SlideShare a Scribd company logo
SACON
SACON International 2020
India | Bangalore | February 21 - 22 | Taj Yeshwantpur
Surfing today’s emerging tech: A policy-based approach
James Stanger, PhD
CompTIA
Chief Technology
Evangelist
@jamesstanger
SACON 2020
Ambient computing – a wave that’s already here
• Context-aware computing – “Presencing 2.0”
• Intelligent tech monitors people (AI & ML)
• Information you generate and use moves from:
• Individuals to edge / cloud / data center
• Environment to environment
• Machine to machine
• Part of the 4th industrial revolution
• The result?
• Hyper-personalization - customer focus
• Data analytics and business intelligence
• Control (?)
SACON 2020
Emerging tech categories generating this wave through
2023
The above revenue drivers are also the building blocks of the ambient computing
world
SACON 2020
Data / information has become the critical skill area
SACON 2020
Unprecedented connectivity of (smart) things
• How is this data connected to 

emerging tech?
• How do we process this data into

information?
ICS
DCS
SCADA
OT
IoT
Sensors / actuators / radios
Gateway Data
AcquisitionEdge
AIData center
Storage
Application
Network
ServerML
SACON 2020
IoT / OT and next steps: Customer
experience (CX)
• The next steps are to:
• Transform “emerging tech” into

customer-centric solutions
• Make the architecture more efficient
How do we apply
AI

and ML IoT?
How do we turn this
into a customer-
focused solution?
What about 

serverless /
edge?Should we do
this?
SACON 2020
Cloud – finally being used
• After much talk, we’re seeing 

actual adoption over the past 5 years
• Another part of the “4th industrial 

revolution”
• Azure vs. Alibaba vs. AWS, and so forth:

It depends on your business model
• Where do charges occur?
• Data in and out
• Services used
• Integration experience is at a premium
• We need workers that can convert 

technical speak into business terms and 

make decisions
SACON 2020
Surprises in the cloud space
• Two major surprise providers:
• VMWare (Dell)
• Red Hat (IBM)
• Why?
• Visualization: Can manage 

multiple environments / providers
• Network management: Using SD-WAN to route IoT device traffic
• Abstraction layer: Helps avoid vendor lock-in
• Customer focus: History of creating useful services
• Emerging tech: Ability to integrate new solutions, including AI
and blockchain
SACON 2020
5G and emerging tech
• 5G – it’s finally here (mostly)
• Capturing data where it is generated
• Edge – microclouds, mini data centers
• Cloud
• More devices to support
• The good, the bad, and the ugly of 5G
Good
Connectivity
Speed
Edge
capability
Bad
Tampering
Eavesdropping
Monitoring
Attack surface
DDoS
Ugly
Privacy
Traffic QoS
Trust models
SACON 2020
AI / ML finds its place: automation
• AI is often used as a subset of 

automation
• The use of tech to automatically:
• Launch, under conditions
• Respond to situations
• Improve itself (and other “things”)
• Communicate with other

machines and other people
• But now, it’s all about the 

intelligence of things.
Automation
Artificial
Intelligence
Machine

Learning Deep
Learning
KubernetesDocker
SACON 2020
Common realities when implementing emerging tech
• Shadow IT / Bring Your Own IT
• Skipping steps in the software development 

or platform deployment cycle
• Not managing devices properly
• No encryption
• No or poor authentication
• Rapid deployment of new technologies 

workers don’t fully understand
• Organizations receiving data that they 

aren’t properly securing
SACON 2020
• Because companies have at least two different perspectives
• Information Technology (IT)
• Business leaders
Why does shadow IT exist?
IT says shadow
IT is:
BAD
Business says
shadow IT is:
GOOD
SACON 2020
The risks of shadow IT
Customer

dissatisfactio
n
Loss of
information
integrity
Non-
compliance
Cost
overrunsPerformanc
e issues
SACON 2020
The result?
• Upstream issues
• Privacy issues
• Penalties (e.g., GDPR, HIPAA)
• Loss of consumer confidence
• Attacks
• Ransomware, credential harvesting
• DDoS
• Social engineering
• Forms of “technical debt”
• Organizations often can’t fix 

problems that they 

have created by using IoT, Cloud, 

and other solutions
• Security workers are asked to fix this problem
Toxic IT?
Code
Complexity Monoculture
s
SACON 2020
An applied example
SACON 2020
So, who is responsible?
SACON 2020
• IT workers

need to

solve

these issues
• They have

the best

perspective
Complexity: The primary reason for increased sales cycles
SACON 2020
• The industry has

moved from mere

detection to issues 

involving:
• Privacy
• New ways of 

investigating

risk
• Selective attack

surface reduction



Critical areas within cybersecurity
SACON 2020
• Most companies

can state a clear business

case
• But, the details

remain a 

problem
• IT workers

are needed

to manage

these factors

ethically
Issue Where IT can help
Customer
Confusion
Clarify product capabilities (e.g., AI, BI). Find
creative solutions. Help make the customer
comfortable.
Risk
aversion
The technical and business risks. Act as liaison. Help
ensure privacy concerns are addressed.
Budget
constraints
Provide accurate information concerning cloud-
based services.
Inhibiting factors for using emerging tech
SACON 2020
• Learn your business!
• This isn’t a technical issue
• Focus on how information flows
in your organization
• Cloud-based assets
• Enterprise / installed
• It requires:
• The ability to breakdown IT silos
• Communication with business
units
• Ability to analyze multiple sources
• Formal documentation
• Network diagrams
Adopting a policy-driven approach to “surf” emtech
problems
Asset
discovery
Articulate
risk level
Identify
policy
Evaluate
compliance
to policy
Change
managemen
t policy
Continuou
s
monitoring
SACON 2020
• We need data / business

intelligence analysts
• Turn data into information
• Identify trends
• We also need security analysts
• Moving from detection 

to prevention
• Threat modeling
• Threat feed interpretation
• Cloud-aware pen testing
The need for analysts
• Can’t secure 100% of the 

company
• Focus on critical resources (the
25%)
SACON 2020
Threat hunters
▪ Profiling specific

attacks
▪ Can provide

characteristics

and context
▪ Situational

awareness
▪ Provides focus
▪ Can also use 

threat feeds
Learn how the
organization
communicates
Identify resources
essential to the
organization
Investigate attack techniques
hackers will try that specific to
your organization’s resources
Proactively investigate –
monitor and analyze
Recommend security controls
SACON 2020
• SolarWinds Service Desk
• SysAid
• ImmuniWeb Discovery
• SolarWinds Network |

Performance Monitor
• Qualys
• Many open source tools
Asset discovery applications
SACON 2020
The indispensable IT worker
▪ Having only tech skills isn’t

enough
▪ Workers need a combination of
human and tech skills
• Emotional
intelligence
• Presentation skills
• Complex reasoning
• Writing
• Categorizing and
summarizing
• Anticipating issues
• Complex
reasoning
• Conditional
thinking
• Multi-vendor
situations
• Integration
Ethics: An increasingly important ski
SACON 2020
Cloud Seeding: A
Cloud Computing
Tutorial (CompTIA)
The Skills needed to combat today’s cybersecurity

threats (RSA)
Automated Pen Testing

(Admin Magazine)
Two sides of the same coin: Pen testing and
security analytics


What’s hot in network certifications
(NetworkWorld)
Escaping the Cybersecurity Metrics Matrix
(CompTIA)
Private Eye: Open source tools for automated
pen testing Admin Magazine

Thoughts about the help desk
(YouTube)
The Hunt for the Meaning of the Red team
(CompTIA)
The Internet of
Things (IoT) and
Technical Debt: Why
It Matters
(CompTIA)
James Stanger, PhD
jstanger@comptia.org
+1 (360) 970-5357
Twitter: @jamesstanger
Skype: stangernet

My CompTIA hub:

https://certification.comptia.org/it-career-news/hub/James-Stanger
Thank You!
Latest articles and blog entries:
Putting AI and ML to work (CompTIA)
What is the difference between IT security and
cybersecurity? (CompTIA)
Observations at RSA San Francisco 2019
(CompTIA)
Moving to the
Cloud:IT
Infrastructure and
Cybersecurity skills
required (CompTIA)
Where the Wild
Things Are:
Investigating
Browser-based
Brute Force Attacks
(November, 2019,
Admin Magazine)
How Technical Debt
Can Damage
Business

Agility and

Competitiveness

(ITPro, UK)

More Related Content

What's hot

(SACON) Satish Sreenivasaiah - DevSecOps Tools and Beyond
(SACON) Satish Sreenivasaiah - DevSecOps Tools and Beyond(SACON) Satish Sreenivasaiah - DevSecOps Tools and Beyond
(SACON) Satish Sreenivasaiah - DevSecOps Tools and Beyond
Priyanka Aash
 
(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...
(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...
(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...
Priyanka Aash
 
(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...
(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...
(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...
Priyanka Aash
 
Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)
Priyanka Aash
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
Liwei Ren任力偉
 
SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)
Priyanka Aash
 
Arm the World with SPN based Security
Arm the World with SPN based SecurityArm the World with SPN based Security
Arm the World with SPN based Security
Liwei Ren任力偉
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
Leonardo De Moura Rocha Lima
 
IoT Broker
IoT BrokerIoT Broker
IoT Broker
FIWARE
 
IoT End-to-End Security Overview
IoT End-to-End Security OverviewIoT End-to-End Security Overview
IoT End-to-End Security Overview
Amazon Web Services
 
Jamie Bowser - A Touch(ID) of iOS Security
Jamie Bowser - A Touch(ID) of iOS SecurityJamie Bowser - A Touch(ID) of iOS Security
Jamie Bowser - A Touch(ID) of iOS Security
centralohioissa
 
IoTSummit - Introduction to IoT Hub
IoTSummit - Introduction to IoT HubIoTSummit - Introduction to IoT Hub
IoTSummit - Introduction to IoT Hub
Marco Silva
 
Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust Strategy
Okta-Inc
 
Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinar
Zscaler
 
What is Zero Trust
What is Zero TrustWhat is Zero Trust
What is Zero Trust
Okta-Inc
 
Zero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeZero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at Adobe
Vishwas Manral
 
Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version external
Zscaler
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
michaelbasoah
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise Report
Okta-Inc
 
Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8
Zscaler
 

What's hot (20)

(SACON) Satish Sreenivasaiah - DevSecOps Tools and Beyond
(SACON) Satish Sreenivasaiah - DevSecOps Tools and Beyond(SACON) Satish Sreenivasaiah - DevSecOps Tools and Beyond
(SACON) Satish Sreenivasaiah - DevSecOps Tools and Beyond
 
(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...
(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...
(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...
 
(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...
(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...
(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...
 
Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)
 
Arm the World with SPN based Security
Arm the World with SPN based SecurityArm the World with SPN based Security
Arm the World with SPN based Security
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
 
IoT Broker
IoT BrokerIoT Broker
IoT Broker
 
IoT End-to-End Security Overview
IoT End-to-End Security OverviewIoT End-to-End Security Overview
IoT End-to-End Security Overview
 
Jamie Bowser - A Touch(ID) of iOS Security
Jamie Bowser - A Touch(ID) of iOS SecurityJamie Bowser - A Touch(ID) of iOS Security
Jamie Bowser - A Touch(ID) of iOS Security
 
IoTSummit - Introduction to IoT Hub
IoTSummit - Introduction to IoT HubIoTSummit - Introduction to IoT Hub
IoTSummit - Introduction to IoT Hub
 
Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust Strategy
 
Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinar
 
What is Zero Trust
What is Zero TrustWhat is Zero Trust
What is Zero Trust
 
Zero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeZero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at Adobe
 
Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version external
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise Report
 
Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8
 

Similar to (SACON) Dr. James Stanger - Surfing today’s emerging tech: A policy-based approach

Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
STASH | Datacentric Security
 
Redgate_summit_atl_kgorman_intersection.pptx
Redgate_summit_atl_kgorman_intersection.pptxRedgate_summit_atl_kgorman_intersection.pptx
Redgate_summit_atl_kgorman_intersection.pptx
Kellyn Pot'Vin-Gorman
 
Eliminating the Multi-Cloud Noise with Razor Technology and OpsRamp
Eliminating the Multi-Cloud Noise with Razor Technology and OpsRampEliminating the Multi-Cloud Noise with Razor Technology and OpsRamp
Eliminating the Multi-Cloud Noise with Razor Technology and OpsRamp
OpsRamp
 
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyondCompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
Zeshan Sattar
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
CompTIA UK
 
Why the cloud is a trend
Why the cloud is a trendWhy the cloud is a trend
Why the cloud is a trend
MotherGuardians
 
Network Centric Cloud: Competing in a IT World with a Telecom Approach
Network Centric Cloud: Competing in a IT World with a Telecom ApproachNetwork Centric Cloud: Competing in a IT World with a Telecom Approach
Network Centric Cloud: Competing in a IT World with a Telecom Approach
Eduardo Mendez Polo
 
Cloud Billing: Enabling consumers for pay for what they use
Cloud Billing: Enabling consumers for pay for what they useCloud Billing: Enabling consumers for pay for what they use
Cloud Billing: Enabling consumers for pay for what they use
Eduardo Mendez Polo
 
Cloud Computing Direction in Thailand: Opportunity for IT Industry
Cloud Computing Direction in Thailand: Opportunity for IT IndustryCloud Computing Direction in Thailand: Opportunity for IT Industry
Cloud Computing Direction in Thailand: Opportunity for IT Industry
IMC Institute
 
Applying Digital to Manufacturing Mindset
Applying Digital to Manufacturing MindsetApplying Digital to Manufacturing Mindset
Applying Digital to Manufacturing Mindset
Pradeep Chankarachan
 
DCD INTERNET 2015 BROCHURE
DCD INTERNET 2015 BROCHUREDCD INTERNET 2015 BROCHURE
DCD INTERNET 2015 BROCHURE
DCDNA
 
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyMay 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
Tim Harvey
 
Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010
Ness Technologies
 
Cloud Computing Direction in Thailand
Cloud Computing  Direction in ThailandCloud Computing  Direction in Thailand
Cloud Computing Direction in Thailand
IMC Institute
 
Big data analytics enterprise and cloud computing
Big data analytics enterprise and cloud computingBig data analytics enterprise and cloud computing
Big data analytics enterprise and cloud computing
Cloud Credential Council
 
Tech Refresh - Ambient Computing and the IT "new normal"
Tech Refresh - Ambient Computing and the IT "new normal"Tech Refresh - Ambient Computing and the IT "new normal"
Tech Refresh - Ambient Computing and the IT "new normal"
CompTIA
 
Negotiating the Next Service Level Agreement
Negotiating the Next Service Level AgreementNegotiating the Next Service Level Agreement
Negotiating the Next Service Level Agreement
Eduardo Mendez Polo
 
Blockchain by Silver Touch Tech Lab
Blockchain by Silver Touch Tech LabBlockchain by Silver Touch Tech Lab
Blockchain by Silver Touch Tech Lab
SilverTouchTechLab
 
Hybrid Work Models, Anywhere Operations and Security
Hybrid Work Models, Anywhere Operations and SecurityHybrid Work Models, Anywhere Operations and Security
Hybrid Work Models, Anywhere Operations and Security
Advanced Technology Consulting (ATC)
 
Wikibon 2018 Predictions
Wikibon 2018 PredictionsWikibon 2018 Predictions
Wikibon 2018 Predictions
plburris
 

Similar to (SACON) Dr. James Stanger - Surfing today’s emerging tech: A policy-based approach (20)

Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
Redgate_summit_atl_kgorman_intersection.pptx
Redgate_summit_atl_kgorman_intersection.pptxRedgate_summit_atl_kgorman_intersection.pptx
Redgate_summit_atl_kgorman_intersection.pptx
 
Eliminating the Multi-Cloud Noise with Razor Technology and OpsRamp
Eliminating the Multi-Cloud Noise with Razor Technology and OpsRampEliminating the Multi-Cloud Noise with Razor Technology and OpsRamp
Eliminating the Multi-Cloud Noise with Razor Technology and OpsRamp
 
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyondCompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
CompTIA Cyber Career Pathway: Developing skills for 2020 and beyond
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Why the cloud is a trend
Why the cloud is a trendWhy the cloud is a trend
Why the cloud is a trend
 
Network Centric Cloud: Competing in a IT World with a Telecom Approach
Network Centric Cloud: Competing in a IT World with a Telecom ApproachNetwork Centric Cloud: Competing in a IT World with a Telecom Approach
Network Centric Cloud: Competing in a IT World with a Telecom Approach
 
Cloud Billing: Enabling consumers for pay for what they use
Cloud Billing: Enabling consumers for pay for what they useCloud Billing: Enabling consumers for pay for what they use
Cloud Billing: Enabling consumers for pay for what they use
 
Cloud Computing Direction in Thailand: Opportunity for IT Industry
Cloud Computing Direction in Thailand: Opportunity for IT IndustryCloud Computing Direction in Thailand: Opportunity for IT Industry
Cloud Computing Direction in Thailand: Opportunity for IT Industry
 
Applying Digital to Manufacturing Mindset
Applying Digital to Manufacturing MindsetApplying Digital to Manufacturing Mindset
Applying Digital to Manufacturing Mindset
 
DCD INTERNET 2015 BROCHURE
DCD INTERNET 2015 BROCHUREDCD INTERNET 2015 BROCHURE
DCD INTERNET 2015 BROCHURE
 
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyMay 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
 
Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010Boston Cloud Dinner/Discussion November 2010
Boston Cloud Dinner/Discussion November 2010
 
Cloud Computing Direction in Thailand
Cloud Computing  Direction in ThailandCloud Computing  Direction in Thailand
Cloud Computing Direction in Thailand
 
Big data analytics enterprise and cloud computing
Big data analytics enterprise and cloud computingBig data analytics enterprise and cloud computing
Big data analytics enterprise and cloud computing
 
Tech Refresh - Ambient Computing and the IT "new normal"
Tech Refresh - Ambient Computing and the IT "new normal"Tech Refresh - Ambient Computing and the IT "new normal"
Tech Refresh - Ambient Computing and the IT "new normal"
 
Negotiating the Next Service Level Agreement
Negotiating the Next Service Level AgreementNegotiating the Next Service Level Agreement
Negotiating the Next Service Level Agreement
 
Blockchain by Silver Touch Tech Lab
Blockchain by Silver Touch Tech LabBlockchain by Silver Touch Tech Lab
Blockchain by Silver Touch Tech Lab
 
Hybrid Work Models, Anywhere Operations and Security
Hybrid Work Models, Anywhere Operations and SecurityHybrid Work Models, Anywhere Operations and Security
Hybrid Work Models, Anywhere Operations and Security
 
Wikibon 2018 Predictions
Wikibon 2018 PredictionsWikibon 2018 Predictions
Wikibon 2018 Predictions
 

More from Priyanka Aash

Keynote : Presentation on SASE Technology
Keynote : Presentation on SASE TechnologyKeynote : Presentation on SASE Technology
Keynote : Presentation on SASE Technology
Priyanka Aash
 
Keynote : AI & Future Of Offensive Security
Keynote : AI & Future Of Offensive SecurityKeynote : AI & Future Of Offensive Security
Keynote : AI & Future Of Offensive Security
Priyanka Aash
 
Redefining Cybersecurity with AI Capabilities
Redefining Cybersecurity with AI CapabilitiesRedefining Cybersecurity with AI Capabilities
Redefining Cybersecurity with AI Capabilities
Priyanka Aash
 
Demystifying Neural Networks And Building Cybersecurity Applications
Demystifying Neural Networks And Building Cybersecurity ApplicationsDemystifying Neural Networks And Building Cybersecurity Applications
Demystifying Neural Networks And Building Cybersecurity Applications
Priyanka Aash
 
Finetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and DefendingFinetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and Defending
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Workshop _ Most Dangerous Attack Technique...
(CISOPlatform Summit & SACON 2024) Workshop _ Most Dangerous Attack Technique...(CISOPlatform Summit & SACON 2024) Workshop _ Most Dangerous Attack Technique...
(CISOPlatform Summit & SACON 2024) Workshop _ Most Dangerous Attack Technique...
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Gen AI & Deepfake In Overall Security.pdf
(CISOPlatform Summit & SACON 2024) Gen AI & Deepfake In Overall Security.pdf(CISOPlatform Summit & SACON 2024) Gen AI & Deepfake In Overall Security.pdf
(CISOPlatform Summit & SACON 2024) Gen AI & Deepfake In Overall Security.pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Incident Response .pdf
(CISOPlatform Summit & SACON 2024) Incident Response .pdf(CISOPlatform Summit & SACON 2024) Incident Response .pdf
(CISOPlatform Summit & SACON 2024) Incident Response .pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) GRC.pdf
(CISOPlatform Summit & SACON 2024) GRC.pdf(CISOPlatform Summit & SACON 2024) GRC.pdf
(CISOPlatform Summit & SACON 2024) GRC.pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Orientation by CISO Platform_ Using CISO P...
(CISOPlatform Summit & SACON 2024) Orientation by CISO Platform_ Using CISO P...(CISOPlatform Summit & SACON 2024) Orientation by CISO Platform_ Using CISO P...
(CISOPlatform Summit & SACON 2024) Orientation by CISO Platform_ Using CISO P...
Priyanka Aash
 
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
Priyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
Priyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
Priyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
Priyanka Aash
 

More from Priyanka Aash (20)

Keynote : Presentation on SASE Technology
Keynote : Presentation on SASE TechnologyKeynote : Presentation on SASE Technology
Keynote : Presentation on SASE Technology
 
Keynote : AI & Future Of Offensive Security
Keynote : AI & Future Of Offensive SecurityKeynote : AI & Future Of Offensive Security
Keynote : AI & Future Of Offensive Security
 
Redefining Cybersecurity with AI Capabilities
Redefining Cybersecurity with AI CapabilitiesRedefining Cybersecurity with AI Capabilities
Redefining Cybersecurity with AI Capabilities
 
Demystifying Neural Networks And Building Cybersecurity Applications
Demystifying Neural Networks And Building Cybersecurity ApplicationsDemystifying Neural Networks And Building Cybersecurity Applications
Demystifying Neural Networks And Building Cybersecurity Applications
 
Finetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and DefendingFinetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and Defending
 
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
 
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
 
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
 
(CISOPlatform Summit & SACON 2024) Workshop _ Most Dangerous Attack Technique...
(CISOPlatform Summit & SACON 2024) Workshop _ Most Dangerous Attack Technique...(CISOPlatform Summit & SACON 2024) Workshop _ Most Dangerous Attack Technique...
(CISOPlatform Summit & SACON 2024) Workshop _ Most Dangerous Attack Technique...
 
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
 
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
 
(CISOPlatform Summit & SACON 2024) Gen AI & Deepfake In Overall Security.pdf
(CISOPlatform Summit & SACON 2024) Gen AI & Deepfake In Overall Security.pdf(CISOPlatform Summit & SACON 2024) Gen AI & Deepfake In Overall Security.pdf
(CISOPlatform Summit & SACON 2024) Gen AI & Deepfake In Overall Security.pdf
 
(CISOPlatform Summit & SACON 2024) Incident Response .pdf
(CISOPlatform Summit & SACON 2024) Incident Response .pdf(CISOPlatform Summit & SACON 2024) Incident Response .pdf
(CISOPlatform Summit & SACON 2024) Incident Response .pdf
 
(CISOPlatform Summit & SACON 2024) GRC.pdf
(CISOPlatform Summit & SACON 2024) GRC.pdf(CISOPlatform Summit & SACON 2024) GRC.pdf
(CISOPlatform Summit & SACON 2024) GRC.pdf
 
(CISOPlatform Summit & SACON 2024) Orientation by CISO Platform_ Using CISO P...
(CISOPlatform Summit & SACON 2024) Orientation by CISO Platform_ Using CISO P...(CISOPlatform Summit & SACON 2024) Orientation by CISO Platform_ Using CISO P...
(CISOPlatform Summit & SACON 2024) Orientation by CISO Platform_ Using CISO P...
 
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 

Recently uploaded

Acumatica vs. Sage Intacct _Construction_July (1).pptx
Acumatica vs. Sage Intacct _Construction_July (1).pptxAcumatica vs. Sage Intacct _Construction_July (1).pptx
Acumatica vs. Sage Intacct _Construction_July (1).pptx
BrainSell Technologies
 
Mastering OnlyFans Clone App Development: Key Strategies for Success
Mastering OnlyFans Clone App Development: Key Strategies for SuccessMastering OnlyFans Clone App Development: Key Strategies for Success
Mastering OnlyFans Clone App Development: Key Strategies for Success
David Wilson
 
Using LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and MilvusUsing LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and Milvus
Zilliz
 
The Role of IoT in Australian Mobile App Development - PDF Guide
The Role of IoT in Australian Mobile App Development - PDF GuideThe Role of IoT in Australian Mobile App Development - PDF Guide
The Role of IoT in Australian Mobile App Development - PDF Guide
Shiv Technolabs
 
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
aslasdfmkhan4750
 
What's new in android: jetpack compose 2024
What's new in android: jetpack compose 2024What's new in android: jetpack compose 2024
What's new in android: jetpack compose 2024
Toru Wonyoung Choi
 
Three New Criminal Laws in India 1 July 2024
Three New Criminal Laws in India 1 July 2024Three New Criminal Laws in India 1 July 2024
Three New Criminal Laws in India 1 July 2024
aakash malhotra
 
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Muhammad Ali
 
Opencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of MünsterOpencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of Münster
Matthias Neugebauer
 
Vertex AI Agent Builder - GDG Alicante - Julio 2024
Vertex AI Agent Builder - GDG Alicante - Julio 2024Vertex AI Agent Builder - GDG Alicante - Julio 2024
Vertex AI Agent Builder - GDG Alicante - Julio 2024
Nicolás Lopéz
 
"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes..."Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
Anant Gupta
 
Google I/O Extended Harare Merged Slides
Google I/O Extended Harare Merged SlidesGoogle I/O Extended Harare Merged Slides
Google I/O Extended Harare Merged Slides
Google Developer Group - Harare
 
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
maigasapphire
 
Types of Weaving loom machine & it's technology
Types of Weaving loom machine & it's technologyTypes of Weaving loom machine & it's technology
Types of Weaving loom machine & it's technology
ldtexsolbl
 
EuroPython 2024 - Streamlining Testing in a Large Python Codebase
EuroPython 2024 - Streamlining Testing in a Large Python CodebaseEuroPython 2024 - Streamlining Testing in a Large Python Codebase
EuroPython 2024 - Streamlining Testing in a Large Python Codebase
Jimmy Lai
 
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptxDublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Kunal Gupta
 
Feature sql server terbaru performance.pptx
Feature sql server terbaru performance.pptxFeature sql server terbaru performance.pptx
Feature sql server terbaru performance.pptx
ssuser1915fe1
 
IPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite SolutionIPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite Solution
IPLOOK Networks
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc
 
BLOCKCHAIN TECHNOLOGY - Advantages and Disadvantages
BLOCKCHAIN TECHNOLOGY - Advantages and DisadvantagesBLOCKCHAIN TECHNOLOGY - Advantages and Disadvantages
BLOCKCHAIN TECHNOLOGY - Advantages and Disadvantages
SAI KAILASH R
 

Recently uploaded (20)

Acumatica vs. Sage Intacct _Construction_July (1).pptx
Acumatica vs. Sage Intacct _Construction_July (1).pptxAcumatica vs. Sage Intacct _Construction_July (1).pptx
Acumatica vs. Sage Intacct _Construction_July (1).pptx
 
Mastering OnlyFans Clone App Development: Key Strategies for Success
Mastering OnlyFans Clone App Development: Key Strategies for SuccessMastering OnlyFans Clone App Development: Key Strategies for Success
Mastering OnlyFans Clone App Development: Key Strategies for Success
 
Using LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and MilvusUsing LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and Milvus
 
The Role of IoT in Australian Mobile App Development - PDF Guide
The Role of IoT in Australian Mobile App Development - PDF GuideThe Role of IoT in Australian Mobile App Development - PDF Guide
The Role of IoT in Australian Mobile App Development - PDF Guide
 
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
 
What's new in android: jetpack compose 2024
What's new in android: jetpack compose 2024What's new in android: jetpack compose 2024
What's new in android: jetpack compose 2024
 
Three New Criminal Laws in India 1 July 2024
Three New Criminal Laws in India 1 July 2024Three New Criminal Laws in India 1 July 2024
Three New Criminal Laws in India 1 July 2024
 
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
 
Opencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of MünsterOpencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of Münster
 
Vertex AI Agent Builder - GDG Alicante - Julio 2024
Vertex AI Agent Builder - GDG Alicante - Julio 2024Vertex AI Agent Builder - GDG Alicante - Julio 2024
Vertex AI Agent Builder - GDG Alicante - Julio 2024
 
"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes..."Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
 
Google I/O Extended Harare Merged Slides
Google I/O Extended Harare Merged SlidesGoogle I/O Extended Harare Merged Slides
Google I/O Extended Harare Merged Slides
 
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
 
Types of Weaving loom machine & it's technology
Types of Weaving loom machine & it's technologyTypes of Weaving loom machine & it's technology
Types of Weaving loom machine & it's technology
 
EuroPython 2024 - Streamlining Testing in a Large Python Codebase
EuroPython 2024 - Streamlining Testing in a Large Python CodebaseEuroPython 2024 - Streamlining Testing in a Large Python Codebase
EuroPython 2024 - Streamlining Testing in a Large Python Codebase
 
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptxDublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
Dublin_mulesoft_meetup_Mulesoft_Salesforce_Integration (1).pptx
 
Feature sql server terbaru performance.pptx
Feature sql server terbaru performance.pptxFeature sql server terbaru performance.pptx
Feature sql server terbaru performance.pptx
 
IPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite SolutionIPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite Solution
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
 
BLOCKCHAIN TECHNOLOGY - Advantages and Disadvantages
BLOCKCHAIN TECHNOLOGY - Advantages and DisadvantagesBLOCKCHAIN TECHNOLOGY - Advantages and Disadvantages
BLOCKCHAIN TECHNOLOGY - Advantages and Disadvantages
 

(SACON) Dr. James Stanger - Surfing today’s emerging tech: A policy-based approach

  • 1. SACON SACON International 2020 India | Bangalore | February 21 - 22 | Taj Yeshwantpur Surfing today’s emerging tech: A policy-based approach James Stanger, PhD CompTIA Chief Technology Evangelist @jamesstanger
  • 2. SACON 2020 Ambient computing – a wave that’s already here • Context-aware computing – “Presencing 2.0” • Intelligent tech monitors people (AI & ML) • Information you generate and use moves from: • Individuals to edge / cloud / data center • Environment to environment • Machine to machine • Part of the 4th industrial revolution • The result? • Hyper-personalization - customer focus • Data analytics and business intelligence • Control (?)
  • 3. SACON 2020 Emerging tech categories generating this wave through 2023 The above revenue drivers are also the building blocks of the ambient computing world
  • 4. SACON 2020 Data / information has become the critical skill area
  • 5. SACON 2020 Unprecedented connectivity of (smart) things • How is this data connected to 
 emerging tech? • How do we process this data into
 information? ICS DCS SCADA OT IoT Sensors / actuators / radios Gateway Data AcquisitionEdge AIData center Storage Application Network ServerML
  • 6. SACON 2020 IoT / OT and next steps: Customer experience (CX) • The next steps are to: • Transform “emerging tech” into
 customer-centric solutions • Make the architecture more efficient How do we apply AI
 and ML IoT? How do we turn this into a customer- focused solution? What about 
 serverless / edge?Should we do this?
  • 7. SACON 2020 Cloud – finally being used • After much talk, we’re seeing 
 actual adoption over the past 5 years • Another part of the “4th industrial 
 revolution” • Azure vs. Alibaba vs. AWS, and so forth:
 It depends on your business model • Where do charges occur? • Data in and out • Services used • Integration experience is at a premium • We need workers that can convert 
 technical speak into business terms and 
 make decisions
  • 8. SACON 2020 Surprises in the cloud space • Two major surprise providers: • VMWare (Dell) • Red Hat (IBM) • Why? • Visualization: Can manage 
 multiple environments / providers • Network management: Using SD-WAN to route IoT device traffic • Abstraction layer: Helps avoid vendor lock-in • Customer focus: History of creating useful services • Emerging tech: Ability to integrate new solutions, including AI and blockchain
  • 9. SACON 2020 5G and emerging tech • 5G – it’s finally here (mostly) • Capturing data where it is generated • Edge – microclouds, mini data centers • Cloud • More devices to support • The good, the bad, and the ugly of 5G Good Connectivity Speed Edge capability Bad Tampering Eavesdropping Monitoring Attack surface DDoS Ugly Privacy Traffic QoS Trust models
  • 10. SACON 2020 AI / ML finds its place: automation • AI is often used as a subset of 
 automation • The use of tech to automatically: • Launch, under conditions • Respond to situations • Improve itself (and other “things”) • Communicate with other
 machines and other people • But now, it’s all about the 
 intelligence of things. Automation Artificial Intelligence Machine
 Learning Deep Learning KubernetesDocker
  • 11. SACON 2020 Common realities when implementing emerging tech • Shadow IT / Bring Your Own IT • Skipping steps in the software development 
 or platform deployment cycle • Not managing devices properly • No encryption • No or poor authentication • Rapid deployment of new technologies 
 workers don’t fully understand • Organizations receiving data that they 
 aren’t properly securing
  • 12. SACON 2020 • Because companies have at least two different perspectives • Information Technology (IT) • Business leaders Why does shadow IT exist? IT says shadow IT is: BAD Business says shadow IT is: GOOD
  • 13. SACON 2020 The risks of shadow IT Customer
 dissatisfactio n Loss of information integrity Non- compliance Cost overrunsPerformanc e issues
  • 14. SACON 2020 The result? • Upstream issues • Privacy issues • Penalties (e.g., GDPR, HIPAA) • Loss of consumer confidence • Attacks • Ransomware, credential harvesting • DDoS • Social engineering • Forms of “technical debt” • Organizations often can’t fix 
 problems that they 
 have created by using IoT, Cloud, 
 and other solutions • Security workers are asked to fix this problem Toxic IT? Code Complexity Monoculture s
  • 16. SACON 2020 So, who is responsible?
  • 17. SACON 2020 • IT workers
 need to
 solve
 these issues • They have
 the best
 perspective Complexity: The primary reason for increased sales cycles
  • 18. SACON 2020 • The industry has
 moved from mere
 detection to issues 
 involving: • Privacy • New ways of 
 investigating
 risk • Selective attack
 surface reduction
 
 Critical areas within cybersecurity
  • 19. SACON 2020 • Most companies
 can state a clear business
 case • But, the details
 remain a 
 problem • IT workers
 are needed
 to manage
 these factors
 ethically Issue Where IT can help Customer Confusion Clarify product capabilities (e.g., AI, BI). Find creative solutions. Help make the customer comfortable. Risk aversion The technical and business risks. Act as liaison. Help ensure privacy concerns are addressed. Budget constraints Provide accurate information concerning cloud- based services. Inhibiting factors for using emerging tech
  • 20. SACON 2020 • Learn your business! • This isn’t a technical issue • Focus on how information flows in your organization • Cloud-based assets • Enterprise / installed • It requires: • The ability to breakdown IT silos • Communication with business units • Ability to analyze multiple sources • Formal documentation • Network diagrams Adopting a policy-driven approach to “surf” emtech problems Asset discovery Articulate risk level Identify policy Evaluate compliance to policy Change managemen t policy Continuou s monitoring
  • 21. SACON 2020 • We need data / business
 intelligence analysts • Turn data into information • Identify trends • We also need security analysts • Moving from detection 
 to prevention • Threat modeling • Threat feed interpretation • Cloud-aware pen testing The need for analysts • Can’t secure 100% of the 
 company • Focus on critical resources (the 25%)
  • 22. SACON 2020 Threat hunters ▪ Profiling specific
 attacks ▪ Can provide
 characteristics
 and context ▪ Situational
 awareness ▪ Provides focus ▪ Can also use 
 threat feeds Learn how the organization communicates Identify resources essential to the organization Investigate attack techniques hackers will try that specific to your organization’s resources Proactively investigate – monitor and analyze Recommend security controls
  • 23. SACON 2020 • SolarWinds Service Desk • SysAid • ImmuniWeb Discovery • SolarWinds Network |
 Performance Monitor • Qualys • Many open source tools Asset discovery applications
  • 24. SACON 2020 The indispensable IT worker ▪ Having only tech skills isn’t
 enough ▪ Workers need a combination of human and tech skills • Emotional intelligence • Presentation skills • Complex reasoning • Writing • Categorizing and summarizing • Anticipating issues • Complex reasoning • Conditional thinking • Multi-vendor situations • Integration Ethics: An increasingly important ski
  • 25. SACON 2020 Cloud Seeding: A Cloud Computing Tutorial (CompTIA) The Skills needed to combat today’s cybersecurity
 threats (RSA) Automated Pen Testing
 (Admin Magazine) Two sides of the same coin: Pen testing and security analytics 
 What’s hot in network certifications (NetworkWorld) Escaping the Cybersecurity Metrics Matrix (CompTIA) Private Eye: Open source tools for automated pen testing Admin Magazine
 Thoughts about the help desk (YouTube) The Hunt for the Meaning of the Red team (CompTIA) The Internet of Things (IoT) and Technical Debt: Why It Matters (CompTIA) James Stanger, PhD jstanger@comptia.org +1 (360) 970-5357 Twitter: @jamesstanger Skype: stangernet
 My CompTIA hub:
 https://certification.comptia.org/it-career-news/hub/James-Stanger Thank You! Latest articles and blog entries: Putting AI and ML to work (CompTIA) What is the difference between IT security and cybersecurity? (CompTIA) Observations at RSA San Francisco 2019 (CompTIA) Moving to the Cloud:IT Infrastructure and Cybersecurity skills required (CompTIA) Where the Wild Things Are: Investigating Browser-based Brute Force Attacks (November, 2019, Admin Magazine) How Technical Debt Can Damage Business
 Agility and
 Competitiveness
 (ITPro, UK)