This document summarizes a presentation on internet and cyber security trends given in Copenhagen in 2014. It discusses how security risks have evolved from focusing on personal computers to broader issues around cloud computing and the growing "Internet of Things." The presentation notes that while cloud services may be more professionally managed, they also give users less control over their data. It predicts the IT security industry will change significantly with the rise of internet-connected devices and a possible backlash against cloud computing. Open source software will be important to solutions, and new legislation may be needed to address security issues from devices in areas like healthcare, transportation and disclosure of breaches.
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Rick Huijbregts
60 minute lecture to Harvard GSD Exec. Edu Leading Organizations course. February 5th. Boston. MA.
Trends in technology. Smart Cities. Impact on business, infrastructure, and real estate. What it takes to manage this change. Our role and participation in the journey of City transformation.
Will the highly hyped technologies change telco and media industries? - Presented by Bertrand Copigneaux, IDATE at London Breakfast Club on 11 Sep 2018
*** SHARED WITH PERMISSION ***
Talk presented at the INDIN2019 conference. Abstract:
This talk presents how IEEE P1451.99 can help autonomous systems to interact (autonomously) with other autonomous systems, operated under different domains and by different controllers. Autonomous Systems need AI and Informatics and the cloud to successfully interoperate. This demands a standard for interoperability… IEEE P1451.99 standard proposal presently under development, defines an architecture and federated, globally scalable communication infrastructure that includes support for security, ownership, consent-based privacy, decentralized (edge) processing, discovery, deterministic decision support, legal identities, smart contracts and monetization. It provides a means for owners of things to define rules, and for autonomous devices to find other devices, sign legally binding agreements and (co)operate with them. It also protects against malicious use. The infrastructure counts usage, which is used to create billing instructions, providing a means for a Return of Investment for owners in Cross-Domain autonomous systems. The economic feedback model also provides an efficient means to optimize industrial processes autonomously using third party systems.
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Rick Huijbregts
60 minute lecture to Harvard GSD Exec. Edu Leading Organizations course. February 5th. Boston. MA.
Trends in technology. Smart Cities. Impact on business, infrastructure, and real estate. What it takes to manage this change. Our role and participation in the journey of City transformation.
Will the highly hyped technologies change telco and media industries? - Presented by Bertrand Copigneaux, IDATE at London Breakfast Club on 11 Sep 2018
*** SHARED WITH PERMISSION ***
Talk presented at the INDIN2019 conference. Abstract:
This talk presents how IEEE P1451.99 can help autonomous systems to interact (autonomously) with other autonomous systems, operated under different domains and by different controllers. Autonomous Systems need AI and Informatics and the cloud to successfully interoperate. This demands a standard for interoperability… IEEE P1451.99 standard proposal presently under development, defines an architecture and federated, globally scalable communication infrastructure that includes support for security, ownership, consent-based privacy, decentralized (edge) processing, discovery, deterministic decision support, legal identities, smart contracts and monetization. It provides a means for owners of things to define rules, and for autonomous devices to find other devices, sign legally binding agreements and (co)operate with them. It also protects against malicious use. The infrastructure counts usage, which is used to create billing instructions, providing a means for a Return of Investment for owners in Cross-Domain autonomous systems. The economic feedback model also provides an efficient means to optimize industrial processes autonomously using third party systems.
This is a talk which I gave to the Brighton IoT Forum on 23/03/2016. It looks at the challenges of scaling IoT security from the perspective of protection of critical national infrastructure from cyber-attack. It then campares this to the security scaling challenges of a small startup business with a great product idea. The presentation concludes that there are similarities between both 'micro' and 'macro' IoT scaling scenarios. In both cases it is essential to cultivate a 'security mindset'.
Neotel is South Africa’s first converged telecommunications network operator, providing business, wholesale, and consumer voice and data services. Cisco Smart Net Total CareTM provides Neotel with proactive support to optimise and secure the network, solving problems faster, improving operational efficiency, and reducing the risk of downtime.“Smart Net Total Care has proactively supported, optimised, and secured our network performance, allowing us to pay more attention to the running of our business.”
— Chala Rao, Chief Network Officer, Neotel
IIoT solutions are providing operators with massive volumes of data while making it easier to apply them to improvements in quality and efficiency. However, the cybersecurity risk to IIoT solutions is often overlooked. Many IIoT devices reside on networks that use open connections such as Wi-Fi, cellular, or satellite. Those could inadvertently increase an ICS threat surface.
Participants in this session will learn how to configure new and existing IIoT devices in a manner that will continue providing the value of the IIoT solution while reducing the exposure to cyberattacks. Guidelines will also be provided in cases of IIoT devices, which do provide inherent security configuration options.
Most organisations are already working towards GDPR compliance. Due to different situations including lack of awareness, availability of funds, scarcity of experienced Data Protection specialists, high work load, etc. some companies will not be ready by the deadline of 25th May 2018.
During our session we will cover some of the key questions facing businesses who are not certain they will be prepared in time.
Join us to discuss these and your own questions with Rogelio Aguilar, Sungard AS Data Protection Sr Consultant
Smart City Lab 6 - Decision Support for your DevicesPeter Waher
For things to be able to make good security decisions in an ad hoc network, it needs support from the infrastructure. We will explore how to provide decision support to devices, allowing their owners to control who are allowed to connect with them, who can read data from them and what type of data, and finally who are allowed to control them and what operations are allowed.
Originally presented at PRIMMA mobile privacy workshop, Imperial College London, 23 Sep 2010. Updated version given at Security and Privacy in Implantable Medical Devices workshop, EPFL, 1 April 2011, and a German Academy of Engineering conference in Berlin on 26 March 2012. Compact version given at Urban Prototyping conference, Imperial College London, 9 April 2013. Updated with ENISA privacy engineering report for 3rd Latin American Data Protection conference in Medellin, 28-29 May 2015.
This is a proof-of-concept about creating a creditable, publicly-available, freely-available, and openly-available ICS and SCADA event and incident database.
Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?3G4G
Presented by David Wood, Principal, Delta Wisdom
In this talk anticipating future scenarios for smart devices, futurist and smartphone industry pioneer David Wood suggests answers to a number of key questions. What are the key trends we should be watching, to see if they'll ever emerge from a slow disappointing phase into a fast and furious phase? How might these trends combine to shake up present-day usage patterns? Will the successors of the smartphone accelerate a Brave New World, and/or make Black Mirror a reality? And what can we learn from past predictions of future smartphone scenarios?
*** Shared with Permission ***
In this on-demand webinar learn about:
- How cloud data encryption and tokenization can be applied in the cloud
- Use cases of enterprises implementing encryption and tokenization to protect data in the cloud
- A live demo of cloud encryption and tokenization technologies in action
This talk summarizes the state of IoT security, specifically as it relates to Industrial Control and Energy. When hearing the buzz-word “Internet of Things,” we typically think of the consumer world: smart toasters and connected fridges. However, there is a staggering number of networked embedded devices that perform life- and mission-critical tasks that our daily lives depend on. Industrial Control Systems (ICS) are not unique snowflakes anymore but use the same ubiquitous technology as found in consumer IoT Devices. This presentation summarizes our experiences at Senrio exploiting embedded system and discusses the reasons why these insecure design patterns exist; including business drivers and technology factors. We will share stories and anecdotes based on 10 years of research, training and consulting (including real vulnerabilities and how they work).
A short journey to explain IIoT The Industrial Internet of things, IND4.0 from IND1.0 and Big Data. How PROFINET is placed as the ideal Industrial Fieldbus to fulfil the above, how its implemented and why you should consider it. Some of the myths explained.
Presented at (ISC)2 Security Congress EMEA 2014 - Mobile Security Track
This presentation discusses attacks and defenses for secure data storage and secure communication in mobile apps. Assume your mobile apps will be attacked and build security in to defend them.
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
As a novel computing platform in network, IoT will bring many security challenges to enterprise networks, and create new opportunities for security industry. This talk will provide a general overview of enterprise network security problems, especially the data security, caused by IoT. After that, a few existing security technologies are evaluated as necessary elements of a holistic network security that cover IoT devices. These technologies include : (a) IoT security monitoring and control; (b) FOTA for firmware vulnerability management; (c) NetFlow based big data security analysis. In the end, the practice of standard security protocols (such as OpenIoC and IODEF) will be strongly advocated for delivering effective IoT security solutions.
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...gogo6
Download our special report, IoT Tech for the Manager: http://bit.ly/report1-slideshare
The IoT Food Chain – Picking the Right Dining Partner is Important as presented at the IoT Inc Business' fourteenth Meetup. See: http://www.iot-inc.com/internet-of-things-value-chain-meetup/
In our fourteenth Meetup we have Dean Freeman, Research VP at Gartner presenting “The IoT Food Chain – Picking the Right Dining Partner is Important”.
Presentation Abstract
The Internet of Things means many different things to different people. What is key about the IoT is there is a distinct food chain that runs from the silicon devices to the services and then back. The level of success you will have in the IoT is heavily dependent upon where you fit in the food chain, and if you have the capability to move up the chain or across the chain into different verticals. In this presentation we will explore the food chain, what is important and what steps need to be taken to succeed in the world of the IoT.
This is a talk which I gave to the Brighton IoT Forum on 23/03/2016. It looks at the challenges of scaling IoT security from the perspective of protection of critical national infrastructure from cyber-attack. It then campares this to the security scaling challenges of a small startup business with a great product idea. The presentation concludes that there are similarities between both 'micro' and 'macro' IoT scaling scenarios. In both cases it is essential to cultivate a 'security mindset'.
Neotel is South Africa’s first converged telecommunications network operator, providing business, wholesale, and consumer voice and data services. Cisco Smart Net Total CareTM provides Neotel with proactive support to optimise and secure the network, solving problems faster, improving operational efficiency, and reducing the risk of downtime.“Smart Net Total Care has proactively supported, optimised, and secured our network performance, allowing us to pay more attention to the running of our business.”
— Chala Rao, Chief Network Officer, Neotel
IIoT solutions are providing operators with massive volumes of data while making it easier to apply them to improvements in quality and efficiency. However, the cybersecurity risk to IIoT solutions is often overlooked. Many IIoT devices reside on networks that use open connections such as Wi-Fi, cellular, or satellite. Those could inadvertently increase an ICS threat surface.
Participants in this session will learn how to configure new and existing IIoT devices in a manner that will continue providing the value of the IIoT solution while reducing the exposure to cyberattacks. Guidelines will also be provided in cases of IIoT devices, which do provide inherent security configuration options.
Most organisations are already working towards GDPR compliance. Due to different situations including lack of awareness, availability of funds, scarcity of experienced Data Protection specialists, high work load, etc. some companies will not be ready by the deadline of 25th May 2018.
During our session we will cover some of the key questions facing businesses who are not certain they will be prepared in time.
Join us to discuss these and your own questions with Rogelio Aguilar, Sungard AS Data Protection Sr Consultant
Smart City Lab 6 - Decision Support for your DevicesPeter Waher
For things to be able to make good security decisions in an ad hoc network, it needs support from the infrastructure. We will explore how to provide decision support to devices, allowing their owners to control who are allowed to connect with them, who can read data from them and what type of data, and finally who are allowed to control them and what operations are allowed.
Originally presented at PRIMMA mobile privacy workshop, Imperial College London, 23 Sep 2010. Updated version given at Security and Privacy in Implantable Medical Devices workshop, EPFL, 1 April 2011, and a German Academy of Engineering conference in Berlin on 26 March 2012. Compact version given at Urban Prototyping conference, Imperial College London, 9 April 2013. Updated with ENISA privacy engineering report for 3rd Latin American Data Protection conference in Medellin, 28-29 May 2015.
This is a proof-of-concept about creating a creditable, publicly-available, freely-available, and openly-available ICS and SCADA event and incident database.
Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?3G4G
Presented by David Wood, Principal, Delta Wisdom
In this talk anticipating future scenarios for smart devices, futurist and smartphone industry pioneer David Wood suggests answers to a number of key questions. What are the key trends we should be watching, to see if they'll ever emerge from a slow disappointing phase into a fast and furious phase? How might these trends combine to shake up present-day usage patterns? Will the successors of the smartphone accelerate a Brave New World, and/or make Black Mirror a reality? And what can we learn from past predictions of future smartphone scenarios?
*** Shared with Permission ***
In this on-demand webinar learn about:
- How cloud data encryption and tokenization can be applied in the cloud
- Use cases of enterprises implementing encryption and tokenization to protect data in the cloud
- A live demo of cloud encryption and tokenization technologies in action
This talk summarizes the state of IoT security, specifically as it relates to Industrial Control and Energy. When hearing the buzz-word “Internet of Things,” we typically think of the consumer world: smart toasters and connected fridges. However, there is a staggering number of networked embedded devices that perform life- and mission-critical tasks that our daily lives depend on. Industrial Control Systems (ICS) are not unique snowflakes anymore but use the same ubiquitous technology as found in consumer IoT Devices. This presentation summarizes our experiences at Senrio exploiting embedded system and discusses the reasons why these insecure design patterns exist; including business drivers and technology factors. We will share stories and anecdotes based on 10 years of research, training and consulting (including real vulnerabilities and how they work).
A short journey to explain IIoT The Industrial Internet of things, IND4.0 from IND1.0 and Big Data. How PROFINET is placed as the ideal Industrial Fieldbus to fulfil the above, how its implemented and why you should consider it. Some of the myths explained.
Presented at (ISC)2 Security Congress EMEA 2014 - Mobile Security Track
This presentation discusses attacks and defenses for secure data storage and secure communication in mobile apps. Assume your mobile apps will be attacked and build security in to defend them.
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
As a novel computing platform in network, IoT will bring many security challenges to enterprise networks, and create new opportunities for security industry. This talk will provide a general overview of enterprise network security problems, especially the data security, caused by IoT. After that, a few existing security technologies are evaluated as necessary elements of a holistic network security that cover IoT devices. These technologies include : (a) IoT security monitoring and control; (b) FOTA for firmware vulnerability management; (c) NetFlow based big data security analysis. In the end, the practice of standard security protocols (such as OpenIoC and IODEF) will be strongly advocated for delivering effective IoT security solutions.
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...gogo6
Download our special report, IoT Tech for the Manager: http://bit.ly/report1-slideshare
The IoT Food Chain – Picking the Right Dining Partner is Important as presented at the IoT Inc Business' fourteenth Meetup. See: http://www.iot-inc.com/internet-of-things-value-chain-meetup/
In our fourteenth Meetup we have Dean Freeman, Research VP at Gartner presenting “The IoT Food Chain – Picking the Right Dining Partner is Important”.
Presentation Abstract
The Internet of Things means many different things to different people. What is key about the IoT is there is a distinct food chain that runs from the silicon devices to the services and then back. The level of success you will have in the IoT is heavily dependent upon where you fit in the food chain, and if you have the capability to move up the chain or across the chain into different verticals. In this presentation we will explore the food chain, what is important and what steps need to be taken to succeed in the world of the IoT.
HP Enterprise Security Products - Intelligent Security & Risk management Platform, una risposta globale e proattiva alle nuove sfide del mercato della sicurezza.
Pierpaolo Ali' , HP Enterprise Security Product - Sales Director Italy
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
In this webcast, KuppingerCole´s Principal Analyst Martin Kuppinger will introduce the concept of Identity Management for the Internet of Things. Following Martin's opening talk, ForgeRock´s Gerhard Zehethofer will discuss how ForgeRock is now extending these capabilities into the areas of managed and unmanaged devices, enhancing the customer experience as well as security and privacy at scale for people, services, and things.
Webinar: Securing IoT with FIDO AuthenticationFIDO Alliance
IDC estimates that there will be 41.6 billion connected IoT devices by 2025, opening up opportunities for increased efficiencies and innovation across industries. Yet, lack of IoT security standards and typical processes such as shipping with default password credentials and manual onboarding leave devices, and the networks they operate on, open to large-scale attack.
Last summer, the FIDO Alliance announced a new standards initiative to tackle these security issues in IoT. The Alliance’s IoT Technical Working Group aims to provide a comprehensive authentication framework for IoT devices in keeping with the fundamental mission of the Alliance – passwordless authentication. These webinar slides provide an update on this new work area, including:
--How FIDO Authentication and existing specifications fit into the IoT ecosystem today
--The charter and goals of the IoT TWG, including development of specifications for IoT device attestation/authentication profiles to enable interoperability between service providers and IoT devices; automated onboarding, and binding of applications and/or users to IoT devices; and IoT device authentication and provisioning via smart routers and IoT hubs
--The progress of the working group to date, including the use case and target architectures the IoT TWG is looking at as a foundation for its specifications and certification program
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...Cloud Native Day Tel Aviv
As the public, private and consumer sectors rush to the cloud, the main hurdles are not feasibility or sensor/network price.
They are -Complexity of deployment due to inadequate IOT standards, inability to guarantee performance, and a growing fear of the liabilities generated by holding and processing data with privacy aspects.
Top 10 tips for effective SOC/NOC collaboration or integrationSridhar Karnam
Top 10 tips for effective SOC/NOC collaboration or integration. In 5 years the security operation center and IT operation center will integrate and bring more context to security events and help to search, store, and analyze machine data for operational intelligence
Without the right data management strategy, investments in Internet of Things (IoT) can yield limited results. Cloudera is pioneering next generation data management solutions, enabling organizations to build an enterprise data hub (EDH) as the backbone to any IoT initiative.
By 2020, more than 25 billion devices will have extensive Internet capabilities. These range from your refrigerator and other consumer electronics and our connected cars. Along the way there are several challenges to overcome in providing a secure platform for our Internet of things, among them the limited performance and memory of the device, the ever increasing volume of data and rising demand of users within given standards. The detection of Cyber-threats in real time and prevention of dynamic attacks as they occur will be essential for the success of the Internet of Things and Industrie4.0. Christian Milde will explain how we will address these issues.
My presentation (in Danish) at the second day (21 April 2012) of the annual meeting of the Danish Association of Media and Entertainment Law at Sophienberg, Copenhagen, on openness, sharing and new business models post ACTA
My presentation (in Danish) at the first day (20 April 2012) of the annual meeting of the Danish Association of Media and Entertainment Law at Sophienberg, Copenhagen, on the new intermediaries of the publishing industry
My presentation on the trend towards more permissive licensing in open source at Itechlaw Asia 2012 on 23 February 2012 in Bangalore. My paper for the presentation can be downloaded at http://cl.ly/282g0I0q450g2A2T1M1M
My presentation on "Balancen mellem hensynet til rettighedshavere og til brugere i forbindelse med ophavsrettens udvikling" at Going Local 2011, København: Digitalt indhold som driver for det digitale indre marked, 8 December 2011, cf. http://ec.europa.eu/information_society/events/cf/daelocal/item-display.cfm?id=7016&lang=en
My presentation (in Danish) on open business models from seminar at the Danish IT-University 6 December 2011. This presentation is largely identical with the previous presentation dated 30 November 2011
Min præsentation på dansk på Seminar 1: Åbne forretningsmodeller i SMV servicevirksomheder der innoverer kl. 13 – 16, onsdag den 30. november 2011
hos Teknologisk Institut
Gregersensvej 3, Indgang 3, lokale 36, 2630 Taastrup
My slides for presentation in Copenhagen 11 November 2011 on Creative Commons at the "Sharing is caring: Digitized cultural heritage for all" seminar organized by the Association of Danish Museums
The slides - based on my first attempt with a Prezi presentation - for a presentation at conference on entreprenuership at Danish Confederation of Industries that took place 31 March 2011
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
20. Thank You
Martin von Haller Grønbæk
Mobile: +45 40 73 19 14
Email: Martin.vonhaller@twobirds.com
Bird & Bird is an international legal practice comprising Bird & Bird LLP and its affiliated and associated businesses.
Bird & Bird LLP is a limited liability partnership, registered in England and Wales with registered number OC340318 and is authorised and regulated by the
Solicitors Regulation Authority. Its registered office and principal place of business is at 15 Fetter Lane, London EC4A 1JP. A list of members of Bird & Bird LLP and
of any non-members who are designated as partners, and of their respective professional qualifications, is open to inspection at that address.
twobirds.com