SlideShare a Scribd company logo
1 of 72
ENCRYPTION WITHOUT
MAGIC,
RISK MANAGEMENT
WITHOUT PAIN
#qconlondon @vixentael
InfoQ.com: News & Community Site
Watch the video with slide
synchronization on InfoQ.com!
https://www.infoq.com/presentations/
encryption-risk-management
• Over 1,000,000 software developers, architects and CTOs read the site world-
wide every month
• 250,000 senior developers subscribe to our weekly newsletter
• Published in 4 languages (English, Chinese, Japanese and Brazilian
Portuguese)
• Post content from our QCon conferences
• 2 dedicated podcast channels: The InfoQ Podcast, with a focus on
Architecture and The Engineering Culture Podcast, with a focus on building
• 96 deep dives on innovative topics packed as downloadable emags and
minibooks
• Over 40 new content items per week
Purpose of QCon
- to empower software development by facilitating the spread of
knowledge and innovation
Strategy
- practitioner-driven conference designed for YOU: influencers of
change and innovation in your teams
- speakers and topics driving the evolution and innovation
- connecting and catalyzing the influencers and innovators
Highlights
- attended by more than 12,000 delegates since 2007
- held in 9 cities worldwide
Presented at QCon London
www.qconlondon.com
@vixentael Product Engineer
Feel free to reach me with
security questions.
I do check my inbox :)
CRYPTOGRAPHY?
CRYPTOGRAPHY?
AES
DES
3DES
CBC
CFB
SEAL
Salsa20
RSA
DSA
OFB
Blowfish
SHARK
RC4
DSS
ECB
CTR
Twofish
Camelia
SEED
Rabbit
ECDSA
#qconlondon @vixentael
CRYPTOGRAPHY?
AES
#qconlondon @vixentael
DES
3DES
CBC
CFB
SEAL
Salsa20
RSA
DSA
OFB
Blowfish
SHARK
RC4
DSS
ECB
CTR
Twofish
Camelia
SEED
Rabbit
ECDSA
MD5
SHA1
SHA3
#qconlondon @vixentael
algorithms
elliptic curves
key management
public key validity
storing secrets
CRYPTOGRAPHY
cool, but…
#qconlondon @vixentael
crypto is not a
but a method to manage
the attack surface
#qconlondon @vixentael
ATTACK SURFACE
– all the possible places
where sensitive data may be
stolen by adversary
https://www.owasp.org/index.php/Attack_Surface_Analysis_Cheat_Sheet
#qconlondon @vixentael
it’s easier to monitor
the suspicious behavior
in a small place
#qconlondon @vixentael
HANDLING SECRET DATA WITH CARE
avoid plain text as possible
manage keys properly
decrease time of plaintext secrets in memory
log, monitor and inspect
– HOW TO MANAGE
THE ATTACK SURFACE
OF MY DATA?
#qconlondon @vixentael
one container one key
symmetric encryption
with poor key management
#qconlondon @vixentael
attack surface
is arbitrary
one container one key
symmetric encryption
with poor key management
key leaked
→ data leaked
#qconlondon @vixentael
WHAT IS A CRYPTO-SYSTEM
https://en.wikipedia.org/wiki/Cryptosystem
#qconlondon @vixentael
KEY AND TRUST MANAGEMENT
SHOULD REFLECT YOUR SYSTEM
#qconlondon @vixentael
MESSAGING
https://core.telegram.org/api/end-to-end
#qconlondon @vixentael
GOOD MESSAGING
IS E2EE
…but your infrastructuresare not only for messaging
#qconlondon @vixentael
NAIVE DATABASE ENCRYPTION
attack surface
is almost everywhere
#qconlondon @vixentael
NARROWING ATTACK SURFACE
middleware-side
encryption
client-side
encryption
MIDDLEWARE-SIDE
ENCRYPTION
#qconlondon @vixentael
SQL injections
code injections
execution flow attacks
reflection attacks
XSS
crypto-miners everywhere
MitM
REAL-WORLD WEB SERVER
#qconlondon @vixentael
ATTACK SURFACE IS
EVERYWHERE :(
REAL-WORLD WEB SERVER
monitor everything
#qconlondon @vixentael
TRY SYMMETRIC ENCRYPTION?
encrypt/decrypt data
using symm key
#qconlondon @vixentael
TRY SYMMETRIC ENCRYPTION?
encrypt/decrypt data
using symm key
easy to steal a key
https://www.alibabacloud.com/
help/faq-detail/37505.htm
#qconlondon @vixentael
ASYMMETRIC ENCRYPTION
wrapped data = Enc(data,
random symm key)
container = Enc(wrapped
data, PKweb, PubKtds)
#qconlondon @vixentael
wrapped data = Enc(data,
random symm key)
container = Enc(wrapped
data, PKweb, PubKtds)
PubKey of ‘trusted
decryption service’
ASYMMETRIC ENCRYPTION
#qconlondon @vixentael
TRUSTED DECRYPTION SERVICE
wrapped_data = Dec(container,
PKtds, PubKweb)
data = Dec(wrapped_data,
random symm key)
decrypts data
#qconlondon @vixentael
trusted element in
infrastructure
SEPARATION OF DUTIES
no decryption
keys
monitor & log
NARROWED ATTACK
SURFACE
TRUSTED DECRYPTION SERVICE
#qconlondon @vixentael
#qconlondon @vixentael
monitor everything
monitor decryption proxy
#qconlondon @vixentael
WHERE TO USE THIS TECHNIQUE?
micro-services infrastructure
public-oriented interfaces
non trusted client side (browsers, IoT devices)
hard to store keys securely
#qconlondon @vixentael
HOW TO IMPLEMENT?
ACRA
https://github.com/cossacklabs/acra
GREEN SQL
https://github.com/larskanis/greensql-fw
HEXATIER
http://www.hexatier.com/
ORACLE DATABASE
FIREWALL / TDE
http://www.oracle.com/
CLIENT-SIDE
ENCRYPTION
#qconlondon @vixentael
MOVE TRUST TO CLIENTS
session hijacking
unattended backups
MitM
replay attacks
misconfigured ACL
trusted element in
infrastructure
#qconlondon @vixentael
P2P TRUST
system doesn’t know
anything about data
encrypted
containers
user-generated
keys
ZERO KNOWLEDGE
ARCHITECTURES
#qconlondon @vixentael
ZKA is a design principle that
enables software to provide services
over protected client data without
having an unencrypted access to it.
#qconlondon @vixentael
e2ee clients
ZKA INCLUDES:
#qconlondon @vixentael
e2ee clients
all operations are on encrypted data:
– control access to data from different users
– CRUD
– search (in encrypted data)
ZKA INCLUDES:
#qconlondon @vixentael
#qconlondon @vixentael
weak key management
algorithm weakness
user pocket
attack surface
RISKS FOR ZKA:
WHEN TO USE ZKA?
#qconlondon @vixentael
trusted client side (mobile, HSM/TPM)
ZKA is already solved for
specific use-cases or
in a naive ways
#qconlondon @vixentael
MESSAGING END-TO-END
ENCRYPTION
#qconlondon @vixentael
AUTHENTICATION ZERO KNOWLEDGE
PROOF
https://www.cossacklabs.com/zero-
knowledge-protocols-without-magic.html
#qconlondon @vixentael
COLLABORATING
ON DATA
– store encrypted
– share with others
– manage access to
parties
#qconlondon @vixentael
???
naive approach
– duplications
– key management
problems
#qconlondon @vixentael
SHARING ENCRYPTED DATA
give access to
certain blocks of
data to exact users
https://github.com/
cossacklabs/hermes-core
#qconlondon @vixentael
OUR TAKE
– Key wrapping
storage keys user keysblocks
#qconlondon @vixentael
HOW TO BUILD IT?
#qconlondon @vixentael
HOW TO BUILD IT?
– Key wrapping
– Manage privileges
– Key wrapping
– Manage privileges
– Control requests
#qconlondon @vixentael
HOW TO BUILD IT?
shared
audit logs complex docs,
spreadsheets
config files
file system
document store
protection
#qconlondon @vixentael
MORE POSSIBLE USE-CASES
OTHER IMPLEMENTATIONS
#qconlondon @vixentael
HERMES
https://github.com/cossacklabs/hermes-core
ZEROKIT
https://tresorit.com/zerokit
LAFS
https://tahoe-lafs.org/trac/tahoe-lafs
#qconlondon @vixentael
monitor everything
monitor client side
MORE GOODIES TO
THINK ABOUT
Cryptography is well implemented,
if it allows to narrow attack surface,
and increase control of data.
#qconlondon @vixentael
if the system has
one perimeter,
it will fail!
ECHELONIZATION
#qconlondon @vixentael
#qconlondon @vixentael
..add more layers
of defense
ECHELONIZATION
EXCEPT CRYPTO, YOU ALSO NEED
log and monitor events
intrusion pattern detection
access control
firewall
...
https://pdos.csail.mit.edu/papers/cryptobugs:apsys14.pdf
269 CVEs
from 2011-2014
17%
83%
bugs inside crypto libs
misuses of crypto libs
by individual apps
#qconlondon @vixentael
RECAP
2
#qconlondon @vixentael
THINGS TO REMEMBER
1. cryptography aims to narrow the attack surface
2. choose relevant encryption scheme
3. combine crypto and classic techniques
4. there is a lib for that
https://hackernoon.com/eli5-zero-knowledge-proof-78a276db9eff
Explain Like I’m 5: Zero Knowledge Proof
https://medium.com/@9gunpi/devops-and-security-from-trenches-to-command-
centers-466dfb58fe5b
DevOps and security: from trenches to command centers
https://medium.com/@cossacklabs/12-and-1-ideas-how-to-enhance-backend-data-
security-4b8ceb5ccb88
12 and 1 ideas how to enhance backend data security
LINKS
https://www.smashingmagazine.com/2018/02/gdpr-for-web-developers/
How GDPR Will Change The Way You Develop
https://github.com/
vixentael/my-talks
…and more
MY OTHER SECURITY SLIDES
@vixentael Product Engineer
Feel free to reach me with
security questions.
I do check my inbox :)
IMAGE CREDITS
www.flaticon.com 
freepik, linector, switficons, pixelperfect, smashicons, icon pond,
dinosoftlabs
Authors:
Watch the video with slide
synchronization on InfoQ.com!
https://www.infoq.com/presentations/
encryption-risk-management

More Related Content

More from C4Media

Shifting Left with Cloud Native CI/CD
Shifting Left with Cloud Native CI/CDShifting Left with Cloud Native CI/CD
Shifting Left with Cloud Native CI/CDC4Media
 
CI/CD for Machine Learning
CI/CD for Machine LearningCI/CD for Machine Learning
CI/CD for Machine LearningC4Media
 
Fault Tolerance at Speed
Fault Tolerance at SpeedFault Tolerance at Speed
Fault Tolerance at SpeedC4Media
 
Architectures That Scale Deep - Regaining Control in Deep Systems
Architectures That Scale Deep - Regaining Control in Deep SystemsArchitectures That Scale Deep - Regaining Control in Deep Systems
Architectures That Scale Deep - Regaining Control in Deep SystemsC4Media
 
ML in the Browser: Interactive Experiences with Tensorflow.js
ML in the Browser: Interactive Experiences with Tensorflow.jsML in the Browser: Interactive Experiences with Tensorflow.js
ML in the Browser: Interactive Experiences with Tensorflow.jsC4Media
 
Build Your Own WebAssembly Compiler
Build Your Own WebAssembly CompilerBuild Your Own WebAssembly Compiler
Build Your Own WebAssembly CompilerC4Media
 
User & Device Identity for Microservices @ Netflix Scale
User & Device Identity for Microservices @ Netflix ScaleUser & Device Identity for Microservices @ Netflix Scale
User & Device Identity for Microservices @ Netflix ScaleC4Media
 
Scaling Patterns for Netflix's Edge
Scaling Patterns for Netflix's EdgeScaling Patterns for Netflix's Edge
Scaling Patterns for Netflix's EdgeC4Media
 
Make Your Electron App Feel at Home Everywhere
Make Your Electron App Feel at Home EverywhereMake Your Electron App Feel at Home Everywhere
Make Your Electron App Feel at Home EverywhereC4Media
 
The Talk You've Been Await-ing For
The Talk You've Been Await-ing ForThe Talk You've Been Await-ing For
The Talk You've Been Await-ing ForC4Media
 
Future of Data Engineering
Future of Data EngineeringFuture of Data Engineering
Future of Data EngineeringC4Media
 
Automated Testing for Terraform, Docker, Packer, Kubernetes, and More
Automated Testing for Terraform, Docker, Packer, Kubernetes, and MoreAutomated Testing for Terraform, Docker, Packer, Kubernetes, and More
Automated Testing for Terraform, Docker, Packer, Kubernetes, and MoreC4Media
 
Navigating Complexity: High-performance Delivery and Discovery Teams
Navigating Complexity: High-performance Delivery and Discovery TeamsNavigating Complexity: High-performance Delivery and Discovery Teams
Navigating Complexity: High-performance Delivery and Discovery TeamsC4Media
 
High Performance Cooperative Distributed Systems in Adtech
High Performance Cooperative Distributed Systems in AdtechHigh Performance Cooperative Distributed Systems in Adtech
High Performance Cooperative Distributed Systems in AdtechC4Media
 
Rust's Journey to Async/await
Rust's Journey to Async/awaitRust's Journey to Async/await
Rust's Journey to Async/awaitC4Media
 
Opportunities and Pitfalls of Event-Driven Utopia
Opportunities and Pitfalls of Event-Driven UtopiaOpportunities and Pitfalls of Event-Driven Utopia
Opportunities and Pitfalls of Event-Driven UtopiaC4Media
 
Datadog: a Real-Time Metrics Database for One Quadrillion Points/Day
Datadog: a Real-Time Metrics Database for One Quadrillion Points/DayDatadog: a Real-Time Metrics Database for One Quadrillion Points/Day
Datadog: a Real-Time Metrics Database for One Quadrillion Points/DayC4Media
 
Are We Really Cloud-Native?
Are We Really Cloud-Native?Are We Really Cloud-Native?
Are We Really Cloud-Native?C4Media
 
CockroachDB: Architecture of a Geo-Distributed SQL Database
CockroachDB: Architecture of a Geo-Distributed SQL DatabaseCockroachDB: Architecture of a Geo-Distributed SQL Database
CockroachDB: Architecture of a Geo-Distributed SQL DatabaseC4Media
 
A Dive into Streams @LinkedIn with Brooklin
A Dive into Streams @LinkedIn with BrooklinA Dive into Streams @LinkedIn with Brooklin
A Dive into Streams @LinkedIn with BrooklinC4Media
 

More from C4Media (20)

Shifting Left with Cloud Native CI/CD
Shifting Left with Cloud Native CI/CDShifting Left with Cloud Native CI/CD
Shifting Left with Cloud Native CI/CD
 
CI/CD for Machine Learning
CI/CD for Machine LearningCI/CD for Machine Learning
CI/CD for Machine Learning
 
Fault Tolerance at Speed
Fault Tolerance at SpeedFault Tolerance at Speed
Fault Tolerance at Speed
 
Architectures That Scale Deep - Regaining Control in Deep Systems
Architectures That Scale Deep - Regaining Control in Deep SystemsArchitectures That Scale Deep - Regaining Control in Deep Systems
Architectures That Scale Deep - Regaining Control in Deep Systems
 
ML in the Browser: Interactive Experiences with Tensorflow.js
ML in the Browser: Interactive Experiences with Tensorflow.jsML in the Browser: Interactive Experiences with Tensorflow.js
ML in the Browser: Interactive Experiences with Tensorflow.js
 
Build Your Own WebAssembly Compiler
Build Your Own WebAssembly CompilerBuild Your Own WebAssembly Compiler
Build Your Own WebAssembly Compiler
 
User & Device Identity for Microservices @ Netflix Scale
User & Device Identity for Microservices @ Netflix ScaleUser & Device Identity for Microservices @ Netflix Scale
User & Device Identity for Microservices @ Netflix Scale
 
Scaling Patterns for Netflix's Edge
Scaling Patterns for Netflix's EdgeScaling Patterns for Netflix's Edge
Scaling Patterns for Netflix's Edge
 
Make Your Electron App Feel at Home Everywhere
Make Your Electron App Feel at Home EverywhereMake Your Electron App Feel at Home Everywhere
Make Your Electron App Feel at Home Everywhere
 
The Talk You've Been Await-ing For
The Talk You've Been Await-ing ForThe Talk You've Been Await-ing For
The Talk You've Been Await-ing For
 
Future of Data Engineering
Future of Data EngineeringFuture of Data Engineering
Future of Data Engineering
 
Automated Testing for Terraform, Docker, Packer, Kubernetes, and More
Automated Testing for Terraform, Docker, Packer, Kubernetes, and MoreAutomated Testing for Terraform, Docker, Packer, Kubernetes, and More
Automated Testing for Terraform, Docker, Packer, Kubernetes, and More
 
Navigating Complexity: High-performance Delivery and Discovery Teams
Navigating Complexity: High-performance Delivery and Discovery TeamsNavigating Complexity: High-performance Delivery and Discovery Teams
Navigating Complexity: High-performance Delivery and Discovery Teams
 
High Performance Cooperative Distributed Systems in Adtech
High Performance Cooperative Distributed Systems in AdtechHigh Performance Cooperative Distributed Systems in Adtech
High Performance Cooperative Distributed Systems in Adtech
 
Rust's Journey to Async/await
Rust's Journey to Async/awaitRust's Journey to Async/await
Rust's Journey to Async/await
 
Opportunities and Pitfalls of Event-Driven Utopia
Opportunities and Pitfalls of Event-Driven UtopiaOpportunities and Pitfalls of Event-Driven Utopia
Opportunities and Pitfalls of Event-Driven Utopia
 
Datadog: a Real-Time Metrics Database for One Quadrillion Points/Day
Datadog: a Real-Time Metrics Database for One Quadrillion Points/DayDatadog: a Real-Time Metrics Database for One Quadrillion Points/Day
Datadog: a Real-Time Metrics Database for One Quadrillion Points/Day
 
Are We Really Cloud-Native?
Are We Really Cloud-Native?Are We Really Cloud-Native?
Are We Really Cloud-Native?
 
CockroachDB: Architecture of a Geo-Distributed SQL Database
CockroachDB: Architecture of a Geo-Distributed SQL DatabaseCockroachDB: Architecture of a Geo-Distributed SQL Database
CockroachDB: Architecture of a Geo-Distributed SQL Database
 
A Dive into Streams @LinkedIn with Brooklin
A Dive into Streams @LinkedIn with BrooklinA Dive into Streams @LinkedIn with Brooklin
A Dive into Streams @LinkedIn with Brooklin
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Encryption without Magic, Risk Management without Pain