SlideShare a Scribd company logo
© 2020 Attivo Networks. All rights reserved. 1Confidential
Transform your biggest risks into one of your greatest allies
human dilemma_
Webinar starts at
12:00 pm AEDT
/the
© 2020 Attivo Networks. All rights reserved. 2Confidential
Transform your biggest risks into one of your greatest allies
human dilemma_
/the
+
Our Speakers
Jacqueline Jayne
KnowBe4
Security Awareness Advocate - APAC
Kelvin Heath
Vectra
Chief Security Officer
human dilemma_
/the
5
90%
of successful data breaches
started with a phishing
attack
• 90% of successful data breaches
started with a phishing attack
• In Australia, 65% of Businesses
reported interruptions due to a
security breach in the last year
• 60% of small business who
experienced a major cyber incident
never recover
Reality by Numbers
6
Percentage of
organisations that
have been breached
in the past 12
months
• 35% of Japanese
• 34% of Australian
• 33.5% of Indian
• 32% of Malaysian
• 26% of Singapore
• 24% of Philippines
70% say educating employees
and leaders is their biggest
challenge and 60% struggle to
provide it
https://www.sophos.com/en-us/medialibrary/Gated-Assets/white-
papers/sophos-the-future-of-cybersecurity-in-apj.pdf
7
Human Error
• 1,300,000 Facebook logins
• 19,000,000 texts sent
• 190,000,000 emails sent
• $1,100,000 spent online
Wait One Minute!
9
Agenda
• The Perception vs. Reality dilemma
• Understanding the OODA (Observe, Orient,
Decide, Act) Loop
• How social engineers and scam artists
achieve their goals by subverting its
different components
• How we can defend ourselves and our
organisations
10
Pick a card
11
Is it gone?
12
How did I do it?
We started with this:
And ended with this:
These are two completely different sets of cards.
And by rushing you through the process, you probably didn’t notice!
13
Our brains’ job
is to filter, interpret,
and present us
with ‘reality’
Understanding the root of deception
14
What is REALITY?
15
"It deosn't mttaer in waht oredr the ltteers in a
wrod are, the olny iprmoetnt tihng is taht the
frist and lsat ltteer be in the rghit pclae.
The rset can be a toatl mses and you can sitll
raed it wouthit a porbelm.
Tihs is bcuseae the huamn mnid deos not raed
ervey lteter by istlef, but the wrod as a wlohe."
16
Agenda
• The Perception vs. Reality dilemma
• Understanding the OODA (Observe, Orient,
Decide, Act) Loop
• How social engineers and scam artists
achieve their goals by subverting its
different components
• How we can defend ourselves and our
organisations
OODA
-----------
A Model for
Decision
Making
OBSERVE
ORIENT
DECIDE
ACT
18
OBSERVE
ORIENT
DECIDE
ACT
OBSERVE
ORIENT
DECIDE
CRITICAL THINKING STEPS
The ideal situation for a
social engineer is to hijack
the OODA loop by creating a
knee-jerk action that
effectively bypasses the first
three steps and results in the
attacker’s intended Action.
19
OBSERVE
ORIENT
DECIDE
ACT
OBSERVE
ORIENT
DECIDE
Messing with the OODA Loop
• Manipulate facts
• Withhold facts
• Manipulate Context
• Manipulate Attention
• Exploit known bias
• Invoke Emotion
• Feed them a ”truth sandwich”
20
Agenda
• The Perception vs. Reality dilemma
• Understanding the OODA (Observe, Orient,
Decide, Act) Loop
• How social engineers and scam artists
achieve their goals by subverting its
different components
• How we can defend ourselves and our
organisations
21
Disinformation
watch videotocontinue
error
to solve
clickhere
advertising
wait5 secondS
downloadskip
click here
getfreemoney!
$
22
Immediate Stressor Events
https://www.mailguard.com.au
23
Immediate Stressor Events
https://www.mailguard.com.au
24
Immediate Stressor Events
https://www.mailguard.com.au
25
Immediate Stressor Events
https://www.mailguard.com.au
26
https://www.cyber.gov.au/threats
https://auspost.com.au/
Smishing
27
Agenda
• The Perception vs. Reality dilemma
• Understanding the OODA (Observe, Orient, Decide, Act)
Loop
• How social engineers and scam artists achieve their
goals by subverting its different components
• How we can defend ourselves and our organisations
28
If you try to work against human nature,
you will fail…
30
It’s a Human Condition
Are You Being Manipulated?
-- understand the lures --
Greed
Urgency
Curiosity
Fear
Self Interest
Helpfulness
+
Where does Security Awareness & Training fit in
with my Cyber Security Compliance & Frameworks?
NIST ISO 27001PCI DSS
33
Security Awareness and Education Program
34
Phishing Security Test
Phishing Reply Test
Phishing
Security Awareness
Training Password Email Security Malware
Social Media Phishing Test
Phish Alert Button
Second Chance
Automated Security
Awareness Program
(ASAP)
Training Preview
Breached Password Test
Weak Password Test
Password Exposure Test
Multi-Factor
Authentication
Security Assessment
Email Exposure
Check Pro
Domain Spoof Test
Mailserver Assessment
(MSA)
Domain Doppelgänger
Ransomware
Simulator Tool
USB Security Test
E-Books Case Studies White Papers BlogResearchWebinarsGlossary …and more!
FREE Tools and Resources https://www.knowbe4.com/resources
35
Products and Services
Kevin Mitnick
Security Awareness Training
Enterprise Security
Awareness Training
Identify and respond to email
threats faster with PhishER
Streamline your compliance,
risk, and audit management
with KCM GRC.
Book a KnowBe4
Platform Overview
+
For more information and to book your
KnowBe4 platform demonstration
Visit our partner page!
https://www.vectracorp.com/partners/knowbe4
Questions?
© 2020 Attivo Networks. All rights reserved. 37Confidential
THANK YOU !
Contact us on:
vectra-corp.com
vimeo.com/vectra
linkedin.com/company/vectra-corporation-ltd
info@vectra-corp.com

More Related Content

Similar to The Human Delimma - KnowBe4 & Vectra

I Was A Guest Lecturer at Yeditepe University MBA Program in Turkey
I Was A Guest Lecturer at Yeditepe University MBA Program in TurkeyI Was A Guest Lecturer at Yeditepe University MBA Program in Turkey
I Was A Guest Lecturer at Yeditepe University MBA Program in Turkey
Fahri Karakas
 
Practical Advantages of a Security Educated Workforce
Practical Advantages of a Security Educated WorkforcePractical Advantages of a Security Educated Workforce
Practical Advantages of a Security Educated Workforce
Keyaan Williams
 
Malware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade DetectionMalware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade Detection
Lastline, Inc.
 
The trinity fuelling the future of project management
The trinity fuelling the future of project managementThe trinity fuelling the future of project management
The trinity fuelling the future of project management
Ulohomuno, Eze Afieroho PMP
 
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Steve Werby
 
Group Interview Paper
Group Interview PaperGroup Interview Paper
Group Interview Paper
Jennifer Lopez
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
Ayodeji Rotibi
 
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
Capgemini
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
Ray Bugg
 
Red vs. Blue Why we’ve been getting it wrong for 25 years
Red vs. Blue Why we’ve been getting it wrong for 25 yearsRed vs. Blue Why we’ve been getting it wrong for 25 years
Red vs. Blue Why we’ve been getting it wrong for 25 years
EC-Council
 
Risk - effective engagement v. Management tick box exercise?
Risk - effective engagement v. Management tick box exercise?Risk - effective engagement v. Management tick box exercise?
Risk - effective engagement v. Management tick box exercise?
Warwick Business School
 
2012 777 The Seven Blind Spots in Business and How to Prevent Them
2012 777   The Seven Blind Spots in Business and How to Prevent Them2012 777   The Seven Blind Spots in Business and How to Prevent Them
2012 777 The Seven Blind Spots in Business and How to Prevent Them
Smith Family Business Initiative at Cornell
 
Getting to know you: the psychology of information management
Getting to know you: the psychology of information managementGetting to know you: the psychology of information management
Getting to know you: the psychology of information management
Heather Jack
 
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
Russell Publishing
 
2015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 202015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 20
Marc S. Sokol
 
Educause+V4.ppt
Educause+V4.pptEducause+V4.ppt
Educause+V4.ppt
ssuser0e5cee
 
Hacker House August Proposal
Hacker House August ProposalHacker House August Proposal
Hacker House August Proposal
Innotech Network™
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Matt Hathaway
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Alexandre Sieira
 

Similar to The Human Delimma - KnowBe4 & Vectra (20)

I Was A Guest Lecturer at Yeditepe University MBA Program in Turkey
I Was A Guest Lecturer at Yeditepe University MBA Program in TurkeyI Was A Guest Lecturer at Yeditepe University MBA Program in Turkey
I Was A Guest Lecturer at Yeditepe University MBA Program in Turkey
 
Practical Advantages of a Security Educated Workforce
Practical Advantages of a Security Educated WorkforcePractical Advantages of a Security Educated Workforce
Practical Advantages of a Security Educated Workforce
 
Malware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade DetectionMalware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade Detection
 
The trinity fuelling the future of project management
The trinity fuelling the future of project managementThe trinity fuelling the future of project management
The trinity fuelling the future of project management
 
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
 
Group Interview Paper
Group Interview PaperGroup Interview Paper
Group Interview Paper
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
 
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
 
Red vs. Blue Why we’ve been getting it wrong for 25 years
Red vs. Blue Why we’ve been getting it wrong for 25 yearsRed vs. Blue Why we’ve been getting it wrong for 25 years
Red vs. Blue Why we’ve been getting it wrong for 25 years
 
Risk - effective engagement v. Management tick box exercise?
Risk - effective engagement v. Management tick box exercise?Risk - effective engagement v. Management tick box exercise?
Risk - effective engagement v. Management tick box exercise?
 
2012 777 The Seven Blind Spots in Business and How to Prevent Them
2012 777   The Seven Blind Spots in Business and How to Prevent Them2012 777   The Seven Blind Spots in Business and How to Prevent Them
2012 777 The Seven Blind Spots in Business and How to Prevent Them
 
Getting to know you: the psychology of information management
Getting to know you: the psychology of information managementGetting to know you: the psychology of information management
Getting to know you: the psychology of information management
 
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
2015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 202015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 20
 
Educause+V4.ppt
Educause+V4.pptEducause+V4.ppt
Educause+V4.ppt
 
Hacker House August Proposal
Hacker House August ProposalHacker House August Proposal
Hacker House August Proposal
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
 

Recently uploaded

UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 

Recently uploaded (20)

UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 

The Human Delimma - KnowBe4 & Vectra