SlideShare a Scribd company logo
1 of 18
Download to read offline
Cyber Crime as a Startup
By Thea Sogenbits
Thea is cybercrime prevention and security by
business design consultant and researcher from
Estonia. She is doing her research at Estonian
Business School on business of cyber crime.
Thea has M.Sc. from Tallinn University in
Interaction Design and Knowledge Environments
and MBA in IT Management.
Her research focuses on business processes and
models of cyber crime as well as early discovery of
potential loopholes. Thea has worked at the IBM,
represented European YWCA in various European
institutions and is currently head of IT curriculums
at Estonian Entrepreneurship University of Applied
Sciences.
page
04
Pirate Bay
Wannacry
Innovative
Marketing
Inc.
Zeus
Scareware
Rove
Digital
CryptoLocker
CryptoWall
Cerber
Locky
Petya/Notp
etya
Silkroad
Shadow
Brokers
Cloudbleed
Mirai Anonymous
LulzSec
Ourmine
Lizard
Squad
Chaos
Computer
Club
Dream
Market
Tochka Free
Market
WallStreet
Market
BitBlender
Dutch
Market
webstressor
.org
Ovidiy
Stealer
Hackshit
Successful
startups
Most Cyber Criminal enterprises
start off as Startups
page
05
Go for Global reach
Accommodate new
business models and
revenue streams
Open to revenue
sharing
Aspire for greatness
What makes
it tick
page
06
Idea
Team
Business
model
Money &
Resources
Timing
What makes
it tick
page
07
Idea
Team
Business
model
Money &
Resources
Timing
What makes
it tick
page
08
Idea
Team
Business
model
Money &
Resources
Timing
What makes
it tick
page
09
Idea
Team
Business
model
Money &
Resources
Timing
What makes
it tick
page
010
Idea
Team
Business
model
Money &
Resources
Timing
Timing
page
011
• Market is shaken into place
• Mimicking top hit legal startups of
that precise time
• Mindset and technical readiness
support the venture
Ross Ulbricht of Silk Road
made a personal fortune of over
$1 billion (Bromium, 2018)
Team
page
012
• Trust issues
• Knowing what to do inhouse and
what to outsource
• Dedication and motivation
• Common understanding
Venture
idea
page
013
• Clear vision
• Market need for the product/service
• Gives somebody added value
Business
model
page
014
• Understanding of revenue stream
• Risk mitigation
• Clean money out
Funding
page
015
• Business devils
• ICO
• Crowdfunding
• Investments from previous criminal
ventures
• Money laundering
An unnamed cybercrime startup turned an
investment of $5,900 into return of
$84,100 in a month.
That's an ROI of 1425% in just 30 days.
(Trustvawe, 2015)
• Helping hands
• Wiki models
• Freelancers and other
service providers
• Subculture
Community
support
For the rest of us
• You can’t fight what you don’t see
• Understanding the mindset helps to move yourself
off the market
• Include them in your risk assessment
• Be a troublemaker
Thank you
It is not the fault of the entrepreneurs that the consumers, the people, the common man,
prefer liquor to Bibles and detective stories to serious books, and that governments prefer
guns to butter. The entrepreneur does not make greater profits in selling bad things than in
selling good things. His profits are the greater the better he succeeds in providing the
consumers with those things they ask for most intensely.
― Ludwig von Mises, Human Action: A Treatise on Economics

More Related Content

Similar to Cyber crime as a startup

Helen Burness - Digital Experience Human Experience
Helen Burness - Digital Experience Human ExperienceHelen Burness - Digital Experience Human Experience
Helen Burness - Digital Experience Human ExperienceEdge Global Media Group
 
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams Faisal Abidi
 
“The myths and reality of starting companies” – Dr. Robert Bush (CFO, curtis ...
“The myths and reality of starting companies” – Dr. Robert Bush (CFO, curtis ...“The myths and reality of starting companies” – Dr. Robert Bush (CFO, curtis ...
“The myths and reality of starting companies” – Dr. Robert Bush (CFO, curtis ...curtis newton labs GmbH
 
Am Wochenende Essay
Am Wochenende EssayAm Wochenende Essay
Am Wochenende EssayAmy Williams
 
Fintech and Transformation of the Financial Services Industry
Fintech and Transformation of the Financial Services IndustryFintech and Transformation of the Financial Services Industry
Fintech and Transformation of the Financial Services IndustryRobin Teigland
 
Csc kit-social-engineering-ppt-en
Csc kit-social-engineering-ppt-enCsc kit-social-engineering-ppt-en
Csc kit-social-engineering-ppt-enJulien Marteel
 
KSEI ENTREPRENEUR INTERVIEW
KSEI ENTREPRENEUR INTERVIEWKSEI ENTREPRENEUR INTERVIEW
KSEI ENTREPRENEUR INTERVIEWCarmarley Dennis
 
IDEA - Fort Voortdorp
IDEA - Fort VoortdorpIDEA - Fort Voortdorp
IDEA - Fort Voortdorpguest7457fe
 
Cryptocurrencies, Blockchain & Smart Contracts: A General Introduction
Cryptocurrencies, Blockchain & Smart Contracts: A General IntroductionCryptocurrencies, Blockchain & Smart Contracts: A General Introduction
Cryptocurrencies, Blockchain & Smart Contracts: A General IntroductionRaffaele Mauro
 
Leading into the Third Industrial Revolution
Leading into the Third Industrial RevolutionLeading into the Third Industrial Revolution
Leading into the Third Industrial RevolutionRobin Teigland
 
April Virtual Series: What Happens in Austin, Doesn't Stay in Austin
April Virtual Series: What Happens in Austin, Doesn't Stay in AustinApril Virtual Series: What Happens in Austin, Doesn't Stay in Austin
April Virtual Series: What Happens in Austin, Doesn't Stay in AustinDigitalMoguls
 
How To Introduce Yourself In English Essential Essay
How To Introduce Yourself In English  Essential EssayHow To Introduce Yourself In English  Essential Essay
How To Introduce Yourself In English Essential EssayMary Burg
 
Manifesto of the Crypto\ICO community
Manifesto of the Crypto\ICO communityManifesto of the Crypto\ICO community
Manifesto of the Crypto\ICO communityVladislav Solodkiy
 
Kickstarter article scam 1:5:15
Kickstarter article scam 1:5:15Kickstarter article scam 1:5:15
Kickstarter article scam 1:5:15Dawn M. Sole
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attackerseadeloitte
 
20 most innovative companies in Fintech Industry
20 most innovative companies  in Fintech Industry20 most innovative companies  in Fintech Industry
20 most innovative companies in Fintech IndustrySumit Roy
 
Funding ideas in a globally connected world – a social approach
Funding ideas in a globally connected world – a social approachFunding ideas in a globally connected world – a social approach
Funding ideas in a globally connected world – a social approachTomé Duarte
 

Similar to Cyber crime as a startup (20)

Helen Burness - Digital Experience Human Experience
Helen Burness - Digital Experience Human ExperienceHelen Burness - Digital Experience Human Experience
Helen Burness - Digital Experience Human Experience
 
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
 
“The myths and reality of starting companies” – Dr. Robert Bush (CFO, curtis ...
“The myths and reality of starting companies” – Dr. Robert Bush (CFO, curtis ...“The myths and reality of starting companies” – Dr. Robert Bush (CFO, curtis ...
“The myths and reality of starting companies” – Dr. Robert Bush (CFO, curtis ...
 
Am Wochenende Essay
Am Wochenende EssayAm Wochenende Essay
Am Wochenende Essay
 
Fintech and Transformation of the Financial Services Industry
Fintech and Transformation of the Financial Services IndustryFintech and Transformation of the Financial Services Industry
Fintech and Transformation of the Financial Services Industry
 
Csc kit-social-engineering-ppt-en
Csc kit-social-engineering-ppt-enCsc kit-social-engineering-ppt-en
Csc kit-social-engineering-ppt-en
 
Rahil Foundation
Rahil Foundation Rahil Foundation
Rahil Foundation
 
KSEI ENTREPRENEUR INTERVIEW
KSEI ENTREPRENEUR INTERVIEWKSEI ENTREPRENEUR INTERVIEW
KSEI ENTREPRENEUR INTERVIEW
 
IDEA - Fort Voortdorp
IDEA - Fort VoortdorpIDEA - Fort Voortdorp
IDEA - Fort Voortdorp
 
Cryptocurrencies, Blockchain & Smart Contracts: A General Introduction
Cryptocurrencies, Blockchain & Smart Contracts: A General IntroductionCryptocurrencies, Blockchain & Smart Contracts: A General Introduction
Cryptocurrencies, Blockchain & Smart Contracts: A General Introduction
 
Leading into the Third Industrial Revolution
Leading into the Third Industrial RevolutionLeading into the Third Industrial Revolution
Leading into the Third Industrial Revolution
 
Hacker House August Proposal
Hacker House August ProposalHacker House August Proposal
Hacker House August Proposal
 
April Virtual Series: What Happens in Austin, Doesn't Stay in Austin
April Virtual Series: What Happens in Austin, Doesn't Stay in AustinApril Virtual Series: What Happens in Austin, Doesn't Stay in Austin
April Virtual Series: What Happens in Austin, Doesn't Stay in Austin
 
How To Introduce Yourself In English Essential Essay
How To Introduce Yourself In English  Essential EssayHow To Introduce Yourself In English  Essential Essay
How To Introduce Yourself In English Essential Essay
 
Manifesto of the Crypto\ICO community
Manifesto of the Crypto\ICO communityManifesto of the Crypto\ICO community
Manifesto of the Crypto\ICO community
 
Kickstarter article scam 1:5:15
Kickstarter article scam 1:5:15Kickstarter article scam 1:5:15
Kickstarter article scam 1:5:15
 
Why Cybercriminals are targeting Small Businesses
Why Cybercriminals are targeting Small BusinessesWhy Cybercriminals are targeting Small Businesses
Why Cybercriminals are targeting Small Businesses
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attacker
 
20 most innovative companies in Fintech Industry
20 most innovative companies  in Fintech Industry20 most innovative companies  in Fintech Industry
20 most innovative companies in Fintech Industry
 
Funding ideas in a globally connected world – a social approach
Funding ideas in a globally connected world – a social approachFunding ideas in a globally connected world – a social approach
Funding ideas in a globally connected world – a social approach
 

More from DATA SECURITY SOLUTIONS

The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...DATA SECURITY SOLUTIONS
 
MLM or how to look at company users with new eyes
MLM or how to look at company users with new eyesMLM or how to look at company users with new eyes
MLM or how to look at company users with new eyesDATA SECURITY SOLUTIONS
 
How to maintain business equality secured in network and cloud
How to maintain business equality secured in network and cloudHow to maintain business equality secured in network and cloud
How to maintain business equality secured in network and cloudDATA SECURITY SOLUTIONS
 
IBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapDATA SECURITY SOLUTIONS
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanDATA SECURITY SOLUTIONS
 
How to discover vulnerabilities in business and mission critical systems
How to discover vulnerabilities in business and mission critical systemsHow to discover vulnerabilities in business and mission critical systems
How to discover vulnerabilities in business and mission critical systemsDATA SECURITY SOLUTIONS
 
Protecting web aplications with machine learning and security fabric
Protecting web aplications with machine learning and security fabricProtecting web aplications with machine learning and security fabric
Protecting web aplications with machine learning and security fabricDATA SECURITY SOLUTIONS
 
Patching: answers to questions you probably were afraid to ask about oracle s...
Patching: answers to questions you probably were afraid to ask about oracle s...Patching: answers to questions you probably were afraid to ask about oracle s...
Patching: answers to questions you probably were afraid to ask about oracle s...DATA SECURITY SOLUTIONS
 
Practical approach to NIS Directive's incident management
Practical approach to NIS Directive's incident managementPractical approach to NIS Directive's incident management
Practical approach to NIS Directive's incident managementDATA SECURITY SOLUTIONS
 
New security solutions for next generation of IT
New security solutions for next generation of ITNew security solutions for next generation of IT
New security solutions for next generation of ITDATA SECURITY SOLUTIONS
 
Botprobe - Reducing network threat intelligence big data
Botprobe - Reducing network threat intelligence big data Botprobe - Reducing network threat intelligence big data
Botprobe - Reducing network threat intelligence big data DATA SECURITY SOLUTIONS
 
Let's hack your mobile device. Yes we can. And many other do.
Let's hack your mobile device. Yes we can. And many other do.Let's hack your mobile device. Yes we can. And many other do.
Let's hack your mobile device. Yes we can. And many other do.DATA SECURITY SOLUTIONS
 
North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...DATA SECURITY SOLUTIONS
 
IoT Technologies for Context-Aware Security
IoT Technologies for Context-Aware SecurityIoT Technologies for Context-Aware Security
IoT Technologies for Context-Aware SecurityDATA SECURITY SOLUTIONS
 
Services evolution in cybercrime economics
Services evolution in cybercrime economicsServices evolution in cybercrime economics
Services evolution in cybercrime economicsDATA SECURITY SOLUTIONS
 

More from DATA SECURITY SOLUTIONS (20)

The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
 
MLM or how to look at company users with new eyes
MLM or how to look at company users with new eyesMLM or how to look at company users with new eyes
MLM or how to look at company users with new eyes
 
The artificial reality of cyber defense
The artificial reality of cyber defenseThe artificial reality of cyber defense
The artificial reality of cyber defense
 
How to maintain business equality secured in network and cloud
How to maintain business equality secured in network and cloudHow to maintain business equality secured in network and cloud
How to maintain business equality secured in network and cloud
 
Forensic tool development with rust
Forensic tool development with rustForensic tool development with rust
Forensic tool development with rust
 
IBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmap
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wan
 
How to discover vulnerabilities in business and mission critical systems
How to discover vulnerabilities in business and mission critical systemsHow to discover vulnerabilities in business and mission critical systems
How to discover vulnerabilities in business and mission critical systems
 
Protecting web aplications with machine learning and security fabric
Protecting web aplications with machine learning and security fabricProtecting web aplications with machine learning and security fabric
Protecting web aplications with machine learning and security fabric
 
Patching: answers to questions you probably were afraid to ask about oracle s...
Patching: answers to questions you probably were afraid to ask about oracle s...Patching: answers to questions you probably were afraid to ask about oracle s...
Patching: answers to questions you probably were afraid to ask about oracle s...
 
Practical approach to NIS Directive's incident management
Practical approach to NIS Directive's incident managementPractical approach to NIS Directive's incident management
Practical approach to NIS Directive's incident management
 
When network security is not enough
When network security is not enoughWhen network security is not enough
When network security is not enough
 
New security solutions for next generation of IT
New security solutions for next generation of ITNew security solutions for next generation of IT
New security solutions for next generation of IT
 
Botprobe - Reducing network threat intelligence big data
Botprobe - Reducing network threat intelligence big data Botprobe - Reducing network threat intelligence big data
Botprobe - Reducing network threat intelligence big data
 
Network is the Firewall
Network is the FirewallNetwork is the Firewall
Network is the Firewall
 
Let's hack your mobile device. Yes we can. And many other do.
Let's hack your mobile device. Yes we can. And many other do.Let's hack your mobile device. Yes we can. And many other do.
Let's hack your mobile device. Yes we can. And many other do.
 
Secure enterprise mobility
Secure enterprise mobilitySecure enterprise mobility
Secure enterprise mobility
 
North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...
 
IoT Technologies for Context-Aware Security
IoT Technologies for Context-Aware SecurityIoT Technologies for Context-Aware Security
IoT Technologies for Context-Aware Security
 
Services evolution in cybercrime economics
Services evolution in cybercrime economicsServices evolution in cybercrime economics
Services evolution in cybercrime economics
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Cyber crime as a startup