Short presentation for Toastmasters. Describes and defines the concept of resilience, looks at some case studies, and also discusses social networks, cascading failure and the vulnerability of Wellington's infrastructure
Blackout of Critical Services: Do you know your exposure?Gen Re
What happens to society when critical infrastructure fails? Imagine the effect of a large-scale failure in the power network on telecommunications, healthcare and the water supply. How would the emergency services cope?
Read More:
http://www.genre.com/knowledge/blog/?c=n
Keynote Speaker – "Infrastructure Interdependencies: Connections that Alter Consequences" - Michael J. Collins III, Infrastructure Analyst, Infrastructure Assurance Center, Argonne National Laboratories
Blackout of Critical Services: Do you know your exposure?Gen Re
What happens to society when critical infrastructure fails? Imagine the effect of a large-scale failure in the power network on telecommunications, healthcare and the water supply. How would the emergency services cope?
Read More:
http://www.genre.com/knowledge/blog/?c=n
Keynote Speaker – "Infrastructure Interdependencies: Connections that Alter Consequences" - Michael J. Collins III, Infrastructure Analyst, Infrastructure Assurance Center, Argonne National Laboratories
Blackout: Extreme Weather, Climate Change and Power Outagesclimate central
Climate change is causing an increase in many types of extreme weather. To date, these kinds of severe weather are among the leading causes of large-scale power outages in the United States.
Top 10 Actions a CIO Can Take to Prepare for a HurricaneBillatDell
Plan for the worst, hope for the best
An active hurricane season imposes an unwelcome set of additional challenges for businesses and executives. Immediate concerns include the safety and security of employees, as well as the prevention of damage to physical facilities. However, CIOs must also be prepared to successfully overcome the challenge of maintaining business continuity in the event of a hurricane. Short and long-term impacts on customers, suppliers, partners, and employees can arise if communications and critical IT systems are lost or down for even a short period of time as the result of a storm.
Business continuity and business viability are closely linked. In the days and months following these recent devastating hurricanes, a handful of businesses fared much better than average. These companies had a combination of the right disaster recovery program in place and had technology solutions to maintain contact with their employees, customers, vendors, and ‘the outside world’. They executed strategies with built-in flexibility to swiftly react to situations and ultimately provided excellent resilience for their organizations. While many companies struggled for months to bring their operations and staff back to capacity, these organizations remained open for business, quickly relocated staff, maintained effective internal & external communications and were able to maintain operations without a devastating financial impact.
Resilience: Global Imperative for 2013 and Beyond_Mesh evans april 25 2013Peter C. Evans, PhD
Identifies key forces that are driving the need for resilient as well as sustainable resilient energy infrastructure. The presentation argues that work need greater technology innovation to support RSI (resilient, sustainable infrastructure).
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?Brian K. Dickard
How many of you think that the US power grid can be taken out for an extended time period by a cyberattack? The threat is real and sophisticated, and our ability to mount a coordinated response at both the government and private industry level is limited. This presentation explores the critical issues involved in making meaningful progress to detect and defend against this threat.
World Economic Forum - Global Risk Report - 2015Shiv ognito
The Global Risks Perception Survey 2014 gathered the
perceptions of almost 900 members of the World
Economic Forum’s multistakeholder community
between July and September 2014.
The 2015 edition of the Global Risks report completes a decade of highlighting the most significant long-term risks worldwide, drawing on the perspectives of experts and global decision-makers.
Over that time, analysis has moved from risk identification to thinking through risk interconnections and the potentially cascading effects that result.
Taking this effort one step further, this year’s report underscores potential causes as well as solutions to global risks.
Not only do we set out a view on 28 global risks in the report’s traditional categories (economic, environmental, societal, geopolitical and technological) but also we consider the drivers of those risks in the form of 13 trends.
In addition, we have selected initiatives for addressing significant challenges, which we hope will inspire collaboration among business, government and civil society communities.
As in previous years, the report is based on the annual Global Risks Perception Survey, completed by almost 900
members of the World Economic Forum’s global multistakeholder community. This year’s report introduces a new distinction between risks and trends, which allows the highlighting of trends as an enlarged solution space to many possible risks.
The 2015 edition of the Global Risks report completes a decade of highlighting the most significant long-term risks worldwide, drawing on the perspectives of experts and global decision-makers. Over that time, analysis has moved from risk identification to thinking through risk interconnections and the potentially cascading effects that result. Taking this effort one step further, this year’s report underscores potential causes as well as solutions to global risks. Not only do we set out a view on 28 global risks in the report’s traditional categories (economic, environmental, societal, geopolitical and technological) but also we consider the drivers of those risks in the form of 13 trends. In addition, we have selected initiatives for addressing significant challenges, which we hope will inspire collaboration among business, government and civil society communities.
As in previous years, the Report is based on the annual Global Risks Perception Survey, completed by almost 750 members of the World Economic Forum’s global multistakeholder community. In addition to the special section exploring the evolving security landscape in an era of uncertainty, the Report presents deep-dive discussions of risks to the stability of societies posed by the (dis)empowered citizen, who is empowered by technology but feels disempowered by traditional decision-making processes.
To briefly describe the various impacts of a hurricane and to give the social and economic consequences of each. The degree by which any of these can affect the human and physical environment can vary. From little to no damage, to the extremes.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Blackout: Extreme Weather, Climate Change and Power Outagesclimate central
Climate change is causing an increase in many types of extreme weather. To date, these kinds of severe weather are among the leading causes of large-scale power outages in the United States.
Top 10 Actions a CIO Can Take to Prepare for a HurricaneBillatDell
Plan for the worst, hope for the best
An active hurricane season imposes an unwelcome set of additional challenges for businesses and executives. Immediate concerns include the safety and security of employees, as well as the prevention of damage to physical facilities. However, CIOs must also be prepared to successfully overcome the challenge of maintaining business continuity in the event of a hurricane. Short and long-term impacts on customers, suppliers, partners, and employees can arise if communications and critical IT systems are lost or down for even a short period of time as the result of a storm.
Business continuity and business viability are closely linked. In the days and months following these recent devastating hurricanes, a handful of businesses fared much better than average. These companies had a combination of the right disaster recovery program in place and had technology solutions to maintain contact with their employees, customers, vendors, and ‘the outside world’. They executed strategies with built-in flexibility to swiftly react to situations and ultimately provided excellent resilience for their organizations. While many companies struggled for months to bring their operations and staff back to capacity, these organizations remained open for business, quickly relocated staff, maintained effective internal & external communications and were able to maintain operations without a devastating financial impact.
Resilience: Global Imperative for 2013 and Beyond_Mesh evans april 25 2013Peter C. Evans, PhD
Identifies key forces that are driving the need for resilient as well as sustainable resilient energy infrastructure. The presentation argues that work need greater technology innovation to support RSI (resilient, sustainable infrastructure).
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?Brian K. Dickard
How many of you think that the US power grid can be taken out for an extended time period by a cyberattack? The threat is real and sophisticated, and our ability to mount a coordinated response at both the government and private industry level is limited. This presentation explores the critical issues involved in making meaningful progress to detect and defend against this threat.
World Economic Forum - Global Risk Report - 2015Shiv ognito
The Global Risks Perception Survey 2014 gathered the
perceptions of almost 900 members of the World
Economic Forum’s multistakeholder community
between July and September 2014.
The 2015 edition of the Global Risks report completes a decade of highlighting the most significant long-term risks worldwide, drawing on the perspectives of experts and global decision-makers.
Over that time, analysis has moved from risk identification to thinking through risk interconnections and the potentially cascading effects that result.
Taking this effort one step further, this year’s report underscores potential causes as well as solutions to global risks.
Not only do we set out a view on 28 global risks in the report’s traditional categories (economic, environmental, societal, geopolitical and technological) but also we consider the drivers of those risks in the form of 13 trends.
In addition, we have selected initiatives for addressing significant challenges, which we hope will inspire collaboration among business, government and civil society communities.
As in previous years, the report is based on the annual Global Risks Perception Survey, completed by almost 900
members of the World Economic Forum’s global multistakeholder community. This year’s report introduces a new distinction between risks and trends, which allows the highlighting of trends as an enlarged solution space to many possible risks.
The 2015 edition of the Global Risks report completes a decade of highlighting the most significant long-term risks worldwide, drawing on the perspectives of experts and global decision-makers. Over that time, analysis has moved from risk identification to thinking through risk interconnections and the potentially cascading effects that result. Taking this effort one step further, this year’s report underscores potential causes as well as solutions to global risks. Not only do we set out a view on 28 global risks in the report’s traditional categories (economic, environmental, societal, geopolitical and technological) but also we consider the drivers of those risks in the form of 13 trends. In addition, we have selected initiatives for addressing significant challenges, which we hope will inspire collaboration among business, government and civil society communities.
As in previous years, the Report is based on the annual Global Risks Perception Survey, completed by almost 750 members of the World Economic Forum’s global multistakeholder community. In addition to the special section exploring the evolving security landscape in an era of uncertainty, the Report presents deep-dive discussions of risks to the stability of societies posed by the (dis)empowered citizen, who is empowered by technology but feels disempowered by traditional decision-making processes.
To briefly describe the various impacts of a hurricane and to give the social and economic consequences of each. The degree by which any of these can affect the human and physical environment can vary. From little to no damage, to the extremes.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
21. Resilience Rapid change makes resilience even more important. It isn't just about being prepared, its about being flexible and adaptable enough to cope with change of any kind.