SlideShare a Scribd company logo
CyberSecurity Considerations
for 4IR in Bangladesh
Mohammad Ashfaqur Rahman
Learner | IT Infra | CyberSecurity | Service Delivery
Sys Admin Day 2023 | 28 July 2023 | Dhaka
Industrial Revolution
⚫ Computer
⚫ Automation
⚫ Robotics
⚫ Cyber-physical
systems
⚫ IoT
⚫ Cloud computing
⚫ Cognitive computing
⚫ Mechanization
⚫ Water power
⚫ Steam power
⚫ Mass production
⚫ Assembly line
⚫ Electricity
4IR
Application
Smart Manufacturing
Agriculture
Healthcare
Autonomous Vehicles
Smart Grids and
Energy Management
Digital Supply Chain
Smart Cities
Augmented and
Virtual Reality
5G Connectivity
Backend
Cloud
Robotics
AI & ML
Drone
AR & VR
Cyber Security
4IR Strategy Bangladesh
Policy &
Strategy
Infra
Development
Education &
Training
E-Gov
ICT Park
Incentives
CyberSecurtiy
Target
IoT
Home
Industrial
Automated Vehicle
CPS
Power Grid
Water Control
Automated Vehicle
Lab
Financial
SCM
Cryptocurrency
IoT Attack Trends
IoT Attack
2016 : Mirai Bot
2021 : Verkada Hack
CPS
Considerations
Traditional
•Data Privacy & Protection
•User Awareness & Training
•Incident Response
•Ethical Considerations
•Continuous Monitoring
•VAPT
•Workforce Development
Additional
•Securing IoT Devices
•AI-Driven Security
•Supply Chain Security
•Cloud Security
•Regulatory Compliance
Just to Note
No technology
that’s
connected to
the Internet is
unhackable.
Thanks for being with us.
(c) ashfaq.saphal@gmail.com

More Related Content

Similar to Cyber Security Considerations for 4IR in Bangladesh

Introduction to IoT by Vectolabs
Introduction to IoT by VectolabsIntroduction to IoT by Vectolabs
Introduction to IoT by Vectolabs
Vectolabs Technologies Sdn Bhd
 
The Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROIThe Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROI
Perry Lea
 
Imperatives for the Smart Sustainable Cities
Imperatives for the Smart Sustainable CitiesImperatives for the Smart Sustainable Cities
Imperatives for the Smart Sustainable Cities
Balvinder Kaur
 
Trends Transforming the Information Technology Industry in 2024
Trends Transforming the Information Technology Industry in 2024Trends Transforming the Information Technology Industry in 2024
Trends Transforming the Information Technology Industry in 2024
Karpagam Engineering
 
Dr Mike Sishi- Manager: ICT Infrastructure at Rand Refinery
Dr Mike Sishi- Manager: ICT Infrastructure at Rand RefineryDr Mike Sishi- Manager: ICT Infrastructure at Rand Refinery
Dr Mike Sishi- Manager: ICT Infrastructure at Rand Refinery
itnewsafrica
 
Cloudera - Enabling the IoT Revolution Driving Insights in a Connected World
Cloudera - Enabling the IoT Revolution Driving Insights in a Connected WorldCloudera - Enabling the IoT Revolution Driving Insights in a Connected World
Cloudera - Enabling the IoT Revolution Driving Insights in a Connected World
andreas kuncoro
 
OT-IT convergence and IoT: innovate at scale and mitigate cyber risks
OT-IT convergence and IoT: innovate at scale and mitigate cyber risksOT-IT convergence and IoT: innovate at scale and mitigate cyber risks
OT-IT convergence and IoT: innovate at scale and mitigate cyber risks
Orange Business Services
 
Emerging Technology: Internet of Things
Emerging Technology: Internet of ThingsEmerging Technology: Internet of Things
Emerging Technology: Internet of Things
Bartosz Petryński
 
Overcoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart citiesOvercoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart cities
Saeed Al Dhaheri
 
Developing your IoT Solutions with Intel
Developing your IoT Solutions with IntelDeveloping your IoT Solutions with Intel
Developing your IoT Solutions with Intel
Amazon Web Services
 
IoT_analysis_Vishal_Kumar
IoT_analysis_Vishal_KumarIoT_analysis_Vishal_Kumar
IoT_analysis_Vishal_KumarVishal Kumar
 
Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...
Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...
Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...
BIS Research Inc.
 
The Most Trusted Cyber Threat Solution Providers in India.pdf
The Most Trusted Cyber Threat Solution Providers in India.pdfThe Most Trusted Cyber Threat Solution Providers in India.pdf
The Most Trusted Cyber Threat Solution Providers in India.pdf
insightssuccess2
 
Navigating the Future with IoT Application Development: Unleashing Potential ...
Navigating the Future with IoT Application Development: Unleashing Potential ...Navigating the Future with IoT Application Development: Unleashing Potential ...
Navigating the Future with IoT Application Development: Unleashing Potential ...
Flexsin
 
IoT Development Solutions
IoT Development SolutionsIoT Development Solutions
IoT Development Solutions
UmeshChandra17893
 
IoT development services Development
IoT development services DevelopmentIoT development services Development
IoT development services Development
UmeshChandra17893
 
IRIS World 2018 - Keynote 2 - Thrive in the Digital Economy
IRIS World 2018 - Keynote 2 - Thrive in the Digital EconomyIRIS World 2018 - Keynote 2 - Thrive in the Digital Economy
IRIS World 2018 - Keynote 2 - Thrive in the Digital Economy
IRIS
 
What happens in the Innovation of Things?
What happens in the Innovation of Things?What happens in the Innovation of Things?
What happens in the Innovation of Things?
Kim Escherich
 
Embedded Systems and IoT Solutions – An Overview
Embedded Systems and IoT Solutions – An OverviewEmbedded Systems and IoT Solutions – An Overview
Embedded Systems and IoT Solutions – An Overview
SatyaKVivek
 

Similar to Cyber Security Considerations for 4IR in Bangladesh (20)

Introduction to IoT by Vectolabs
Introduction to IoT by VectolabsIntroduction to IoT by Vectolabs
Introduction to IoT by Vectolabs
 
The Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROIThe Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROI
 
Imperatives for the Smart Sustainable Cities
Imperatives for the Smart Sustainable CitiesImperatives for the Smart Sustainable Cities
Imperatives for the Smart Sustainable Cities
 
Trends Transforming the Information Technology Industry in 2024
Trends Transforming the Information Technology Industry in 2024Trends Transforming the Information Technology Industry in 2024
Trends Transforming the Information Technology Industry in 2024
 
Dr Mike Sishi- Manager: ICT Infrastructure at Rand Refinery
Dr Mike Sishi- Manager: ICT Infrastructure at Rand RefineryDr Mike Sishi- Manager: ICT Infrastructure at Rand Refinery
Dr Mike Sishi- Manager: ICT Infrastructure at Rand Refinery
 
Cloudera - Enabling the IoT Revolution Driving Insights in a Connected World
Cloudera - Enabling the IoT Revolution Driving Insights in a Connected WorldCloudera - Enabling the IoT Revolution Driving Insights in a Connected World
Cloudera - Enabling the IoT Revolution Driving Insights in a Connected World
 
OT-IT convergence and IoT: innovate at scale and mitigate cyber risks
OT-IT convergence and IoT: innovate at scale and mitigate cyber risksOT-IT convergence and IoT: innovate at scale and mitigate cyber risks
OT-IT convergence and IoT: innovate at scale and mitigate cyber risks
 
Emerging Technology: Internet of Things
Emerging Technology: Internet of ThingsEmerging Technology: Internet of Things
Emerging Technology: Internet of Things
 
Overcoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart citiesOvercoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart cities
 
Developing your IoT Solutions with Intel
Developing your IoT Solutions with IntelDeveloping your IoT Solutions with Intel
Developing your IoT Solutions with Intel
 
IoT_analysis_Vishal_Kumar
IoT_analysis_Vishal_KumarIoT_analysis_Vishal_Kumar
IoT_analysis_Vishal_Kumar
 
Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...
Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...
Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...
 
The Most Trusted Cyber Threat Solution Providers in India.pdf
The Most Trusted Cyber Threat Solution Providers in India.pdfThe Most Trusted Cyber Threat Solution Providers in India.pdf
The Most Trusted Cyber Threat Solution Providers in India.pdf
 
Navigating the Future with IoT Application Development: Unleashing Potential ...
Navigating the Future with IoT Application Development: Unleashing Potential ...Navigating the Future with IoT Application Development: Unleashing Potential ...
Navigating the Future with IoT Application Development: Unleashing Potential ...
 
IoT Development Solutions
IoT Development SolutionsIoT Development Solutions
IoT Development Solutions
 
IoT development services Development
IoT development services DevelopmentIoT development services Development
IoT development services Development
 
IRIS World 2018 - Keynote 2 - Thrive in the Digital Economy
IRIS World 2018 - Keynote 2 - Thrive in the Digital EconomyIRIS World 2018 - Keynote 2 - Thrive in the Digital Economy
IRIS World 2018 - Keynote 2 - Thrive in the Digital Economy
 
What happens in the Innovation of Things?
What happens in the Innovation of Things?What happens in the Innovation of Things?
What happens in the Innovation of Things?
 
Embedded Systems and IoT Solutions – An Overview
Embedded Systems and IoT Solutions – An OverviewEmbedded Systems and IoT Solutions – An Overview
Embedded Systems and IoT Solutions – An Overview
 
DataQuest_Sairam
DataQuest_SairamDataQuest_Sairam
DataQuest_Sairam
 

More from Mohammad Ashfaqur Rahman

Cyber Security For E-commerce (Infrastructure) development
Cyber Security For E-commerce (Infrastructure) developmentCyber Security For E-commerce (Infrastructure) development
Cyber Security For E-commerce (Infrastructure) development
Mohammad Ashfaqur Rahman
 
Cyber Awareness : Perspective Bangladesh & Covid-19
Cyber Awareness : Perspective Bangladesh & Covid-19Cyber Awareness : Perspective Bangladesh & Covid-19
Cyber Awareness : Perspective Bangladesh & Covid-19
Mohammad Ashfaqur Rahman
 
Cyber Security Awareness - file 1 of 2
Cyber Security Awareness - file 1 of 2Cyber Security Awareness - file 1 of 2
Cyber Security Awareness - file 1 of 2
Mohammad Ashfaqur Rahman
 
Cyber Security Awareness - file 2 of 2
Cyber Security Awareness - file 2 of 2Cyber Security Awareness - file 2 of 2
Cyber Security Awareness - file 2 of 2
Mohammad Ashfaqur Rahman
 
009.itsecurity bcp v1
009.itsecurity bcp v1009.itsecurity bcp v1
009.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
008.itsecurity bcp v1
008.itsecurity bcp v1008.itsecurity bcp v1
008.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
007.itsecurity bcp v1
007.itsecurity bcp v1007.itsecurity bcp v1
007.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
006.itsecurity bcp v1
006.itsecurity bcp v1006.itsecurity bcp v1
006.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
005.itsecurity bcp v1
005.itsecurity bcp v1005.itsecurity bcp v1
005.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
002.itsecurity bcp v1
002.itsecurity bcp v1002.itsecurity bcp v1
002.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
001.itsecurity bcp v1
001.itsecurity bcp v1001.itsecurity bcp v1
001.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
000.itsecurity bcp v1
000.itsecurity bcp v1000.itsecurity bcp v1
000.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
Business Continuty Planning and Disester Recovry Planning
Business Continuty Planning and Disester Recovry Planning Business Continuty Planning and Disester Recovry Planning
Business Continuty Planning and Disester Recovry Planning
Mohammad Ashfaqur Rahman
 
013.safetymanagement v3
013.safetymanagement v3013.safetymanagement v3
013.safetymanagement v3
Mohammad Ashfaqur Rahman
 
013.safetymanagement v3
013.safetymanagement v3013.safetymanagement v3
013.safetymanagement v3
Mohammad Ashfaqur Rahman
 
012.safetymanagement v3
012.safetymanagement v3012.safetymanagement v3
012.safetymanagement v3
Mohammad Ashfaqur Rahman
 
012.safetymanagement v3
012.safetymanagement v3012.safetymanagement v3
012.safetymanagement v3
Mohammad Ashfaqur Rahman
 
011.safetymanagement v3
011.safetymanagement v3011.safetymanagement v3
011.safetymanagement v3
Mohammad Ashfaqur Rahman
 
011.safetymanagement v3
011.safetymanagement v3011.safetymanagement v3
011.safetymanagement v3
Mohammad Ashfaqur Rahman
 
010.safetymanagement v3
010.safetymanagement v3010.safetymanagement v3
010.safetymanagement v3
Mohammad Ashfaqur Rahman
 

More from Mohammad Ashfaqur Rahman (20)

Cyber Security For E-commerce (Infrastructure) development
Cyber Security For E-commerce (Infrastructure) developmentCyber Security For E-commerce (Infrastructure) development
Cyber Security For E-commerce (Infrastructure) development
 
Cyber Awareness : Perspective Bangladesh & Covid-19
Cyber Awareness : Perspective Bangladesh & Covid-19Cyber Awareness : Perspective Bangladesh & Covid-19
Cyber Awareness : Perspective Bangladesh & Covid-19
 
Cyber Security Awareness - file 1 of 2
Cyber Security Awareness - file 1 of 2Cyber Security Awareness - file 1 of 2
Cyber Security Awareness - file 1 of 2
 
Cyber Security Awareness - file 2 of 2
Cyber Security Awareness - file 2 of 2Cyber Security Awareness - file 2 of 2
Cyber Security Awareness - file 2 of 2
 
009.itsecurity bcp v1
009.itsecurity bcp v1009.itsecurity bcp v1
009.itsecurity bcp v1
 
008.itsecurity bcp v1
008.itsecurity bcp v1008.itsecurity bcp v1
008.itsecurity bcp v1
 
007.itsecurity bcp v1
007.itsecurity bcp v1007.itsecurity bcp v1
007.itsecurity bcp v1
 
006.itsecurity bcp v1
006.itsecurity bcp v1006.itsecurity bcp v1
006.itsecurity bcp v1
 
005.itsecurity bcp v1
005.itsecurity bcp v1005.itsecurity bcp v1
005.itsecurity bcp v1
 
002.itsecurity bcp v1
002.itsecurity bcp v1002.itsecurity bcp v1
002.itsecurity bcp v1
 
001.itsecurity bcp v1
001.itsecurity bcp v1001.itsecurity bcp v1
001.itsecurity bcp v1
 
000.itsecurity bcp v1
000.itsecurity bcp v1000.itsecurity bcp v1
000.itsecurity bcp v1
 
Business Continuty Planning and Disester Recovry Planning
Business Continuty Planning and Disester Recovry Planning Business Continuty Planning and Disester Recovry Planning
Business Continuty Planning and Disester Recovry Planning
 
013.safetymanagement v3
013.safetymanagement v3013.safetymanagement v3
013.safetymanagement v3
 
013.safetymanagement v3
013.safetymanagement v3013.safetymanagement v3
013.safetymanagement v3
 
012.safetymanagement v3
012.safetymanagement v3012.safetymanagement v3
012.safetymanagement v3
 
012.safetymanagement v3
012.safetymanagement v3012.safetymanagement v3
012.safetymanagement v3
 
011.safetymanagement v3
011.safetymanagement v3011.safetymanagement v3
011.safetymanagement v3
 
011.safetymanagement v3
011.safetymanagement v3011.safetymanagement v3
011.safetymanagement v3
 
010.safetymanagement v3
010.safetymanagement v3010.safetymanagement v3
010.safetymanagement v3
 

Recently uploaded

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 

Recently uploaded (20)

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 

Cyber Security Considerations for 4IR in Bangladesh