SlideShare a Scribd company logo
Eating The Security Elephant
Or
Swallowing the Security Ocean
Or
Congratulations! You’re the new security person!
Sean Jackson
Congratulations! You’re The New
Security Person!
About Me
Pentester, Incident Handling, Technical Debt
Consultant, Alliance Information Security
Senior Security Engineer, Solutionreach
General Manager of HackWest
InfoSec professional for 9 years
Husband, Father X5, keyboardist
I really like hacker challenges
Congratulations! You’re the new security person!
How did you get here?
Ignorance
Ignorance
L0: You don’t even know you’re ignorant of something
L1: You don’t know there are things you don’t know, and there’s no way you
might find out
L2: You know you don’t know something, but don’t know how to learn more
L3: You know you don’t know something, but you have a way to learn more
L4: You think you might know something
Competence
You don’t know you don’t do it well
You know you don’t do it well
You do it well, and you think about it while
doing it
You do it so well, it’s automatic
Playbooks
Playbooks
NIST (800-53)
ISO 23001
SANS 20 (CIS
Critical Security
Controls)
HIPAA
PCI
FISMA
Copy each line to a spreadsheet
Where are we today?
Are we doing it already?

(I color code yes/partial/no)
What would it take to do it?
When do we want to do it? (and notes)
– John Strand
“If you can’t detect an
inside actor, you have
no security program”
Inside Actor
What’s the low-hanging fruit?
Some of the things on the list will look simple
Application white listing? Not so much….
The Low-Hanging Fruit
Identify what you can knock out now without any
additional budget or headcount.
That’s all the low-hanging fruit. Go do it now.
Back to the Playbook
Identifying how much $ or how
many heads you’d need to do X
In budget = short/med
Not in budget = long and/or budget
conversation
Let’s talk about some good short/
med goals today:
What can we do TODAY?
Increased Security Awareness
EVERYONE is part of
Security
Empower all employees to
report things
Say Thank You to false
positives
Increased Security Awareness
Help the developers
(training SDL, OWASP,
Threat Modeling)
Increased Security Awareness
Train HR and Legal on
Information Disclosure,
espionage, policy violation
consequence, secure
hiring process, secure
dismissal process, etc
Increased Security Awareness
All these Increased Security Awareness items should be
short-term and med-term goals
Segment The Network
Break off everything that
doesn’t need to be externally
visible
Servers, file shares, printers,
etc
Need routers/switches/next-
gen firewall, if you have one
Short-term, maybe med-term
VPN
Don’t allow direct access
to ANYTHING from
outside
Need: Beefy (hardened)
box with multiple NIC
cards
Should be short-term
What else can we do today?
Logging
Logging
Need to learn grep, awk, sed,
regex
Set up a centralized logging
aggregation point
I recommend syslog-ng (on
linux) (windows can send to
it)
Make sure the box has lots of
storage
Logging
Logs are the paint on the
floor you’ll want to look at
when something wrong
happens
Get in the habit of
reviewing them
Could you automate
that?
Logging
Automation —
Something that reads logs
that come in, and match
something with regex
Maybe, send you an email
when it sees something you
have defined?
You’re standing on the edge of
a SEIM
Logging
Short-term, Med-term, and Long-term
What else can we do right now?
2FA On All Windows and Linux Boxes!
2FA
Windows now has
the option
Use Google
Authenticator for
free with Linux
This should be
short-term
What else should we think about?
How Is Your Organization Going to Assess Risk?
Talk to management, find out what
they see as risk.
Document with a score
Likelihood * Impact = Risk
Identify mitigations, new scores
Take feedback from anyone/
everyone and address it, add it to
the list
How Is Your Organization Going to Assess Risk?
Start this today,
then rinse and
repeat, ad
infinitum.
Physical Security
Physical Security
Doors
(And locks)
And next time your
company wants to do
some light construction,
talk about the latest
Tinder plugin, the mantrap
Physical Security
Cameras
Cover where a bad guy
would be if he were doing
bad things:
General workstation areas
Specific paths to and from
data closets
All entry and exit
Physical Security
Cameras
Needed: Dedicated
server, lots of storage
Big $$ bite in the
beginning, then roll out
more yearly
Badges
Two kinds; ID badges
and/or Access Cards
Don’t use one card for
both
Badges
This is where you
empower employees
Have all employees
question EVERYONE
without a badge
Policies
You can have lots of policies —
Company Policy
Information Security Policy
Access Policy
Approved Usage Policy
Data Retention Policy
Clean Desk Policy
And many more!
Policies
Work with the legal
department
The policies need
teeth.
There should be real
consequences to
violation
Policies
Train and work with HR
Make policy violation a
part of reviews
Some violations should
cost the job
Policies
Policies need to be
reviewed and updated
You will need to keep a
record of reviews and
track changes
Audits and Pentests
Audits
NOT adversarial!
Show them your playbook
spreadsheet
You don’t need to do
everything
You DO need to show that
you’ve considered everything
Audits
The auditor will do their
job
Understand what that
job is, and help them
Pentests
Pentests
Lots of kinds of penetration tests
Application
External Network
Internal Network
Physical
Social Engineering
Pentests
Similar to an audit
Findings are not attacks
(the speak to ignorance
which you can now solve)
Use a reputable agency,
not the most expensive,
not the cheapest
Audits and Pentests
You’ll most likely do
audits and pentests
once per year.
Start putting that on
your calendar now as a
long-term goal
Data Retention
Data Retention
Backups
Logs
Email (<—talk to Legal
inre: discoverable
evidence)
This would be mid-term
to long-term
Spot The Fed
Relationship with Cops/FBI
Talk to the InfraGard peeps
Take your local Fed to lunch
Tell them who you are, what
your org does, and find out how
to reach them when you think
you’re hacked
Talk to them now, NOT once
you’re hacked
Med-term
Budget / Headcount
Budget / Headcount
Look at the playbook
Hire to fill in gaps in skillset
Network Security
Application Security
Forensics
Governance / Risk /
Compliance
Red Team
Budget / Headcount
Hardware / Software
Security on the cheap
Opensource
Hardware on eBay
When you have more budget,
develop relationship with
VARS
This is med- and long-term
Last thing today, What about YOU?
What about you?
Training
What about you?
Certifications
What about you?
Conferences
SaintCon, BSidesSLC, HackWest,
OpenWest
Regional
BlackHat ($$$), BSidesLV, DefCon,
CactusCon
National
Too many to list
UtahSec
What about you?
Maintain
work/life
balance
Taking care of you is short-, med-, and long-term
Rinse and Repeat
Questions?
Sean Jackson @74rku5

More Related Content

What's hot

Secure Texting Best Practices: Supercharge Your Implementation Plan
Secure Texting Best Practices: Supercharge Your Implementation PlanSecure Texting Best Practices: Supercharge Your Implementation Plan
Secure Texting Best Practices: Supercharge Your Implementation Plan
qliqSoft
 
What are some study techniques which I could use?
What are some study techniques which I could use?What are some study techniques which I could use?
What are some study techniques which I could use?
Lorenz Duremdes, Polymath
 
Never show a design you haven't tested
Never show a design you haven't testedNever show a design you haven't tested
Never show a design you haven't tested
Ida Aalen
 
Laptop physical security
Laptop physical securityLaptop physical security
Laptop physical security
Kensington ClickSafe™
 
Pilot Tech Talk #5—Managing notifications and messages in Slack by Piotrek Pe...
Pilot Tech Talk #5—Managing notifications and messages in Slack by Piotrek Pe...Pilot Tech Talk #5—Managing notifications and messages in Slack by Piotrek Pe...
Pilot Tech Talk #5—Managing notifications and messages in Slack by Piotrek Pe...
Pilot
 
Interview - online
Interview - onlineInterview - online
Interview - online
DR. Ram Kumar Pathak
 
Subject assignment 2 Google Effects for Academic writing
Subject assignment 2 Google Effects for Academic writingSubject assignment 2 Google Effects for Academic writing
Subject assignment 2 Google Effects for Academic writing
VanithaDsouza1
 
Sidekicktohero
SidekicktoheroSidekicktohero
Sidekicktohero
m-bright
 

What's hot (8)

Secure Texting Best Practices: Supercharge Your Implementation Plan
Secure Texting Best Practices: Supercharge Your Implementation PlanSecure Texting Best Practices: Supercharge Your Implementation Plan
Secure Texting Best Practices: Supercharge Your Implementation Plan
 
What are some study techniques which I could use?
What are some study techniques which I could use?What are some study techniques which I could use?
What are some study techniques which I could use?
 
Never show a design you haven't tested
Never show a design you haven't testedNever show a design you haven't tested
Never show a design you haven't tested
 
Laptop physical security
Laptop physical securityLaptop physical security
Laptop physical security
 
Pilot Tech Talk #5—Managing notifications and messages in Slack by Piotrek Pe...
Pilot Tech Talk #5—Managing notifications and messages in Slack by Piotrek Pe...Pilot Tech Talk #5—Managing notifications and messages in Slack by Piotrek Pe...
Pilot Tech Talk #5—Managing notifications and messages in Slack by Piotrek Pe...
 
Interview - online
Interview - onlineInterview - online
Interview - online
 
Subject assignment 2 Google Effects for Academic writing
Subject assignment 2 Google Effects for Academic writingSubject assignment 2 Google Effects for Academic writing
Subject assignment 2 Google Effects for Academic writing
 
Sidekicktohero
SidekicktoheroSidekicktohero
Sidekicktohero
 

Similar to Security crashcourse openwest_2019

Simulating Real World Attack
Simulating Real World AttackSimulating Real World Attack
Simulating Real World Attack
tmacuk
 
You Can't Buy Security - DerbyCon 2012
You Can't Buy Security - DerbyCon 2012You Can't Buy Security - DerbyCon 2012
You Can't Buy Security - DerbyCon 2012
jadedsecurity
 
Assessing Your security
Assessing Your securityAssessing Your security
Thought Leader Interview: HP's Global CISO Brett Wahlin on the Future of Secu...
Thought Leader Interview: HP's Global CISO Brett Wahlin on the Future of Secu...Thought Leader Interview: HP's Global CISO Brett Wahlin on the Future of Secu...
Thought Leader Interview: HP's Global CISO Brett Wahlin on the Future of Secu...
Dana Gardner
 
Cliffnotes on Blue Teaming
Cliffnotes on Blue TeamingCliffnotes on Blue Teaming
Cliffnotes on Blue Teaming
Rishabh Dangwal
 
Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information security
Major Hayden
 
Software projects can go well... ask me how
Software projects can go well... ask me howSoftware projects can go well... ask me how
Software projects can go well... ask me how
Daniel Cardelús
 
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
Dana Gardner
 
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
John Bambenek
 
2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference 2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference
Rea & Associates
 
Conference presentation
Conference presentationConference presentation
Conference presentation
JasonCamronRochon
 
Security Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersSecurity Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud Examiners
The Lorenzi Group
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
Matthew Pascucci
 
Rick Clymer - Incident Management.pdf
Rick Clymer - Incident Management.pdfRick Clymer - Incident Management.pdf
Rick Clymer - Incident Management.pdf
QA or the Highway
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
vicenteDiaz_KL
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
AEGILITY
 
Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?
Rob Fuller
 
SANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPSANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLP
Nick Selby
 
Productivity 3.0
Productivity 3.0Productivity 3.0
Productivity 3.0
The Lorenzi Group
 
Red Team Operations: Attack and Think Like a Criminal
Red Team Operations: Attack and Think Like a CriminalRed Team Operations: Attack and Think Like a Criminal
Red Team Operations: Attack and Think Like a Criminal
Infosec
 

Similar to Security crashcourse openwest_2019 (20)

Simulating Real World Attack
Simulating Real World AttackSimulating Real World Attack
Simulating Real World Attack
 
You Can't Buy Security - DerbyCon 2012
You Can't Buy Security - DerbyCon 2012You Can't Buy Security - DerbyCon 2012
You Can't Buy Security - DerbyCon 2012
 
Assessing Your security
Assessing Your securityAssessing Your security
Assessing Your security
 
Thought Leader Interview: HP's Global CISO Brett Wahlin on the Future of Secu...
Thought Leader Interview: HP's Global CISO Brett Wahlin on the Future of Secu...Thought Leader Interview: HP's Global CISO Brett Wahlin on the Future of Secu...
Thought Leader Interview: HP's Global CISO Brett Wahlin on the Future of Secu...
 
Cliffnotes on Blue Teaming
Cliffnotes on Blue TeamingCliffnotes on Blue Teaming
Cliffnotes on Blue Teaming
 
Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information security
 
Software projects can go well... ask me how
Software projects can go well... ask me howSoftware projects can go well... ask me how
Software projects can go well... ask me how
 
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
 
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
 
2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference 2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference
 
Conference presentation
Conference presentationConference presentation
Conference presentation
 
Security Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersSecurity Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud Examiners
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Rick Clymer - Incident Management.pdf
Rick Clymer - Incident Management.pdfRick Clymer - Incident Management.pdf
Rick Clymer - Incident Management.pdf
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?
 
SANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPSANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLP
 
Productivity 3.0
Productivity 3.0Productivity 3.0
Productivity 3.0
 
Red Team Operations: Attack and Think Like a Criminal
Red Team Operations: Attack and Think Like a CriminalRed Team Operations: Attack and Think Like a Criminal
Red Team Operations: Attack and Think Like a Criminal
 

Recently uploaded

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 

Recently uploaded (20)

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 

Security crashcourse openwest_2019