SlideShare a Scribd company logo
World®
’16
How	is	Buying	a	Home	Like	Justifying	Data	Security	
Investments?	Developing	Return	on	Security	
Investment	(ROSI)	Analysis
Jeff	Cherrington - Senior	Director	of	Product	Management	- CA	Technologies
MFX118S
MAINFRAME	AND	WORKLOAD	AUTOMATION
2 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
©	2016	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.
The	content	provided	in	this CA	World	2016	presentation	is	intended	for	informational	purposes	only	and	does	not	form	any	type	of	
warranty. The information	provided	by	a	CA	partner	and/or	CA	customer	has	not	been	reviewed	for	accuracy	by	CA.	
For	Informational	Purposes	Only	
Terms	of	this	Presentation
3 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Abstract
Data	protection	is	a	mandatory	hygiene	required	in	the	data	center	and	demanded	by	
customers,	both	consumer	and	commercial.	Justifying	additional	investments	in	data	security	
can	be	challenging	to	justify	to	the	executive	team,	as	it	seldom	has	direct	line-of-sight	to	
increased	revenue	or	reduced	costs.	However,	investments	must	pace	with	the	increases	in	both	
the	threats	of	increasingly	organized	and	sophisticated	attacks	and	the	broader,	more	invasive	
regulations.	Find	out	how	justifying	investments	in	data	security	is	similar	to	the	decisions	made	
when	purchasing	a	home.	The	session	continues	by	reviewing	strategies	for	building	persuasive	
business	cases	for	the	additional	mainframe	protections	to	protect	the	mainframe	data	center	in	
its	current	role	and	in	the	increasingly	critical	role	it	must	play	in	the	emerging	Application	
Economy.
Jeff	
Cherrington
CA	Technologies	
Senior	Director,	
Product	Management
4 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Agenda
PURPOSE	OF	SESSION
SHARED	EXPERIENCE	– BUYING	A	HOME
QUESTIONS,	DISCUSSIONS,	AND	EXPERIENCES	
HOW	DOES	THAT	RELATE	TO	DATA	SECURITY?
RETURN	ON	SECURITY	INVESTMENT	(ROSI)
DEVELOPING	A	ROSI ANALYSIS
1
2
3
4
5
6
5 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Purpose	of	This	Session
§ Enterprises	must	diligently	assess	investments	in	data	
security,	striving	to	invest	enough,	neither	too	much	nor	
too	little
§ This	session	offers	some	strategies	for	equipping	senior	
managers	with	relevant	financial	analysis	
§ The	conversation	is	framed	using	comparison	to	experience	
many	of	us	share	– purchasing	a	home
§ You	are	encouraged	to	share	your	questions	and	experiences
6 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Shared	Experience	– Buying	a	Home
§ Buying	a	home	is	the	largest	financial	decision	most of	us
make	in	our	personal	lives
§ Most	of	us	find	the	process	unfamiliar	the	first	time,	with	
many	murky	components	– lending	rates	and	terms,	home	owners	insurance,	title	
insurance,	inspection	fees,	…
§ Think	about	when	you	bought	your	first	home	and	you	had	to	engage	with	
things	like	PMI	or	MIP	(insurance	on	my	mortgage?	Really?),	loan-to-value(LTV)	
ratio,	points,	…
§ In	good	cases,	we	are	guided	through	the	process	by	competent	professionals	of	
integrity,	who	speak	to	us	clearly	using	concepts	we	understand
7 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
What	does	that	have	to	do	with	enterprise	data	security?
§ Senior	enterprise	executives	struggle	with	assessing	security	investment,	at	least	in	
part,	because	it	aligns	only	uncomfortably	with	the	concepts	they	use	most	frequently	–
Return	on	Investment	(ROI),	Internal	Rate	of	Return	(IRR),	Net	Present	Value	(NPV)	…	
§ Evaluating	and	committing	to	investments	
in	data	security	introduces	elements	less	
familiar	and	more	nebulous	to	most	senior	
executive	experience
§ They	know	some	is	required	by	regulation,	some	is	
mandatory	to	remain	operational,	while	some	is	
discretionary	with	uncomfortable	understanding	
of	the	risk	addressed	and	to	what	degree…
8 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Return	on	Security	Investment	(ROSI)
§ ROI	=	(Gain	from	Investment	– Cost	of	Investment)
Cost	of	Investment
§ Gains	from	investment	in	security	are	hard,	if	not	impossible,	to	quantify	– if	the	
security	works,	the	best	case	is	nothing	bad	happens	(meet	expectations)
§ Return	on	Security	Investment	alters	the	view	point	from	‘what	happens	if	you	
invest	in	x’	to	‘what	happens	if	you	don’t	invest	in	x’
§ Standard	approaches	applied	to	normalizing	units	of	measure	and	probability	of	
negative	event	occurrences
§ Supported	by	a	body	of	both	academic	and	commercial	research
9 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Return	on	Security	Investment	(ROSI)	
§ ROSI =	((Risk	Exposure *	%	Risk	Mitigated)	– Solution	Cost)/Solution	Cost
§ Risk	Exposure	=	Annual	Loss	Exposure	(ALE)
§ ALE =	Single	Loss	Exposure	(SLE)	*	Annual	
Rate	of	Occurrence	(ARO)
§ SLE =	Estimated	cost	of	a	negative	
security	event
§ ARO =	Estimated	probability	of	the	negative	
security	event	occurring	in	a	period	
(typically,	a	year)
10 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
An	Example	of	an	ROSI	Analysis	– Data	Breach
§ Analysis	using	industry	standard	Return	on	Security	Investment	(ROSI)	calculations1
§ ROSI =	((Risk	Exposure	*	%	Risk	Mitigated)	– Solution	Cost)/Solution	Cost
§ Risk	Exposure	=	Annual	Loss	Exposure	(ALE)
§ ALE =	Single	Loss	Exposure	(SLE)	*	Annual	Rate	of	Occurrence	(ARO)
§ ARO =	22%3,	according	to	Ponemon Institute
§ Using	Ponemon Institute	figures2
Cost/Record $217.00
Records	Lost	Range Cost	of	Breach ALE
Low 5,655 $1,227,135 $269,970
Average 28,070 $6,091,190 $1,340,062
High 96,550 $20,951,350 $4,609,297
11 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
An	Example	of	an	ROSI	Analysis	– Data	Breach
ROSI	=	((Risk	Exposure	*	%	Risk	Mitigated)	– Solution	Cost)/Solution	Cost
Assume	an	investment	option	mitigates	only	20%	of	the	target	risk
Using	the	Average	Ponemon Institute	Incident
[ALE]	$6,091,191	*	[ARO]	22%	=	[Risk	Exposure]	$1,340,062
Small	Enterprise (using	28K	compromised	records	as	basis)
ROSI	=	(($1,340,062	*	20%)	– $31,8934)/$31,893,	or	700%+	ROSI	
Medium	Enterprise (using	28K	compromised	records	as	basis)
ROSI	=	(($1,340,062	*	20%)	– $160,6404)/$160,640,	or	69%	ROSI
Large	Enterprise (using	public	figures	for	major	data	breach)	
ROSI	=	(($56,000,000	*	20%)	– $833,3335)/$833,33,	or	1200%+	ROSI
12 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Recap
§ Many	executives	who	the	ultimate	decision	
makers	regarding	security	investments	are	
more	comfortable	approaching	such	decisions	
using	concepts	and	techniques	familiar	from	
evaluating	other	investments
§ Security	investments	are	poorly	aligned	with	
traditional	ROI	approached
§ ROSI	aligns	financial	analysis	techniques	
familiar	to	executives	with	the	content	of	data	
protection’s	realities
13 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Questions?
14 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Recommended	Sessions
SESSION	# TITLE DATE/TIME
MFX173S The	Importance	of	Mainframe	Security	Education	 11/16/2016	at	3:45	pm
MFT174S
Mainframe	Security	Strategy	and	Roadmap:	Best	
Practices	for	Protecting	Mission	Essential	Data
11/17/2016	at	12:45	pm
MFT175S Gaps	in	Your	Defense:	Hacking	the	Mainframe	 11/17/2016	at	3:00	pm
15 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Must	See	Demos
Real-Time	Data	Security	
and	Compliance	
CA	Data	Content	
Discovery
Mainframe	Theatre
Mainframe	Security	
Smart	Bar
CA	Top	Secret®
Mainframe	Theatre
Real-Time	Data	Security	
and	Compliance	
CA	Compliance	
Event	Manager
Mainframe	Theatre
Mainframe	Security	
Smart	Bar
CA	ACF2
Mainframe	Theatre
16 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Thank	you.
Stay	connected	at	communities.ca.com
17 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Mainframe	and	Workload	Automation
For	more	information	on	Mainframe	and	Workload	Automation,		
please	visit:	http://cainc.to/9GQ2JI

More Related Content

Viewers also liked

Resumen para-estudiantes-de-romeo-y-julieta
Resumen para-estudiantes-de-romeo-y-julietaResumen para-estudiantes-de-romeo-y-julieta
Resumen para-estudiantes-de-romeo-y-julieta
noelia bornia
 
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
CA Technologies
 
Technology Primer: Save Money and Improve Service by Replacing "Free" Native ...
Technology Primer: Save Money and Improve Service by Replacing "Free" Native ...Technology Primer: Save Money and Improve Service by Replacing "Free" Native ...
Technology Primer: Save Money and Improve Service by Replacing "Free" Native ...
CA Technologies
 
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDash
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDashTech Talk: Predictive Workload Analytics with CA Workload Automation iDash
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDash
CA Technologies
 
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...
CA Technologies
 
CA IDMS™ 19.0 SQL Enhancements for Modernization
CA IDMS™ 19.0 SQL Enhancements for ModernizationCA IDMS™ 19.0 SQL Enhancements for Modernization
CA IDMS™ 19.0 SQL Enhancements for Modernization
CA Technologies
 
Salivary gland and its secretion in mosquitoes
Salivary gland and its secretion in mosquitoesSalivary gland and its secretion in mosquitoes
Salivary gland and its secretion in mosquitoes
iswarya mohan
 
CA Spectrum® Just Keeps Getting Better and Better
CA Spectrum® Just Keeps Getting Better and BetterCA Spectrum® Just Keeps Getting Better and Better
CA Spectrum® Just Keeps Getting Better and Better
CA Technologies
 
Hands-On Lab: CA Spectrum : How To Leverage UI Updates For Operational Effic...
Hands-On Lab: CA Spectrum: How To Leverage UI Updates For Operational Effic...Hands-On Lab: CA Spectrum: How To Leverage UI Updates For Operational Effic...
Hands-On Lab: CA Spectrum : How To Leverage UI Updates For Operational Effic...
CA Technologies
 
Voluntary Guidelines for Sustainable Soil Management - VGSSM
Voluntary Guidelines for Sustainable Soil Management - VGSSMVoluntary Guidelines for Sustainable Soil Management - VGSSM
Voluntary Guidelines for Sustainable Soil Management - VGSSM
FAO
 
Hands-On Lab: Master REST APIs in CA Application Performance Management
Hands-On Lab: Master REST APIs in CA Application Performance ManagementHands-On Lab: Master REST APIs in CA Application Performance Management
Hands-On Lab: Master REST APIs in CA Application Performance Management
CA Technologies
 
Justifying Security Investment
Justifying Security InvestmentJustifying Security Investment
Justifying Security Investment
Jojo Colina
 
Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps
CA Technologies
 
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
CA Technologies
 
Vocabulario sobre vegetación
Vocabulario sobre vegetaciónVocabulario sobre vegetación
Vocabulario sobre vegetación
IES Las Musas
 
Green v Gold Open Access
Green v Gold Open AccessGreen v Gold Open Access
New Product Introduction: iPad 2
New Product Introduction: iPad 2New Product Introduction: iPad 2
New Product Introduction: iPad 2
staneymv
 
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
CA Technologies
 
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security ControlsPre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls
CA Technologies
 
Network Security
Network  SecurityNetwork  Security
Network Security
VIKAS SINGH BHADOURIA
 

Viewers also liked (20)

Resumen para-estudiantes-de-romeo-y-julieta
Resumen para-estudiantes-de-romeo-y-julietaResumen para-estudiantes-de-romeo-y-julieta
Resumen para-estudiantes-de-romeo-y-julieta
 
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
 
Technology Primer: Save Money and Improve Service by Replacing "Free" Native ...
Technology Primer: Save Money and Improve Service by Replacing "Free" Native ...Technology Primer: Save Money and Improve Service by Replacing "Free" Native ...
Technology Primer: Save Money and Improve Service by Replacing "Free" Native ...
 
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDash
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDashTech Talk: Predictive Workload Analytics with CA Workload Automation iDash
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDash
 
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...
 
CA IDMS™ 19.0 SQL Enhancements for Modernization
CA IDMS™ 19.0 SQL Enhancements for ModernizationCA IDMS™ 19.0 SQL Enhancements for Modernization
CA IDMS™ 19.0 SQL Enhancements for Modernization
 
Salivary gland and its secretion in mosquitoes
Salivary gland and its secretion in mosquitoesSalivary gland and its secretion in mosquitoes
Salivary gland and its secretion in mosquitoes
 
CA Spectrum® Just Keeps Getting Better and Better
CA Spectrum® Just Keeps Getting Better and BetterCA Spectrum® Just Keeps Getting Better and Better
CA Spectrum® Just Keeps Getting Better and Better
 
Hands-On Lab: CA Spectrum : How To Leverage UI Updates For Operational Effic...
Hands-On Lab: CA Spectrum: How To Leverage UI Updates For Operational Effic...Hands-On Lab: CA Spectrum: How To Leverage UI Updates For Operational Effic...
Hands-On Lab: CA Spectrum : How To Leverage UI Updates For Operational Effic...
 
Voluntary Guidelines for Sustainable Soil Management - VGSSM
Voluntary Guidelines for Sustainable Soil Management - VGSSMVoluntary Guidelines for Sustainable Soil Management - VGSSM
Voluntary Guidelines for Sustainable Soil Management - VGSSM
 
Hands-On Lab: Master REST APIs in CA Application Performance Management
Hands-On Lab: Master REST APIs in CA Application Performance ManagementHands-On Lab: Master REST APIs in CA Application Performance Management
Hands-On Lab: Master REST APIs in CA Application Performance Management
 
Justifying Security Investment
Justifying Security InvestmentJustifying Security Investment
Justifying Security Investment
 
Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps
 
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
 
Vocabulario sobre vegetación
Vocabulario sobre vegetaciónVocabulario sobre vegetación
Vocabulario sobre vegetación
 
Green v Gold Open Access
Green v Gold Open AccessGreen v Gold Open Access
Green v Gold Open Access
 
New Product Introduction: iPad 2
New Product Introduction: iPad 2New Product Introduction: iPad 2
New Product Introduction: iPad 2
 
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
 
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security ControlsPre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls
 
Network Security
Network  SecurityNetwork  Security
Network Security
 

Similar to How is Buying a Home Like Justifying Data Security Investments? Developing Return on Security Investment (ROSI) Analysis

CA World - mft1755 - gaps in your defense hacking the mainframe - philip young
CA World - mft1755 - gaps in your defense hacking the mainframe - philip youngCA World - mft1755 - gaps in your defense hacking the mainframe - philip young
CA World - mft1755 - gaps in your defense hacking the mainframe - philip young
Philip Young
 
Securely Enabling the Digital Age
Securely Enabling the Digital AgeSecurely Enabling the Digital Age
Securely Enabling the Digital Age
CA Technologies
 
Gaps in Your Defense: Hacking the Mainframe
Gaps in Your Defense: Hacking the Mainframe Gaps in Your Defense: Hacking the Mainframe
Gaps in Your Defense: Hacking the Mainframe
CA Technologies
 
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
CA Technologies
 
o-palerra-ROI-QuantifyCASB-WP
o-palerra-ROI-QuantifyCASB-WPo-palerra-ROI-QuantifyCASB-WP
o-palerra-ROI-QuantifyCASB-WP
Eric Opp
 
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...
CA Technologies
 
The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...
The Economist Media Businesses
 
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
incmagazineseo
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence report
Simon Clements FIRP DipRP
 
Critical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT StrategyCritical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT Strategy
CA Technologies
 
Investor Presentation
Investor PresentationInvestor Presentation
Investor Presentation
Hint Creative Group
 
Bankworld fintech Jan 2018 v.redacted
Bankworld fintech Jan 2018 v.redactedBankworld fintech Jan 2018 v.redacted
Bankworld fintech Jan 2018 v.redacted
Mona Ashour
 
Case Study: Alliant Technologies Switches to a Utility-Centric Infrastructure...
Case Study: Alliant Technologies Switches to a Utility-Centric Infrastructure...Case Study: Alliant Technologies Switches to a Utility-Centric Infrastructure...
Case Study: Alliant Technologies Switches to a Utility-Centric Infrastructure...
CA Technologies
 
Predictive vs Prescriptive Analytics
Predictive vs Prescriptive AnalyticsPredictive vs Prescriptive Analytics
Predictive vs Prescriptive Analytics
DATAVERSITY
 
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
CA Technologies
 
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
CA Technologies
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
Brencil Kaimba
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
CloudMask inc.
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016
InvestorSymantec
 
RingCentral (RNG) Equity Report
RingCentral (RNG) Equity ReportRingCentral (RNG) Equity Report
RingCentral (RNG) Equity Report
Mike Zimmer
 

Similar to How is Buying a Home Like Justifying Data Security Investments? Developing Return on Security Investment (ROSI) Analysis (20)

CA World - mft1755 - gaps in your defense hacking the mainframe - philip young
CA World - mft1755 - gaps in your defense hacking the mainframe - philip youngCA World - mft1755 - gaps in your defense hacking the mainframe - philip young
CA World - mft1755 - gaps in your defense hacking the mainframe - philip young
 
Securely Enabling the Digital Age
Securely Enabling the Digital AgeSecurely Enabling the Digital Age
Securely Enabling the Digital Age
 
Gaps in Your Defense: Hacking the Mainframe
Gaps in Your Defense: Hacking the Mainframe Gaps in Your Defense: Hacking the Mainframe
Gaps in Your Defense: Hacking the Mainframe
 
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
 
o-palerra-ROI-QuantifyCASB-WP
o-palerra-ROI-QuantifyCASB-WPo-palerra-ROI-QuantifyCASB-WP
o-palerra-ROI-QuantifyCASB-WP
 
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...
Technology Primer: Learn How Analytics Can Sort the Wheat From the Chaff and ...
 
The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...
 
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence report
 
Critical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT StrategyCritical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT Strategy
 
Investor Presentation
Investor PresentationInvestor Presentation
Investor Presentation
 
Bankworld fintech Jan 2018 v.redacted
Bankworld fintech Jan 2018 v.redactedBankworld fintech Jan 2018 v.redacted
Bankworld fintech Jan 2018 v.redacted
 
Case Study: Alliant Technologies Switches to a Utility-Centric Infrastructure...
Case Study: Alliant Technologies Switches to a Utility-Centric Infrastructure...Case Study: Alliant Technologies Switches to a Utility-Centric Infrastructure...
Case Study: Alliant Technologies Switches to a Utility-Centric Infrastructure...
 
Predictive vs Prescriptive Analytics
Predictive vs Prescriptive AnalyticsPredictive vs Prescriptive Analytics
Predictive vs Prescriptive Analytics
 
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
 
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016
 
RingCentral (RNG) Equity Report
RingCentral (RNG) Equity ReportRingCentral (RNG) Equity Report
RingCentral (RNG) Equity Report
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
CA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
CA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
CA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
CA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
CA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 

Recently uploaded (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 

How is Buying a Home Like Justifying Data Security Investments? Developing Return on Security Investment (ROSI) Analysis