Critically discussion on the view that the government needs to track and store a citizen’s personal information in order to provide ‘a safe and secure society’ versus a citizen’s right to protect his/ her personal information
June 19, 2015
NISO Consensus Framework to Support
Patron Privacy in Digital Library and Information Systems
http://www.niso.org/topics/tl/patron_privacy/
Copy of OSTP RFI on Big Data and PrivacyMicah Altman
This document was originally published by OSTP here:
http://www.ofr.gov/(S(rfkilxaktjiadgtykwxaljqm))/OFRUpload/OFRData/2014-04660_PI.pdf
The original link is now broken, so this copy is provided for the transparency and commentary.
In recent years, hacktivists have received greater attention from the media, the public and from government bodies. The distribution of classified information by hacktivists has garnered much media attention. In particular, the 2010 release of over 200,000 United States embassy cables by the whistleblower organization Wikileaks (the largest set of confidential documents ever released into the public domain) was widely publicized and severely condemned by the United States government (Al Jazeera, 2010). As their actions become both bolder and more widely acknowledged, hacktivists are being increasingly seen as a threat to national security in security-focused states such as the United States. This raises the question of how actors in the government of the United States are currently taking action to securitize hacktivism.
This year I had the opportunity to give a presentation at the World Bank in Washington DC during one of their "brown bag sessions", focused on Privacy, Drones and IoT.
The World Bank is an organization that works worldwide with a wide range of projects, including some initiatives connected with new technologies, and every time, they should evaluate different risks involved, including privacy risks.
The purpose of the presentation was to understand the concept of ‘privacy’ and its different meanings worldwide, how to define the privacy framework and assess the risks arising from the use of new technologies such as drones or IoT, and introduce the Privacy Impact Assessment as an effective tool that we can use in any jurisdiction.
I am going to share some thoughts of these broad and complex chapters that I had to sum up within one hour in this presentation!
Here the full post: http://www.lauravivet.com
June 19, 2015
NISO Consensus Framework to Support
Patron Privacy in Digital Library and Information Systems
http://www.niso.org/topics/tl/patron_privacy/
Copy of OSTP RFI on Big Data and PrivacyMicah Altman
This document was originally published by OSTP here:
http://www.ofr.gov/(S(rfkilxaktjiadgtykwxaljqm))/OFRUpload/OFRData/2014-04660_PI.pdf
The original link is now broken, so this copy is provided for the transparency and commentary.
In recent years, hacktivists have received greater attention from the media, the public and from government bodies. The distribution of classified information by hacktivists has garnered much media attention. In particular, the 2010 release of over 200,000 United States embassy cables by the whistleblower organization Wikileaks (the largest set of confidential documents ever released into the public domain) was widely publicized and severely condemned by the United States government (Al Jazeera, 2010). As their actions become both bolder and more widely acknowledged, hacktivists are being increasingly seen as a threat to national security in security-focused states such as the United States. This raises the question of how actors in the government of the United States are currently taking action to securitize hacktivism.
This year I had the opportunity to give a presentation at the World Bank in Washington DC during one of their "brown bag sessions", focused on Privacy, Drones and IoT.
The World Bank is an organization that works worldwide with a wide range of projects, including some initiatives connected with new technologies, and every time, they should evaluate different risks involved, including privacy risks.
The purpose of the presentation was to understand the concept of ‘privacy’ and its different meanings worldwide, how to define the privacy framework and assess the risks arising from the use of new technologies such as drones or IoT, and introduce the Privacy Impact Assessment as an effective tool that we can use in any jurisdiction.
I am going to share some thoughts of these broad and complex chapters that I had to sum up within one hour in this presentation!
Here the full post: http://www.lauravivet.com
Causes of the Growing Conflict Between Privacy and SecurityDon Edwards
The struggle of maintaining an acceptable level of individual privacy is inherent in any society which values group protection from both internal and external threats. This paper illustrates the competing priorities that are the source of the conflict between privacy and security.
Data Privacy and Security in the Digital age Ukraine - Patrick BellUBA-komitet
Зустріч в рамках Комітету АПУ з питань телекомунікацій, інформаційних технологій та Інтернету з юристом з США Патріком М. Беллом щодо обговорення питань конфіденційності та безпеки даних, 26.07.2017, м.Київ
My presentation at the IGov2 conference at the University of Oslo, 9 Sept 2014. Gave shorter version at Norwegian Board of Technology hearing on 10 Sept 2014. Related journal article at http://ijlit.oxfordjournals.org/content/early/2014/09/01/ijlit.eau007.abstract
Audio at http://www.jus.uio.no/ifp/english/research/projects/nrccl/internet-governance/events/dag-2-del-2-norrm-mp3.mp3
Leg 500 assignment 2 the value of digital privacy in an information technolog...printwork4849
LEG 500 Assignment 2 The Value of Digital Privacy in an Information Technology Age
LEG 500 Assignment 1 Employment-At-Will Doctrine
LEG 500 Assignment 3 Employment-At-Will Doctrine
LEG 500 Assignment 4 Products Liability Research Paper
LEG 500 Week 8 Quiz
In 2013, Development Initiatives-Africa Hub, Open Institute and Development Research, and Training, Uganda carried out a study tracing the evolution of the open data movement in Kenya and Uganda. It aimed at assessing the role that this movement plays in accountability and the equitable allocation of financial resources for the eradication poverty. The study was carried out as part of the Open Data in Developing Countries (ODDC) initiative, which seeks to explore the emerging impacts of open data in developing countries. It is centred on a number of case studies across the world.
Muchiri Nyaggah highlights the key findings from the Kenyan case study.
E. Bryan Information Management Core Requirements [3rd Meeting Of The Sg ...Emerson Bryan
As a first step towards the development of a comprehensive information management programme across the Community, the CARICOM Secretariat through this presentation seeks to engage Community Institutions and as well as to provoke some ideas on how this may be built into the Institutions’ work programmes.
Causes of the Growing Conflict Between Privacy and SecurityDon Edwards
The struggle of maintaining an acceptable level of individual privacy is inherent in any society which values group protection from both internal and external threats. This paper illustrates the competing priorities that are the source of the conflict between privacy and security.
Data Privacy and Security in the Digital age Ukraine - Patrick BellUBA-komitet
Зустріч в рамках Комітету АПУ з питань телекомунікацій, інформаційних технологій та Інтернету з юристом з США Патріком М. Беллом щодо обговорення питань конфіденційності та безпеки даних, 26.07.2017, м.Київ
My presentation at the IGov2 conference at the University of Oslo, 9 Sept 2014. Gave shorter version at Norwegian Board of Technology hearing on 10 Sept 2014. Related journal article at http://ijlit.oxfordjournals.org/content/early/2014/09/01/ijlit.eau007.abstract
Audio at http://www.jus.uio.no/ifp/english/research/projects/nrccl/internet-governance/events/dag-2-del-2-norrm-mp3.mp3
Leg 500 assignment 2 the value of digital privacy in an information technolog...printwork4849
LEG 500 Assignment 2 The Value of Digital Privacy in an Information Technology Age
LEG 500 Assignment 1 Employment-At-Will Doctrine
LEG 500 Assignment 3 Employment-At-Will Doctrine
LEG 500 Assignment 4 Products Liability Research Paper
LEG 500 Week 8 Quiz
In 2013, Development Initiatives-Africa Hub, Open Institute and Development Research, and Training, Uganda carried out a study tracing the evolution of the open data movement in Kenya and Uganda. It aimed at assessing the role that this movement plays in accountability and the equitable allocation of financial resources for the eradication poverty. The study was carried out as part of the Open Data in Developing Countries (ODDC) initiative, which seeks to explore the emerging impacts of open data in developing countries. It is centred on a number of case studies across the world.
Muchiri Nyaggah highlights the key findings from the Kenyan case study.
E. Bryan Information Management Core Requirements [3rd Meeting Of The Sg ...Emerson Bryan
As a first step towards the development of a comprehensive information management programme across the Community, the CARICOM Secretariat through this presentation seeks to engage Community Institutions and as well as to provoke some ideas on how this may be built into the Institutions’ work programmes.
Links Associated with Privacy Death of privacy ‘Your ce.docxsmile790243
Links Associated with Privacy
Death of privacy: ‘Your cell phone Big Brother’s best friend’ (video with Steve Rambam CEO
of Pallorium Inc. an international online investigative service).
TEDx-Cory Doctorow: How do we make kids care about online privacy? (video that
illustrates how social networking and our use of the Internet influences how children
under-value their privacy).
Privacy no more? TrapWire’s all seeing eye tracks your every move. (video of how the
federal government uses surveillance cameras nationwide).
Privacy Issues in the Age of Technology: Jim Dempsey (provides an overview of privacy
issues and how data is used by organizations).
Defcon 21 - The ACLU Presents: NSA Surveillance and More (illustrates key issues
associated with NSA surveillance and how the government acquires data about
individuals).
Smartphones damage our privacy much more than we realize: interview with Carissa Véliz
(privacy issues regarding our use of cell phones, personal computers, social media sites,
etc.).
http://www.youtube.com/watch?v=QGHU8btqrrU
http://www.youtube.com/watch?v=RAGjNe1YhMA
http://www.youtube.com/watch?v=yyNA_6yv5Y0
https://www.youtube.com/watch?v=HekUeBJJbSw
https://www.youtube.com/watch?v=tknNtx9Sl2E
https://www.youtube.com/watch?v=RFqCyMtv1Cc
TECHNOLOGY AS A THREAT TO
PRIVACY: Ethical Challenges to the
Information Profession
J. J. BRITZ
Department of Information Science
University of Pretoria
0002 Pretoria, South Africa
E-mail: [email protected]
The aim of this paper is to assess the impact of technology on the private lives of people.
It is approached from a socio-ethical perspective with specific emphasis on the
implication for the information profession. The issues discussed are the concept privacy,
he influence of technology on the processing of personal and private information, the
relevance of this influence for the information profession, and proposed solutions to these
ethical issues for the information profession.
1. INTRODUCTION
We are currently living in the so-called information age which can be described as an
era were economic activities are mainly information based (an age of
informationalization). This is due to the development and use of technology. The main
characteristics of this era can be summarized as a rise in the number of knowledge
workers, a world that has become more open - in the sense of communication (global
village/Gutenberg galaxy) and internationalization (trans-border flow of data).
This paradigm shift brings new ethical and juridical problems which are mainly
related to issues such as the right of access to information, the right of privacy which
is threatened by the emphasis on the free flow of information, and the protection of
the economic interest of the owners of intellectual property.
In this paper the ethical questions related to the right to privacy of the individual
which is threatened by the use of ...
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxtoltonkendal
Running head: THE FUTURE OF ORGANIC FOOD.
Surname 7
Name:
Instructor:
Course:
Course code:
Digital Bill of Rights and Online Privacy
Introduction
The primary aim of enacting the United States’ Bill of Rights was to offer protection to individual liberties and limit the government powers in conducting unwarranted searches or seizures. In ensuring people’s privacy online, the government must continuously create awareness and re-educate the American citizens concerning the control measures put in place to collect security information from people. As the world advances digitally, people are transferring more of their personal information online and are becoming tech-savvy. Therefore protecting people’s private information in the digital space should be an important role for the government. Milanovic (38) explains that as Americans continue digitizing and collaborating on social networking sites, the question on every person’s mind is; is our privacy and freedom to use the digital space protected?
Thesis Statement
According to the enacted Bill of Rights, American people have the rights to enjoy online freedom, security and unlawful search and seizures.
People Have Rights to Enjoy Online Freedom and Privacy
Personal data breaches have become common, peoples’ televisions are sometimes used in recording their conversations, and criminals are hacking emails and occasionally being monitored by law enforcement. According to Acquisti, Alessandro, Brandimarte and Loewenstein (22), online freedom and privacy of Americans are always in jeopardy. The government of United States must create an atmosphere where people enjoy online privacy and freedom. There are several reasons why people must be allowed to enjoy online privacy and freedom.
The question many people ask is why does online freedom and privacy matter? Most times commenters and criminal justice-especially the courts struggle articulating why privacy is valuable. While research and Bill of Rights demonstrate why online privacy and freedom is essential for the average American, stakeholders, and civil society groups to continue explaining why people must be let to enjoy their freedom online. Additionally, as people enjoy online independence, the government must come up with strategies aimed at protecting such liberties and private information.
Firstly online privacy and freedom are vital because it limits government power. Online privacy puts a limit on government power and the power of private sector organizations (Angwin 27). The more the government knows about its citizens, the more power they can have control over its people. People can misuse personal data and affect reputations, and it can also be used in influencing the decisions and shape behavior (Fisher 192). When the government and private sector organizations have access to people’s online private information, it can be used as a tool to exercise control over the people.
When private and personal information gets into the ...
What is an Information Society
Why are Information Policies needed
What is an Information Policy
Elements of Information Policy
Who has Information Policies
E-Inclusion
Life Long Learning
E-Business strategies
Infrasture – physical (broadband/e-fibre)
Infrastructure – political / Legal and regulatory
Copyright, Intellectual Property, Data Protection, Freedom of Information
Regulation of Domain Name Spaces ( .ie)
E-government
Information Policy in Ireland
Internet Privacy Essay
Internet Privacy Essays
Internet Privacy
Essay On Internet Privacy
Internet and Personal Privacy Essay
Essay on Internet Privacy
Internet Privacy Essay
Internet Privacy.
Internet Privacy Essay
Internet Privacy Analysis
Police surveillance of social media - do you have a reasonable expectation of...Lilian Edwards
This paper (co-authored with lachlan Urquart of U of Nottingham) discusses if we have any expectations of privacy in content we make public on;line on social media - or can such content be data mined by the police at will? Should any kind of surveillance warrant be required of the police to use such material? has social jmedia become the new panopticon?
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxdebishakespeare
ESSENTIALS OF
Management Information Systems 12e
KENNETH C. LAUDON AND JANE P. LAUDON
continued
Systems
CHAPTER 4 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS
CASE 3 Data Mining for Terrorists and Innocents
SUMMARY This case describes how data mining software, combined with Big Data collection from
the Internet, are used to identify potential terrorists. The PRISM program of the U.S.
National Security Agency (NSA) is an on-going effort to enable such Internet surveillance.
In some cases innocent people have been mistaken for terrorists, while sometimes a
terrorist plot is disrupted. The existence of the PRISM program was a national security
secret until its existence was revealed by Edward Snowden, a former NSA contractor.
There are two videos in this case:
(1) Data Mining for Terrorists and Innocents (L= 5:10)
URL http://www.youtube.com/watch?v=4lKpD7MC22I
(2) How Does the PRISM Program Work? (L=1:59)
URL https://www.youtube.com/watch?v=JR6YyYdF8ho
CASE Anti-terrorism agencies around the world have made effective use of new surveillance tech-
nologies that offer unprecedented abilities to identify and apprehend potential terrorists.
Today’s terrorists are by nature difficult to track, as disconnected groups of individuals can
use the Internet to communicate their plans with lower chance of detection. Anti-terrorist
technology has evolved to better handle this new type of threat.
But there are drawbacks to these new strategies. Often, innocent people may find their
privacy compromised or completely eliminated as a result of inaccurate information.
Surveillance technologies are constantly improving. While this makes it more difficult for
Chapter 4, Case 3 Data Mining for terrorists anD innoCents 2
continued
terrorists and other criminals to exchange information, it also jeopardizes our privacy, on
the Internet and elsewhere, going forward. For instance, it may be necessary to monitor the
phone calls of all American citizens, and visiting foreigners, in order to uncover a terrorist
plot. Is this reason for worry? Are comparisons to Orwell’s 1984 appropriate or overblown?
The first video displays both the positive and negative results of new advances in tech-
nology. The first segment describes a program called the Dark Web Project developed by
a team at the University of Tucson that combs the Internet in search of militant leaders
and their followers. The program creates profiles based on word length, punctuation,
syntax, and content, and displays information about the personality type of an individual
graphically.
The plotting of information on a graph represents whether the user is violent or militant,
inexperienced and seeking advice, or an opinion leader holding sway over many more
people. Programs like this have been adopted by many intelligence agencies worldwide,
who incorporate it into their arsenal of terrorist surveillance technologies.
It’s unclear if this project i.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ronnasleightholm
ESSENTIALS OF
Management Information Systems 12e
KENNETH C. LAUDON AND JANE P. LAUDON
continued
Systems
CHAPTER 4 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS
CASE 3 Data Mining for Terrorists and Innocents
SUMMARY This case describes how data mining software, combined with Big Data collection from
the Internet, are used to identify potential terrorists. The PRISM program of the U.S.
National Security Agency (NSA) is an on-going effort to enable such Internet surveillance.
In some cases innocent people have been mistaken for terrorists, while sometimes a
terrorist plot is disrupted. The existence of the PRISM program was a national security
secret until its existence was revealed by Edward Snowden, a former NSA contractor.
There are two videos in this case:
(1) Data Mining for Terrorists and Innocents (L= 5:10)
URL http://www.youtube.com/watch?v=4lKpD7MC22I
(2) How Does the PRISM Program Work? (L=1:59)
URL https://www.youtube.com/watch?v=JR6YyYdF8ho
CASE Anti-terrorism agencies around the world have made effective use of new surveillance tech-
nologies that offer unprecedented abilities to identify and apprehend potential terrorists.
Today’s terrorists are by nature difficult to track, as disconnected groups of individuals can
use the Internet to communicate their plans with lower chance of detection. Anti-terrorist
technology has evolved to better handle this new type of threat.
But there are drawbacks to these new strategies. Often, innocent people may find their
privacy compromised or completely eliminated as a result of inaccurate information.
Surveillance technologies are constantly improving. While this makes it more difficult for
Chapter 4, Case 3 Data Mining for terrorists anD innoCents 2
continued
terrorists and other criminals to exchange information, it also jeopardizes our privacy, on
the Internet and elsewhere, going forward. For instance, it may be necessary to monitor the
phone calls of all American citizens, and visiting foreigners, in order to uncover a terrorist
plot. Is this reason for worry? Are comparisons to Orwell’s 1984 appropriate or overblown?
The first video displays both the positive and negative results of new advances in tech-
nology. The first segment describes a program called the Dark Web Project developed by
a team at the University of Tucson that combs the Internet in search of militant leaders
and their followers. The program creates profiles based on word length, punctuation,
syntax, and content, and displays information about the personality type of an individual
graphically.
The plotting of information on a graph represents whether the user is violent or militant,
inexperienced and seeking advice, or an opinion leader holding sway over many more
people. Programs like this have been adopted by many intelligence agencies worldwide,
who incorporate it into their arsenal of terrorist surveillance technologies.
It’s unclear if this project i ...
Letter of attestation regarding the "Study and development of a Records Retention and Archive System for the preservation of paper records of the ACP Secretariat"
Letter of attestation from the University of the West Indies Open Campus regarding development of CPE Programme: Foundations of Records Management https://www.open.uwi.edu/programmes/foundations-records-management
Letter of attestation from the Barbados National Standards Institution (BNSI) regarding participation in technical committee for BS ISO 15489-1:2013 Information and documentation – Records management - Part 1: Concepts and principles.
Certified Records Analyst (CRA) QualificationEmerson Bryan
Attaining the Certified Records Analyst (CRA) designation is based on educational background, professional work experience and successful completion of a three-part examination consisting of:
Part 2 - Records and Information: Creation and Use
Part 3 - Records Systems, Storage and Retrieval
Part 4 - Records Appraisal, Retention, Protection and Disposition
Parts 2 through 4 each consist of 100 multiple-choice questions. Part 6 is an essay question and requires a well thought, detailed response in a business case format. All examination questions are in English. The multiple-choice questions in Parts 2 through 4 are chosen as equally as possible from all parts of the Examination Outlines
The questions in each part are based on fundamental records and information management practices, and are meant to represent the best practices in the industry. Questions are NOT included in the test bank if they refer solely to the practices of a specific country, vendor or company.
Presentation delivered at the MIND Policy Forum at the Management Institute for National Development (MIND) in Kingston, Jamaica on Friday, December 1, 2017.
E. Bryan - Changing the Paradigm - Record and Information Management for Pub...Emerson Bryan
Presentation delivered at the MIND Policy Forum at the Management Institute for National Development (MIND) on Friday, December 1, 2017.
See link: https://www.scribd.com/document/369215645/MIND-Policy-Forum-Decemeber-2017
University Certificate: Museum Conservation SkillsEmerson Bryan
Organization of American States (OAS)/ University of the West Indies' (UWI) Open Campus Cultural Studies Programme - HIST6821 Museum Conservation Skill, January-May 2017
The CARIFESTA XIII Symposium - Schedule August 11-23, 2017Emerson Bryan
The University of the West Indies, Cave Hill Campus, in partnership with the Ministry of Culture, Sports and Youth, Barbados, will host the CARIFESTA XIII Symposium entitled “The Caribbean, the Arts and the Cultural Industries: Negotiating Tradition, Aesthetics, Economics and Legacy.” The Symposium will be hosted at The University of the West Indies, Cave Hill Campus, from 19-23 August 2017.
E. Bryan Digital curation of digital cultural assets- Mutual interest of AL...Emerson Bryan
The University of the West Indies, Cave Hill Campus, in partnership with the Ministry of Culture, Sports and Youth, Barbados, will host the CARIFESTA XIII Symposium entitled “The Caribbean, the Arts and the Cultural Industries: Negotiating Tradition, Aesthetics, Economics and Legacy.”
The Symposium was hosted at The University of the West Indies, Cave Hill Campus, from 19-23 August 2017.
E. Bryan - Traditional Knowledge Digital Repository - Considerations for Domi...Emerson Bryan
Description:
Traditional knowledge (TK) is knowledge, know-how, skills and practices that are developed, sustained and passed on from generation to generation within a community, often forming part of its cultural or spiritual identity. The Kalinago Barana Aute has been a fixture on the landscape of Waitukubuli for years, however, aside from the direct encounter with the indigenous peoples, physical access to the Council, and limited literary and artefacts within various repositories such as the Documentation Centre, the Dominica Museum or the Ministry of Kalinago Affairs in Roseau. However, there is a clear need to expand access to not just the physical artefacts accessible via these repositories, but also through the development of a specific resource to support the work of the Kalinago Council to revive, assist and maintain Kalinago traditions through song, dances, herbal medicine and some aspects of the ancient Kalinago language. Such a repository would support Dominica’s ratification of the UNESO Convention for the Safeguarding of the Intangible Cultural Heritage, 2003. This support of a repository is especially critical for the continued survival of the Kalinago’s heritage, as the Commonwealth of Dominica is also a small island development state, and therefore has to remain competitive should it hope to realize the United Nations Sustainable Development Goals (SDGs ), and especially under goals 11 and 13.
Also, the role and participation of indigenous peoples such as the Kalinago in global concerns such as traditional medicine, oral tradition, climate change, disaster risk reduction, tourism and sustainable development require great access to resources, including in cyberspace, to drive awareness of the Kalinago, as well as provide access to perspectives specific to Dominica, and the rich cultural heritage of these indigenous people .
Objectives:
The presentation will:
• Introduce some definitions on the subject of traditional knowledge
• Discuss the global and regional initiatives aimed at addressing traditional knowledge
• Consider some “Implementable” current best practices for developing a TK Repository
• Describe some necessary stages which must be considered for a proposed Kalinago TK Repository
SLCC 2016 Presentation Schedule - Day 2Emerson Bryan
The University of the West Indies Saint Lucia Country Conference 2016
The overall theme of the conference is: “Collegial Information Sharing for Sustainable Development”. This conference is expected to create an environment for sharing and learning, which is a necessary step towards establishing the links which facilitate the management of indigenous knowledge for our own use, thus providing an avenue by which academic research on Saint Lucia can make a substantial contribution to global discourse.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.