SlideShare a Scribd company logo
John Yessis - Telecom and
Security
John Yessis
The telecommunications industry is one that has fallen
under the spectrum of security threats. It is a
challenging environment that has seen state-sponsored
activity, activist-based attacks, widespread malware,
and a constant and evolving array of threats. Thanks to
a constant stream of stories about computer breaches,
most people are aware of the kind of threats that affect
computer networks.
John Yessis
Such breaches inevitably reach public channels and have made big
news. Security threats over time have evolved from early and obvious
targets such as financial institutions to the purpose-driven breaches of
today. Hackers have a way of finding the softest perceived target
because the efforts to attack financial targets are too great in
comparison to those targets that have not endured as long of a history
of threat.
The telecom industry is one that is intertwined with infrastructure, utilities,
and the networking industries. One of the greatest threats in the
country today is the posture of our critical utilities in the face of
constant threats. There is repeated talk that centers on the readiness
to contend with security matters in these environments.
John Yessis
Our power grid and its various distribution points are woefully outdated in
many ways. The systems that control and manage them were
instituted in a time when there was little consideration of these kinds of
threats. The cost to innovate and replace some of the systems is
significant, but there is hope that new approaches and robust security
products can close the gap.
Telecommunications is both a target and a solution when it comes to
security threats. Telecommunications networks often form the
backbone of controls, secure transmissions, and vital information.
While interception of information is a threat that concerns many, there
is also a threat of disruption that looms over the heads of many.
John Yessis
The simple fact is that modern hackers have realized the
ability to financially impact a target through the
disruption of vital services. In some cases, the
disruption of communication services can be even
more impactful than can be described in financial
terms. An extended disruption to the power grid, for
example, could affect millions.
John Yessis
John Yessis is a sales director that works at EUS Networks. He has been
aware of security in the delivery of his solutions and products for as
long as he has been in the industry. One of the things that he shares is
that a product needs to have an inherent level of security, but it must
also be architected in a way that is resilient and hardened to outside
threats.

https://en.wikipedia.org/wiki/User:John_Yessis

https://www.linkedin.com/pub/john-yessis/46/960/125

https://www.facebook.com/John.Yessis

https://www.behance.net/johnyessis

https://johnyessis.wordpress.com/

https://www.crunchbase.com/person/john-yessis
John Yessis
John Yessis is a sales director that works at EUS Networks. He has been
aware of security in the delivery of his solutions and products for as
long as he has been in the industry. One of the things that he shares is
that a product needs to have an inherent level of security, but it must
also be architected in a way that is resilient and hardened to outside
threats.

https://en.wikipedia.org/wiki/User:John_Yessis

https://www.linkedin.com/pub/john-yessis/46/960/125

https://www.facebook.com/John.Yessis

https://www.behance.net/johnyessis

https://johnyessis.wordpress.com/

https://www.crunchbase.com/person/john-yessis

More Related Content

What's hot

CTO Cybersecurity Forum 2013 Pierre Dandjinou Promoting Cybersecurity in Africa
CTO Cybersecurity Forum 2013 Pierre Dandjinou Promoting Cybersecurity in AfricaCTO Cybersecurity Forum 2013 Pierre Dandjinou Promoting Cybersecurity in Africa
CTO Cybersecurity Forum 2013 Pierre Dandjinou Promoting Cybersecurity in Africa
Commonwealth Telecommunications Organisation
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
Russell Publishing
 
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis MPhil/MRes/BSc
 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
Commonwealth Telecommunications Organisation
 
Isoc2011 new release
Isoc2011 new releaseIsoc2011 new release
Isoc2011 new release
Elena Zvarici
 
Potential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructurePotential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical Infrastructure
Unisys Corporation
 
Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber Threat
Motorola Solutions
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
inside-BigData.com
 
Building internet safety wall understanding the imperatives of national domai...
Building internet safety wall understanding the imperatives of national domai...Building internet safety wall understanding the imperatives of national domai...
Building internet safety wall understanding the imperatives of national domai...
Commonwealth Telecommunications Organisation
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
journal ijrtem
 
AI/ML for Real-time decision-making in IT/OT
AI/ML for Real-time decision-making in IT/OTAI/ML for Real-time decision-making in IT/OT
AI/ML for Real-time decision-making in IT/OT
Justin Hayward
 
Steganography - Muheeb Ghallab
Steganography - Muheeb GhallabSteganography - Muheeb Ghallab
Steganography - Muheeb Ghallab
Fahmi Albaheth
 
Cyber security report in m asteral
Cyber security report in m asteralCyber security report in m asteral
Cyber security report in m asteral
whilma teodoro
 
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
CapitolTechU
 
Cyber-Terrorism
Cyber-TerrorismCyber-Terrorism
Cyber-Terrorism
sudheerreddy59
 
b-confident_smb_sep10_cover_story
b-confident_smb_sep10_cover_storyb-confident_smb_sep10_cover_story
b-confident_smb_sep10_cover_story
Patrick Spencer
 
Trends Affecting the Future of Cybersecurity
Trends Affecting the Future of CybersecurityTrends Affecting the Future of Cybersecurity
Trends Affecting the Future of Cybersecurity
Mason Bird
 
ITrust Company Overview EN
ITrust Company Overview ENITrust Company Overview EN
ITrust Company Overview EN
ITrust - Cybersecurity as a Service
 
3rd Annual CISO Round Table
3rd Annual CISO Round Table3rd Annual CISO Round Table
3rd Annual CISO Round Table
Vinoth Sivasubramanan
 

What's hot (19)

CTO Cybersecurity Forum 2013 Pierre Dandjinou Promoting Cybersecurity in Africa
CTO Cybersecurity Forum 2013 Pierre Dandjinou Promoting Cybersecurity in AfricaCTO Cybersecurity Forum 2013 Pierre Dandjinou Promoting Cybersecurity in Africa
CTO Cybersecurity Forum 2013 Pierre Dandjinou Promoting Cybersecurity in Africa
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
 
Isoc2011 new release
Isoc2011 new releaseIsoc2011 new release
Isoc2011 new release
 
Potential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructurePotential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical Infrastructure
 
Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber Threat
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 
Building internet safety wall understanding the imperatives of national domai...
Building internet safety wall understanding the imperatives of national domai...Building internet safety wall understanding the imperatives of national domai...
Building internet safety wall understanding the imperatives of national domai...
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
 
AI/ML for Real-time decision-making in IT/OT
AI/ML for Real-time decision-making in IT/OTAI/ML for Real-time decision-making in IT/OT
AI/ML for Real-time decision-making in IT/OT
 
Steganography - Muheeb Ghallab
Steganography - Muheeb GhallabSteganography - Muheeb Ghallab
Steganography - Muheeb Ghallab
 
Cyber security report in m asteral
Cyber security report in m asteralCyber security report in m asteral
Cyber security report in m asteral
 
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
 
Cyber-Terrorism
Cyber-TerrorismCyber-Terrorism
Cyber-Terrorism
 
b-confident_smb_sep10_cover_story
b-confident_smb_sep10_cover_storyb-confident_smb_sep10_cover_story
b-confident_smb_sep10_cover_story
 
Trends Affecting the Future of Cybersecurity
Trends Affecting the Future of CybersecurityTrends Affecting the Future of Cybersecurity
Trends Affecting the Future of Cybersecurity
 
ITrust Company Overview EN
ITrust Company Overview ENITrust Company Overview EN
ITrust Company Overview EN
 
3rd Annual CISO Round Table
3rd Annual CISO Round Table3rd Annual CISO Round Table
3rd Annual CISO Round Table
 

Viewers also liked

5. telecomm & network security
5. telecomm & network security5. telecomm & network security
5. telecomm & network security
7wounders
 
Strategyzing big data in telco industry
Strategyzing big data in telco industryStrategyzing big data in telco industry
Strategyzing big data in telco industry
Parviz Iskhakov
 
Gsm security
Gsm securityGsm security
Gsm security
Ali Kamil
 
Gsm security final
Gsm security finalGsm security final
Gsm security final
Sanket Yavalkar
 
GSM Security
GSM SecurityGSM Security
GSM Security
smita gupta
 
Customer_Communications_in_2025 whitepaper
Customer_Communications_in_2025 whitepaperCustomer_Communications_in_2025 whitepaper
Customer_Communications_in_2025 whitepaper
Anthony Chiusano
 
Proximi.io Presentation
Proximi.io PresentationProximi.io Presentation
Proximi.io Presentation
anninakoskiola
 
Javaconsult courses
Javaconsult coursesJavaconsult courses
Javaconsult courses
Simon Dineen
 
Cyber threat alerts 2011
Cyber threat alerts 2011Cyber threat alerts 2011
What Matters to Me
What Matters to MeWhat Matters to Me
What Matters to Me
Sreedevi Patnala
 
2013 ThaiCERT ANNUAL REPORT
2013 ThaiCERT ANNUAL REPORT2013 ThaiCERT ANNUAL REPORT
2013 ThaiCERT ANNUAL REPORT
Electronic Transactions Development Agency
 
Matter by Angel del Águila y María Blanco
Matter by Angel del Águila y María Blanco Matter by Angel del Águila y María Blanco
Matter by Angel del Águila y María Blanco
Luis Alfonso Andrades Castro
 
なにが選ばれたかという情報から評価関数を推定する
なにが選ばれたかという情報から評価関数を推定するなにが選ばれたかという情報から評価関数を推定する
なにが選ばれたかという情報から評価関数を推定する
Miyako Yuno
 
Streebo Manufacturing Apps Suite
Streebo Manufacturing Apps SuiteStreebo Manufacturing Apps Suite
Streebo Manufacturing Apps Suite
Streebo
 
Romell CV_PE
Romell CV_PERomell CV_PE
Romell CV_PE
Romell Alcantara
 

Viewers also liked (15)

5. telecomm & network security
5. telecomm & network security5. telecomm & network security
5. telecomm & network security
 
Strategyzing big data in telco industry
Strategyzing big data in telco industryStrategyzing big data in telco industry
Strategyzing big data in telco industry
 
Gsm security
Gsm securityGsm security
Gsm security
 
Gsm security final
Gsm security finalGsm security final
Gsm security final
 
GSM Security
GSM SecurityGSM Security
GSM Security
 
Customer_Communications_in_2025 whitepaper
Customer_Communications_in_2025 whitepaperCustomer_Communications_in_2025 whitepaper
Customer_Communications_in_2025 whitepaper
 
Proximi.io Presentation
Proximi.io PresentationProximi.io Presentation
Proximi.io Presentation
 
Javaconsult courses
Javaconsult coursesJavaconsult courses
Javaconsult courses
 
Cyber threat alerts 2011
Cyber threat alerts 2011Cyber threat alerts 2011
Cyber threat alerts 2011
 
What Matters to Me
What Matters to MeWhat Matters to Me
What Matters to Me
 
2013 ThaiCERT ANNUAL REPORT
2013 ThaiCERT ANNUAL REPORT2013 ThaiCERT ANNUAL REPORT
2013 ThaiCERT ANNUAL REPORT
 
Matter by Angel del Águila y María Blanco
Matter by Angel del Águila y María Blanco Matter by Angel del Águila y María Blanco
Matter by Angel del Águila y María Blanco
 
なにが選ばれたかという情報から評価関数を推定する
なにが選ばれたかという情報から評価関数を推定するなにが選ばれたかという情報から評価関数を推定する
なにが選ばれたかという情報から評価関数を推定する
 
Streebo Manufacturing Apps Suite
Streebo Manufacturing Apps SuiteStreebo Manufacturing Apps Suite
Streebo Manufacturing Apps Suite
 
Romell CV_PE
Romell CV_PERomell CV_PE
Romell CV_PE
 

Similar to John Yessis - Telecom and Security

cyber security guidelines.pdf
cyber security guidelines.pdfcyber security guidelines.pdf
cyber security guidelines.pdf
VarinSingh1
 
Survey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresSurvey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive Measures
IOSR Journals
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber security
John Kingsley
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber security
iFluidsEng
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety Communications
Kory Edwards
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety Communications
Kory Edwards
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptx
SharifulShishir
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
at MicroFocus Italy ❖✔
 
Darktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemDarktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystem
Austin Eppstein
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
whmillerjr
 
Security Strategies for UC
Security Strategies for UCSecurity Strategies for UC
Security Strategies for UC
Digium
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
Andrea Rossetti
 
Information systems security_awareness_fy10
Information systems security_awareness_fy10Information systems security_awareness_fy10
Information systems security_awareness_fy10
Wesen Tegegne
 
Week 3 Discussion post 3 minimum of 150 words APA FormatJudith.docx
Week 3 Discussion post 3 minimum of 150 words APA FormatJudith.docxWeek 3 Discussion post 3 minimum of 150 words APA FormatJudith.docx
Week 3 Discussion post 3 minimum of 150 words APA FormatJudith.docx
loganta
 
Dhs cybersecurity-roadmap
Dhs cybersecurity-roadmapDhs cybersecurity-roadmap
Dhs cybersecurity-roadmap
Ajay Ohri
 
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
cyberprosocial
 
Atos wp-cyberrisks
Atos wp-cyberrisksAtos wp-cyberrisks
Atos wp-cyberrisks
Henk van der Tweel
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
Adela Cocic
 
Emerging web security threats
Emerging web security threatsEmerging web security threats
Emerging web security threats
Insikt Intelligence
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
Chuck Brooks
 

Similar to John Yessis - Telecom and Security (20)

cyber security guidelines.pdf
cyber security guidelines.pdfcyber security guidelines.pdf
cyber security guidelines.pdf
 
Survey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresSurvey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive Measures
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber security
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber security
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety Communications
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety Communications
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptx
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
Darktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemDarktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystem
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
Security Strategies for UC
Security Strategies for UCSecurity Strategies for UC
Security Strategies for UC
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Information systems security_awareness_fy10
Information systems security_awareness_fy10Information systems security_awareness_fy10
Information systems security_awareness_fy10
 
Week 3 Discussion post 3 minimum of 150 words APA FormatJudith.docx
Week 3 Discussion post 3 minimum of 150 words APA FormatJudith.docxWeek 3 Discussion post 3 minimum of 150 words APA FormatJudith.docx
Week 3 Discussion post 3 minimum of 150 words APA FormatJudith.docx
 
Dhs cybersecurity-roadmap
Dhs cybersecurity-roadmapDhs cybersecurity-roadmap
Dhs cybersecurity-roadmap
 
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
 
Atos wp-cyberrisks
Atos wp-cyberrisksAtos wp-cyberrisks
Atos wp-cyberrisks
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Emerging web security threats
Emerging web security threatsEmerging web security threats
Emerging web security threats
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
 

Recently uploaded

Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 

Recently uploaded (20)

Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 

John Yessis - Telecom and Security

  • 1. John Yessis - Telecom and Security
  • 2. John Yessis The telecommunications industry is one that has fallen under the spectrum of security threats. It is a challenging environment that has seen state-sponsored activity, activist-based attacks, widespread malware, and a constant and evolving array of threats. Thanks to a constant stream of stories about computer breaches, most people are aware of the kind of threats that affect computer networks.
  • 3. John Yessis Such breaches inevitably reach public channels and have made big news. Security threats over time have evolved from early and obvious targets such as financial institutions to the purpose-driven breaches of today. Hackers have a way of finding the softest perceived target because the efforts to attack financial targets are too great in comparison to those targets that have not endured as long of a history of threat. The telecom industry is one that is intertwined with infrastructure, utilities, and the networking industries. One of the greatest threats in the country today is the posture of our critical utilities in the face of constant threats. There is repeated talk that centers on the readiness to contend with security matters in these environments.
  • 4. John Yessis Our power grid and its various distribution points are woefully outdated in many ways. The systems that control and manage them were instituted in a time when there was little consideration of these kinds of threats. The cost to innovate and replace some of the systems is significant, but there is hope that new approaches and robust security products can close the gap. Telecommunications is both a target and a solution when it comes to security threats. Telecommunications networks often form the backbone of controls, secure transmissions, and vital information. While interception of information is a threat that concerns many, there is also a threat of disruption that looms over the heads of many.
  • 5. John Yessis The simple fact is that modern hackers have realized the ability to financially impact a target through the disruption of vital services. In some cases, the disruption of communication services can be even more impactful than can be described in financial terms. An extended disruption to the power grid, for example, could affect millions.
  • 6. John Yessis John Yessis is a sales director that works at EUS Networks. He has been aware of security in the delivery of his solutions and products for as long as he has been in the industry. One of the things that he shares is that a product needs to have an inherent level of security, but it must also be architected in a way that is resilient and hardened to outside threats.  https://en.wikipedia.org/wiki/User:John_Yessis  https://www.linkedin.com/pub/john-yessis/46/960/125  https://www.facebook.com/John.Yessis  https://www.behance.net/johnyessis  https://johnyessis.wordpress.com/  https://www.crunchbase.com/person/john-yessis
  • 7. John Yessis John Yessis is a sales director that works at EUS Networks. He has been aware of security in the delivery of his solutions and products for as long as he has been in the industry. One of the things that he shares is that a product needs to have an inherent level of security, but it must also be architected in a way that is resilient and hardened to outside threats.  https://en.wikipedia.org/wiki/User:John_Yessis  https://www.linkedin.com/pub/john-yessis/46/960/125  https://www.facebook.com/John.Yessis  https://www.behance.net/johnyessis  https://johnyessis.wordpress.com/  https://www.crunchbase.com/person/john-yessis