SlideShare a Scribd company logo
Cyber Security Threat Trends and
End Point Defenses
Jeff Brown
WW Head of Personal Systems Professional Services
HP
HP Confidential. For use under Confidential Disclosure Agreement only. © Copyright 2017 HP Development Company, L.P. The information contained herein is subject to change without notice.
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
The Changing Threat Landscape
2018 Trends
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
FY18 Trends
GDPR, Cyber-Physical Threats, Patching/Application testing, Deficit of
Security Professionals, Lack of employee security education …
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
FY18 Trends
GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of
Security Professionals, Lack of employee security education …
1. IOT Vulnerability Continues
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
FY18 Trends
GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of
Security Professionals, Lack of employee security education …
1. IOT Vulnerability Continues
2. AI Expansion – The Good and The Bad
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
FY18 Trends
GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of
Security Professionals, Lack of employee security education …
1. IOT Vulnerability Continues
2. AI Expansion – The Good and The Bad
3. Blockchain Revolution
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
FY18 Trends
GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of
Security Professionals, Lack of employee security education …
1. IOT Vulnerability Continues
2. AI Expansion – The Good and The Bad
3. Blockchain Revolution
4. The rise of Ransomware and Organized Crime
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
Breaches and Perpetrators
120.248
4.753
Source: Verizon DBIR 2017
Incidents
Breaches
Top Five Threat Agents (by
effectiveness)
• Private Criminal Organizations
• Advanced Persistent Threat (APT)
• Information Partners and Vendors
• Disgruntled, Reckless, or Untrained
Employees
• Civil Activists
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
Who are the Hackers?
-The 2018 Black Report
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
Who are the Hackers?
-The 2018 Black Report
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
What does an Attach look like?
-The 2018 Black Report
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
What does an attach look like?
-The 2018 Black Report
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
Is it Static?
-The 2018 Black Report
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
Hackers Advice
-The 2018 Black Report
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
The Changing Threat Landscape
End Point Defenses
HP: Experiences for the Modern Workforce
DESIGN
for the way you work
and live
SECURITY
to work anywhere
COLLABORATION
for connecting & creating
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
EVERY PC & PRINTER DECISION
IS A SECURITY DECISION
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
Detect
Increase protection at all
levels of compute platform
Continuous business
productivity, lower TCO
and seamless recovery
Even when protections
fail (and they will),
proactive detection is
essential
Ultimate Goal – No Downtime!
Protect
Recover
SECURITY THAT’S “BUILT-IN, NOT BOLTED ON”
DESIGNED FOR CYBER-RESILIENCE
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
MANY USERS THINK SECURITY IS DIFFICULT –
When a user finds security difficult, they work around it…
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
The next generation of the
WORLD’S MOST SECURE & MANAGEABLE PCs1
S E C U R I T Y
B U I LT - I N n o t B O LT E D O N
20
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
HP’s 2018 SECURITY STACK
ABOVE
THE OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion Detection
HP BIOSphere Gen410
Comprehensive BIOS management
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
NEW Additions and Updates
HP Client Security Manager Gen4
• HP Multi-Factor Authenticate Gen25
MFA with hardened policies, 3-factor, face log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
21
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
HP’s 2018 SECURITY STACK
ABOVE
THE OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion Detection
HP BIOSphere Gen410
Comprehensive BIOS management
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
NEW Additions and Updates
HP Client Security Manager Gen4
• HP Multi-Factor Authenticate Gen25
MFA with hardened policies, 3-factor, face log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
22
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
IN THE OS
Operating System,
Software, Downloads
ABOVE THE OS
Manageability Infrastructure,
Visual Hackers
OPEN DOORS
Security tools are useless unless policies are
enforced. Manageability is required to make
security effective
!
COMMON TARGET
Unpatched software vulnerabilities are easy to exploit.
Malicious websites, infected downloads
!
IDEAL TARGET
Complex target, but successful attacks mean persistence,
stealth, and access to almost anything they want
!!!BELOW THE OS
Firmware (BIOS, etc.)
HARDWARE
Most Secure. Extremely difficult for hackers and
malware to penetrate.
THREATS TARGET EVERY LEVEL OF THE SYSTEM
23
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
HP ENDPOINT SECURITY STACK 2018
24
ABOVE
THE OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager Gen4
• HP Multi-Factor Authenticate Gen25
MFA with hardened policies, 3-factor, face log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and Updates
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
A SECURE SYSTEM REQUIRES A HARDENED
ROOT OF TRUST
25
To protect against the malware
of the future PCs must have
security rooted in HARDWARE
• Out of reach of malware attacks
• Independent of the BIOS and OS
• Can’t be tampered with
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
HP Endpoint Security Controller
Since 2014, HP has integrated the
HP Endpoint Security Controller
into our HP Elite PCs.
This unique hardware enables solutions that are in turn trustworthy,
such as HP Sure Start2, the World’s First and Only Self-Healing BIOS.
26
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
GROUNDING SECURITY IN HARDWARE
27
to create a cyber resilient system in the face of unexpected attacks.
The HP Endpoint Security Controller
enables solutions that are:
Hardware Enforced Self-Healing Manageable
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
PROTECTING ALL LEVELS OF THE PC
IN THE OS
Operating System,
Software, Downloads
ABOVE THE OS
Manageability
BELOW THE OS
Firmware (BIOS, etc.)
Hardware
ENFORCE COMPLIANCE
HP Management Integration Toolkit6
HP Endpoint Security Controller
TRUSTED BIOS
HP Sure Start Gen42
STRENGTHEN THE OS
HP Sure Run3, HP Sure Click8, HP Sure Recover4
HP MIK ensures the systems continues working as it should
28
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
HP ENDPOINT SECURITY STACK 2018
29
ABOVE
THE OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager Gen4
• HP Multi-Factor Authenticate Gen25
MFA with hardened policies, 3-factor, face log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and Updates
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
DEFEND AGAINST DEVASTATING FIRMWARE ATTACKS
Protect your BIOS with HP Sure Start Gen4 2
HP Sure Start is the industry’s first
and still the only self-healing BIOS.
The BIOS is the first million lines of code that run.
It is the key to your PC’s foundation.
Why should customers care?
Once the BIOS is corrupted, the hackers “own”
your PC: all other protection is useless.
Antivirus, anti-malware, and OS firewalls will not detect an infected BIOS!
30
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
HP ENDPOINT SECURITY STACK 2018
ABOVE
THE OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager Gen4
• HP Multi-Factor Authenticate Gen25
MFA with hardened policies, 3-factor, face log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and Updates
31
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
MINIMIZE DOWNTIME
Recover quickly with HP Sure Recover4
32
HP Sure Recover offers secure,
automated, network-based
software image recovery.
Using the HP Endpoint Security Controller, it can
quickly and securely reimage machines to HP’s
or the company’s latest software image - using
only an internet connection
! 
Because HP Sure Recover4 is based in hardware, you can
reimage a PC, even from a bare hard drive.
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
REIMAGE ON DEMAND OR ON SCHEDULE
RESILIENT BY DEFAULT FOR SMB. CUSTOMIZABLE FOR ENTERPRISE.
User initiated IT scheduled!
FRESH START: IT can schedule routine
reimaging, so malware doesn’t have a
chance to stick around.
• Ideal for Hospitality, Retail,
Healthcare, Education, etc.
ENABLING USERS to quickly reimage
their own machines without IT support
AUTOMATED RECOVERY:
If no OS is found, the PC will
automatically present the user the
option to reimage
FLEXIBLE: Defaults to latest HP image,
or may be configured in firmware to
recover custom enterprise image
33
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
HP ENDPOINT SECURITY STACK 2018
34
ABOVE
THE OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager Gen4
• HP Multi-Factor Authenticate Gen25
MFA with hardened policies, 3-factor, face log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and Updates
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
WORK FREELY IN PUBLIC SPACES
HP Sure View Gen27: the world’s ONLY integrated PC privacy screen12
Now in it’s SECOND GENERATION, HP Sure View Gen2
enables a better visual experience in light OR dark
environments – from the plane to the café
What’s New
• Performs great in BRIGHT and DARK environments
• IPS panel technology
• Improved 120Hz REFRESH RATE, for smooth motion
• Reduced display thickness - ULTRA-THIN DESIGNS
HP Sure View Gen27 protects against
visual hacking with the press of a button.
35
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
Detect
Increase protection at all
levels of compute platform
Continuous business
productivity, lower TCO
and seamless recovery
Even when protections
fail (and they will),
proactive detection is
essential
Ultimate Goal – No Downtime!
Protect
Recover
SECURITY THAT’S “BUILT-IN, NOT BOLTED ON”
DESIGNED FOR CYBER-RESILIENCE
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
EVERY PC & PRINTER DECISION
IS A SECURITY DECISION
THANK YOU
HP Confidential. For use with HP customers under HP CDA only

More Related Content

Similar to Presentación Jeff Brown, HP en VI Summit País Digital 2018

HP Enterprise Software: Making your applications and information work for you
HP Enterprise Software: Making your applications and information work for youHP Enterprise Software: Making your applications and information work for you
HP Enterprise Software: Making your applications and information work for you
HP Enterprise Italia
 
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationTop 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integration
Sridhar Karnam
 
Take the Big Data Challenge - Take Advantage of ALL of Your Data 16 Sept 2014
Take the Big Data Challenge - Take Advantage of ALL of Your Data 16 Sept 2014Take the Big Data Challenge - Take Advantage of ALL of Your Data 16 Sept 2014
Take the Big Data Challenge - Take Advantage of ALL of Your Data 16 Sept 2014
pietvz
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – Data
Fujitsu Middle East
 
Making the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data VisibilityMaking the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data Visibility
dianadvo
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercato
HP Enterprise Italia
 
Retail security-services--client-presentation
Retail security-services--client-presentationRetail security-services--client-presentation
Retail security-services--client-presentation
Joseph Schorr
 
5 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 20185 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 2018
NowSecure
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir
 
How often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web Day
How often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web DayHow often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web Day
How often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web Day
AWS Germany
 
WCIT 2014 Rohit Tandon - Big Data to Drive Business Results: HP HAVEn
WCIT 2014 Rohit Tandon - Big Data to Drive Business Results: HP HAVEnWCIT 2014 Rohit Tandon - Big Data to Drive Business Results: HP HAVEn
WCIT 2014 Rohit Tandon - Big Data to Drive Business Results: HP HAVEn
WCIT 2014
 
HP Helion - Copaco Cloud Event 2015 (break-out 4)
HP Helion - Copaco Cloud Event 2015 (break-out 4)HP Helion - Copaco Cloud Event 2015 (break-out 4)
HP Helion - Copaco Cloud Event 2015 (break-out 4)
Copaco Nederland
 
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primend
 
Webinar–Open Source Risk in M&A by the Numbers
Webinar–Open Source Risk in M&A by the NumbersWebinar–Open Source Risk in M&A by the Numbers
Webinar–Open Source Risk in M&A by the Numbers
Synopsys Software Integrity Group
 
Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?
Sridhar Karnam
 
UX STRAT USA 2018 Presentation: Joe Meersman, IBM
UX STRAT USA 2018 Presentation: Joe Meersman, IBMUX STRAT USA 2018 Presentation: Joe Meersman, IBM
UX STRAT USA 2018 Presentation: Joe Meersman, IBM
UX STRAT
 
Protect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksProtect Your Customers Data from Cyberattacks
Protect Your Customers Data from Cyberattacks
SAP Customer Experience
 
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial ServicesAn Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial Services
Forcepoint LLC
 
Mobility Why? What does it means to us?
Mobility Why? What does it means to us?Mobility Why? What does it means to us?
Mobility Why? What does it means to us?
Pronq by HP
 
Making Network Security Relevant
Making Network Security RelevantMaking Network Security Relevant
Making Network Security Relevant
HP Enterprise Italia
 

Similar to Presentación Jeff Brown, HP en VI Summit País Digital 2018 (20)

HP Enterprise Software: Making your applications and information work for you
HP Enterprise Software: Making your applications and information work for youHP Enterprise Software: Making your applications and information work for you
HP Enterprise Software: Making your applications and information work for you
 
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationTop 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integration
 
Take the Big Data Challenge - Take Advantage of ALL of Your Data 16 Sept 2014
Take the Big Data Challenge - Take Advantage of ALL of Your Data 16 Sept 2014Take the Big Data Challenge - Take Advantage of ALL of Your Data 16 Sept 2014
Take the Big Data Challenge - Take Advantage of ALL of Your Data 16 Sept 2014
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – Data
 
Making the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data VisibilityMaking the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data Visibility
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercato
 
Retail security-services--client-presentation
Retail security-services--client-presentationRetail security-services--client-presentation
Retail security-services--client-presentation
 
5 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 20185 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 2018
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
 
How often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web Day
How often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web DayHow often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web Day
How often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web Day
 
WCIT 2014 Rohit Tandon - Big Data to Drive Business Results: HP HAVEn
WCIT 2014 Rohit Tandon - Big Data to Drive Business Results: HP HAVEnWCIT 2014 Rohit Tandon - Big Data to Drive Business Results: HP HAVEn
WCIT 2014 Rohit Tandon - Big Data to Drive Business Results: HP HAVEn
 
HP Helion - Copaco Cloud Event 2015 (break-out 4)
HP Helion - Copaco Cloud Event 2015 (break-out 4)HP Helion - Copaco Cloud Event 2015 (break-out 4)
HP Helion - Copaco Cloud Event 2015 (break-out 4)
 
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
 
Webinar–Open Source Risk in M&A by the Numbers
Webinar–Open Source Risk in M&A by the NumbersWebinar–Open Source Risk in M&A by the Numbers
Webinar–Open Source Risk in M&A by the Numbers
 
Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?
 
UX STRAT USA 2018 Presentation: Joe Meersman, IBM
UX STRAT USA 2018 Presentation: Joe Meersman, IBMUX STRAT USA 2018 Presentation: Joe Meersman, IBM
UX STRAT USA 2018 Presentation: Joe Meersman, IBM
 
Protect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksProtect Your Customers Data from Cyberattacks
Protect Your Customers Data from Cyberattacks
 
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial ServicesAn Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial Services
 
Mobility Why? What does it means to us?
Mobility Why? What does it means to us?Mobility Why? What does it means to us?
Mobility Why? What does it means to us?
 
Making Network Security Relevant
Making Network Security RelevantMaking Network Security Relevant
Making Network Security Relevant
 

More from PAÍS DIGITAL

Presentación Marco Nicolini, DUOC-UC en Jornada Pyme País Digital
Presentación Marco Nicolini, DUOC-UC en Jornada Pyme País DigitalPresentación Marco Nicolini, DUOC-UC en Jornada Pyme País Digital
Presentación Marco Nicolini, DUOC-UC en Jornada Pyme País Digital
PAÍS DIGITAL
 
Recomendaciones para Videoconferencias - País Digital
Recomendaciones para Videoconferencias - País Digital Recomendaciones para Videoconferencias - País Digital
Recomendaciones para Videoconferencias - País Digital
PAÍS DIGITAL
 
Presentación Ciro Cattuto, ISI Foundation en VI Summit País Digital 2018
Presentación Ciro Cattuto, ISI Foundation en VI Summit País Digital 2018Presentación Ciro Cattuto, ISI Foundation en VI Summit País Digital 2018
Presentación Ciro Cattuto, ISI Foundation en VI Summit País Digital 2018
PAÍS DIGITAL
 
Presentación Alberto Rodríguez , World Bank en VI Summit País Diigtal 2018
Presentación Alberto Rodríguez , World Bank en VI Summit País Diigtal 2018Presentación Alberto Rodríguez , World Bank en VI Summit País Diigtal 2018
Presentación Alberto Rodríguez , World Bank en VI Summit País Diigtal 2018
PAÍS DIGITAL
 
Presentación Jose Melchert , Google en VI Summit País Digital 2018
Presentación Jose Melchert , Google en VI Summit País Digital 2018Presentación Jose Melchert , Google en VI Summit País Digital 2018
Presentación Jose Melchert , Google en VI Summit País Digital 2018
PAÍS DIGITAL
 
Presentación Pamela Gidi, Subsecertaria Telecomunicaciones en VI Summit País ...
Presentación Pamela Gidi, Subsecertaria Telecomunicaciones en VI Summit País ...Presentación Pamela Gidi, Subsecertaria Telecomunicaciones en VI Summit País ...
Presentación Pamela Gidi, Subsecertaria Telecomunicaciones en VI Summit País ...
PAÍS DIGITAL
 
Presentación de Priscila Oliva, American Tower Chile en VI Summit País Digital
Presentación de Priscila Oliva,  American Tower Chile en VI Summit País DigitalPresentación de Priscila Oliva,  American Tower Chile en VI Summit País Digital
Presentación de Priscila Oliva, American Tower Chile en VI Summit País Digital
PAÍS DIGITAL
 
Presentación de Esteban Rodríguez, Accenture en VI Summit País Digital
Presentación de Esteban Rodríguez, Accenture en VI Summit País DigitalPresentación de Esteban Rodríguez, Accenture en VI Summit País Digital
Presentación de Esteban Rodríguez, Accenture en VI Summit País Digital
PAÍS DIGITAL
 
Presentación Claudio Perek, IBM en Vi Summit País Digital 2018
Presentación Claudio Perek, IBM en Vi Summit País Digital 2018Presentación Claudio Perek, IBM en Vi Summit País Digital 2018
Presentación Claudio Perek, IBM en Vi Summit País Digital 2018
PAÍS DIGITAL
 
Presentación de Gloria Hutt, Ministra Transportes y Telecomunicaciones en Sum...
Presentación de Gloria Hutt, Ministra Transportes y Telecomunicaciones en Sum...Presentación de Gloria Hutt, Ministra Transportes y Telecomunicaciones en Sum...
Presentación de Gloria Hutt, Ministra Transportes y Telecomunicaciones en Sum...
PAÍS DIGITAL
 
Presentación Gonzalo Blumel, Ministro Segpres, Summit País Diigtal 2018
Presentación Gonzalo Blumel, Ministro Segpres, Summit País Diigtal 2018Presentación Gonzalo Blumel, Ministro Segpres, Summit País Diigtal 2018
Presentación Gonzalo Blumel, Ministro Segpres, Summit País Diigtal 2018
PAÍS DIGITAL
 
Presentación Ines Locatelli, Chatbot for Good - Oracle Chile en Vi Summit Paí...
Presentación Ines Locatelli, Chatbot for Good - Oracle Chile en Vi Summit Paí...Presentación Ines Locatelli, Chatbot for Good - Oracle Chile en Vi Summit Paí...
Presentación Ines Locatelli, Chatbot for Good - Oracle Chile en Vi Summit Paí...
PAÍS DIGITAL
 
Presentación Virginia Dias, Sima Robot en el VI Summit País Digital 2018
Presentación Virginia Dias, Sima Robot en el VI Summit País Digital 2018Presentación Virginia Dias, Sima Robot en el VI Summit País Digital 2018
Presentación Virginia Dias, Sima Robot en el VI Summit País Digital 2018
PAÍS DIGITAL
 
Presentación Alejandro Herrera, Transbank en VI Summit País Digital 2018
Presentación Alejandro Herrera, Transbank en VI Summit País Digital 2018Presentación Alejandro Herrera, Transbank en VI Summit País Digital 2018
Presentación Alejandro Herrera, Transbank en VI Summit País Digital 2018
PAÍS DIGITAL
 
Presentación César Cernuda, Microsoft en el marco del VI Summit País Digital ...
Presentación César Cernuda, Microsoft en el marco del VI Summit País Digital ...Presentación César Cernuda, Microsoft en el marco del VI Summit País Digital ...
Presentación César Cernuda, Microsoft en el marco del VI Summit País Digital ...
PAÍS DIGITAL
 
Presentación de Arun Ramachandra, Tata Consultancy Services en VI Summit País...
Presentación de Arun Ramachandra, Tata Consultancy Services en VI Summit País...Presentación de Arun Ramachandra, Tata Consultancy Services en VI Summit País...
Presentación de Arun Ramachandra, Tata Consultancy Services en VI Summit País...
PAÍS DIGITAL
 
Presentación Alejandro Gorodetzky y Mariano Duran, Wilobank-Indra Summit País...
Presentación Alejandro Gorodetzky y Mariano Duran, Wilobank-Indra Summit País...Presentación Alejandro Gorodetzky y Mariano Duran, Wilobank-Indra Summit País...
Presentación Alejandro Gorodetzky y Mariano Duran, Wilobank-Indra Summit País...
PAÍS DIGITAL
 
Presentación Joseph Lichtenberg, InterSystems en VI Summit País Digital
Presentación Joseph Lichtenberg, InterSystems en VI Summit País DigitalPresentación Joseph Lichtenberg, InterSystems en VI Summit País Digital
Presentación Joseph Lichtenberg, InterSystems en VI Summit País Digital
PAÍS DIGITAL
 
Presentación Elena Gil, Telefónica en VI Summit País Digital
Presentación Elena Gil, Telefónica en VI Summit País DigitalPresentación Elena Gil, Telefónica en VI Summit País Digital
Presentación Elena Gil, Telefónica en VI Summit País Digital
PAÍS DIGITAL
 
Presentación Subsecretario de Economía, Ignacio Guerreo en Simposio Tendencia...
Presentación Subsecretario de Economía, Ignacio Guerreo en Simposio Tendencia...Presentación Subsecretario de Economía, Ignacio Guerreo en Simposio Tendencia...
Presentación Subsecretario de Economía, Ignacio Guerreo en Simposio Tendencia...
PAÍS DIGITAL
 

More from PAÍS DIGITAL (20)

Presentación Marco Nicolini, DUOC-UC en Jornada Pyme País Digital
Presentación Marco Nicolini, DUOC-UC en Jornada Pyme País DigitalPresentación Marco Nicolini, DUOC-UC en Jornada Pyme País Digital
Presentación Marco Nicolini, DUOC-UC en Jornada Pyme País Digital
 
Recomendaciones para Videoconferencias - País Digital
Recomendaciones para Videoconferencias - País Digital Recomendaciones para Videoconferencias - País Digital
Recomendaciones para Videoconferencias - País Digital
 
Presentación Ciro Cattuto, ISI Foundation en VI Summit País Digital 2018
Presentación Ciro Cattuto, ISI Foundation en VI Summit País Digital 2018Presentación Ciro Cattuto, ISI Foundation en VI Summit País Digital 2018
Presentación Ciro Cattuto, ISI Foundation en VI Summit País Digital 2018
 
Presentación Alberto Rodríguez , World Bank en VI Summit País Diigtal 2018
Presentación Alberto Rodríguez , World Bank en VI Summit País Diigtal 2018Presentación Alberto Rodríguez , World Bank en VI Summit País Diigtal 2018
Presentación Alberto Rodríguez , World Bank en VI Summit País Diigtal 2018
 
Presentación Jose Melchert , Google en VI Summit País Digital 2018
Presentación Jose Melchert , Google en VI Summit País Digital 2018Presentación Jose Melchert , Google en VI Summit País Digital 2018
Presentación Jose Melchert , Google en VI Summit País Digital 2018
 
Presentación Pamela Gidi, Subsecertaria Telecomunicaciones en VI Summit País ...
Presentación Pamela Gidi, Subsecertaria Telecomunicaciones en VI Summit País ...Presentación Pamela Gidi, Subsecertaria Telecomunicaciones en VI Summit País ...
Presentación Pamela Gidi, Subsecertaria Telecomunicaciones en VI Summit País ...
 
Presentación de Priscila Oliva, American Tower Chile en VI Summit País Digital
Presentación de Priscila Oliva,  American Tower Chile en VI Summit País DigitalPresentación de Priscila Oliva,  American Tower Chile en VI Summit País Digital
Presentación de Priscila Oliva, American Tower Chile en VI Summit País Digital
 
Presentación de Esteban Rodríguez, Accenture en VI Summit País Digital
Presentación de Esteban Rodríguez, Accenture en VI Summit País DigitalPresentación de Esteban Rodríguez, Accenture en VI Summit País Digital
Presentación de Esteban Rodríguez, Accenture en VI Summit País Digital
 
Presentación Claudio Perek, IBM en Vi Summit País Digital 2018
Presentación Claudio Perek, IBM en Vi Summit País Digital 2018Presentación Claudio Perek, IBM en Vi Summit País Digital 2018
Presentación Claudio Perek, IBM en Vi Summit País Digital 2018
 
Presentación de Gloria Hutt, Ministra Transportes y Telecomunicaciones en Sum...
Presentación de Gloria Hutt, Ministra Transportes y Telecomunicaciones en Sum...Presentación de Gloria Hutt, Ministra Transportes y Telecomunicaciones en Sum...
Presentación de Gloria Hutt, Ministra Transportes y Telecomunicaciones en Sum...
 
Presentación Gonzalo Blumel, Ministro Segpres, Summit País Diigtal 2018
Presentación Gonzalo Blumel, Ministro Segpres, Summit País Diigtal 2018Presentación Gonzalo Blumel, Ministro Segpres, Summit País Diigtal 2018
Presentación Gonzalo Blumel, Ministro Segpres, Summit País Diigtal 2018
 
Presentación Ines Locatelli, Chatbot for Good - Oracle Chile en Vi Summit Paí...
Presentación Ines Locatelli, Chatbot for Good - Oracle Chile en Vi Summit Paí...Presentación Ines Locatelli, Chatbot for Good - Oracle Chile en Vi Summit Paí...
Presentación Ines Locatelli, Chatbot for Good - Oracle Chile en Vi Summit Paí...
 
Presentación Virginia Dias, Sima Robot en el VI Summit País Digital 2018
Presentación Virginia Dias, Sima Robot en el VI Summit País Digital 2018Presentación Virginia Dias, Sima Robot en el VI Summit País Digital 2018
Presentación Virginia Dias, Sima Robot en el VI Summit País Digital 2018
 
Presentación Alejandro Herrera, Transbank en VI Summit País Digital 2018
Presentación Alejandro Herrera, Transbank en VI Summit País Digital 2018Presentación Alejandro Herrera, Transbank en VI Summit País Digital 2018
Presentación Alejandro Herrera, Transbank en VI Summit País Digital 2018
 
Presentación César Cernuda, Microsoft en el marco del VI Summit País Digital ...
Presentación César Cernuda, Microsoft en el marco del VI Summit País Digital ...Presentación César Cernuda, Microsoft en el marco del VI Summit País Digital ...
Presentación César Cernuda, Microsoft en el marco del VI Summit País Digital ...
 
Presentación de Arun Ramachandra, Tata Consultancy Services en VI Summit País...
Presentación de Arun Ramachandra, Tata Consultancy Services en VI Summit País...Presentación de Arun Ramachandra, Tata Consultancy Services en VI Summit País...
Presentación de Arun Ramachandra, Tata Consultancy Services en VI Summit País...
 
Presentación Alejandro Gorodetzky y Mariano Duran, Wilobank-Indra Summit País...
Presentación Alejandro Gorodetzky y Mariano Duran, Wilobank-Indra Summit País...Presentación Alejandro Gorodetzky y Mariano Duran, Wilobank-Indra Summit País...
Presentación Alejandro Gorodetzky y Mariano Duran, Wilobank-Indra Summit País...
 
Presentación Joseph Lichtenberg, InterSystems en VI Summit País Digital
Presentación Joseph Lichtenberg, InterSystems en VI Summit País DigitalPresentación Joseph Lichtenberg, InterSystems en VI Summit País Digital
Presentación Joseph Lichtenberg, InterSystems en VI Summit País Digital
 
Presentación Elena Gil, Telefónica en VI Summit País Digital
Presentación Elena Gil, Telefónica en VI Summit País DigitalPresentación Elena Gil, Telefónica en VI Summit País Digital
Presentación Elena Gil, Telefónica en VI Summit País Digital
 
Presentación Subsecretario de Economía, Ignacio Guerreo en Simposio Tendencia...
Presentación Subsecretario de Economía, Ignacio Guerreo en Simposio Tendencia...Presentación Subsecretario de Economía, Ignacio Guerreo en Simposio Tendencia...
Presentación Subsecretario de Economía, Ignacio Guerreo en Simposio Tendencia...
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 

Presentación Jeff Brown, HP en VI Summit País Digital 2018

  • 1. Cyber Security Threat Trends and End Point Defenses Jeff Brown WW Head of Personal Systems Professional Services HP HP Confidential. For use under Confidential Disclosure Agreement only. © Copyright 2017 HP Development Company, L.P. The information contained herein is subject to change without notice.
  • 2. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. The Changing Threat Landscape 2018 Trends
  • 3. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. FY18 Trends GDPR, Cyber-Physical Threats, Patching/Application testing, Deficit of Security Professionals, Lack of employee security education …
  • 4. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. FY18 Trends GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of Security Professionals, Lack of employee security education … 1. IOT Vulnerability Continues
  • 5. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. FY18 Trends GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of Security Professionals, Lack of employee security education … 1. IOT Vulnerability Continues 2. AI Expansion – The Good and The Bad
  • 6. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. FY18 Trends GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of Security Professionals, Lack of employee security education … 1. IOT Vulnerability Continues 2. AI Expansion – The Good and The Bad 3. Blockchain Revolution
  • 7. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. FY18 Trends GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of Security Professionals, Lack of employee security education … 1. IOT Vulnerability Continues 2. AI Expansion – The Good and The Bad 3. Blockchain Revolution 4. The rise of Ransomware and Organized Crime
  • 8. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. Breaches and Perpetrators 120.248 4.753 Source: Verizon DBIR 2017 Incidents Breaches Top Five Threat Agents (by effectiveness) • Private Criminal Organizations • Advanced Persistent Threat (APT) • Information Partners and Vendors • Disgruntled, Reckless, or Untrained Employees • Civil Activists
  • 9. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. Who are the Hackers? -The 2018 Black Report
  • 10. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. Who are the Hackers? -The 2018 Black Report
  • 11. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. What does an Attach look like? -The 2018 Black Report
  • 12. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. What does an attach look like? -The 2018 Black Report
  • 13. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. Is it Static? -The 2018 Black Report
  • 14. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. Hackers Advice -The 2018 Black Report
  • 15. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. The Changing Threat Landscape End Point Defenses
  • 16. HP: Experiences for the Modern Workforce DESIGN for the way you work and live SECURITY to work anywhere COLLABORATION for connecting & creating
  • 17. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. EVERY PC & PRINTER DECISION IS A SECURITY DECISION
  • 18. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. Detect Increase protection at all levels of compute platform Continuous business productivity, lower TCO and seamless recovery Even when protections fail (and they will), proactive detection is essential Ultimate Goal – No Downtime! Protect Recover SECURITY THAT’S “BUILT-IN, NOT BOLTED ON” DESIGNED FOR CYBER-RESILIENCE
  • 19. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. MANY USERS THINK SECURITY IS DIFFICULT – When a user finds security difficult, they work around it…
  • 20. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. The next generation of the WORLD’S MOST SECURE & MANAGEABLE PCs1 S E C U R I T Y B U I LT - I N n o t B O LT E D O N 20
  • 21. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. HP’s 2018 SECURITY STACK ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller NEW Additions and Updates HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices 21
  • 22. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. HP’s 2018 SECURITY STACK ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller NEW Additions and Updates HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices 22
  • 23. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. IN THE OS Operating System, Software, Downloads ABOVE THE OS Manageability Infrastructure, Visual Hackers OPEN DOORS Security tools are useless unless policies are enforced. Manageability is required to make security effective ! COMMON TARGET Unpatched software vulnerabilities are easy to exploit. Malicious websites, infected downloads ! IDEAL TARGET Complex target, but successful attacks mean persistence, stealth, and access to almost anything they want !!!BELOW THE OS Firmware (BIOS, etc.) HARDWARE Most Secure. Extremely difficult for hackers and malware to penetrate. THREATS TARGET EVERY LEVEL OF THE SYSTEM 23
  • 24. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. HP ENDPOINT SECURITY STACK 2018 24 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates
  • 25. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. A SECURE SYSTEM REQUIRES A HARDENED ROOT OF TRUST 25 To protect against the malware of the future PCs must have security rooted in HARDWARE • Out of reach of malware attacks • Independent of the BIOS and OS • Can’t be tampered with
  • 26. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. HP Endpoint Security Controller Since 2014, HP has integrated the HP Endpoint Security Controller into our HP Elite PCs. This unique hardware enables solutions that are in turn trustworthy, such as HP Sure Start2, the World’s First and Only Self-Healing BIOS. 26
  • 27. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. GROUNDING SECURITY IN HARDWARE 27 to create a cyber resilient system in the face of unexpected attacks. The HP Endpoint Security Controller enables solutions that are: Hardware Enforced Self-Healing Manageable
  • 28. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. PROTECTING ALL LEVELS OF THE PC IN THE OS Operating System, Software, Downloads ABOVE THE OS Manageability BELOW THE OS Firmware (BIOS, etc.) Hardware ENFORCE COMPLIANCE HP Management Integration Toolkit6 HP Endpoint Security Controller TRUSTED BIOS HP Sure Start Gen42 STRENGTHEN THE OS HP Sure Run3, HP Sure Click8, HP Sure Recover4 HP MIK ensures the systems continues working as it should 28
  • 29. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. HP ENDPOINT SECURITY STACK 2018 29 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates
  • 30. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. DEFEND AGAINST DEVASTATING FIRMWARE ATTACKS Protect your BIOS with HP Sure Start Gen4 2 HP Sure Start is the industry’s first and still the only self-healing BIOS. The BIOS is the first million lines of code that run. It is the key to your PC’s foundation. Why should customers care? Once the BIOS is corrupted, the hackers “own” your PC: all other protection is useless. Antivirus, anti-malware, and OS firewalls will not detect an infected BIOS! 30
  • 31. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. HP ENDPOINT SECURITY STACK 2018 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates 31
  • 32. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. MINIMIZE DOWNTIME Recover quickly with HP Sure Recover4 32 HP Sure Recover offers secure, automated, network-based software image recovery. Using the HP Endpoint Security Controller, it can quickly and securely reimage machines to HP’s or the company’s latest software image - using only an internet connection !  Because HP Sure Recover4 is based in hardware, you can reimage a PC, even from a bare hard drive.
  • 33. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. REIMAGE ON DEMAND OR ON SCHEDULE RESILIENT BY DEFAULT FOR SMB. CUSTOMIZABLE FOR ENTERPRISE. User initiated IT scheduled! FRESH START: IT can schedule routine reimaging, so malware doesn’t have a chance to stick around. • Ideal for Hospitality, Retail, Healthcare, Education, etc. ENABLING USERS to quickly reimage their own machines without IT support AUTOMATED RECOVERY: If no OS is found, the PC will automatically present the user the option to reimage FLEXIBLE: Defaults to latest HP image, or may be configured in firmware to recover custom enterprise image 33
  • 34. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. HP ENDPOINT SECURITY STACK 2018 34 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates
  • 35. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. WORK FREELY IN PUBLIC SPACES HP Sure View Gen27: the world’s ONLY integrated PC privacy screen12 Now in it’s SECOND GENERATION, HP Sure View Gen2 enables a better visual experience in light OR dark environments – from the plane to the café What’s New • Performs great in BRIGHT and DARK environments • IPS panel technology • Improved 120Hz REFRESH RATE, for smooth motion • Reduced display thickness - ULTRA-THIN DESIGNS HP Sure View Gen27 protects against visual hacking with the press of a button. 35
  • 36. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. Detect Increase protection at all levels of compute platform Continuous business productivity, lower TCO and seamless recovery Even when protections fail (and they will), proactive detection is essential Ultimate Goal – No Downtime! Protect Recover SECURITY THAT’S “BUILT-IN, NOT BOLTED ON” DESIGNED FOR CYBER-RESILIENCE
  • 37. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. EVERY PC & PRINTER DECISION IS A SECURITY DECISION
  • 38. THANK YOU HP Confidential. For use with HP customers under HP CDA only