Presentation given by Rajan Raj Pant, Controller Ministry of Science & Technology, Government of Nepal on August 3rd, 2011 at eWorld Forum (www.eworldforum.net) in the session Information Management and Security
Digital signature and certificate authorityKrutiShah114
This presentation will give you a broad view about digital signature and certificate authority. It also explains the difference between digital signature and electronic signature.
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)NUS-ISS
Presentation by Mr. Floyd DCosta, Co-founder @Block Armour, CEO @Blockchain Worx at NUS-ISS SkillsFuture Series Seminar: How the world is experimenting with Blockchain
Smart OpenID brings strong authentication for internet cloud service access to mobile devices by leveraging the crypto capabiliteis provided by smart cards and secure elements in mobile phones.
Presentation held at Chip-To-Cloud Forum in Nice, September 2012
Digital signature and certificate authorityKrutiShah114
This presentation will give you a broad view about digital signature and certificate authority. It also explains the difference between digital signature and electronic signature.
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)NUS-ISS
Presentation by Mr. Floyd DCosta, Co-founder @Block Armour, CEO @Blockchain Worx at NUS-ISS SkillsFuture Series Seminar: How the world is experimenting with Blockchain
Smart OpenID brings strong authentication for internet cloud service access to mobile devices by leveraging the crypto capabiliteis provided by smart cards and secure elements in mobile phones.
Presentation held at Chip-To-Cloud Forum in Nice, September 2012
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System IJECEIAES
Contactless payments devised for NFC technology are gaining popularity. Howbeit, with NFC technology permeating concerns about arising security threats and risks to lessen mobile payments is vital. The security analysis of NFC-enabled mobile payment system is precariously imperative due to its widespread ratification. In mobile payments security is a prevalent concern by virtue of the financial value at stave. This paper assays the security of NFC based mobile payment system. It discusses the security requirements, threats and attacks that could occur in mobile payment system and the countermeasures to be taken to secure pursuance suitability.
Andrew Shikiar, Executive Director & CMO of the FIDO Alliance outlines what FIDO has achieved in the last 7 years, how the market is adopting FIDO, and new expanded work areas focusing on identity verification and binding and the Internet of Things.
Presentation given by S K Sinha, Senior Technical Director & Head, Smart Card Technology Division and NIC CA, NIC on August 2nd, 2011 at eWorld Forum (www.eworldforum.net) in the session Unique Identification Number (UID)
Mobilized Secure Login - motionQR Use CasemotionQR
motionQR technology can provide a platform that can hold/present/scan limitless types of information. This enables secure digital signatures, among other things.
Combating Financial Fraud and Cyber-Crime on MobileWultra
Presentation prepared for the 43 online Banking Conference by BACEE presented by Petr Dvorak, CEO at Wultra, covers the areas that banks need to focus on to protect mobile banking users.
Mobile Connect, an initiative by GSMA, has the potential to change online authentication and how we consume online services, on a global basis. This presentation will explain what Mobile Connect is, how it can benefit your organisation and the end users.
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System IJECEIAES
Contactless payments devised for NFC technology are gaining popularity. Howbeit, with NFC technology permeating concerns about arising security threats and risks to lessen mobile payments is vital. The security analysis of NFC-enabled mobile payment system is precariously imperative due to its widespread ratification. In mobile payments security is a prevalent concern by virtue of the financial value at stave. This paper assays the security of NFC based mobile payment system. It discusses the security requirements, threats and attacks that could occur in mobile payment system and the countermeasures to be taken to secure pursuance suitability.
Andrew Shikiar, Executive Director & CMO of the FIDO Alliance outlines what FIDO has achieved in the last 7 years, how the market is adopting FIDO, and new expanded work areas focusing on identity verification and binding and the Internet of Things.
Presentation given by S K Sinha, Senior Technical Director & Head, Smart Card Technology Division and NIC CA, NIC on August 2nd, 2011 at eWorld Forum (www.eworldforum.net) in the session Unique Identification Number (UID)
Mobilized Secure Login - motionQR Use CasemotionQR
motionQR technology can provide a platform that can hold/present/scan limitless types of information. This enables secure digital signatures, among other things.
Combating Financial Fraud and Cyber-Crime on MobileWultra
Presentation prepared for the 43 online Banking Conference by BACEE presented by Petr Dvorak, CEO at Wultra, covers the areas that banks need to focus on to protect mobile banking users.
Mobile Connect, an initiative by GSMA, has the potential to change online authentication and how we consume online services, on a global basis. This presentation will explain what Mobile Connect is, how it can benefit your organisation and the end users.
Continuous improvements in technology and quality of life have had a strong impact on the development of payment techniques. With the evolution of near-field communication (NFC) technology, contactless payment has received recent attention because of its short-range, conducive nature. As mobile computing made great leaps due to enormous development in the smart phone platform, companies like Google, Samsung, and Apple embedded NFC in smart phones to provide on-the-go payment capabilities, eliminating the need for payment cards. But due to interoperability and high cost, these technologies are not available to everyone. Dr. B Srinivasa Rao | Ch. Sphoorthi | K. TejaSree | G. Sai Snigdha | V. S R Harika"Pay-Cloak:Biometric" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11430.pdf http://www.ijtsrd.com/computer-science/other/11430/pay-cloakbiometric/dr-b-srinivasa-rao
Key Security Measures Behind Digital Payment SystemsITIO Innovex
Today, digital payment systems thanks to white-label payment gateway solutions have become the heartbeat of modern commerce. Visit us at: https://itio.in/services/white-label-payment-gateway
Revolutionizing digital authentication with gsma mobile connectKeet Sugathadasa
This is the presentation that was conducted at the Colombo Identity and Access Management User Group Meetup on the 7th of September 2017.
The Title is "Revolutionizing Digital Authentication with GSMA Mobile Connect"
Speaker is Keet Malin Sugathadasa. He is an undergraduate of the Department of Computer Science and Engineering, University of Moratuwa.
Topics Addresses in this Presentation:
1) Problems with Current Authentication Solutions
2) Introduction to Mobile Connect
3) The Mobile Connect Flow
4) Discovery API
5) Mobile Connect API
6) Level of Assurance (LoA)
7) Mobile Connect and OpenID Connect
8) The WSO2 Identity Server
9) Mobile Connect Demonstration
Mobile identity management has attracted the attention of both the public and private sectors in the last few years. In the context of service delivery, modern mobile communication networks offer more convenient approaches to developing citizen-centric applications. However, taking into consideration the need for compelling user authentication and identification, secure communication in mobile environments remains a challenging matter. This article explores the potential role of government-issued smart identity cards in leveraging and enabling a more trusted mobile communication base. It delves into the identity management infrastructure program in the United Arab Emirates (UAE) and how the smart identity card and overall system architecture have been designed to enable trusted and secure transactions for both physical and virtual mobile communications.
Security & Seamless CX in User Authentication: How to Achieve Both?Ivona M
Watch our webinar and learn:
-How to satisfy the existing security compliance criteria in the era of impatient customers?
-Industry best practices in ensuring the highest security and improved user experience in the authentication process.
-Practical steps to planning and implementing optimal authentication ecosystems without unnecessary expenses.
-From OTP to push and biometry – which authentication methods will be best suited to your business needs?
-How to ensure strong authentication for remote work?
For more info go to https://sxs.asseco.com/
NEC's Digital Identity Platform for Federal AgenciesInteractiveNEC
The NEC Digital Platform (NDP) streamlines the use of our secure biometrics and identity and document verification capabilities and speeds up the assembly of complex or challenging processes or services. Designed as an extensible framework, the NDP aggregates, expands, and enhances systems capabilities into a multifunctional digital ecosystem designed to support current and future Federal operations.
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
Identity and authentication management, or IAM, represents the greatest security return on investment an organization can make. Former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States, Richard Clarke, once famously said, "If you spend more on coffee than on IT security, then you will be hacked." Many analysts concur that spending on strong authentication provides the greatest security return on investment. This educational white paper, written by Richard Stiennon, Chief Research Analyst at IT-Harvest and Executive Editor of securitycurrent, explores the concept of identity platforms.
• How to fix intrinsic weaknesses in authentication regimes that result in gaping and trivially exploitable vulnerabilities
• Explore the core features of an authentication and identity platform
• Examine specific features and components organizations should require in a software authentication platform
קומדע קבוצה לפתרונות תקשורת ואבטחת מידע מובילה, משנת 1985, עובדים עם חברות הטכנולוגיה הגדולות בעולם כדי להוביל פרויקטים חכמים ומתקדמים שמשנים את העולם! פתרונות ביומטריים חכמים מאפשרים הזדהות חזקה למניעת גניבת זהות וכן התנהלות נוחה, מהירה ופשוטה (לא צריך לסחוב שום דבר חוץ מקרנית העין ;)
This is a presentation I made to IT heads in various ministries in the Central Government as well as the State Governments across India.
It describes how crowd-sourcing is used in Pune and how the best practice has evolved across the world.
This can be a good set of examples for local, state and central government offices to emulate rapidly with low budgets and high impact.
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...ijiert bestjournal
Quick Response (QR) code are 2D (two dimension) matrix code. Here it is use for secure authentication. Now days Internet is most commonlyused medium to access the information. People are using many website like online banking,insurance,shopping etc. these websites requires the strong authentication. Using a pair of username and password authentication scheme is not secure enough since attacker can collect information from web phishing and computer infection. Various malware or intended programs attempt to capture the confidential information from personal computer. Therefore,secure authentication scheme is required. Many authentication methods have been developed such as one time password,SMS base OTP system and some using bio-metric feature. Some of these authentications are fail due to network problem and increases the cost. People are increasingly used in all life fields,especially with the wide spread of Android smart phones which are used as QR-code scanners
Presentation given by Nalini Chandran, Director, The Sobha Academy on July 15,2011 at WORLD EDUCATION SUMMIT (www.worldeducationsummit.net) in the School Education Track: SCHOOL EDUCATION LEADERSHIP CONCLAVE: BUILDING VISIONARy SCHOOLS OF THE 21ST CENTURY
Presentation given by Rachna Swarup, Project Manager,Teacher Training, NIIT Limited on July 15,2011 at WORLD EDUCATION SUMMIT (www.worldeducationsummit.net) in the School Education Track: FROM CONVENTIONAL ASSESSMENT PRACTICES TO CONTINUOUS AND COMPREHENSIVE EVALUATION (CCE): A REVIEW OF BEST PRACTICES
Presentation given by Murli K S, CEO, 24×7 Guru on July 15,2011 at WORLD EDUCATION SUMMIT (www.worldeducationsummit.net) in the School Education Track: FROM CONVENTIONAL ASSESSMENT PRACTICES TO CONTINUOUS AND COMPREHENSIVE EVALUATION (CCE): A REVIEW OF BEST PRACTICES
Presentation given by Dr Kuldeep Agarwal, Director (Academics), National Institute of Open Schooling (NIOS) on July 15,2011 at WORLD EDUCATION SUMMIT (www.worldeducationsummit.net) in the School Education Track: FROM CONVENTIONAL ASSESSMENT PRACTICES TO CONTINUOUS AND COMPREHENSIVE EVALUATION (CCE): A REVIEW OF BEST PRACTICES
Presentation given by Mark Parkinson, Director, Shri Ram Schools on July 15,2011 at WORLD EDUCATION SUMMIT (www.worldeducationsummit.net) in the School Education Track: FROM CONVENTIONAL ASSESSMENT PRACTICES TO CONTINUOUS AND COMPREHENSIVE EVALUATION (CCE): A REVIEW OF BEST PRACTICES
Presentation given by Nagraj G Honnekeri, State Project Director, Sarva Shiksha Abhiyan, Goa on July 15,2011 at WORLD EDUCATION SUMMIT (www.worldeducationsummit.net) in the School Education Track: SCHOOL EDUCATION LEADERSHIP CONCLAVE: BUILDING VISIONARy SCHOOLS OF THE 21ST CENTURY
"Presentation given by Shraman Jha, Vice President, School Learning Solutions, NIIT Limited on July 15,2011 at WORLD EDUCATION SUMMIT (www.worldeducationsummit.net) in the School Education Track: UNIVERSALISATION OF SCHOOL EDUCATION: STRATEGIES FOR ACHIEVING MILLENNIUM DEVELOPMENT GOALS IN EDUCATION
"
Presentation given by Dr Melor Md yunus, Deputy Director of PERMATApintar National Gifted Centre, National University of Malaysia on July 15,2011 at WORLD EDUCATION SUMMIT (www.worldeducationsummit.net) in the School Education Track: UNIVERSALISATION OF SCHOOL EDUCATION: STRATEGIES FOR ACHIEVING MILLENNIUM DEVELOPMENT GOALS IN EDUCATION
"Presentation given by Dr Dinesh Kumar, Joint Commissioner, Kendriya Vidyalaya Sangathan (KVS) on July 15,2011 at WORLD EDUCATION SUMMIT (www.worldeducationsummit.net) in the School Education Track: IMPROVING GROSS ENROLLMENT RATIO AND MANAGING QUALITY IN HIGHER EDUCATION INSTITUTES: UNIVERSALISATION OF SCHOOL EDUCATION: STRATEGIES FOR ACHIEVING MILLENNIUM DEVELOPMENT GOALS IN EDUCATION
"
Presentation given by Veena Raizada, Head – Academics, NExT Education on July 14,2011 at WORLD EDUCATION SUMMIT (www.worldeducationsummit.net) in the School Education Track: CREATING EXCELLENCE IN SCHOOL EDUCATION: FUNDAMENTALS FOR POLICy MAKERS, PRACTITIONERS AND EDUCATIONISTS
"Presentation given byAmit Gupta, CEO, S Chand Group
Kalpesh Gajanand, GM, Mexus Education
on July 14,2011 at WORLD EDUCATION SUMMIT (www.worldeducationsummit.net) in the School Education Track: CREATING EXCELLENCE IN SCHOOL EDUCATION: FUNDAMENTALS FOR POLICy MAKERS, PRACTITIONERS AND EDUCATIONISTS"
Presentation given by Dr Anita Priyadarshini, Director, Distance Education Programme – SSA, Indira Gandhi National Open Universityon July 14,2011 at WORLD EDUCATION SUMMIT (www.worldeducationsummit.net) in the School Education Track: CREATING EXCELLENCE IN SCHOOL EDUCATION: FUNDAMENTALS FOR POLICy MAKERS, PRACTITIONERS AND EDUCATIONISTS
Presentation given by Dr Anjalee Prakash, CEO, Learning Links Foundation on July 14,2011 at WORLD EDUCATION SUMMIT (www.worldeducationsummit.net) in the School Education Track: CREATING EXCELLENCE IN SCHOOL EDUCATION: FUNDAMENTALS FOR POLICy MAKERS, PRACTITIONERS AND EDUCATIONISTS
"Presentation given by Son Kuswadi, Education Attache, Embassy of the Republic of Indonesia on July 14,2011 at WORLD EDUCATION SUMMIT (www.worldeducationsummit.net) in the School Education Track: LOCALISED LEARNING IN A GLOBALISED CONTExT: CAPACITy BUILDING, CONTENT AND TRAINING OF TRAINERS
"
Presentation given by Mr. Raj Grover, CEO, Rumi Education Ltd on July 14,2011 at WORLD EDUCATION SUMMIT (www.worldeducationsummit.net) in the School Education Track: FROM CONVENTIONAL ASSESSMENT PRACTICES TO CONTINUOUS AND COMPREHENSIVE EVALUATION (CCE): A REVIEW OF BEST PRACTICES
Presentation given by Mr. Manish Upadhyay, COO, EnglishEdge on July 14,2011 at WORLD EDUCATION SUMMIT (www.worldeducationsummit.net) in the School Education Track: LOCALISED LEARNING IN A GLOBALISED CONTExT: CAPACITy BUILDING, CONTENT AND TRAINING OF TRAINERS
Presentation given by Dr Thomas Christie, Director, Aga Khan University Examination Board on July 15,2011 at WORLD EDUCATION SUMMIT (www.worldeducationsummit.net) in the School Education Track: LOCALISED LEARNING IN A GLOBALISED CONTExT: CAPACITy BUILDING, CONTENT AND TRAINING OF TRAINERS
Presentation given by Prof K R Srivathsan, Pro Vice Chancellor, Indira Gandhi National Open University on July 13,2011 at WORLD EDUCATION SUMMIT (www.worldeducationsummit.net) in the Higher Education Track: OPEN UNIVERSITIES IN THE DIGITAL ERA (Special Session in association with Distance Education Council)
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Rajan Raj Pant
1. Comprehensive National Authentication Framework using Digital Certificate and One Time Passwords Rajan Raj Pant Controller Office of Controller of Certification Ministry of Science & Technology
2. The State of User Authentication Passwords still dominate, but continue to weaken The need for strong authentication continues to grow Increasing number of business processes moving online Employee mobility expanding – demand for anywhere anytime access to information Compliance and notification laws proliferate Phishing attacks have increased dramatically (see www.antiphishing.org) 2
3. Digital Certificates Digital certificates: An electronic document that utilizes amethod to bind together: A public key An identity Can be used to verify that a public key belongs to an individual 3 Digital Certificate
4. One Time Passwords (OTP) 4 Software Token on PC Software Token on Mobile Device OTP On-demand Delivered: Via hardware token Software application on PC or smart device Over an SMS channel Can only be used once Hardware Token
5. Lightweight OTP and Legal validity using Digital Certificates – Mantra of Hybrid Authentication All Citizen Centric Internet Applications can utilize the single Authentication framework without having to reinvest into citizen registration thereby saving thousands of dollars in user management Applications can choose OTP for lightweight authentication while Digital Certificates where non-repudiation and digital signing may be necessary. Not all applications require digital signatures but all applications definitely need “strong 2 Factor Authentication” Citizen would be safe from password based vulnerabilities and would also not be required to remember multiple authentication schemes across the various public and private enterprises thereby increasing convenience manifold With government support a uniform and strong authentication service would be available for all to access – a major deterrent for technology adoption is the initial cost of procurement and maintenance – this is completely eliminated by the government providing the same as a service to all enterprises and citizens alike The framework can be easily extended to newer authentication technologies e.g. Risk Based authentication, Knowledge based authentication etc.. 5 OTP Authentication PKI Authentication & Services eCommerce Site Internet Banking Site
6. Digital Certificate Management Components 6 Registration Manager Certificate Manager User Validation Client Key Recovery Manager Web Server Card Manager Validation Manager
14. Southern Asia, between India and China ISP = 12 Telecom Operator = 4 Area: 147,181 sq km, Land: 143,351, Water: 3,830 sq km Population: 29,391,883 (June 2011) country comparison to the world: 41 10
22. Vision 18 “The Value Networking Nepal” through – Citizen-centered service Transparent Service Networking Government Knowledge Based Society
23. Nepal Factsheet Population: 29,391,883 (June 2011) country comparison to the world: 41 Internet hosts: 43,928 (2010) country comparison to the world: 91 Internet users: 2,426,357(June 2011) country comparison to the world: 116 Internet penetration: 8.49 % ETA 2006, IT Policy, Password Practices, IT Security Guidelines (to be passed) Current Penetration of Mobile: 24.35 % 19
26. IT Trends in Nepal 22 Present Future E-mail Facebook Skype IRD Online Tax Return PKI E-Passport E-Banking Online Postbox NID DR Center GIDC Mobile Cash Digitization Of Land Map Vehicle Registration GEA
27. 23 Security Layers Threats Applications Security Destruction Corruption Services Security Removal Disclosure Interruption Infrastructure Security Attacks Security Planes Security Dimensions Control Plane Management Plane Technology Architecture- Security Privacy Authentication Non-Repudiation Data Confidentiality Communications Security Data Integrity Availability Access Control Vulnerabilities End User Plane
28. Initiations ITERT IT Security Guidelines Code of Conduct for IT Government Network 24
29. Cyber Crime 21 Cases so far reported Mostly Social Engineering from Facebook Hacking 38 cases up to May 2011 25
38. 28 OCC Implementation of ETA License to ICA Monitor and Supervision of ICAs Information Security Relates works IT Security Audit Investigation Agency Functions