SlideShare a Scribd company logo
Cybersecurity
CHALLENGES AND OPPORTUNITY
Karel Obluk
Cybersecurity – Segments
• Global
• Critical infrastructure
• Geo-political
Cybersecurity – Segments
• Global
• Personal
• Money
• Privacy – stealing
your info & identity
Cybersecurity – Segments
• Global
• Personal
• Data
• Personal,
company sensitivedata
Global – Infrastructure
• Espionage
• Snowden,China
• Cyber Warfare
• Estonia,Georgia, Iran
• Critical infrastructure
• US North-East blackout
• Emergency systems
• Typically state-sponsored
Global – Economy
• Target, Sony, TalkTalk
• massive attacks, lots of sensitive data, trade secrets
• company value, significant economical impact
• Aetna, Anthem, BlueCross
• Bangladesh central bank / SWIFT
• WHO?
• Criminals, hacktivists, bored geeks
• Also state sponsored?
Personal
• Stealing money from your bank account, ransomware
• guessing passwords, sending money elsewhere
• Electronic currencies, virtual valuables
• Games, virtual objects– World of Warcraft,...
• Who andWhy?
• Criminals
• Obtaining tools and means
for other attacks
Identity
Identity
• Social Networks
• Fake Facebook, LinkedIn accounts
• intelligence, constructing spear-headed attacks
• Social engineering
• Pictures, relationships
• Dating sites, sensitive info
• Even cost lives!
Personal Information
• Location
• Behaviour - patterns
• IoT, Devices
• Amount of info collected
• Security (or lack of it)
• Value of data
Data
• The good
• Product recommendations
• Predictions and forecasting
• But also the bad!
• Manipulating stock
• Ad-business
• Wait!
Data
• The good
• Product recommendations
• Predictions and forecasting
• Ad-business
• But also the bad!
• Manipulating stock
• Ad-business
Opportunity
• Education and Training
• Shortage ofsecurity experts
• Test systems, “labs”,simulation - for experts
• Basic training,education,certification - for normal users
• Security Tools and Frameworks
• Securing protocolsand applications
• Virtualisation,device management
• Exploit detection,attack detection and prevention
• Back-end systems,web applications- strengthening,
Opportunity
• Network infrastructure
• Deception tools and frameworks
• Using data analytics to identify good or bad
• Network, endpoints, mobile devices, access to resources
• SIEM / log analysis
• User Behaviour Analysis
• Anomalies, suspicious activity - spotting new trends, …
• Authentication
• Passwords = cockroaches of the web…
Questions?

More Related Content

What's hot

Tips memulai karir di cybersecurity
Tips memulai karir di cybersecurityTips memulai karir di cybersecurity
Tips memulai karir di cybersecurity
PT Datacomm Diangraha
 
Hackers
HackersHackers
Identity theft and data responsibilities
Identity theft and data responsibilitiesIdentity theft and data responsibilities
Identity theft and data responsibilities
Peter Henley
 
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party RiskUsing SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
SurfWatch Labs
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
silambarasansam
 
Computer security chapter 2: About Hacking
Computer security chapter 2: About Hacking Computer security chapter 2: About Hacking
Computer security chapter 2: About Hacking
Theko Moima
 
Intro
IntroIntro
Intro
Kalkey
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
penetration Tester
 
OSINT
OSINTOSINT
Protecting the Crown Jewels from Devastating Data Breaches
Protecting the Crown Jewels from Devastating Data BreachesProtecting the Crown Jewels from Devastating Data Breaches
Protecting the Crown Jewels from Devastating Data Breaches
Lancope, Inc.
 
Hacking-Basics
Hacking-BasicsHacking-Basics
Hacking-Basics
Gaurav Singh
 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
Jeremiah Tillman
 
NRF Presentation v2
NRF Presentation v2NRF Presentation v2
NRF Presentation v2
Pete Pouridis
 
Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINT
Adam Compton
 
Hacking-coffee and latte
Hacking-coffee and latteHacking-coffee and latte
Hacking-coffee and latte
coffeeandlatte
 
Information Security - Foundations and basic understanding
Information Security - Foundations and basic understanding Information Security - Foundations and basic understanding
Information Security - Foundations and basic understanding
Facundo Mauricio
 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligence
balakumaran779
 
IT Risk Management In The Age of Wikileaks
IT Risk Management In The Age of WikileaksIT Risk Management In The Age of Wikileaks
IT Risk Management In The Age of Wikileaks
Anderson Ruysam, BBA (IS) CISSP, CRISC, DevSecOps
 
Hacking
HackingHacking
Hacking
Jay Janodia
 
Leone ct#1 presentation 1
Leone ct#1 presentation 1Leone ct#1 presentation 1
Leone ct#1 presentation 1
vincentleone
 

What's hot (20)

Tips memulai karir di cybersecurity
Tips memulai karir di cybersecurityTips memulai karir di cybersecurity
Tips memulai karir di cybersecurity
 
Hackers
HackersHackers
Hackers
 
Identity theft and data responsibilities
Identity theft and data responsibilitiesIdentity theft and data responsibilities
Identity theft and data responsibilities
 
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party RiskUsing SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Computer security chapter 2: About Hacking
Computer security chapter 2: About Hacking Computer security chapter 2: About Hacking
Computer security chapter 2: About Hacking
 
Intro
IntroIntro
Intro
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
OSINT
OSINTOSINT
OSINT
 
Protecting the Crown Jewels from Devastating Data Breaches
Protecting the Crown Jewels from Devastating Data BreachesProtecting the Crown Jewels from Devastating Data Breaches
Protecting the Crown Jewels from Devastating Data Breaches
 
Hacking-Basics
Hacking-BasicsHacking-Basics
Hacking-Basics
 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
 
NRF Presentation v2
NRF Presentation v2NRF Presentation v2
NRF Presentation v2
 
Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINT
 
Hacking-coffee and latte
Hacking-coffee and latteHacking-coffee and latte
Hacking-coffee and latte
 
Information Security - Foundations and basic understanding
Information Security - Foundations and basic understanding Information Security - Foundations and basic understanding
Information Security - Foundations and basic understanding
 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligence
 
IT Risk Management In The Age of Wikileaks
IT Risk Management In The Age of WikileaksIT Risk Management In The Age of Wikileaks
IT Risk Management In The Age of Wikileaks
 
Hacking
HackingHacking
Hacking
 
Leone ct#1 presentation 1
Leone ct#1 presentation 1Leone ct#1 presentation 1
Leone ct#1 presentation 1
 

Viewers also liked

Are You Prepared? Cybersecurity Trends & Opportunities (Ed Valdez)
Are You Prepared? Cybersecurity Trends & Opportunities (Ed Valdez)  Are You Prepared? Cybersecurity Trends & Opportunities (Ed Valdez)
Are You Prepared? Cybersecurity Trends & Opportunities (Ed Valdez)
Ed Valdez
 
Cyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdfCyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdf
Mitch Cardoza, SPHR, Workforce Solutions Exec.
 
моторное развитие дошкольников с речевой патологией
моторное развитие дошкольников с речевой патологиеймоторное развитие дошкольников с речевой патологией
моторное развитие дошкольников с речевой патологией
Валерия Кулеш
 
Flaviu Simihaian (iMedicare) - How to Sell your First Customers
Flaviu Simihaian (iMedicare) - How to Sell your First CustomersFlaviu Simihaian (iMedicare) - How to Sell your First Customers
Flaviu Simihaian (iMedicare) - How to Sell your First Customers
Techsylvania
 
Wallace Wu (Misfit) - Wearable 2.0: Tech + Fashion
Wallace Wu (Misfit) - Wearable 2.0: Tech + FashionWallace Wu (Misfit) - Wearable 2.0: Tech + Fashion
Wallace Wu (Misfit) - Wearable 2.0: Tech + Fashion
Techsylvania
 
Dmfa let's talk production final.
Dmfa let's talk production final.Dmfa let's talk production final.
Dmfa let's talk production final.
Nonprofit_Education
 
FORCE
FORCEFORCE
Album csr adirect "Sahur Goes To Panti"
Album csr adirect "Sahur Goes To Panti"Album csr adirect "Sahur Goes To Panti"
Album csr adirect "Sahur Goes To Panti"
rizkyadhechurnia
 
Prace konkursowe - Niemiecka Sofa - lipiec 2014
Prace konkursowe - Niemiecka Sofa - lipiec 2014Prace konkursowe - Niemiecka Sofa - lipiec 2014
Prace konkursowe - Niemiecka Sofa - lipiec 2014
NiemieckaSofa
 
Thomas Roth-Berghofer (University of West London) – Artificial Intelligence -...
Thomas Roth-Berghofer (University of West London) – Artificial Intelligence -...Thomas Roth-Berghofer (University of West London) – Artificial Intelligence -...
Thomas Roth-Berghofer (University of West London) – Artificial Intelligence -...
Techsylvania
 
поделка «подсолнух» с использование природного
поделка «подсолнух» с использование природногоподелка «подсолнух» с использование природного
поделка «подсолнух» с использование природного
Валерия Кулеш
 
Jon Soberg (Expansive Ventures) – Expansive Horizons - Taking on New Markets
Jon Soberg (Expansive Ventures) – Expansive Horizons - Taking on New MarketsJon Soberg (Expansive Ventures) – Expansive Horizons - Taking on New Markets
Jon Soberg (Expansive Ventures) – Expansive Horizons - Taking on New Markets
Techsylvania
 
Cristiano Betta (PayPal) – Hackathons on Rails
Cristiano Betta (PayPal) – Hackathons on RailsCristiano Betta (PayPal) – Hackathons on Rails
Cristiano Betta (PayPal) – Hackathons on Rails
Techsylvania
 
Агрегатор проверок. Demo day#2
Агрегатор проверок. Demo day#2Агрегатор проверок. Demo day#2
Агрегатор проверок. Demo day#2
pshelk
 
Unscramble the words
Unscramble the wordsUnscramble the words
Unscramble the words
olga31_2014
 
цветочная фея
цветочная феяцветочная фея
цветочная фея
Валерия Кулеш
 
7 errores financieros capacitacion virtual
7 errores financieros capacitacion virtual7 errores financieros capacitacion virtual
7 errores financieros capacitacion virtual
CONEXION TIENS
 
Scraps for bronze with a strong background for business
Scraps for bronze with a strong background for businessScraps for bronze with a strong background for business
Scraps for bronze with a strong background for business
Pedro Gonzalez, PMP®
 
Garcinia cambogia: nuovo estratto miracoloso per perdere peso velocemente. Tu...
Garcinia cambogia: nuovo estratto miracoloso per perdere peso velocemente. Tu...Garcinia cambogia: nuovo estratto miracoloso per perdere peso velocemente. Tu...
Garcinia cambogia: nuovo estratto miracoloso per perdere peso velocemente. Tu...
muddledreferee887
 
Bab 1 (1)
Bab 1 (1)Bab 1 (1)
Bab 1 (1)
The Viking Dead
 

Viewers also liked (20)

Are You Prepared? Cybersecurity Trends & Opportunities (Ed Valdez)
Are You Prepared? Cybersecurity Trends & Opportunities (Ed Valdez)  Are You Prepared? Cybersecurity Trends & Opportunities (Ed Valdez)
Are You Prepared? Cybersecurity Trends & Opportunities (Ed Valdez)
 
Cyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdfCyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdf
 
моторное развитие дошкольников с речевой патологией
моторное развитие дошкольников с речевой патологиеймоторное развитие дошкольников с речевой патологией
моторное развитие дошкольников с речевой патологией
 
Flaviu Simihaian (iMedicare) - How to Sell your First Customers
Flaviu Simihaian (iMedicare) - How to Sell your First CustomersFlaviu Simihaian (iMedicare) - How to Sell your First Customers
Flaviu Simihaian (iMedicare) - How to Sell your First Customers
 
Wallace Wu (Misfit) - Wearable 2.0: Tech + Fashion
Wallace Wu (Misfit) - Wearable 2.0: Tech + FashionWallace Wu (Misfit) - Wearable 2.0: Tech + Fashion
Wallace Wu (Misfit) - Wearable 2.0: Tech + Fashion
 
Dmfa let's talk production final.
Dmfa let's talk production final.Dmfa let's talk production final.
Dmfa let's talk production final.
 
FORCE
FORCEFORCE
FORCE
 
Album csr adirect "Sahur Goes To Panti"
Album csr adirect "Sahur Goes To Panti"Album csr adirect "Sahur Goes To Panti"
Album csr adirect "Sahur Goes To Panti"
 
Prace konkursowe - Niemiecka Sofa - lipiec 2014
Prace konkursowe - Niemiecka Sofa - lipiec 2014Prace konkursowe - Niemiecka Sofa - lipiec 2014
Prace konkursowe - Niemiecka Sofa - lipiec 2014
 
Thomas Roth-Berghofer (University of West London) – Artificial Intelligence -...
Thomas Roth-Berghofer (University of West London) – Artificial Intelligence -...Thomas Roth-Berghofer (University of West London) – Artificial Intelligence -...
Thomas Roth-Berghofer (University of West London) – Artificial Intelligence -...
 
поделка «подсолнух» с использование природного
поделка «подсолнух» с использование природногоподелка «подсолнух» с использование природного
поделка «подсолнух» с использование природного
 
Jon Soberg (Expansive Ventures) – Expansive Horizons - Taking on New Markets
Jon Soberg (Expansive Ventures) – Expansive Horizons - Taking on New MarketsJon Soberg (Expansive Ventures) – Expansive Horizons - Taking on New Markets
Jon Soberg (Expansive Ventures) – Expansive Horizons - Taking on New Markets
 
Cristiano Betta (PayPal) – Hackathons on Rails
Cristiano Betta (PayPal) – Hackathons on RailsCristiano Betta (PayPal) – Hackathons on Rails
Cristiano Betta (PayPal) – Hackathons on Rails
 
Агрегатор проверок. Demo day#2
Агрегатор проверок. Demo day#2Агрегатор проверок. Demo day#2
Агрегатор проверок. Demo day#2
 
Unscramble the words
Unscramble the wordsUnscramble the words
Unscramble the words
 
цветочная фея
цветочная феяцветочная фея
цветочная фея
 
7 errores financieros capacitacion virtual
7 errores financieros capacitacion virtual7 errores financieros capacitacion virtual
7 errores financieros capacitacion virtual
 
Scraps for bronze with a strong background for business
Scraps for bronze with a strong background for businessScraps for bronze with a strong background for business
Scraps for bronze with a strong background for business
 
Garcinia cambogia: nuovo estratto miracoloso per perdere peso velocemente. Tu...
Garcinia cambogia: nuovo estratto miracoloso per perdere peso velocemente. Tu...Garcinia cambogia: nuovo estratto miracoloso per perdere peso velocemente. Tu...
Garcinia cambogia: nuovo estratto miracoloso per perdere peso velocemente. Tu...
 
Bab 1 (1)
Bab 1 (1)Bab 1 (1)
Bab 1 (1)
 

Similar to Karel Obluk (Evolution Equity Partners) - Cybersecurity: Challenges and Opportunity

OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
Deep Shankar Yadav
 
Fun with Application Security
Fun with Application SecurityFun with Application Security
Fun with Application Security
Bruce Abernethy
 
Corporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence communityCorporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence community
antitree
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
Forensics intro
Forensics introForensics intro
Forensics intro
test tt
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iot
ST_World
 
Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)
AT-NET Services, Inc. - Charleston Division
 
Computer Security
Computer SecurityComputer Security
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
Gianluca Varisco
 
[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actors[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actors
OWASP EEE
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
Jayaseelan Vejayon
 
Trends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yoursTrends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yours
MotherGuardians
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
OoXair
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
MansoorAhmed57263
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
Aravind R
 
Threats
ThreatsThreats
Threats
sbmiller87
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
Sloan Carne
 
SECURITY OPERATION CENTER CONTENT.pptx
SECURITY OPERATION CENTER CONTENT.pptxSECURITY OPERATION CENTER CONTENT.pptx
SECURITY OPERATION CENTER CONTENT.pptx
FarzanMansoor1
 
Keeping you and your library safe and secure
Keeping you and your library safe and secureKeeping you and your library safe and secure
Keeping you and your library safe and secure
LYRASIS
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
Nader Alkeinay
 

Similar to Karel Obluk (Evolution Equity Partners) - Cybersecurity: Challenges and Opportunity (20)

OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
 
Fun with Application Security
Fun with Application SecurityFun with Application Security
Fun with Application Security
 
Corporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence communityCorporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence community
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Forensics intro
Forensics introForensics intro
Forensics intro
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iot
 
Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actors[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actors
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Trends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yoursTrends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yours
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 
Threats
ThreatsThreats
Threats
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
 
SECURITY OPERATION CENTER CONTENT.pptx
SECURITY OPERATION CENTER CONTENT.pptxSECURITY OPERATION CENTER CONTENT.pptx
SECURITY OPERATION CENTER CONTENT.pptx
 
Keeping you and your library safe and secure
Keeping you and your library safe and secureKeeping you and your library safe and secure
Keeping you and your library safe and secure
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 

More from Techsylvania

Tom Mason (Stability AI) - Computing Large Foundational Models Unlisted
Tom Mason (Stability AI) - Computing Large Foundational Models UnlistedTom Mason (Stability AI) - Computing Large Foundational Models Unlisted
Tom Mason (Stability AI) - Computing Large Foundational Models Unlisted
Techsylvania
 
Sergiu Biris (MultiversX) - Blurring the Lines Between Web 2.0 and Web 3.0
Sergiu Biris (MultiversX) - Blurring the Lines Between Web 2.0 and Web 3.0Sergiu Biris (MultiversX) - Blurring the Lines Between Web 2.0 and Web 3.0
Sergiu Biris (MultiversX) - Blurring the Lines Between Web 2.0 and Web 3.0
Techsylvania
 
Conversation w/ Tijana Kovacevic (Happening) - Keeping Your Startup Heart Whi...
Conversation w/ Tijana Kovacevic (Happening) - Keeping Your Startup Heart Whi...Conversation w/ Tijana Kovacevic (Happening) - Keeping Your Startup Heart Whi...
Conversation w/ Tijana Kovacevic (Happening) - Keeping Your Startup Heart Whi...
Techsylvania
 
Aarik Mudgal (METRO.Digital) - How to Implement DDoS Protection in GCP
Aarik Mudgal (METRO.Digital) - How to Implement DDoS Protection in GCPAarik Mudgal (METRO.Digital) - How to Implement DDoS Protection in GCP
Aarik Mudgal (METRO.Digital) - How to Implement DDoS Protection in GCP
Techsylvania
 
Tudor Mafteianu (Blu Capital Partners) - What Drives the Value of Your Business?
Tudor Mafteianu (Blu Capital Partners) - What Drives the Value of Your Business?Tudor Mafteianu (Blu Capital Partners) - What Drives the Value of Your Business?
Tudor Mafteianu (Blu Capital Partners) - What Drives the Value of Your Business?
Techsylvania
 
Andrew O’Neal (Clearbit) - Scaling a Product Vision Through World-Class Team ...
Andrew O’Neal (Clearbit) - Scaling a Product Vision Through World-Class Team ...Andrew O’Neal (Clearbit) - Scaling a Product Vision Through World-Class Team ...
Andrew O’Neal (Clearbit) - Scaling a Product Vision Through World-Class Team ...
Techsylvania
 
Andrew Davies (Paddle) - From Zero to $350m Revenue: Finding and Scaling Your...
Andrew Davies (Paddle) - From Zero to $350m Revenue: Finding and Scaling Your...Andrew Davies (Paddle) - From Zero to $350m Revenue: Finding and Scaling Your...
Andrew Davies (Paddle) - From Zero to $350m Revenue: Finding and Scaling Your...
Techsylvania
 
Jonathan Oakes (Google) - Powering Health and Fitness Products
Jonathan Oakes (Google) - Powering Health and Fitness ProductsJonathan Oakes (Google) - Powering Health and Fitness Products
Jonathan Oakes (Google) - Powering Health and Fitness Products
Techsylvania
 
Yossi Matias (Google) - Driving Societal Change Through AI Innovation
Yossi Matias (Google) - Driving Societal Change Through AI InnovationYossi Matias (Google) - Driving Societal Change Through AI Innovation
Yossi Matias (Google) - Driving Societal Change Through AI Innovation
Techsylvania
 
Angus Keck (AgUnity) - Mastering Determination, Adaptability, and Storytellin...
Angus Keck (AgUnity) - Mastering Determination, Adaptability, and Storytellin...Angus Keck (AgUnity) - Mastering Determination, Adaptability, and Storytellin...
Angus Keck (AgUnity) - Mastering Determination, Adaptability, and Storytellin...
Techsylvania
 
Efi Dahan (PayPal) - From Local to Global: Tips and Trends to Scale Your Busi...
Efi Dahan (PayPal) - From Local to Global: Tips and Trends to Scale Your Busi...Efi Dahan (PayPal) - From Local to Global: Tips and Trends to Scale Your Busi...
Efi Dahan (PayPal) - From Local to Global: Tips and Trends to Scale Your Busi...
Techsylvania
 
Amy Varney (Systemiq Capital) - Has Climate Tech Graduated?
Amy Varney (Systemiq Capital) - Has Climate Tech Graduated?Amy Varney (Systemiq Capital) - Has Climate Tech Graduated?
Amy Varney (Systemiq Capital) - Has Climate Tech Graduated?
Techsylvania
 
Nima Banai - Vision to Product: Product Design, Development, and Manufacturin...
Nima Banai - Vision to Product: Product Design, Development, and Manufacturin...Nima Banai - Vision to Product: Product Design, Development, and Manufacturin...
Nima Banai - Vision to Product: Product Design, Development, and Manufacturin...
Techsylvania
 
Chris Leacock aka Jillionaire - Embracing Diversity Through Interdisciplinary...
Chris Leacock aka Jillionaire - Embracing Diversity Through Interdisciplinary...Chris Leacock aka Jillionaire - Embracing Diversity Through Interdisciplinary...
Chris Leacock aka Jillionaire - Embracing Diversity Through Interdisciplinary...
Techsylvania
 
Emil Boc (Mayor of Cluj-Napoca) - Opening Remarks Day 1
Emil Boc (Mayor of Cluj-Napoca) - Opening Remarks Day 1Emil Boc (Mayor of Cluj-Napoca) - Opening Remarks Day 1
Emil Boc (Mayor of Cluj-Napoca) - Opening Remarks Day 1
Techsylvania
 
Patrick Poels (Snyk) - The 3 Key Rules of Building Globally Distributed Teams
Patrick Poels (Snyk) - The 3 Key Rules of Building Globally Distributed TeamsPatrick Poels (Snyk) - The 3 Key Rules of Building Globally Distributed Teams
Patrick Poels (Snyk) - The 3 Key Rules of Building Globally Distributed Teams
Techsylvania
 
Eduard Varvara (Barings, MassMutual) - How Barings is Shaping a Culture of In...
Eduard Varvara (Barings, MassMutual) - How Barings is Shaping a Culture of In...Eduard Varvara (Barings, MassMutual) - How Barings is Shaping a Culture of In...
Eduard Varvara (Barings, MassMutual) - How Barings is Shaping a Culture of In...
Techsylvania
 
Cristina Morariu (MassMutual Romania) -How Is Technology & Innovation Shaping...
Cristina Morariu (MassMutual Romania) -How Is Technology & Innovation Shaping...Cristina Morariu (MassMutual Romania) -How Is Technology & Innovation Shaping...
Cristina Morariu (MassMutual Romania) -How Is Technology & Innovation Shaping...
Techsylvania
 
Marie Astrid Molina (Scaleway), How to Design for a Product You Understand No...
Marie Astrid Molina (Scaleway), How to Design for a Product You Understand No...Marie Astrid Molina (Scaleway), How to Design for a Product You Understand No...
Marie Astrid Molina (Scaleway), How to Design for a Product You Understand No...
Techsylvania
 
Julie Xu (Carta) - Designing a product experience vision at scale
Julie Xu (Carta) - Designing a product experience vision at scaleJulie Xu (Carta) - Designing a product experience vision at scale
Julie Xu (Carta) - Designing a product experience vision at scale
Techsylvania
 

More from Techsylvania (20)

Tom Mason (Stability AI) - Computing Large Foundational Models Unlisted
Tom Mason (Stability AI) - Computing Large Foundational Models UnlistedTom Mason (Stability AI) - Computing Large Foundational Models Unlisted
Tom Mason (Stability AI) - Computing Large Foundational Models Unlisted
 
Sergiu Biris (MultiversX) - Blurring the Lines Between Web 2.0 and Web 3.0
Sergiu Biris (MultiversX) - Blurring the Lines Between Web 2.0 and Web 3.0Sergiu Biris (MultiversX) - Blurring the Lines Between Web 2.0 and Web 3.0
Sergiu Biris (MultiversX) - Blurring the Lines Between Web 2.0 and Web 3.0
 
Conversation w/ Tijana Kovacevic (Happening) - Keeping Your Startup Heart Whi...
Conversation w/ Tijana Kovacevic (Happening) - Keeping Your Startup Heart Whi...Conversation w/ Tijana Kovacevic (Happening) - Keeping Your Startup Heart Whi...
Conversation w/ Tijana Kovacevic (Happening) - Keeping Your Startup Heart Whi...
 
Aarik Mudgal (METRO.Digital) - How to Implement DDoS Protection in GCP
Aarik Mudgal (METRO.Digital) - How to Implement DDoS Protection in GCPAarik Mudgal (METRO.Digital) - How to Implement DDoS Protection in GCP
Aarik Mudgal (METRO.Digital) - How to Implement DDoS Protection in GCP
 
Tudor Mafteianu (Blu Capital Partners) - What Drives the Value of Your Business?
Tudor Mafteianu (Blu Capital Partners) - What Drives the Value of Your Business?Tudor Mafteianu (Blu Capital Partners) - What Drives the Value of Your Business?
Tudor Mafteianu (Blu Capital Partners) - What Drives the Value of Your Business?
 
Andrew O’Neal (Clearbit) - Scaling a Product Vision Through World-Class Team ...
Andrew O’Neal (Clearbit) - Scaling a Product Vision Through World-Class Team ...Andrew O’Neal (Clearbit) - Scaling a Product Vision Through World-Class Team ...
Andrew O’Neal (Clearbit) - Scaling a Product Vision Through World-Class Team ...
 
Andrew Davies (Paddle) - From Zero to $350m Revenue: Finding and Scaling Your...
Andrew Davies (Paddle) - From Zero to $350m Revenue: Finding and Scaling Your...Andrew Davies (Paddle) - From Zero to $350m Revenue: Finding and Scaling Your...
Andrew Davies (Paddle) - From Zero to $350m Revenue: Finding and Scaling Your...
 
Jonathan Oakes (Google) - Powering Health and Fitness Products
Jonathan Oakes (Google) - Powering Health and Fitness ProductsJonathan Oakes (Google) - Powering Health and Fitness Products
Jonathan Oakes (Google) - Powering Health and Fitness Products
 
Yossi Matias (Google) - Driving Societal Change Through AI Innovation
Yossi Matias (Google) - Driving Societal Change Through AI InnovationYossi Matias (Google) - Driving Societal Change Through AI Innovation
Yossi Matias (Google) - Driving Societal Change Through AI Innovation
 
Angus Keck (AgUnity) - Mastering Determination, Adaptability, and Storytellin...
Angus Keck (AgUnity) - Mastering Determination, Adaptability, and Storytellin...Angus Keck (AgUnity) - Mastering Determination, Adaptability, and Storytellin...
Angus Keck (AgUnity) - Mastering Determination, Adaptability, and Storytellin...
 
Efi Dahan (PayPal) - From Local to Global: Tips and Trends to Scale Your Busi...
Efi Dahan (PayPal) - From Local to Global: Tips and Trends to Scale Your Busi...Efi Dahan (PayPal) - From Local to Global: Tips and Trends to Scale Your Busi...
Efi Dahan (PayPal) - From Local to Global: Tips and Trends to Scale Your Busi...
 
Amy Varney (Systemiq Capital) - Has Climate Tech Graduated?
Amy Varney (Systemiq Capital) - Has Climate Tech Graduated?Amy Varney (Systemiq Capital) - Has Climate Tech Graduated?
Amy Varney (Systemiq Capital) - Has Climate Tech Graduated?
 
Nima Banai - Vision to Product: Product Design, Development, and Manufacturin...
Nima Banai - Vision to Product: Product Design, Development, and Manufacturin...Nima Banai - Vision to Product: Product Design, Development, and Manufacturin...
Nima Banai - Vision to Product: Product Design, Development, and Manufacturin...
 
Chris Leacock aka Jillionaire - Embracing Diversity Through Interdisciplinary...
Chris Leacock aka Jillionaire - Embracing Diversity Through Interdisciplinary...Chris Leacock aka Jillionaire - Embracing Diversity Through Interdisciplinary...
Chris Leacock aka Jillionaire - Embracing Diversity Through Interdisciplinary...
 
Emil Boc (Mayor of Cluj-Napoca) - Opening Remarks Day 1
Emil Boc (Mayor of Cluj-Napoca) - Opening Remarks Day 1Emil Boc (Mayor of Cluj-Napoca) - Opening Remarks Day 1
Emil Boc (Mayor of Cluj-Napoca) - Opening Remarks Day 1
 
Patrick Poels (Snyk) - The 3 Key Rules of Building Globally Distributed Teams
Patrick Poels (Snyk) - The 3 Key Rules of Building Globally Distributed TeamsPatrick Poels (Snyk) - The 3 Key Rules of Building Globally Distributed Teams
Patrick Poels (Snyk) - The 3 Key Rules of Building Globally Distributed Teams
 
Eduard Varvara (Barings, MassMutual) - How Barings is Shaping a Culture of In...
Eduard Varvara (Barings, MassMutual) - How Barings is Shaping a Culture of In...Eduard Varvara (Barings, MassMutual) - How Barings is Shaping a Culture of In...
Eduard Varvara (Barings, MassMutual) - How Barings is Shaping a Culture of In...
 
Cristina Morariu (MassMutual Romania) -How Is Technology & Innovation Shaping...
Cristina Morariu (MassMutual Romania) -How Is Technology & Innovation Shaping...Cristina Morariu (MassMutual Romania) -How Is Technology & Innovation Shaping...
Cristina Morariu (MassMutual Romania) -How Is Technology & Innovation Shaping...
 
Marie Astrid Molina (Scaleway), How to Design for a Product You Understand No...
Marie Astrid Molina (Scaleway), How to Design for a Product You Understand No...Marie Astrid Molina (Scaleway), How to Design for a Product You Understand No...
Marie Astrid Molina (Scaleway), How to Design for a Product You Understand No...
 
Julie Xu (Carta) - Designing a product experience vision at scale
Julie Xu (Carta) - Designing a product experience vision at scaleJulie Xu (Carta) - Designing a product experience vision at scale
Julie Xu (Carta) - Designing a product experience vision at scale
 

Recently uploaded

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 

Recently uploaded (20)

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 

Karel Obluk (Evolution Equity Partners) - Cybersecurity: Challenges and Opportunity

  • 2. Cybersecurity – Segments • Global • Critical infrastructure • Geo-political
  • 3. Cybersecurity – Segments • Global • Personal • Money • Privacy – stealing your info & identity
  • 4. Cybersecurity – Segments • Global • Personal • Data • Personal, company sensitivedata
  • 5. Global – Infrastructure • Espionage • Snowden,China • Cyber Warfare • Estonia,Georgia, Iran • Critical infrastructure • US North-East blackout • Emergency systems • Typically state-sponsored
  • 6. Global – Economy • Target, Sony, TalkTalk • massive attacks, lots of sensitive data, trade secrets • company value, significant economical impact • Aetna, Anthem, BlueCross • Bangladesh central bank / SWIFT • WHO? • Criminals, hacktivists, bored geeks • Also state sponsored?
  • 7. Personal • Stealing money from your bank account, ransomware • guessing passwords, sending money elsewhere • Electronic currencies, virtual valuables • Games, virtual objects– World of Warcraft,... • Who andWhy? • Criminals • Obtaining tools and means for other attacks
  • 9. Identity • Social Networks • Fake Facebook, LinkedIn accounts • intelligence, constructing spear-headed attacks • Social engineering • Pictures, relationships • Dating sites, sensitive info • Even cost lives!
  • 10. Personal Information • Location • Behaviour - patterns • IoT, Devices • Amount of info collected • Security (or lack of it) • Value of data
  • 11. Data • The good • Product recommendations • Predictions and forecasting • But also the bad! • Manipulating stock • Ad-business • Wait!
  • 12. Data • The good • Product recommendations • Predictions and forecasting • Ad-business • But also the bad! • Manipulating stock • Ad-business
  • 13. Opportunity • Education and Training • Shortage ofsecurity experts • Test systems, “labs”,simulation - for experts • Basic training,education,certification - for normal users • Security Tools and Frameworks • Securing protocolsand applications • Virtualisation,device management • Exploit detection,attack detection and prevention • Back-end systems,web applications- strengthening,
  • 14. Opportunity • Network infrastructure • Deception tools and frameworks • Using data analytics to identify good or bad • Network, endpoints, mobile devices, access to resources • SIEM / log analysis • User Behaviour Analysis • Anomalies, suspicious activity - spotting new trends, … • Authentication • Passwords = cockroaches of the web…