SlideShare a Scribd company logo
1 of 38
Download to read offline
monicatalkscyber.com
VermaMonica
From Hacker to CISO
How to turn risk management into a business differentiator
Feb 2020 ISF General Assembly
monicatalkscyber.com
VermaMonica
Who am I?
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
CISO
Business Enabler
Tech and Auto-
Enthusiast



Hobby-Photographer
Hobby-Chef
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
monicatalkscyber.com
VermaMonica
Cyber Threat Landscape
Finance Sector
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
Cobalt Group
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
Few of the Biggest
Cyber Attacks
Finance Sector
100 M
Capital
One
2019
~ $1 B
SWIFT
Bank Heist
2016
147 M
Equifax
2017
150K
Pakistan
Data
Theft
2013
83 M
JP
Morgan
Chase
2014
€13 M
Bank of
Valletta
2019
$3 M
$21.1 M
Tesco
Bank
2017
130 M
$3.6 M
(AmEx)
Heartland
Payments
2017
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
Highest Industry
Average Cost per
record Scandinavia
Finance Sector
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
During the year ended December 31, 2018, the
Company recorded $401.2 million of pre-tax expenses
related to the 2017 cybersecurity incident
and insurance recoveries of $75.0 million for
net expenses of $326.2 million.
147 M
Equifax
2017
$326M
Equifax
since
2017
$575M
Equifax
FTC
2019
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
monicatalkscyber.com
VermaMonica
Differentiator
Something that differentiates!
Gives you competitive edge!
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
Not just a matter of if
and when, but
how long?
how much impact?
how to contain?
how to invest?
how to continue?
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
Business
Differentiator
Key Elements
monicatalkscyber.com
VermaMonica
monicatalkscyber.com
VermaMonica
1. Business Involvement
2. Cyber Resilience
3. Risk Quantification
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
Business Involvement
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
1. Business
Involvement
All assessment of vulnerabilities and
cyber risks require

a) context

b) and business involvement 

to understand and connect the business
and financial impacts.
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
Cyber Resilience
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
2. Cyber
Resilience
Cybersecurity + Business Resilience

Anticipate Chaos! Be Prepared!

Critical to understand the threat landscape
and the cybersecurity risks you face

Resilience happens when you are better
able to detect, contain and respond to
cyber attacks, whilst shortening time
required to be back to normal business
operations.
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
77 percent of firms surveyed lack proper
cyber resilience plans
Only 44 percent of respondents believe
their organizations’ leaders recognize that
enterprise risks affects cyber resilience
62 percent of respondents say risk
assessment is a critical element to cyber
resilience plans
2. Cyber
Resilience
62%77%
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
Cyber Resilience
Anticipate Chaos!
Be Prepared!
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
Risk Quantification
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
3. Risk
Quantification
Financial estimation of a cyber risk
including financial, business and
reputational impact, in order to 

a) understand risk exposure

b) ensure right security investment and
risk management strategy.
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
The risk I took was calculated,
   …..but man, I am bad at math.
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
Quantitative Qualitative
Financial Risk
Management
Cyber Risk
Management
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
Bull’s Eye
It’s about balancing
accuracy and precision!
monicatalkscyber.com
VermaMonica
The True Cost
of a Cyber
Incident
Right
Expertise.
Right
Competency.
Clear and Well-
Defined Risk
Appetite and
Tolerances
Cyber Risk
Management:
A part of
Enterprise Risk
Management
monicatalkscyber.com
VermaMonica
Monetary Loss
(Range of)
Amount of loss
with ca. 90%
certainty
Subjective BUT
numeric
(amount or
range)
Threat Factor
Capability and
Motivation
Categorization
Key Scenarios
and Key Cyber
Risks
monicatalkscyber.com
VermaMonica
2. Timely detection of cyber attacks
and adequate level of cyber
resilience within systems, services
and business operations, to ensure
protection of entire ecosystem.
3. Quantitative risk management to
minimize impact on the business,
treat cyber risks adequately, and to
quantify organization’s cyber
resilience and security capabilities.
1. Security governance and
management with regards to
Confidentiality, Integrity &
Availability (CIA) across
organization and integrated with
the business.
monicatalkscyber.com
VermaMonica
@monica_verma monicaverma
“In today’s digital landscape, cyber risk
is not only an enterprise risk but also a
systemic risk.”
Monica Verma, Chief Information Security Officer (CISO)

Board Member, Cloud Security Alliance Norway

More Related Content

What's hot

SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
12 Top Talks from the 2017 R-CISC Summit
12 Top Talks from the 2017 R-CISC Summit12 Top Talks from the 2017 R-CISC Summit
12 Top Talks from the 2017 R-CISC SummitTripwire
 
A Hacker's Playground - Cyber Risks During COVID-19
A Hacker's Playground - Cyber Risks During COVID-19A Hacker's Playground - Cyber Risks During COVID-19
A Hacker's Playground - Cyber Risks During COVID-19Citrin Cooperman
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilienceaccenture
 
2017 in Review: Infosec Pros Look Back on the Year
2017 in Review: Infosec Pros Look Back on the Year2017 in Review: Infosec Pros Look Back on the Year
2017 in Review: Infosec Pros Look Back on the YearTripwire
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence reportSimon Clements FIRP DipRP
 
CEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackCEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackKevin Duffey
 
Infographic: Cloud Security & SMBs - What You Need to Know in 2015
Infographic: Cloud Security & SMBs - What You Need to Know in 2015Infographic: Cloud Security & SMBs - What You Need to Know in 2015
Infographic: Cloud Security & SMBs - What You Need to Know in 2015CloudEntr
 
Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Rans...
Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Rans...Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Rans...
Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Rans...EC-Council
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitKevin Duffey
 
Flipping the Economics of Attacks
Flipping the Economics of AttacksFlipping the Economics of Attacks
Flipping the Economics of AttacksPaloAltoNetworks
 
Strategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a RoleStrategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a RoleKevin Duffey
 
DDOS OCTOBER 2015 NEUSTAR DDOS ATTACKS & PROTECTION REPORT: NORTH AMERICA & E...
DDOS OCTOBER 2015 NEUSTAR DDOS ATTACKS & PROTECTION REPORT: NORTH AMERICA & E...DDOS OCTOBER 2015 NEUSTAR DDOS ATTACKS & PROTECTION REPORT: NORTH AMERICA & E...
DDOS OCTOBER 2015 NEUSTAR DDOS ATTACKS & PROTECTION REPORT: NORTH AMERICA & E...CMR WORLD TECH
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage YearsJeremiah Grossman
 
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Jeremiah Grossman
 

What's hot (19)

SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Effective collaboration with ethical hackers community
Effective collaboration with ethical hackers communityEffective collaboration with ethical hackers community
Effective collaboration with ethical hackers community
 
12 Top Talks from the 2017 R-CISC Summit
12 Top Talks from the 2017 R-CISC Summit12 Top Talks from the 2017 R-CISC Summit
12 Top Talks from the 2017 R-CISC Summit
 
A Hacker's Playground - Cyber Risks During COVID-19
A Hacker's Playground - Cyber Risks During COVID-19A Hacker's Playground - Cyber Risks During COVID-19
A Hacker's Playground - Cyber Risks During COVID-19
 
HackersAttackersCriminals_2014
HackersAttackersCriminals_2014HackersAttackersCriminals_2014
HackersAttackersCriminals_2014
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 
2017 in Review: Infosec Pros Look Back on the Year
2017 in Review: Infosec Pros Look Back on the Year2017 in Review: Infosec Pros Look Back on the Year
2017 in Review: Infosec Pros Look Back on the Year
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence report
 
CEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackCEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber Attack
 
Infographic: Cloud Security & SMBs - What You Need to Know in 2015
Infographic: Cloud Security & SMBs - What You Need to Know in 2015Infographic: Cloud Security & SMBs - What You Need to Know in 2015
Infographic: Cloud Security & SMBs - What You Need to Know in 2015
 
Cyber-Defenders-2020
Cyber-Defenders-2020Cyber-Defenders-2020
Cyber-Defenders-2020
 
Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Rans...
Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Rans...Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Rans...
Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Rans...
 
1530 track1 ulinski
1530 track1 ulinski1530 track1 ulinski
1530 track1 ulinski
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal Toolkit
 
Flipping the Economics of Attacks
Flipping the Economics of AttacksFlipping the Economics of Attacks
Flipping the Economics of Attacks
 
Strategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a RoleStrategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a Role
 
DDOS OCTOBER 2015 NEUSTAR DDOS ATTACKS & PROTECTION REPORT: NORTH AMERICA & E...
DDOS OCTOBER 2015 NEUSTAR DDOS ATTACKS & PROTECTION REPORT: NORTH AMERICA & E...DDOS OCTOBER 2015 NEUSTAR DDOS ATTACKS & PROTECTION REPORT: NORTH AMERICA & E...
DDOS OCTOBER 2015 NEUSTAR DDOS ATTACKS & PROTECTION REPORT: NORTH AMERICA & E...
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
 

Similar to Cybersecurity and Risk Management as Business Differentiators

Insur Tech Adelaide slides
Insur Tech Adelaide slidesInsur Tech Adelaide slides
Insur Tech Adelaide slidesGemma Burdon
 
PCI Compliance Myths, Reality and Solutions for Retail
PCI Compliance Myths, Reality and Solutions for RetailPCI Compliance Myths, Reality and Solutions for Retail
PCI Compliance Myths, Reality and Solutions for RetailInDefense Security
 
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020Kevin Duffey
 
Empowering Corporate Treasury Through Digitalization
Empowering Corporate Treasury Through DigitalizationEmpowering Corporate Treasury Through Digitalization
Empowering Corporate Treasury Through DigitalizationKyriba Corporation
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game Rahul Neel Mani
 
About BNamericas
About BNamericasAbout BNamericas
About BNamericasmcfarlanec4
 
Everything You Need to Know About Crypto
Everything You Need to Know About CryptoEverything You Need to Know About Crypto
Everything You Need to Know About CryptoAggregage
 
100 marks topics for banking and insurance projects
100 marks topics for banking and insurance projects100 marks topics for banking and insurance projects
100 marks topics for banking and insurance projectsbanking-insurance
 
Cyber Attack Simulation for 450 Executives
Cyber Attack Simulation for 450 ExecutivesCyber Attack Simulation for 450 Executives
Cyber Attack Simulation for 450 ExecutivesKevin Duffey
 
Behavioral Analytics for Preventing Fraud Today and Tomorrow
Behavioral Analytics for Preventing Fraud Today and TomorrowBehavioral Analytics for Preventing Fraud Today and Tomorrow
Behavioral Analytics for Preventing Fraud Today and TomorrowGuardian Analytics
 
Busting myths for SMB cybersecurity
Busting myths for SMB cybersecurityBusting myths for SMB cybersecurity
Busting myths for SMB cybersecurityHazel Burton
 
Safe Security – Insurtech Innovation Award 2023
Safe Security – Insurtech Innovation Award 2023Safe Security – Insurtech Innovation Award 2023
Safe Security – Insurtech Innovation Award 2023The Digital Insurer
 
Regulatory Cybersecurity Assessment
Regulatory Cybersecurity AssessmentRegulatory Cybersecurity Assessment
Regulatory Cybersecurity AssessmentMitchell Grooms
 
2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en
2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en
2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_enMonica Verma
 
Hold Firm: The State of Cyber Resilience in Banking and Capital Markets
Hold Firm: The State of Cyber Resilience in Banking and Capital MarketsHold Firm: The State of Cyber Resilience in Banking and Capital Markets
Hold Firm: The State of Cyber Resilience in Banking and Capital Marketsaccenture
 
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Citrin Cooperman
 
<iframe src="//www.slideshare.net/slideshow/embed_code/42392945" width="47...
<iframe src="//www.slideshare.net/slideshow/embed_code/42392945" width="47...<iframe src="//www.slideshare.net/slideshow/embed_code/42392945" width="47...
<iframe src="//www.slideshare.net/slideshow/embed_code/42392945" width="47...Reputation VIP
 
[CB16] Background Story of "Operation neutralizing banking malware" and highl...
[CB16] Background Story of "Operation neutralizing banking malware" and highl...[CB16] Background Story of "Operation neutralizing banking malware" and highl...
[CB16] Background Story of "Operation neutralizing banking malware" and highl...CODE BLUE
 

Similar to Cybersecurity and Risk Management as Business Differentiators (20)

Insur Tech Adelaide slides
Insur Tech Adelaide slidesInsur Tech Adelaide slides
Insur Tech Adelaide slides
 
PCI Compliance Myths, Reality and Solutions for Retail
PCI Compliance Myths, Reality and Solutions for RetailPCI Compliance Myths, Reality and Solutions for Retail
PCI Compliance Myths, Reality and Solutions for Retail
 
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
 
Empowering Corporate Treasury Through Digitalization
Empowering Corporate Treasury Through DigitalizationEmpowering Corporate Treasury Through Digitalization
Empowering Corporate Treasury Through Digitalization
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game
 
About BNamericas
About BNamericasAbout BNamericas
About BNamericas
 
Everything You Need to Know About Crypto
Everything You Need to Know About CryptoEverything You Need to Know About Crypto
Everything You Need to Know About Crypto
 
100 marks topics for banking and insurance projects
100 marks topics for banking and insurance projects100 marks topics for banking and insurance projects
100 marks topics for banking and insurance projects
 
Cyber Attack Simulation for 450 Executives
Cyber Attack Simulation for 450 ExecutivesCyber Attack Simulation for 450 Executives
Cyber Attack Simulation for 450 Executives
 
Behavioral Analytics for Preventing Fraud Today and Tomorrow
Behavioral Analytics for Preventing Fraud Today and TomorrowBehavioral Analytics for Preventing Fraud Today and Tomorrow
Behavioral Analytics for Preventing Fraud Today and Tomorrow
 
Trick or threat
Trick or threatTrick or threat
Trick or threat
 
Busting myths for SMB cybersecurity
Busting myths for SMB cybersecurityBusting myths for SMB cybersecurity
Busting myths for SMB cybersecurity
 
Safe Security – Insurtech Innovation Award 2023
Safe Security – Insurtech Innovation Award 2023Safe Security – Insurtech Innovation Award 2023
Safe Security – Insurtech Innovation Award 2023
 
Regulatory Cybersecurity Assessment
Regulatory Cybersecurity AssessmentRegulatory Cybersecurity Assessment
Regulatory Cybersecurity Assessment
 
2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en
2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en
2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en
 
Data Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. MookheyData Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. Mookhey
 
Hold Firm: The State of Cyber Resilience in Banking and Capital Markets
Hold Firm: The State of Cyber Resilience in Banking and Capital MarketsHold Firm: The State of Cyber Resilience in Banking and Capital Markets
Hold Firm: The State of Cyber Resilience in Banking and Capital Markets
 
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
 
<iframe src="//www.slideshare.net/slideshow/embed_code/42392945" width="47...
<iframe src="//www.slideshare.net/slideshow/embed_code/42392945" width="47...<iframe src="//www.slideshare.net/slideshow/embed_code/42392945" width="47...
<iframe src="//www.slideshare.net/slideshow/embed_code/42392945" width="47...
 
[CB16] Background Story of "Operation neutralizing banking malware" and highl...
[CB16] Background Story of "Operation neutralizing banking malware" and highl...[CB16] Background Story of "Operation neutralizing banking malware" and highl...
[CB16] Background Story of "Operation neutralizing banking malware" and highl...
 

Recently uploaded

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 

Recently uploaded (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Cybersecurity and Risk Management as Business Differentiators