head CYBERSECURITY1CYBERSECURITY 15.docxRunning Head CYBERSECURITY1CYBERSECURITY 15.docx
Running Head CYBERSECURITY1CYBERSECURITY 15.docx
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
 
Who is the next target and how is big data related ulf mattsson
Who is the next target and how is big data related   ulf mattssonWho is the next target and how is big data related   ulf mattsson
Who is the next target and how is big data related ulf mattsson
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
 
Can We Avert A Cyber-Insurance Market Crisis?
Can We Avert A Cyber-Insurance Market Crisis?Can We Avert A Cyber-Insurance Market Crisis?
Can We Avert A Cyber-Insurance Market Crisis?
 

More from AIIM International

2022 IIM Infographic.pptx
2022 IIM Infographic.pptx2022 IIM Infographic.pptx
2022 IIM Infographic.pptx
AIIM International
 
Create, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational ValueCreate, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational Value
AIIM International
 
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
AIIM International
 
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
AIIM International
 
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
AIIM International
 
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
AIIM International
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
AIIM International
 
[Webinar Slides] New Approaches to Classification and Retention for Organizat...
[Webinar Slides] New Approaches to Classification and Retention for Organizat...[Webinar Slides] New Approaches to Classification and Retention for Organizat...
[Webinar Slides] New Approaches to Classification and Retention for Organizat...
AIIM International
 
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
AIIM International
 
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
AIIM International
 
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
AIIM International
 
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
AIIM International
 
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
AIIM International
 
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
AIIM International
 
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
AIIM International
 
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
AIIM International
 
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
AIIM International
 
[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern Solutions[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern Solutions
AIIM International
 
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
AIIM International
 
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
AIIM International
 

More from AIIM International (20)

2022 IIM Infographic.pptx
2022 IIM Infographic.pptx2022 IIM Infographic.pptx
2022 IIM Infographic.pptx
 
Create, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational ValueCreate, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational Value
 
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
 
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
 
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
 
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
 
[Webinar Slides] New Approaches to Classification and Retention for Organizat...
[Webinar Slides] New Approaches to Classification and Retention for Organizat...[Webinar Slides] New Approaches to Classification and Retention for Organizat...
[Webinar Slides] New Approaches to Classification and Retention for Organizat...
 
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
 
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
 
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
 
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
 
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
 
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
 
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
 
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
 
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
 
[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern Solutions[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern Solutions
 
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
 
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 

[AIIM18] When the C-Suite won't Talk About Cybersecurity: What I know about the Target and Equifax breaches - Bryce Austin