SlideShare a Scribd company logo
CIBERAMENAZAS :
¿ A QUÉ NOS ENFRENTAMOS ?
Antonio Sanz
Information Security Consultant
@antoniosanzalc
http://www.s2grupo.es
http://www.securityartwork.es
#si2015
http://bit.ly/1y92QXG
Dependance on IT
IT is everywhere
We are vulnerable
Attribution is complicated
International law is … flaky
Cyberwar
Cyberterrorism
Cyberespionage
Objective: critical infrastructures
Main targets: SCADA systems
Cyberarmies
StuxnetStuxnet
Georgia & Russia
Cyberwar
Cyberterrorism
Cyberespionage
Objectives: Get influence through
violent actions
Objective: Political influence
-1%
- $136.000M
Myth or reality ?
Technical (in)competence
Cyberwar
Cyberterrorism
Cyberespionage
Objectives: Trade secrets & IP
APT – Advanced Persistent Threat
RSA & Lockheed Martin
Red October - Uroboros/Snake
IceFog - Mercenaries
Hi Prism !!
Hi Chinese Great Firewall !!
What can we do
about it?
Manage
risk
Don’t be a
low hanging
fruit
Get some (advanced) help
Get threat
intelligence
Assume you’ll be compromised
Report the incident
Stand your ground
@antoniosanzalc
http://www.s2grupo.es
http://bit.ly/1y92QXG
Be careful out there

More Related Content

What's hot

Cisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallengeCisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallenge
Cristian Garcia G.
 
The Seven Axioms Of Security
The Seven Axioms Of SecurityThe Seven Axioms Of Security
The Seven Axioms Of Security
Saumil Shah
 
PPIT Lecture 17
PPIT Lecture 17PPIT Lecture 17
PPIT Lecture 17
Kashif Sohail
 
Hack.LU - The Infosec Crossroads
Hack.LU - The Infosec CrossroadsHack.LU - The Infosec Crossroads
Hack.LU - The Infosec Crossroads
Saumil Shah
 
Hacking
HackingHacking
Hacking
Nicolas Loh
 
Intelligence-Led Security: Powering the Future of Cyber Defense
Intelligence-Led Security: Powering the  Future of Cyber DefenseIntelligence-Led Security: Powering the  Future of Cyber Defense
Intelligence-Led Security: Powering the Future of Cyber Defense
Priyanka Aash
 
CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....
CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....
CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....
CSO_Presentations
 
Cross Border Cyber Attacks: Impact on Digital Sovereignty
Cross Border Cyber Attacks: Impact on Digital SovereigntyCross Border Cyber Attacks: Impact on Digital Sovereignty
Cross Border Cyber Attacks: Impact on Digital Sovereignty
Saumil Shah
 
PPIT Lecture 18
PPIT Lecture 18PPIT Lecture 18
PPIT Lecture 18
Kashif Sohail
 
PPIT Lecture 19
PPIT Lecture 19PPIT Lecture 19
PPIT Lecture 19
Kashif Sohail
 
Web hacking using Cyber range
Web hacking using Cyber rangeWeb hacking using Cyber range
Web hacking using Cyber range
Priyanka Aash
 
The Next Generation Security
The Next Generation SecurityThe Next Generation Security
The Next Generation Security
Cybera Inc.
 
Hacking Closed Networks
Hacking Closed NetworksHacking Closed Networks
Hacking Closed Networks
Priyanka Aash
 
Idc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronIdc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian Aron
Dejan Jeremic
 
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
Mikko Hypponen
 
My dog is a hacker and will steal your data!
My dog is a hacker and will steal your data!My dog is a hacker and will steal your data!
My dog is a hacker and will steal your data!
rafa_el_souza
 
2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
Sylvain Martinez
 
Analysis of cyber security and threats
Analysis of cyber security and threatsAnalysis of cyber security and threats
Analysis of cyber security and threats
Sudhanshu Maurya
 
Hack the World: IT/IOT/ICS SCADA OSINT
Hack the World: IT/IOT/ICS SCADA OSINT Hack the World: IT/IOT/ICS SCADA OSINT
Hack the World: IT/IOT/ICS SCADA OSINT
DefCamp
 

What's hot (19)

Cisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallengeCisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallenge
 
The Seven Axioms Of Security
The Seven Axioms Of SecurityThe Seven Axioms Of Security
The Seven Axioms Of Security
 
PPIT Lecture 17
PPIT Lecture 17PPIT Lecture 17
PPIT Lecture 17
 
Hack.LU - The Infosec Crossroads
Hack.LU - The Infosec CrossroadsHack.LU - The Infosec Crossroads
Hack.LU - The Infosec Crossroads
 
Hacking
HackingHacking
Hacking
 
Intelligence-Led Security: Powering the Future of Cyber Defense
Intelligence-Led Security: Powering the  Future of Cyber DefenseIntelligence-Led Security: Powering the  Future of Cyber Defense
Intelligence-Led Security: Powering the Future of Cyber Defense
 
CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....
CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....
CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....
 
Cross Border Cyber Attacks: Impact on Digital Sovereignty
Cross Border Cyber Attacks: Impact on Digital SovereigntyCross Border Cyber Attacks: Impact on Digital Sovereignty
Cross Border Cyber Attacks: Impact on Digital Sovereignty
 
PPIT Lecture 18
PPIT Lecture 18PPIT Lecture 18
PPIT Lecture 18
 
PPIT Lecture 19
PPIT Lecture 19PPIT Lecture 19
PPIT Lecture 19
 
Web hacking using Cyber range
Web hacking using Cyber rangeWeb hacking using Cyber range
Web hacking using Cyber range
 
The Next Generation Security
The Next Generation SecurityThe Next Generation Security
The Next Generation Security
 
Hacking Closed Networks
Hacking Closed NetworksHacking Closed Networks
Hacking Closed Networks
 
Idc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronIdc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian Aron
 
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
 
My dog is a hacker and will steal your data!
My dog is a hacker and will steal your data!My dog is a hacker and will steal your data!
My dog is a hacker and will steal your data!
 
2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
 
Analysis of cyber security and threats
Analysis of cyber security and threatsAnalysis of cyber security and threats
Analysis of cyber security and threats
 
Hack the World: IT/IOT/ICS SCADA OSINT
Hack the World: IT/IOT/ICS SCADA OSINT Hack the World: IT/IOT/ICS SCADA OSINT
Hack the World: IT/IOT/ICS SCADA OSINT
 

Similar to Antonio Sanz. S2Grupo. Ciberamenazas. Semanainformatica.com 2015

ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
Cyber Security Alliance
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
African Cyber Security Summit
 
Computerworld Conference (2002)
Computerworld Conference (2002)Computerworld Conference (2002)
Computerworld Conference (2002)
Skeeve Stevens
 
CSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziCSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael Narezzi
NCCOMMS
 
Cybersecurity in the gambling industry
Cybersecurity in the gambling industryCybersecurity in the gambling industry
Cybersecurity in the gambling industry
Filippo Ferri
 
Cyber Threats
Cyber ThreatsCyber Threats
Cómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo localCómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo local
Adrian Mikeliunas
 
DSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital worldDSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital world
Andris Soroka
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
joshquarrie
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defense
fantaghost
 
Achieving 360° view of security for complete situational awareness
Achieving 360° view of security for complete situational awarenessAchieving 360° view of security for complete situational awareness
Achieving 360° view of security for complete situational awareness
Happiest Minds Technologies
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
SensePost
 
network security, cryptography,steganography
network security, cryptography,steganographynetwork security, cryptography,steganography
network security, cryptography,steganography
Nikhil l
 
A Look Into Cyber Security
A Look Into Cyber SecurityA Look Into Cyber Security
A Look Into Cyber Security
GTreasury
 
Cisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptCisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.ppt
jdenbryston
 
Cybersecurity- Role of FinTech
Cybersecurity- Role of FinTech Cybersecurity- Role of FinTech
Cybersecurity- Role of FinTech
Harshit Verma
 
Integrated cyber defense
Integrated cyber defenseIntegrated cyber defense
Integrated cyber defense
kajal kumari
 
U S Embassy Event - Today’S Cyber Threats
U S  Embassy  Event - Today’S  Cyber  ThreatsU S  Embassy  Event - Today’S  Cyber  Threats
U S Embassy Event - Today’S Cyber Threats
Narinrit Prem-apiwathanokul
 
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Raffael Marty
 
Cyber intelligence for corporate security
Cyber intelligence for corporate securityCyber intelligence for corporate security
Cyber intelligence for corporate security
G3 intelligence Ltd
 

Similar to Antonio Sanz. S2Grupo. Ciberamenazas. Semanainformatica.com 2015 (20)

ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
 
Computerworld Conference (2002)
Computerworld Conference (2002)Computerworld Conference (2002)
Computerworld Conference (2002)
 
CSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziCSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael Narezzi
 
Cybersecurity in the gambling industry
Cybersecurity in the gambling industryCybersecurity in the gambling industry
Cybersecurity in the gambling industry
 
Cyber Threats
Cyber ThreatsCyber Threats
Cyber Threats
 
Cómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo localCómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo local
 
DSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital worldDSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital world
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defense
 
Achieving 360° view of security for complete situational awareness
Achieving 360° view of security for complete situational awarenessAchieving 360° view of security for complete situational awareness
Achieving 360° view of security for complete situational awareness
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
network security, cryptography,steganography
network security, cryptography,steganographynetwork security, cryptography,steganography
network security, cryptography,steganography
 
A Look Into Cyber Security
A Look Into Cyber SecurityA Look Into Cyber Security
A Look Into Cyber Security
 
Cisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptCisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.ppt
 
Cybersecurity- Role of FinTech
Cybersecurity- Role of FinTech Cybersecurity- Role of FinTech
Cybersecurity- Role of FinTech
 
Integrated cyber defense
Integrated cyber defenseIntegrated cyber defense
Integrated cyber defense
 
U S Embassy Event - Today’S Cyber Threats
U S  Embassy  Event - Today’S  Cyber  ThreatsU S  Embassy  Event - Today’S  Cyber  Threats
U S Embassy Event - Today’S Cyber Threats
 
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
 
Cyber intelligence for corporate security
Cyber intelligence for corporate securityCyber intelligence for corporate security
Cyber intelligence for corporate security
 

More from COIICV

Carlos Garcia, ICC - Fe de vida con biometria y blockchain
Carlos Garcia, ICC - Fe de vida con biometria y blockchainCarlos Garcia, ICC - Fe de vida con biometria y blockchain
Carlos Garcia, ICC - Fe de vida con biometria y blockchain
COIICV
 
Antonio Villalon, S2 Grupo - Seguridad en tiempos de pandemia
Antonio Villalon, S2 Grupo - Seguridad en tiempos de pandemiaAntonio Villalon, S2 Grupo - Seguridad en tiempos de pandemia
Antonio Villalon, S2 Grupo - Seguridad en tiempos de pandemia
COIICV
 
Rafa Vidal, Nunsys - Seguridad as a service: Como proteger el activo más crít...
Rafa Vidal, Nunsys - Seguridad as a service: Como proteger el activo más crít...Rafa Vidal, Nunsys - Seguridad as a service: Como proteger el activo más crít...
Rafa Vidal, Nunsys - Seguridad as a service: Como proteger el activo más crít...
COIICV
 
Silvia Rueda, ETSE-UV - Falta de diversidad en estudios TIC ¿Elección libre o...
Silvia Rueda, ETSE-UV - Falta de diversidad en estudios TIC ¿Elección libre o...Silvia Rueda, ETSE-UV - Falta de diversidad en estudios TIC ¿Elección libre o...
Silvia Rueda, ETSE-UV - Falta de diversidad en estudios TIC ¿Elección libre o...
COIICV
 
Sebastian Borreani, Jeff Customer Product - Creando el primer ecosistema omni...
Sebastian Borreani, Jeff Customer Product - Creando el primer ecosistema omni...Sebastian Borreani, Jeff Customer Product - Creando el primer ecosistema omni...
Sebastian Borreani, Jeff Customer Product - Creando el primer ecosistema omni...
COIICV
 
Ruben Ruiz, UPV - Mesa: El valor del CIO Público
Ruben Ruiz, UPV  - Mesa: El valor del CIO PúblicoRuben Ruiz, UPV  - Mesa: El valor del CIO Público
Ruben Ruiz, UPV - Mesa: El valor del CIO Público
COIICV
 
José Benedito, Diputación de Valencia - Proyectos SAAS en la Diputación. Expe...
José Benedito, Diputación de Valencia - Proyectos SAAS en la Diputación. Expe...José Benedito, Diputación de Valencia - Proyectos SAAS en la Diputación. Expe...
José Benedito, Diputación de Valencia - Proyectos SAAS en la Diputación. Expe...
COIICV
 
Amparo Cabo - Mesa: El valor del CIO Público
Amparo Cabo - Mesa: El valor del CIO PúblicoAmparo Cabo - Mesa: El valor del CIO Público
Amparo Cabo - Mesa: El valor del CIO Público
COIICV
 
Guillermo Cortina - Construyendo una Cultura DevOps
Guillermo Cortina - Construyendo una Cultura DevOpsGuillermo Cortina - Construyendo una Cultura DevOps
Guillermo Cortina - Construyendo una Cultura DevOps
COIICV
 
Manuel Lora - Internet of Things (IoT): el arte de conectar cualquier cosa a ...
Manuel Lora - Internet of Things (IoT): el arte de conectar cualquier cosa a ...Manuel Lora - Internet of Things (IoT): el arte de conectar cualquier cosa a ...
Manuel Lora - Internet of Things (IoT): el arte de conectar cualquier cosa a ...
COIICV
 
Francisco Torrijos - Make the switch. Activa el cambio
Francisco Torrijos - Make the switch. Activa el cambioFrancisco Torrijos - Make the switch. Activa el cambio
Francisco Torrijos - Make the switch. Activa el cambio
COIICV
 
José Manuel Ferri - DevOps la evolución de la fábrica de software
José Manuel Ferri - DevOps la evolución de la fábrica de softwareJosé Manuel Ferri - DevOps la evolución de la fábrica de software
José Manuel Ferri - DevOps la evolución de la fábrica de software
COIICV
 
Silvia Rueda - Impulsando la presencia de mujeres en titulaciones TIC
Silvia Rueda - Impulsando la presencia de mujeres en titulaciones TICSilvia Rueda - Impulsando la presencia de mujeres en titulaciones TIC
Silvia Rueda - Impulsando la presencia de mujeres en titulaciones TIC
COIICV
 
Mesa Redonda: Nuevas tendencias en ciberseguridad
Mesa Redonda: Nuevas tendencias en ciberseguridadMesa Redonda: Nuevas tendencias en ciberseguridad
Mesa Redonda: Nuevas tendencias en ciberseguridad
COIICV
 
Rubén Antón - Como ser ágil sin enterrarse en deuda técnica
Rubén Antón - Como ser ágil sin enterrarse en deuda técnicaRubén Antón - Como ser ágil sin enterrarse en deuda técnica
Rubén Antón - Como ser ágil sin enterrarse en deuda técnica
COIICV
 
Juan Carlos Egido - Estructuras de gestión de las TI en un contexto de Gobier...
Juan Carlos Egido - Estructuras de gestión de las TI en un contexto de Gobier...Juan Carlos Egido - Estructuras de gestión de las TI en un contexto de Gobier...
Juan Carlos Egido - Estructuras de gestión de las TI en un contexto de Gobier...
COIICV
 
Cayetano Sánchez - Las nuevas tecnologías en el ámbito profesional de la abog...
Cayetano Sánchez - Las nuevas tecnologías en el ámbito profesional de la abog...Cayetano Sánchez - Las nuevas tecnologías en el ámbito profesional de la abog...
Cayetano Sánchez - Las nuevas tecnologías en el ámbito profesional de la abog...
COIICV
 
Joaquín Garrido - Tecnologías emergentes aplicadas al entorno empresarial ali...
Joaquín Garrido - Tecnologías emergentes aplicadas al entorno empresarial ali...Joaquín Garrido - Tecnologías emergentes aplicadas al entorno empresarial ali...
Joaquín Garrido - Tecnologías emergentes aplicadas al entorno empresarial ali...
COIICV
 
Borja Izquierdo - Programa Horizonte 2020
Borja Izquierdo - Programa Horizonte 2020Borja Izquierdo - Programa Horizonte 2020
Borja Izquierdo - Programa Horizonte 2020
COIICV
 
Javier Mínguez - Medidas del IVACE para impulsar la I+D, la innovación y la d...
Javier Mínguez - Medidas del IVACE para impulsar la I+D, la innovación y la d...Javier Mínguez - Medidas del IVACE para impulsar la I+D, la innovación y la d...
Javier Mínguez - Medidas del IVACE para impulsar la I+D, la innovación y la d...
COIICV
 

More from COIICV (20)

Carlos Garcia, ICC - Fe de vida con biometria y blockchain
Carlos Garcia, ICC - Fe de vida con biometria y blockchainCarlos Garcia, ICC - Fe de vida con biometria y blockchain
Carlos Garcia, ICC - Fe de vida con biometria y blockchain
 
Antonio Villalon, S2 Grupo - Seguridad en tiempos de pandemia
Antonio Villalon, S2 Grupo - Seguridad en tiempos de pandemiaAntonio Villalon, S2 Grupo - Seguridad en tiempos de pandemia
Antonio Villalon, S2 Grupo - Seguridad en tiempos de pandemia
 
Rafa Vidal, Nunsys - Seguridad as a service: Como proteger el activo más crít...
Rafa Vidal, Nunsys - Seguridad as a service: Como proteger el activo más crít...Rafa Vidal, Nunsys - Seguridad as a service: Como proteger el activo más crít...
Rafa Vidal, Nunsys - Seguridad as a service: Como proteger el activo más crít...
 
Silvia Rueda, ETSE-UV - Falta de diversidad en estudios TIC ¿Elección libre o...
Silvia Rueda, ETSE-UV - Falta de diversidad en estudios TIC ¿Elección libre o...Silvia Rueda, ETSE-UV - Falta de diversidad en estudios TIC ¿Elección libre o...
Silvia Rueda, ETSE-UV - Falta de diversidad en estudios TIC ¿Elección libre o...
 
Sebastian Borreani, Jeff Customer Product - Creando el primer ecosistema omni...
Sebastian Borreani, Jeff Customer Product - Creando el primer ecosistema omni...Sebastian Borreani, Jeff Customer Product - Creando el primer ecosistema omni...
Sebastian Borreani, Jeff Customer Product - Creando el primer ecosistema omni...
 
Ruben Ruiz, UPV - Mesa: El valor del CIO Público
Ruben Ruiz, UPV  - Mesa: El valor del CIO PúblicoRuben Ruiz, UPV  - Mesa: El valor del CIO Público
Ruben Ruiz, UPV - Mesa: El valor del CIO Público
 
José Benedito, Diputación de Valencia - Proyectos SAAS en la Diputación. Expe...
José Benedito, Diputación de Valencia - Proyectos SAAS en la Diputación. Expe...José Benedito, Diputación de Valencia - Proyectos SAAS en la Diputación. Expe...
José Benedito, Diputación de Valencia - Proyectos SAAS en la Diputación. Expe...
 
Amparo Cabo - Mesa: El valor del CIO Público
Amparo Cabo - Mesa: El valor del CIO PúblicoAmparo Cabo - Mesa: El valor del CIO Público
Amparo Cabo - Mesa: El valor del CIO Público
 
Guillermo Cortina - Construyendo una Cultura DevOps
Guillermo Cortina - Construyendo una Cultura DevOpsGuillermo Cortina - Construyendo una Cultura DevOps
Guillermo Cortina - Construyendo una Cultura DevOps
 
Manuel Lora - Internet of Things (IoT): el arte de conectar cualquier cosa a ...
Manuel Lora - Internet of Things (IoT): el arte de conectar cualquier cosa a ...Manuel Lora - Internet of Things (IoT): el arte de conectar cualquier cosa a ...
Manuel Lora - Internet of Things (IoT): el arte de conectar cualquier cosa a ...
 
Francisco Torrijos - Make the switch. Activa el cambio
Francisco Torrijos - Make the switch. Activa el cambioFrancisco Torrijos - Make the switch. Activa el cambio
Francisco Torrijos - Make the switch. Activa el cambio
 
José Manuel Ferri - DevOps la evolución de la fábrica de software
José Manuel Ferri - DevOps la evolución de la fábrica de softwareJosé Manuel Ferri - DevOps la evolución de la fábrica de software
José Manuel Ferri - DevOps la evolución de la fábrica de software
 
Silvia Rueda - Impulsando la presencia de mujeres en titulaciones TIC
Silvia Rueda - Impulsando la presencia de mujeres en titulaciones TICSilvia Rueda - Impulsando la presencia de mujeres en titulaciones TIC
Silvia Rueda - Impulsando la presencia de mujeres en titulaciones TIC
 
Mesa Redonda: Nuevas tendencias en ciberseguridad
Mesa Redonda: Nuevas tendencias en ciberseguridadMesa Redonda: Nuevas tendencias en ciberseguridad
Mesa Redonda: Nuevas tendencias en ciberseguridad
 
Rubén Antón - Como ser ágil sin enterrarse en deuda técnica
Rubén Antón - Como ser ágil sin enterrarse en deuda técnicaRubén Antón - Como ser ágil sin enterrarse en deuda técnica
Rubén Antón - Como ser ágil sin enterrarse en deuda técnica
 
Juan Carlos Egido - Estructuras de gestión de las TI en un contexto de Gobier...
Juan Carlos Egido - Estructuras de gestión de las TI en un contexto de Gobier...Juan Carlos Egido - Estructuras de gestión de las TI en un contexto de Gobier...
Juan Carlos Egido - Estructuras de gestión de las TI en un contexto de Gobier...
 
Cayetano Sánchez - Las nuevas tecnologías en el ámbito profesional de la abog...
Cayetano Sánchez - Las nuevas tecnologías en el ámbito profesional de la abog...Cayetano Sánchez - Las nuevas tecnologías en el ámbito profesional de la abog...
Cayetano Sánchez - Las nuevas tecnologías en el ámbito profesional de la abog...
 
Joaquín Garrido - Tecnologías emergentes aplicadas al entorno empresarial ali...
Joaquín Garrido - Tecnologías emergentes aplicadas al entorno empresarial ali...Joaquín Garrido - Tecnologías emergentes aplicadas al entorno empresarial ali...
Joaquín Garrido - Tecnologías emergentes aplicadas al entorno empresarial ali...
 
Borja Izquierdo - Programa Horizonte 2020
Borja Izquierdo - Programa Horizonte 2020Borja Izquierdo - Programa Horizonte 2020
Borja Izquierdo - Programa Horizonte 2020
 
Javier Mínguez - Medidas del IVACE para impulsar la I+D, la innovación y la d...
Javier Mínguez - Medidas del IVACE para impulsar la I+D, la innovación y la d...Javier Mínguez - Medidas del IVACE para impulsar la I+D, la innovación y la d...
Javier Mínguez - Medidas del IVACE para impulsar la I+D, la innovación y la d...
 

Recently uploaded

Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 

Recently uploaded (20)

Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU