SlideShare a Scribd company logo
Be CyberSMART.
Get CyberSECURE.
Strategy: If you don’t know
where you’re going, you’ll
never get there
Don Welch, Ph.D.
CISO
Be CyberSMART.
Get CyberSECURE.
Be CyberSMART.
Get CyberSECURE.
Agenda
• Introduction
• Risk
• Strategy Basics
• IT and Business Strategy
• Strategic Analysis
• Design Framework
• Communicating the Strategy
Be CyberSMART.
Get CyberSECURE.
Introduction
Be CyberSMART.
Get CyberSECURE.
Why listen to me?
Be CyberSMART.
Get CyberSECURE.
Cyber Security Environment
Be CyberSMART.
Get CyberSECURE.
Be CyberSMART.
Get CyberSECURE.
Be CyberSMART.
Get CyberSECURE.
Foreign Intelligence
Be CyberSMART.
Get CyberSECURE.
Criminals
Be CyberSMART.
Get CyberSECURE.
Hacktivists
Be CyberSMART.
Get CyberSECURE.
C-Level Leaders
Be CyberSMART.
Get CyberSECURE.
Risk
Be CyberSMART.
Get CyberSECURE.
Be CyberSMART.
Get CyberSECURE.
Be CyberSMART.
Get CyberSECURE.
Strategy 101
Be CyberSMART.
Get CyberSECURE.
Strategy: Definition
High level plan to achieve
one or more goals under
conditions of uncertainty
• WikiPedia
Be CyberSMART.
Get CyberSECURE.
Strategy: Definitions
A pattern in a stream of
decisions
• Henry Mintzberg, McGill
University
Be CyberSMART.
Get CyberSECURE.
Strategy: Definitions
Planning and marshalling
resources for their most
efficient and effective use
• Business Dictionary
Be CyberSMART.
Get CyberSECURE.
Strategy: Definitions
•Plan to achieve long-term
goals
•Guide for decisions at all
levels
•Efficient and effective
resource allocation
Be CyberSMART.
Get CyberSECURE.
Be CyberSMART.
Get CyberSECURE.
Be CyberSMART.
Get CyberSECURE.
Asymmetry and Adversaries
Be CyberSMART.
Get CyberSECURE.
Be CyberSMART.
Get CyberSECURE.
Strategic Environment Analysis
Asset Impact Attacker Payoff Capability
Threat
Be CyberSMART.
Get CyberSECURE.
Be CyberSMART.
Get CyberSECURE.
Constraints
• Funding
• Regulations and Laws
• Staff Time and Talent
• Business Overhead
• Political Capital
• Accountability
• Calendar Time
Be CyberSMART.
Get CyberSECURE.
Be CyberSMART.
Get CyberSECURE.
Be CyberSMART.
Get CyberSECURE.
Coverage Matrix
People Process Technology
Identify
Protect
Detect
Respond
Recover
Be CyberSMART.
Get CyberSECURE.
Example Nested Matrix
Detect/Technology Near Real-Time Post Compromise
Network
Payload
Endpoint
Be CyberSMART.
Get CyberSECURE.
Example Nested Matrix
Protect/People Users IT Staff Security
Mandatory
Optional
Be CyberSMART.
Get CyberSECURE.
Be CyberSMART.
Get CyberSECURE.
Written Plan
•One Pager
•< 10 Pages
•Full Document
Be CyberSMART.
Get CyberSECURE.
Be CyberSMART.
Get CyberSECURE.
Be CyberSMART.
Get CyberSECURE.
Be CyberSMART.
Get CyberSECURE.
Be CyberSMART.
Get CyberSECURE.
Be CyberSMART.
Get CyberSECURE.
Information Security Strategy
Low
Moderate
High
High +
(Restricted)
Identify Protect
Watch
Respond Recover
Be CyberSMART.
Get CyberSECURE.
Be CyberSMART.
Get CyberSECURE.

More Related Content

Similar to Spc cyber security strategy

AI in Cybersecurity | 2023
AI in Cybersecurity | 2023AI in Cybersecurity | 2023
AI in Cybersecurity | 2023
KharimMchatta
 
Clear and present danger: Cyber Threats and Trends 2017
Clear and present danger: Cyber Threats and Trends 2017Clear and present danger: Cyber Threats and Trends 2017
Clear and present danger: Cyber Threats and Trends 2017
Morakinyo Animasaun
 
Shadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining ControlShadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining Control
CipherCloud
 
Cyber security resilience ESRM Conference Amsterdam 2016
Cyber security resilience  ESRM Conference Amsterdam 2016Cyber security resilience  ESRM Conference Amsterdam 2016
Cyber security resilience ESRM Conference Amsterdam 2016
Niran Seriki, CCISO, CISM
 
Major General Brett Williams
Major General Brett WilliamsMajor General Brett Williams
Major General Brett Williams
Hanah Croft
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Steve Poole
 
ethicalhacking-1
ethicalhacking-1ethicalhacking-1
ethicalhacking-1
CSERAMYA
 
South West Cyber Security Cluster Introduction
South West Cyber Security Cluster IntroductionSouth West Cyber Security Cluster Introduction
South West Cyber Security Cluster Introduction
Peter Jones
 
How to be a Security Wingman by Dominique Singer
How to be a Security Wingman by Dominique Singer How to be a Security Wingman by Dominique Singer
How to be a Security Wingman by Dominique Singer
SaraPia5
 
Securing the Digital Frontier: Navigating the World of Cyber Crypto
Securing the Digital Frontier: Navigating the World of Cyber CryptoSecuring the Digital Frontier: Navigating the World of Cyber Crypto
Securing the Digital Frontier: Navigating the World of Cyber Crypto
cybertracking342
 
Etical hacking
Etical hackingEtical hacking
Etical hackingtalhaabid
 
Scot Secure 2016
Scot Secure 2016Scot Secure 2016
Scot Secure 2016
Ray Bugg
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
Ray Bugg
 
Personal Digital Hygiene
Personal Digital HygienePersonal Digital Hygiene
e-Extortion Trends and Defense
e-Extortion Trends and Defensee-Extortion Trends and Defense
e-Extortion Trends and Defense
Erik Iker
 
Scot Secure 2018
Scot Secure 2018Scot Secure 2018
Scot Secure 2018
Ray Bugg
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptx
dhumaletiku
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
Aravind R
 
The Current State of Cybersecurity
The Current State of CybersecurityThe Current State of Cybersecurity
The Current State of Cybersecurity
TruShield Security Solutions
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
Steve Poole
 

Similar to Spc cyber security strategy (20)

AI in Cybersecurity | 2023
AI in Cybersecurity | 2023AI in Cybersecurity | 2023
AI in Cybersecurity | 2023
 
Clear and present danger: Cyber Threats and Trends 2017
Clear and present danger: Cyber Threats and Trends 2017Clear and present danger: Cyber Threats and Trends 2017
Clear and present danger: Cyber Threats and Trends 2017
 
Shadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining ControlShadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining Control
 
Cyber security resilience ESRM Conference Amsterdam 2016
Cyber security resilience  ESRM Conference Amsterdam 2016Cyber security resilience  ESRM Conference Amsterdam 2016
Cyber security resilience ESRM Conference Amsterdam 2016
 
Major General Brett Williams
Major General Brett WilliamsMajor General Brett Williams
Major General Brett Williams
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 
ethicalhacking-1
ethicalhacking-1ethicalhacking-1
ethicalhacking-1
 
South West Cyber Security Cluster Introduction
South West Cyber Security Cluster IntroductionSouth West Cyber Security Cluster Introduction
South West Cyber Security Cluster Introduction
 
How to be a Security Wingman by Dominique Singer
How to be a Security Wingman by Dominique Singer How to be a Security Wingman by Dominique Singer
How to be a Security Wingman by Dominique Singer
 
Securing the Digital Frontier: Navigating the World of Cyber Crypto
Securing the Digital Frontier: Navigating the World of Cyber CryptoSecuring the Digital Frontier: Navigating the World of Cyber Crypto
Securing the Digital Frontier: Navigating the World of Cyber Crypto
 
Etical hacking
Etical hackingEtical hacking
Etical hacking
 
Scot Secure 2016
Scot Secure 2016Scot Secure 2016
Scot Secure 2016
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
 
Personal Digital Hygiene
Personal Digital HygienePersonal Digital Hygiene
Personal Digital Hygiene
 
e-Extortion Trends and Defense
e-Extortion Trends and Defensee-Extortion Trends and Defense
e-Extortion Trends and Defense
 
Scot Secure 2018
Scot Secure 2018Scot Secure 2018
Scot Secure 2018
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptx
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 
The Current State of Cybersecurity
The Current State of CybersecurityThe Current State of Cybersecurity
The Current State of Cybersecurity
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
 

More from IT Strategy Group

11 pp-cybersecurity-revised2 a
11 pp-cybersecurity-revised2 a11 pp-cybersecurity-revised2 a
11 pp-cybersecurity-revised2 a
IT Strategy Group
 
Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-
IT Strategy Group
 
Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015
IT Strategy Group
 
Todcouncil proposed pi_gppt
Todcouncil proposed pi_gpptTodcouncil proposed pi_gppt
Todcouncil proposed pi_gppt
IT Strategy Group
 
David sm14 inppt01
David  sm14 inppt01David  sm14 inppt01
David sm14 inppt01
IT Strategy Group
 
Strategic information systems planning
Strategic information systems planningStrategic information systems planning
Strategic information systems planning
IT Strategy Group
 
Kirksey kirk
Kirksey kirkKirksey kirk
Kirksey kirk
IT Strategy Group
 
Management summary presentation
Management summary presentationManagement summary presentation
Management summary presentation
IT Strategy Group
 
Jehyuk jang and heung no lee ieee double spend
Jehyuk jang and heung no lee ieee double spendJehyuk jang and heung no lee ieee double spend
Jehyuk jang and heung no lee ieee double spend
IT Strategy Group
 
Jehyuk jang and heung no lee double spend
Jehyuk jang and heung no lee double spendJehyuk jang and heung no lee double spend
Jehyuk jang and heung no lee double spend
IT Strategy Group
 
Jae hyung lee mit
Jae hyung lee mitJae hyung lee mit
Jae hyung lee mit
IT Strategy Group
 
Huashan chen, marcus pendleton, laurent njilla, and shouhuai xu
Huashan chen, marcus pendleton, laurent njilla, and shouhuai xuHuashan chen, marcus pendleton, laurent njilla, and shouhuai xu
Huashan chen, marcus pendleton, laurent njilla, and shouhuai xu
IT Strategy Group
 
Emily rutland blockchain
Emily rutland blockchainEmily rutland blockchain
Emily rutland blockchain
IT Strategy Group
 
Donn felker etehreum
Donn felker etehreumDonn felker etehreum
Donn felker etehreum
IT Strategy Group
 
Delloite custodian whitepaper
Delloite custodian whitepaperDelloite custodian whitepaper
Delloite custodian whitepaper
IT Strategy Group
 
David shrier, weige wu, alex pentland mit blockchain
David shrier, weige wu, alex pentland mit blockchainDavid shrier, weige wu, alex pentland mit blockchain
David shrier, weige wu, alex pentland mit blockchain
IT Strategy Group
 
Rui zhang and rui xue, georgia tech
Rui zhang and rui xue, georgia techRui zhang and rui xue, georgia tech
Rui zhang and rui xue, georgia tech
IT Strategy Group
 
Sarwar sayeed , hector marco gisbert, tom caira ieee
Sarwar sayeed , hector marco gisbert, tom caira ieeeSarwar sayeed , hector marco gisbert, tom caira ieee
Sarwar sayeed , hector marco gisbert, tom caira ieee
IT Strategy Group
 
Nist.ir.8202
Nist.ir.8202Nist.ir.8202
Nist.ir.8202
IT Strategy Group
 
Jun dai blockchain
Jun dai blockchainJun dai blockchain
Jun dai blockchain
IT Strategy Group
 

More from IT Strategy Group (20)

11 pp-cybersecurity-revised2 a
11 pp-cybersecurity-revised2 a11 pp-cybersecurity-revised2 a
11 pp-cybersecurity-revised2 a
 
Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-
 
Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015
 
Todcouncil proposed pi_gppt
Todcouncil proposed pi_gpptTodcouncil proposed pi_gppt
Todcouncil proposed pi_gppt
 
David sm14 inppt01
David  sm14 inppt01David  sm14 inppt01
David sm14 inppt01
 
Strategic information systems planning
Strategic information systems planningStrategic information systems planning
Strategic information systems planning
 
Kirksey kirk
Kirksey kirkKirksey kirk
Kirksey kirk
 
Management summary presentation
Management summary presentationManagement summary presentation
Management summary presentation
 
Jehyuk jang and heung no lee ieee double spend
Jehyuk jang and heung no lee ieee double spendJehyuk jang and heung no lee ieee double spend
Jehyuk jang and heung no lee ieee double spend
 
Jehyuk jang and heung no lee double spend
Jehyuk jang and heung no lee double spendJehyuk jang and heung no lee double spend
Jehyuk jang and heung no lee double spend
 
Jae hyung lee mit
Jae hyung lee mitJae hyung lee mit
Jae hyung lee mit
 
Huashan chen, marcus pendleton, laurent njilla, and shouhuai xu
Huashan chen, marcus pendleton, laurent njilla, and shouhuai xuHuashan chen, marcus pendleton, laurent njilla, and shouhuai xu
Huashan chen, marcus pendleton, laurent njilla, and shouhuai xu
 
Emily rutland blockchain
Emily rutland blockchainEmily rutland blockchain
Emily rutland blockchain
 
Donn felker etehreum
Donn felker etehreumDonn felker etehreum
Donn felker etehreum
 
Delloite custodian whitepaper
Delloite custodian whitepaperDelloite custodian whitepaper
Delloite custodian whitepaper
 
David shrier, weige wu, alex pentland mit blockchain
David shrier, weige wu, alex pentland mit blockchainDavid shrier, weige wu, alex pentland mit blockchain
David shrier, weige wu, alex pentland mit blockchain
 
Rui zhang and rui xue, georgia tech
Rui zhang and rui xue, georgia techRui zhang and rui xue, georgia tech
Rui zhang and rui xue, georgia tech
 
Sarwar sayeed , hector marco gisbert, tom caira ieee
Sarwar sayeed , hector marco gisbert, tom caira ieeeSarwar sayeed , hector marco gisbert, tom caira ieee
Sarwar sayeed , hector marco gisbert, tom caira ieee
 
Nist.ir.8202
Nist.ir.8202Nist.ir.8202
Nist.ir.8202
 
Jun dai blockchain
Jun dai blockchainJun dai blockchain
Jun dai blockchain
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 

Spc cyber security strategy